Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2005-0970
|
High
|
|
May 2, 2005
|
== 10.2.5
== 10.2.7
== 10.0.2
== 10.2.8
== 10.2.1
== 10.3.1
== 10.3.5
== 10.1
== 10.0.1
== 10.0.3
== 10.1.4
== 10.2.4
== 10.3.2
== 10.2.2
== 10.0
== 10.3.7
== 10.1.3
== 10.3.6
== 10.1.5
== 10.3.8
== 10.1.1
== 10.3.9
== 10.3.4
== 10.3.3
== 10.2.6
== 10.2.3
== 10.2
== 10.3
== 10.0.4
== 10.1.2
|
CVE-2005-0975
|
Low
|
|
May 2, 2005
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
|
CVE-2005-1043
|
Medium
|
|
Apr 14, 2005
|
== 10.3.9
== 10.4
== 10.4.1
|
CVE-2005-0713
|
Low
|
|
Mar 21, 2005
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
|
CVE-2005-0715
|
Low
|
|
Mar 21, 2005
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
|
CVE-2005-0716
|
High
|
|
Mar 21, 2005
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
|
CVE-2004-0886
|
Medium
|
|
Jan 27, 2005
|
== 10.2
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
|
CVE-2004-0921
|
High
|
|
Jan 27, 2005
|
== 10.2
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
|
CVE-2004-0922
|
Medium
|
|
Jan 27, 2005
|
== 10.2
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
|
CVE-2004-0923
|
Low
|
|
Jan 27, 2005
|
== 10.2
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
|