Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2006-1984
|
Medium
|
|
Apr 22, 2006
|
<= 10.4.5
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.1
== 10.4.2
== 10.4.3
== 10.4.4
|
CVE-2006-0396
|
Medium
|
|
Mar 14, 2006
|
== 10.4
== 10.4.1
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
|
CVE-2006-1220
|
Low
|
|
Mar 14, 2006
|
== 10.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.1
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
|
CVE-2006-0848
|
Medium
|
|
Feb 23, 2006
|
== 10.4.5
|
CVE-2005-2713
|
Medium
|
|
Dec 31, 2005
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.1
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
|
CVE-2005-2714
|
Medium
|
|
Dec 31, 2005
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.1
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
|
CVE-2005-3782
|
Low
|
|
Dec 31, 2005
|
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
|
CVE-2005-4504
|
High
|
|
Dec 23, 2005
|
== 10.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.1
== 10.4.2
== 10.4.3
|
CVE-2005-1933
|
High
|
|
Jun 13, 2005
|
== 10.4
|
CVE-2005-1307
|
High
|
|
May 17, 2005
|
== 10.3.6
|