Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2012-4820
|
High
|
|
Jan 11, 2013
|
== 6.1.0
== 6.1.0.7
== 6.2.0
== 6.2.0.1
== 6.2.0.2
== 6.2.0.3
== 6.2.1
== 6.2.1.0
== 6.2.1.1
== 6.2.1.2
== 6.2.1.3
== 6.2.1.4
== 6.2.2
== 6.2.2.0
== 6.2.2.1
== 6.2.2.2
== 6.2.2.3
== 6.2.2.4
== 6.2.2.5
== 6.2.2.6
== 6.2.2.7
== 6.2.2.8
== 6.2.2.9
== 6.2.3
== 6.2.3.0
== 6.2.3.1
== 6.2.3.2
|
CVE-2012-4821
|
High
|
|
Jan 11, 2013
|
== 6.1.0
== 6.1.0.7
== 6.2.0
== 6.2.0.1
== 6.2.0.2
== 6.2.0.3
== 6.2.1
== 6.2.1.0
== 6.2.1.1
== 6.2.1.2
== 6.2.1.3
== 6.2.1.4
== 6.2.2
== 6.2.2.0
== 6.2.2.1
== 6.2.2.2
== 6.2.2.3
== 6.2.2.4
== 6.2.2.5
== 6.2.2.6
== 6.2.2.7
== 6.2.2.8
== 6.2.2.9
== 6.2.3
== 6.2.3.0
== 6.2.3.1
== 6.2.3.2
|
CVE-2012-4822
|
High
|
|
Jan 11, 2013
|
== 6.1.0
== 6.1.0.7
== 6.2.0
== 6.2.0.1
== 6.2.0.2
== 6.2.0.3
== 6.2.1
== 6.2.1.0
== 6.2.1.1
== 6.2.1.2
== 6.2.1.3
== 6.2.1.4
== 6.2.2
== 6.2.2.0
== 6.2.2.1
== 6.2.2.2
== 6.2.2.3
== 6.2.2.4
== 6.2.2.5
== 6.2.2.6
== 6.2.2.7
== 6.2.2.8
== 6.2.2.9
== 6.2.3
== 6.2.3.0
== 6.2.3.1
== 6.2.3.2
|
CVE-2012-4823
|
High
|
|
Jan 11, 2013
|
== 6.1.0
== 6.1.0.7
== 6.2.0
== 6.2.0.1
== 6.2.0.2
== 6.2.0.3
== 6.2.1
== 6.2.1.0
== 6.2.1.1
== 6.2.1.2
== 6.2.1.3
== 6.2.1.4
== 6.2.2
== 6.2.2.0
== 6.2.2.1
== 6.2.2.2
== 6.2.2.3
== 6.2.2.4
== 6.2.2.5
== 6.2.2.6
== 6.2.2.7
== 6.2.2.8
== 6.2.2.9
== 6.2.3
== 6.2.3.0
== 6.2.3.1
== 6.2.3.2
|
CVE-2012-3297
|
Low
|
|
Dec 8, 2012
|
== 6.2.3
== 6.2.2
|