Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-2868
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2869
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2870
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2871
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2872
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2873
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2875
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2876
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2877
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2878
|
High
|
|
Aug 26, 2010
|
== 8.5.324
<= 11.5.7.609
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|