Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2005-2713
|
Medium
|
|
Dec 31, 2005
|
== 10.4.3
== 10.3.2
== 10.3.7
== 10.3.5
== 10.4.2
== 10.3.3
== 10.4.4
== 10.4.1
== 10.3.4
== 10.4
== 10.4.5
== 10.3
== 10.3.8
== 10.3.9
== 10.3.1
== 10.3.6
|
CVE-2005-2714
|
Medium
|
|
Dec 31, 2005
|
== 10.4.3
== 10.3.2
== 10.3.7
== 10.3.5
== 10.4.2
== 10.3.3
== 10.4.4
== 10.4.1
== 10.3.4
== 10.4
== 10.4.5
== 10.3
== 10.3.8
== 10.3.9
== 10.3.1
== 10.3.6
|
CVE-2005-3782
|
Low
|
|
Dec 31, 2005
|
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
|
CVE-2005-4504
|
High
|
|
Dec 23, 2005
|
== 10.4.3
== 10.3.2
== 10.1.5
== 10.1
== 10.2.2
== 10.1.1
== 10.2.4
== 10.1.2
== 10.3.7
== 10.3.5
== 10.4.2
== 10.3.3
== 10.2.7
== 10.2.3
== 10.4.1
== 10.3.4
== 10.2.5
== 10.4
== 10.3
== 10.3.8
== 10.2.6
== 10.3.9
== 10.2
== 10.2.1
== 10.3.1
== 10.1.4
== 10.0
== 10.2.8
== 10.3.6
== 10.1.3
|
CVE-2005-1331
|
Medium
|
|
May 4, 2005
|
== 10.3.2
== 10.3.7
== 10.3.5
== 10.3.3
== 10.3.4
== 10.3
== 10.3.8
== 10.3.9
== 10.3.1
== 10.3.6
|
CVE-2005-1341
|
Medium
|
|
May 4, 2005
|
== 10.3.2
== 10.3.7
== 10.3.5
== 10.3.3
== 10.3.4
== 10.3
== 10.3.8
== 10.3.9
== 10.3.1
== 10.3.6
|
CVE-2005-1430
|
Low
|
|
May 3, 2005
|
== 10.3.2
== 10.1.5
== 10.1
== 10.2.2
== 10.1.1
== 10.2.4
== 10.1.2
== 10.3.7
== 10.3.5
== 10.3.3
== 10.2.7
== 10.2.3
== 10.3.4
== 10.2.5
== 10.3
== 10.3.8
== 10.2.6
== 10.3.9
== 10.2
== 10.2.1
== 10.3.1
== 10.1.4
== 10.0
== 10.2.8
== 10.3.6
== 10.1.3
|
CVE-2005-0342
|
Low
|
|
May 2, 2005
|
== 10.3.2
== 10.1.5
== 10.1
== 10.2.2
== 10.1.1
== 10.2.4
== 10.1.2
== 10.3.7
== 10.3.5
== 10.3.3
== 10.2.7
== 10.2.3
== 10.3.4
== 10.2.5
== 10.3
== 10.2.6
== 10.2
== 10.2.1
== 10.3.1
== 10.1.4
== 10.0
== 10.2.8
== 10.3.6
== 10.1.3
|
CVE-2005-0975
|
Low
|
|
May 2, 2005
|
== 10.3
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
|
CVE-2004-0886
|
Medium
|
|
Jan 27, 2005
|
== 10.3.2
== 10.2.2
== 10.2.4
== 10.3.5
== 10.3.3
== 10.2.7
== 10.2.3
== 10.3.4
== 10.2.5
== 10.3
== 10.2.6
== 10.2
== 10.2.1
== 10.3.1
== 10.2.8
== 10.3.6
|