Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2006-0552
|
High
|
|
Feb 4, 2006
|
== standard_8.1.7.4
== standard_8.0.6
== standard_8.0.6.3
== enterprise_8.1.7.4
|
CVE-2006-0262
|
High
|
|
Jan 18, 2006
|
== standard_8.1.7.4
== enterprise_8.1.7.4
|
CVE-2006-0271
|
High
|
|
Jan 18, 2006
|
== standard_8.1.7.4
== enterprise_8.1.7.4
|
CVE-2005-3641
|
High
|
|
Nov 16, 2005
|
== enterprise_8.0.5.0.0
== enterprise_8.0.6.0.0
== enterprise_8.0.6.0.1
== enterprise_8.1.5.0.0
== enterprise_8.1.5.0.2
== enterprise_8.1.5.1.0
== enterprise_8.1.6.0.0
== enterprise_8.1.6.1.0
== enterprise_8.1.7.0.0
== enterprise_8.1.7.1.0
== enterprise_8.1.7.4
== standard_8.0.6
== standard_8.0.6.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7.0.0
== standard_8.1.7.1
== standard_8.1.7.4
|
CVE-2004-0638
|
High
|
|
Dec 31, 2004
|
== standard_8.1.7.4
== enterprise_8.1.7.4
|
CVE-2004-0637
|
Medium
|
|
Sep 2, 2004
|
== standard_8.1.7_.4
== enterprise_8.1.7_.4
|
CVE-2004-1362
|
High
|
|
Aug 4, 2004
|
== enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
|
CVE-2004-1364
|
High
|
|
Aug 4, 2004
|
== enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
|
CVE-2004-1365
|
Low
|
|
Aug 4, 2004
|
== enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
|
CVE-2004-1366
|
Low
|
|
Aug 4, 2004
|
== enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
|