Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2006-0386
|
Low
|
|
Mar 3, 2006
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.1
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
|
CVE-2006-0388
|
Low
|
|
Mar 3, 2006
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.1
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
|
CVE-2006-0389
|
Low
|
|
Mar 3, 2006
|
== 10.4
== 10.4.1
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
|
CVE-2006-0391
|
Low
|
|
Mar 3, 2006
|
== 10.4.3
== 10.3.1
== 10.3.5
== 10.4.1
== 10.4.4
== 10.3.7
== 10.3.6
== 10.4
== 10.3.8
== 10.3.4
== 10.3.3
== 10.4.2
|
CVE-2006-0383
|
Medium
|
|
Mar 2, 2006
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.1
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
|
CVE-2006-0384
|
High
|
|
Mar 2, 2006
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.1
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
|
CVE-2006-0848
|
Medium
|
|
Feb 23, 2006
|
== 10.4.5
|
CVE-2006-0382
|
Low
|
|
Feb 14, 2006
|
== 10.4.5
|
CVE-2005-1726
|
Low
|
|
Dec 31, 2005
|
== 10.4.1
|
CVE-2005-2194
|
Medium
|
|
Dec 31, 2005
|
<= 10.4.1
|