Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-0768
|
Low
|
|
Apr 1, 2010
|
== 6.0.2.1
== 6.0.2.5
<= 6.0.2.39
== 6.0.2.13
== 6.0.2.9
== 6.0.2.11
== 6.0.2.35
== 6.0.2
== 6.0.2.21
== 6.0.2.15
== 6.0.2.17
== 6.0.2.29
== 6.0.2.23
== 6.0.2.7
== 6.0.2.33
== 6.0.2.27
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.37
== 6.0.2.31
== 6.1.0.21
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.1
== 6.1.0.27
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
<= 6.1.0.29
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
|
CVE-2010-0769
|
Low
|
|
Apr 1, 2010
|
== 6.0.2.1
== 6.0.2.5
<= 6.0.2.39
== 6.0.0.3
== 6.0.2.13
== 6.0.2.9
== 6.0.2.11
== 6.0.2.35
== 6.0.2
== 6.0.2.21
== 6.0.2.15
== 6.0.2.17
== 6.0.1.2
== 6.0.2.29
== 6.0.2.23
== 6.0.1
== 6.0.2.7
== 6.0.0.2
== 6.0.2.33
== 6.0.2.27
== 6.0
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.37
== 6.0.2.31
== 6.1.0.21
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.1
== 6.1.0.27
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
<= 6.1.0.29
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
|
CVE-2010-0770
|
Low
|
|
Apr 1, 2010
|
== 6.0.2.1
== 6.0.2.5
<= 6.0.2.39
== 6.0.0.3
== 6.0.2.13
== 6.0.2.9
== 6.0.2.11
== 6.0.2.35
== 6.0.2
== 6.0.2.21
== 6.0.2.15
== 6.0.2.17
== 6.0.1.2
== 6.0.2.29
== 6.0.2.23
== 6.0.1
== 6.0.2.7
== 6.0.0.2
== 6.0.2.33
== 6.0.2.27
== 6.0
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.37
== 6.0.2.31
== 6.1.0.21
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.1
== 6.1.0.27
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
<= 6.1.0.29
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
|
CVE-2009-1898
|
Medium
|
|
Jun 3, 2009
|
== 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
<= 6.0.2.33
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.16
== 6.0.2.7
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.8
== 6.0.2.14
== 6.0.2.31
|
CVE-2009-1899
|
High
|
|
Jun 3, 2009
|
== 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
<= 6.0.2.33
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.16
== 6.0.2.7
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.8
== 6.0.2.14
== 6.0.2.31
|
CVE-2009-1900
|
Medium
|
|
Jun 3, 2009
|
== 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
<= 6.0.2.33
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.16
== 6.0.2.7
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.8
== 6.0.2.14
== 6.0.2.31
|
CVE-2009-1901
|
High
|
|
Jun 3, 2009
|
== 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
<= 6.0.2.33
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.16
== 6.0.2.7
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.8
== 6.0.2.14
== 6.0.2.31
|
CVE-2009-0504
|
Low
|
|
Feb 17, 2009
|
<= 7.0
|
CVE-2008-4283
|
High
|
|
Feb 10, 2009
|
== 5.0.0
== 5.1.0.5
== 5.0.2.10
== 5.1.1.14
== 5.0.2.5
== 5.0.2.1
== 5.1.1.2
== 5.0
== 5.0.2.11
== 5.1.1
== 5.1.1.6
== 5.1.0
== 5.0.1
== 5.0.2.3
== 5.0.2.15
== 5.1.1.15
== 5.1.1.3
== 5.1.1.13
== 5.0.2.12
== 5.1.1.10
== 5.0.2.8
== 5.1.1.17
== 5.1.1.7
== 5.1.0.4
== 5.0.2.16
== 5.1.0.2
== 5.1.1.18
== 5.0.2.2
== 5.1.1.1
== 5.0.2.9
== 5.0.2.6
== 5.0.2.13
== 5.1.1.12
<= 5.1.1.19
== 5.1.1.8
== 5.0.2.4
== 5.1.1.16
== 5.0.2
== 5.1.1.9
== 5.0.2.14
== 5.1.1.11
== 5.1.0.3
== 5.0.2.7
== 5.1.1.5
== 5.1.1.4
|
CVE-2008-5411
|
Medium
|
|
Dec 10, 2008
|
<= 7.0
|