Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2005-1474
|
High
|
|
Jun 13, 2005
|
== 10.4
== 10.4.1
|
CVE-2005-1933
|
High
|
|
Jun 13, 2005
|
== 10.4
|
CVE-2005-1728
|
Low
|
|
Jun 8, 2005
|
== 10.4.1
== 10.4
|
CVE-2005-1260
|
Medium
|
|
May 19, 2005
|
< 10.4.11
|
CVE-2005-1472
|
Low
|
|
May 19, 2005
|
== 10.4.1
|
CVE-2005-1307
|
High
|
|
May 17, 2005
|
== 10.3.6
|
CVE-2005-0969
|
Low
|
|
May 12, 2005
|
== 10.2.5
== 10.2.7
== 10.0.2
== 10.2.8
== 10.2.1
== 10.3.1
== 10.3.5
== 10.1
== 10.0.1
== 10.0.3
== 10.1.4
== 10.2.4
== 10.3.2
== 10.2.2
== 10.0
== 10.3.7
== 10.1.3
== 10.3.6
== 10.1.5
== 10.3.8
== 10.1.1
== 10.3.4
== 10.3.3
== 10.2.6
== 10.2.3
== 10.2
== 10.3
== 10.0.4
== 10.1.2
|
CVE-2005-0971
|
Low
|
|
May 12, 2005
|
== 10.2.5
== 10.2.7
== 10.0.2
== 10.2.8
== 10.2.1
== 10.3.1
== 10.3.5
== 10.1
== 10.0.1
== 10.0.3
== 10.1.4
== 10.2.4
== 10.3.2
== 10.2.2
== 10.0
== 10.3.7
== 10.1.3
== 10.3.6
== 10.1.5
== 10.3.8
== 10.1.1
== 10.3.9
== 10.3.4
== 10.3.3
== 10.2.6
== 10.2.3
== 10.2
== 10.3
== 10.0.4
== 10.1.2
|
CVE-2005-0972
|
High
|
|
May 12, 2005
|
== 10.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
|
CVE-2005-0973
|
Low
|
|
May 12, 2005
|
== 10.2.5
== 10.2.7
== 10.0.2
== 10.2.8
== 10.2.1
== 10.3.1
== 10.3.5
== 10.1
== 10.0.1
== 10.0.3
== 10.1.4
== 10.2.4
== 10.3.2
== 10.2.2
== 10.0
== 10.3.7
== 10.1.3
== 10.3.6
== 10.1.5
== 10.3.8
== 10.1.1
== 10.3.9
== 10.3.4
== 10.3.3
== 10.2.6
== 10.2.3
== 10.2
== 10.3
== 10.0.4
== 10.1.2
|