Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-4088
|
High
|
|
Oct 29, 2010
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
<= 11.5.8.612
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-4089
|
High
|
|
Oct 29, 2010
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
<= 11.5.8.612
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-4090
|
High
|
|
Oct 29, 2010
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
<= 11.5.8.612
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-3653
|
High
|
|
Oct 26, 2010
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
<= 11.5.8.612
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
|
CVE-2010-2874
|
High
|
|
Sep 7, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2863
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2864
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2865
|
Medium
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2866
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2867
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|