Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2008-3622
|
Low
|
|
Sep 17, 2008
|
== 10.5
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
|
CVE-2008-2324
|
Low
|
|
Aug 4, 2008
|
== 10.4.11
|
CVE-2008-2309
|
Medium
|
|
Jul 1, 2008
|
== 10.4.3
== 10.5.2
== 10.4.10
== 10.4.9
== 10.4.11
== 10.4.2
== 10.4.4
== 10.4.1
== 10.5.1
== 10.5.3
== 10.4.5
== 10.4.6
== 10.4.8
== 10.5
== 10.4.7
|
CVE-2008-2310
|
Medium
|
|
Jul 1, 2008
|
== 10.4.3
<= 10.5.3
== 10.5.2
== 10.4.10
== 10.4.9
== 10.4.11
== 10.4.2
== 10.4.4
== 10.4.1
== 10.5.1
== 10.4.5
== 10.4.6
== 10.4.8
== 10.5
== 10.4.7
|
CVE-2008-2311
|
High
|
|
Jul 1, 2008
|
== 10.4.3
== 10.5.2
== 10.4.10
== 10.4.9
== 10.4.11
== 10.4.2
== 10.4.4
== 10.4.1
== 10.5.1
== 10.5.3
== 10.4.5
== 10.4.6
== 10.4.8
== 10.5
== 10.4.7
|
CVE-2008-2313
|
Low
|
|
Jul 1, 2008
|
== 10.4.3
== 10.5.2
== 10.4.10
== 10.4.9
== 10.4.11
== 10.4.2
== 10.4.4
== 10.4.1
== 10.5.1
== 10.5.3
== 10.4.5
== 10.4.6
== 10.4.8
== 10.5
== 10.4.7
|
CVE-2008-2314
|
Low
|
|
Jul 1, 2008
|
== 10.4.3
== 10.5.2
== 10.4.10
== 10.4.9
== 10.4.11
== 10.4.2
== 10.4.4
== 10.4.1
== 10.5.1
== 10.5.3
== 10.4.5
== 10.4.6
== 10.4.8
== 10.5
== 10.4.7
|
CVE-2008-2308
|
Low
|
|
Jul 1, 2008
|
== 10.4.3
== 10.4.9
== 10.4.2
== 10.4.4
== 10.4.1
== 10.5.1
== 10.4.5
== 10.4.6
== 10.4.8
== 10.5
== 10.4.7
|
CVE-2008-1027
|
Low
|
|
Jun 2, 2008
|
== 10.4.11
== 10.5
== 10.5.1
== 10.5.2
|
CVE-2008-1028
|
High
|
|
Jun 2, 2008
|
== 10.4.11
|