Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2005-3301
|
Low
|
|
Oct 24, 2005
|
== 2.6.4_rc1
== 2.6.4_pl1
== 2.6.4_pl2
== 2.6.4
|
CVE-2005-3299
|
Medium
|
|
Oct 23, 2005
|
== 2.6.4_pl1
== 2.6.4
|
CVE-2005-3300
|
Medium
|
|
Oct 23, 2005
|
== 2.6.4_pl3
|
CVE-2005-2869
|
Low
|
|
Sep 9, 2005
|
== 2.1.1
== 2.2.4
== 2.1.2
== 2.2_pre1
== 2.5.0
== 2.2
== 2.6.2_pl1
== 2.0.4
== 2.6.1
== 2.6.1_pl3
== 2.3.1
== 2.0.2
== 2.5.5_rc1
== 2.6.0_pl3
== 2.5.7_pl1
== 2.4.0
== 2.5.5
== 2.5.7
== 2.5.6_rc1
== 2.0.3
== 2.6.1_pl1
== 2.2.6
== 2.6.0_pl1
== 2.6.3
== 2.5.2
== 2.1
== 2.0.1
== 2.6.2
== 2.5.1
== 2.6.0_pl2
== 2.2_rc2
== 2.3.2
== 2.5.4
== 2.2.5
== 2.2_rc3
== 2.5.3
== 2.2.2
== 2.2.3
== 2.5.5_rc2
== 2.2_pre2
== 2.6.3_pl1
== 2.6.1_rc1
== 2.2_rc1
== 2.0
== 2.5.5_pl1
== 2.0.5
|
CVE-2005-1392
|
Low
|
|
May 3, 2005
|
== 2.6.2
|
CVE-2005-0459
|
Medium
|
|
May 2, 2005
|
== 2.1.1
== 2.2.4
== 2.1.2
== 2.2_pre1
== 2.5.0
== 2.0.4
== 2.3.1
== 2.0.2
== 2.5.5_rc1
== 2.6.0_pl3
== 2.5.7_pl1
== 2.4.0
== 2.5.5
== 2.5.7
== 2.5.6_rc1
== 2.0.3
== 2.2.6
== 2.6.2_dev
== 2.6.0_pl1
== 2.5.2
== 2.1
== 2.0.1
== 2.5.1
== 2.6.0_pl2
== 2.2_rc2
== 2.3.2
== 2.5.4
== 2.2.5
== 2.2_rc3
== 2.2.2
== 2.2.3
== 2.5.5_rc2
== 2.2_rc1
== 2.0
== 2.5.5_pl1
== 2.0.5
|
CVE-2005-0544
|
Medium
|
|
May 2, 2005
|
== 2.6.1
|
CVE-2005-0567
|
High
|
|
May 2, 2005
|
== 2.6.1
|
CVE-2005-0653
|
Low
|
|
May 2, 2005
|
== 2.6.1
|
CVE-2005-0992
|
Low
|
|
May 2, 2005
|
== 2.1.1
== 2.2.4
== 2.1.2
== 2.2_pre1
== 2.5.0
== 2.2
== 2.0.4
== 2.6.1
== 2.6.1_pl3
== 2.3.1
== 2.0.2
== 2.5.5_rc1
== 2.6.0_pl3
== 2.5.7_pl1
== 2.4.0
== 2.5.5
== 2.5.7
== 2.5.6_rc1
== 2.0.3
== 2.6.1_pl1
== 2.2.6
== 2.6.0_pl1
== 2.5.2
== 2.1
== 2.0.1
== 2.5.1
== 2.6.0_pl2
== 2.2_rc2
== 2.3.2
== 2.5.4
== 2.2.5
== 2.2_rc3
== 2.5.3
== 2.2.2
== 2.2.3
== 2.5.5_rc2
== 2.2_pre2
== 2.6.1_rc1
== 2.2_rc1
== 2.0
== 2.5.5_pl1
== 2.0.5
|