Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2005-1331
|
Medium
|
|
May 4, 2005
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
|
CVE-2005-1341
|
Medium
|
|
May 4, 2005
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
|
CVE-2005-1342
|
High
|
|
May 4, 2005
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
|
CVE-2005-1430
|
Low
|
|
May 3, 2005
|
== 10.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
|
CVE-2005-0342
|
Low
|
|
May 2, 2005
|
== 10.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
|
CVE-2005-0975
|
Low
|
|
May 2, 2005
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
|
CVE-2004-0886
|
Medium
|
|
Jan 27, 2005
|
== 10.2
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
|
CVE-2004-1123
|
Medium
|
|
Jan 10, 2005
|
== 10.2
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
|
CVE-2004-0486
|
High
|
|
Jul 7, 2004
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
|
CVE-2004-0489
|
High
|
|
Jul 7, 2004
|
<= 10.3.3
|