Vulnerability Name:

CVE-2009-0217 (CCN-51716)

Assigned:2009-07-14
Published:2009-07-14
Updated:2018-10-12
Summary:The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: UNKNOWN
http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161

Source: MITRE
Type: CNA
CVE-2009-0217

Source: CONFIRM
Type: UNKNOWN
http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7

Source: CONFIRM
Type: UNKNOWN
http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7

Source: APPLE
Type: UNKNOWN
APPLE-SA-2009-09-03-1

Source: SUSE
Type: UNKNOWN
SUSE-SA:2009:053

Source: SUSE
Type: UNKNOWN
SUSE-SA:2010:017

Source: HP
Type: UNKNOWN
HPSBUX02476

Source: OSVDB
Type: UNKNOWN
55895

Source: OSVDB
Type: UNKNOWN
55907

Source: CCN
Type: RHSA-2009-1200
Critical: java-1.6.0-sun security update

Source: CCN
Type: RHSA-2009-1201
Important: java-1.6.0-openjdk security and bug fix update

Source: CCN
Type: RHSA-2009-1428
Moderate: xmlsec1 security update

Source: CCN
Type: RHSA-2009-1636
Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update

Source: CCN
Type: RHSA-2009-1637
Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update

Source: CCN
Type: RHSA-2009-1649
Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update

Source: CCN
Type: RHSA-2009-1650
Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update

Source: CCN
Type: RHSA-2009-1694
Critical: java-1.6.0-ibm security update

Source: CCN
Type: RHSA-2010-0043
Low: Red Hat Network Satellite Server IBM Java Runtime security update

Source: SECUNIA
Type: UNKNOWN
34461

Source: CCN
Type: SA35776
Oracle Products Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
35776

Source: CCN
Type: SA35852
Mono XML Signature HMAC Truncation Spoofing

Source: SECUNIA
Type: Vendor Advisory
35852

Source: CCN
Type: SA35853
Sun Java JDK / JRE XML Signature HMAC Truncation Spoofing

Source: SECUNIA
Type: Vendor Advisory
35853

Source: CCN
Type: SA35854
XML Security Library XML Signature HMAC Truncation Spoofing

Source: SECUNIA
Type: Vendor Advisory
35854

Source: CCN
Type: SA35855
Apache XML Security HMAC Truncation Spoofing

Source: SECUNIA
Type: Vendor Advisory
35855

Source: CCN
Type: SA35858
RSA Products XML Signature HMAC Truncation Spoofing

Source: SECUNIA
Type: Vendor Advisory
35858

Source: SECUNIA
Type: Vendor Advisory
36162

Source: SECUNIA
Type: Vendor Advisory
36176

Source: SECUNIA
Type: Vendor Advisory
36180

Source: SECUNIA
Type: Vendor Advisory
36494

Source: CCN
Type: SA37102
Oracle BEA Products Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
37300

Source: SECUNIA
Type: UNKNOWN
37671

Source: SECUNIA
Type: UNKNOWN
37841

Source: CCN
Type: SA38567
OpenOffice.org 2 Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
38567

Source: CCN
Type: SA38568
OpenOffice.org 3 Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
38568

Source: SECUNIA
Type: UNKNOWN
38695

Source: SECUNIA
Type: UNKNOWN
38921

Source: CCN
Type: SA40080
Microsoft .NET Framework XML Signature HMAC Truncation Security Issue

Source: SECUNIA
Type: UNKNOWN
41818

Source: SECUNIA
Type: UNKNOWN
60799

Source: CCN
Type: SECTRACK ID: 1022561
WebLogic Server Bugs Let Remote Users Gain Access and Modify Data and Deny Service

Source: CCN
Type: SECTRACK ID: 1022567
Oracle Application Server Bugs Let Remote Users Modify Data

Source: CCN
Type: SECTRACK ID: 1022661
Java Runtime Environment (JRE) XML Digital Signature Flaw May Let Remote Users Bypass Authentication

Source: CONFIRM
Type: UNKNOWN
http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1

Source: SUNALERT
Type: UNKNOWN
263429

Source: CCN
Type: Sun Alert ID: 269208
A Security Vulnerability With Verifying HMAC-based XML Digital Signatures in the XML Digital Signature Implementation Included With the Sun GlassFish Enterprise Server v2.1 may Allow Authentication to be Bypassed

Source: SUNALERT
Type: UNKNOWN
269208

Source: SUNALERT
Type: UNKNOWN
1020710

Source: CONFIRM
Type: UNKNOWN
http://svn.apache.org/viewvc?revision=794013&view=revision

Source: CCN
Type: Microsoft Security Bulletin MS13-040
Vulnerabilities in .NET Framework Could Allow Spoofing (2836440)

Source: CCN
Type: Microsoft Security Bulletin MS13-082
Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2878890)

Source: CCN
Type: Microsoft Security Bulletin MS15-080
Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (3078662)

Source: CCN
Type: Microsoft Security Bulletin MS15-097
Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (3089656)

Source: CCN
Type: Microsoft Security Bulletin MS15-115
Security Update for Microsoft Windows to Address Remote Code Execution (3105864)

Source: CCN
Type: Microsoft Security Bulletin MS15-116
Security Updates for Microsoft Office to Address Remote Code Execution (3104540)

Source: CCN
Type: Microsoft Security Bulletin MS15-123
Security Update for Skype for Business and Lync to Address Information Disclosure (3105872)

Source: CCN
Type: Microsoft Security Bulletin MS15-128
Security Update for Microsoft Graphics Component to Address Remote Code Execution (3104503)

Source: CCN
Type: Microsoft Security Bulletin MS15-129
Security Update for Silverlight to Address Remote Code Execution (3106614)

Source: CCN
Type: Microsoft Security Bulletin MS15-131
Security Update for Microsoft Office to Address Remote Code Execution (3116111)

Source: CCN
Type: Microsoft Security Bulletin MS15-132
Security Update for Microsoft Windows to Address Remote Code Execution (3116162)

Source: CCN
Type: Microsoft Security Bulletin MS15-135
Security Update for Windows Kernel Mode Drivers to Address Elevation of Privilege (3119075)

Source: CCN
Type: Microsoft Security Bulletin MS16-004
Security Update for Microsoft Office to Address Remote Code Execution - Critical (3124585)

Source: CCN
Type: Microsoft Security Bulletin MS16-006
Security Update for Silverlight to Address Remote Code Execution (3126036)

Source: CCN
Type: Microsoft Security Bulletin MS16-008
Security Update for Kernel to Address Elevation of Privilege (3124605)

Source: CCN
Type: Microsoft Security Bulletin MS16-014
Security update for Microsoft Windows to Address Remote Code Execution (3134228)

Source: CCN
Type: Microsoft Security Bulletin MS16-015
Security Update for Microsoft Office to Address Remote Code Execution (3134226)

Source: CCN
Type: Microsoft Security Bulletin MS16-029
Security Update for Microsoft Office to Address Remote Code Execution (3141806)

Source: CCN
Type: Microsoft Security Bulletin MS16-031
Security Update for Microsoft Windows to Address Elevation of Privilege (3140410)

Source: CCN
Type: Microsoft Security Bulletin MS16-035
Security Update for .NET Framework to Address Security Feature Bypass (3141780)

Source: CCN
Type: Microsoft Security Bulletin MS16-042
Security Update for Microsoft Office (3148775)

Source: CCN
Type: Microsoft Security Bulletin MS16-044
Security Update for Windows OLE (3146706)

Source: CCN
Type: Microsoft Security Bulletin MS16-048
Security Update for CSRSS (3148528)

Source: CCN
Type: Microsoft Security Bulletin MS16-054
Security Update for Microsoft Office (3155544)

Source: CCN
Type: Microsoft Security Bulletin MS16-060
Security Update for Windows Kernel (3154846)

Source: CCN
Type: Microsoft Security Bulletin MS16-061
Security Update for Microsoft RPC (3155520)

Source: CCN
Type: Microsoft Security Bulletin MS16-070
Security Update for Office (3163610)

Source: CCN
Type: Microsoft Security Bulletin MS16-088
Security Updates for Office (3170008)

Source: CCN
Type: Microsoft Security Bulletin MS16-092
Security Update for Windows Kernel (3171910)

Source: CCN
Type: Microsoft Security Bulletin MS16-097
Security Update for Microsoft Graphics Component (3177393)

Source: CCN
Type: Microsoft Security Bulletin MS16-099
Security Update for Office (3177451)

Source: CCN
Type: Microsoft Security Bulletin MS16-106
Security Update for Microsoft Graphics Component (3185848)

Source: CCN
Type: Microsoft Security Bulletin MS16-107
Security Update for Microsoft Office (3185852)

Source: CCN
Type: Microsoft Security Bulletin MS16-109
Security Update for Silverlight (3182373)

Source: CCN
Type: Microsoft Security Bulletin MS16-111
Security Update for Windows Kernel (3186973)

Source: CCN
Type: Microsoft Security Bulletin MS16-120
Security Update for Microsoft Graphics Component (3192884)

Source: CCN
Type: Microsoft Security Bulletin MS16-121
Security Update for Microsoft Office (3194063)

Source: CCN
Type: Microsoft Security Bulletin MS16-122
Security Update for Microsoft Video Control (3195360)

Source: CCN
Type: Microsoft Security Bulletin MS16-123
Security Update for Kernel-Mode Drivers (3192892)

Source: CCN
Type: Microsoft Security Bulletin MS16-124
Security Update for Windows Registry (3193227)

Source: CCN
Type: Microsoft Security Bulletin MS16-126
Security Update for Microsoft Internet Messaging API (3196067)

Source: CCN
Type: Microsoft Security Bulletin MS16-131
Security Update for Microsoft Video Control (3199151)

Source: CCN
Type: Microsoft Security Bulletin MS16-133
Security Update for Microsoft Office (3199168)

Source: CCN
Type: Microsoft Security Bulletin MS16-139
Security Update for Windows Kernel (3199720)

Source: CCN
Type: Microsoft Security Bulletin MS16-148
Security Update for Microsoft Office (3204068)

Source: CCN
Type: Microsoft Security Bulletin MS16-155
Security Update for .NET Framework (3205640)

Source: CCN
Type: Microsoft Security Bulletin MS17-002
Security Update for Microsoft Office (3214291)

Source: CCN
Type: Microsoft Security Bulletin MS17-006
Cumulative Security Update for Internet Explorer (4013073)

Source: CCN
Type: Microsoft Security Bulletin MS17-013
Security Update for Microsoft Graphics Component (4013075)

Source: CCN
Type: Microsoft Security Bulletin MS17-014
Security Update for Microsoft Office (4013241)

Source: AIXAPAR
Type: Patch, Vendor Advisory
PK80596

Source: AIXAPAR
Type: Patch, Vendor Advisory
PK80627

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925

Source: CONFIRM
Type: UNKNOWN
http://www.aleksey.com/xmlsec/

Source: DEBIAN
Type: UNKNOWN
DSA-1995

Source: DEBIAN
Type: DSA-1849
xml-security-c -- design flaw

Source: DEBIAN
Type: DSA-1995
openoffice.org -- several vulnerabilities

Source: GENTOO
Type: UNKNOWN
GLSA-201408-19

Source: CCN
Type: US-CERT VU#466161
XML signature HMAC truncation authentication bypass

Source: CERT-VN
Type: US Government Resource
VU#466161

Source: CONFIRM
Type: UNKNOWN
http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ

Source: CONFIRM
Type: UNKNOWN
http://www.kb.cert.org/vuls/id/WDON-7TY529

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2009:209

Source: CCN
Type: Microsoft Security Bulletin MS10-041
Vulnerabilities in the Microsoft .NET Framework Could Allow Tampering (981343)

Source: CONFIRM
Type: Vendor Advisory
http://www.mono-project.com/Vulnerabilities

Source: CCN
Type: OpenOffice Web Site
Security Vulnerability in OpenOffice.org resulting from 3rd party library

Source: CONFIRM
Type: UNKNOWN
http://www.openoffice.org/security/cves/CVE-2009-0217.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html

Source: CCN
Type: Oracle Critical Patch Update Advisory - October 2009
Oracle Critical Patch Update Advisory - October 2009

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html

Source: CCN
Type: OSVDB ID: 55895
Oracle Application Server Security Developer Tools HMACOutputLength Signature Spoofing Weakness

Source: CCN
Type: OSVDB ID: 55907
Oracle BEA WebLogic Server Web Services Package HMACOutputLength Signature Spoofing Weakness

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1694

Source: BID
Type: Patch
35671

Source: CCN
Type: BID-35671
IETF and W3C XML Digital Signature Specification HMAC Truncation Authentication Bypass Vulnerability

Source: SECTRACK
Type: UNKNOWN
1022561

Source: SECTRACK
Type: UNKNOWN
1022567

Source: SECTRACK
Type: UNKNOWN
1022661

Source: CCN
Type: USN-814-1
OpenJDK vulnerabilities

Source: CCN
Type: USN-826-1
Mono vulnerabilities

Source: CCN
Type: USN-903-1
OpenOffice.org vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-903-1

Source: CERT
Type: US Government Resource
TA09-294A

Source: CERT
Type: US Government Resource
TA10-159B

Source: VUPEN
Type: Patch, Vendor Advisory
ADV-2009-1900

Source: VUPEN
Type: Patch, Vendor Advisory
ADV-2009-1908

Source: VUPEN
Type: Patch, Vendor Advisory
ADV-2009-1909

Source: VUPEN
Type: Patch, Vendor Advisory
ADV-2009-1911

Source: VUPEN
Type: UNKNOWN
ADV-2009-2543

Source: VUPEN
Type: UNKNOWN
ADV-2009-3122

Source: VUPEN
Type: UNKNOWN
ADV-2010-0366

Source: VUPEN
Type: UNKNOWN
ADV-2010-0635

Source: CONFIRM
Type: Vendor Advisory
http://www.w3.org/2008/06/xmldsigcore-errata.html#e03

Source: CCN
Type: W3C Questions & Answers blog
HMAC truncation in XML Signature: When Alice didn't look

Source: MISC
Type: Vendor Advisory
http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=511915

Source: MS
Type: UNKNOWN
MS10-041

Source: XF
Type: UNKNOWN
w3cxml-xmld-spoofing(51716)

Source: CONFIRM
Type: UNKNOWN
https://issues.apache.org/bugzilla/show_bug.cgi?id=47526

Source: CONFIRM
Type: UNKNOWN
https://issues.apache.org/bugzilla/show_bug.cgi?id=47527

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10186

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:7158

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:8717

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1200

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1201

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1428

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1636

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1637

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1649

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1650

Source: UBUNTU
Type: UNKNOWN
USN-826-1

Source: CCN
Type: IBM Security Bulletin 3106029 (StoredIQ)
Multiple Vulnerabilities identified in IBM StoredIQ

Source: CCN
Type: IBM Security Bulletin 6826621 (Tivoli Business Service Manager)
A vulnerability in Apache XML Security for Java affects IBM Tivoli Business Service Manager (CVE-2013-4517, CVE-2013-2172, CVE-2009-0217, CVE-2021-40690)

Source: CCN
Type: IBM Security Bulletin 6829363 (InfoSphere Information Server)
Multiple vulnerabilities in Apache Santuario XML Security for Java affect IBM InfoSphere Information Server

Source: FEDORA
Type: UNKNOWN
FEDORA-2009-8329

Source: FEDORA
Type: UNKNOWN
FEDORA-2009-8337

Source: FEDORA
Type: UNKNOWN
FEDORA-2009-8456

Source: FEDORA
Type: UNKNOWN
FEDORA-2009-8473

Source: SUSE
Type: SUSE-SA:2009:053
IBM Java 6 security update

Source: SUSE
Type: SUSE-SA:2010:004
IBM Java 6 security update

Source: SUSE
Type: SUSE-SA:2010:017
OpenOffice.org security update

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.13:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.15:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.17:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2:*:fp17:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.14:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.16:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.18:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.20:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.21:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.32:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.33:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mono_project:mono:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:mono_project:mono:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mono_project:mono:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mono_project:mono:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mono_project:mono:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mono_project:mono:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:mono_project:mono:1.9:*:*:*:*:*:*:*
  • OR cpe:/a:mono_project:mono:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:10.1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:10.1.4.3im:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:8.1:sp6:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:9.2:mp3:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:10.0:mp1:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:10.3:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:.net_framework:1.0:sp3:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.21:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:mono:mono:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:10.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:10.1.3.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:10.1.3.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:10.1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:10.1.3.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:2.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.13:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.15:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.17:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.32:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x32:*
  • OR cpe:/a:oracle:application_server:10.1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.14:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.16:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.18:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.20:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2.33:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server_10g:10.1.3.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server_10g:10.1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server_10g:10.1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*
  • OR cpe:/a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:3.5:sp1:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:10.1.4.3im:*:*:*:*:*:*:*
  • OR cpe:/a:mono:mono:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:mono:mono:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mono:mono:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mono:mono:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mono:mono:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mono:mono:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:mono:mono:1.9:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:10.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:10.0:mp1:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:9.2:mp3:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server_component:8.1:sp6:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.0.2::fp17:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:*
  • OR cpe:/a:oracle:opensso_enterprise:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_xp::sp2:x64:*:professional:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:x86_64:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_application_server:2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp1:x64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.10:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista::sp2:~~~~x64~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista::sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_7:::~~~~x64~:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.8.z:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.8.z:*:as:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:::x32:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
  • OR cpe:/a:sun:openoffice.org:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storediq:7.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_business_service_manager:6.2.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:42399
    P
    Security update for the Linux Kernel (Important)
    2022-06-24
    oval:org.opensuse.security:def:42400
    P
    Security update for the Linux Kernel (Important)
    2022-06-24
    oval:org.opensuse.security:def:20090217
    V
    CVE-2009-0217
    2022-05-20
    oval:org.opensuse.security:def:42192
    P
    Security update for containerd, docker (Moderate)
    2022-02-04
    oval:org.opensuse.security:def:26221
    P
    Security update for python-numpy (Moderate) (in QA)
    2022-01-17
    oval:org.opensuse.security:def:26218
    P
    Security update for java-1_8_0-ibm (Important) (in QA)
    2022-01-04
    oval:org.opensuse.security:def:31721
    P
    Security update for log4j (Important)
    2021-12-17
    oval:org.opensuse.security:def:32235
    P
    Security update for openssh (Important)
    2021-12-06
    oval:org.opensuse.security:def:31710
    P
    Security update for java-1_7_0-openjdk (Important)
    2021-11-24
    oval:org.opensuse.security:def:31709
    P
    Security update for java-1_8_0-openjdk (Important)
    2021-11-23
    oval:org.opensuse.security:def:26172
    P
    Security update for webkit2gtk3 (Important)
    2021-11-23
    oval:org.opensuse.security:def:31706
    P
    Security update for postgresql96 (Important)
    2021-11-22
    oval:org.opensuse.security:def:31299
    P
    Security update for qemu (Important)
    2021-11-10
    oval:org.opensuse.security:def:32213
    P
    Security update for binutils (Moderate)
    2021-11-09
    oval:org.opensuse.security:def:31691
    P
    Security update for apache2 (Important)
    2021-10-06
    oval:org.opensuse.security:def:26134
    P
    Security update for the Linux Kernel (Important)
    2021-09-23
    oval:org.opensuse.security:def:26119
    P
    Security update for file (Important)
    2021-09-02
    oval:org.opensuse.security:def:31264
    P
    Security update for file (Important)
    2021-09-02
    oval:org.opensuse.security:def:31677
    P
    Security update for libesmtp (Important)
    2021-09-02
    oval:org.opensuse.security:def:31253
    P
    Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)
    2021-08-25
    oval:org.opensuse.security:def:32174
    P
    Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)
    2021-08-25
    oval:org.opensuse.security:def:32163
    P
    Security update for MozillaFirefox (Important)
    2021-08-17
    oval:org.opensuse.security:def:32956
    P
    Security update for openexr (Important)
    2021-06-24
    oval:org.opensuse.security:def:32125
    P
    Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)
    2021-06-18
    oval:org.opensuse.security:def:26077
    P
    Security update for apache2 (Important)
    2021-06-17
    oval:org.opensuse.security:def:36243
    P
    mono-core-2.6.7-0.13.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:26067
    P
    Security update for MozillaFirefox (Important)
    2021-06-08
    oval:org.opensuse.security:def:36381
    P
    bytefx-data-mysql-2.6.7-0.13.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:42650
    P
    mono-core-2.6.7-0.13.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:26053
    P
    Security update for libxml2 (Important)
    2021-05-19
    oval:org.opensuse.security:def:31619
    P
    Security update for python3 (Important)
    2021-05-17
    oval:org.opensuse.security:def:32917
    P
    Security update for python3 (Important)
    2021-05-17
    oval:org.opensuse.security:def:31167
    P
    Security update for java-1_7_0-openjdk (Moderate)
    2021-04-29
    oval:org.opensuse.security:def:32076
    P
    Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)
    2021-04-28
    oval:org.opensuse.security:def:32072
    P
    Security update for xen (Important)
    2021-04-19
    oval:org.opensuse.security:def:32069
    P
    Security update for xorg-x11-server (Important)
    2021-04-14
    oval:org.opensuse.security:def:26215
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:31747
    P
    Security update for nghttp2 (Important)
    2021-03-24
    oval:org.opensuse.security:def:32279
    P
    Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)
    2021-03-17
    oval:org.opensuse.security:def:31338
    P
    Security update for openvswitch (Important)
    2021-02-12
    oval:org.opensuse.security:def:31252
    P
    Security update for openvswitch (Important)
    2021-02-02
    oval:org.opensuse.security:def:26111
    P
    Security update for cups (Moderate)
    2021-02-02
    oval:org.opensuse.security:def:32019
    P
    Security update for clamav (Important)
    2020-12-22
    oval:org.opensuse.security:def:32006
    P
    Security update for mutt (Important)
    2020-12-07
    oval:org.opensuse.security:def:31562
    P
    Security update for xen (Important)
    2020-12-07
    oval:org.opensuse.security:def:31093
    P
    Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)
    2020-12-07
    oval:org.opensuse.security:def:35613
    P
    mono-core-2.0.1-1.19.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35785
    P
    mono-core-2.6.7-0.7.19 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35992
    P
    mono-core-2.6.7-0.7.19 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:42020
    P
    mono-core-2.0.1-1.19.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:31082
    P
    Security update for gdm (Important)
    2020-12-03
    oval:org.opensuse.security:def:35993
    P
    mono-core-2.6.7-0.9.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:31081
    P
    Security update for python3 (Important)
    2020-12-02
    oval:org.opensuse.security:def:25618
    P
    Security update for python3 (Important)
    2020-12-01
    oval:org.opensuse.security:def:26609
    P
    libxslt on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26578
    P
    lcms on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25942
    P
    Security update for gstreamer-0_10-plugins-bad (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25506
    P
    Security update for openexr (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31918
    P
    Security update for gd (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26318
    P
    Security update for MozillaThunderbird (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25827
    P
    Security update for flash-player (Critical)
    2020-12-01
    oval:org.opensuse.security:def:32319
    P
    Security update for ruby (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26662
    P
    PackageKit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25912
    P
    Security update for zziplib (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26991
    P
    mono-core on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25335
    P
    Security update for u-boot (Important)
    2020-12-01
    oval:org.opensuse.security:def:32424
    P
    Security update for wpa_supplicant (Important)
    2020-12-01
    oval:org.opensuse.security:def:27344
    P
    libcurl4-openssl1-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31448
    P
    Security update for postgresql-init (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26014
    P
    Security update for mariadb (Important)
    2020-12-01
    oval:org.opensuse.security:def:25347
    P
    Security update for mariadb (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26422
    P
    Security update for Chromium (Important)
    2020-12-01
    oval:org.opensuse.security:def:32485
    P
    PolicyKit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25793
    P
    Security update for icedtea-web (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31927
    P
    Security update for giflib (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32749
    P
    mono-core on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25539
    P
    Security update for dbus-1 (Important)
    2020-12-01
    oval:org.opensuse.security:def:31913
    P
    Security update for gcc5 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26510
    P
    Security update for nextcloud (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33167
    P
    libnewt0_52 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25868
    P
    Security update for pcre (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25590
    P
    Security update for dovecot22 (Important)
    2020-12-01
    oval:org.opensuse.security:def:31796
    P
    Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)
    2020-12-01
    oval:org.opensuse.security:def:26749
    P
    libgtop on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25677
    P
    Security update for raptor (Important)
    2020-12-01
    oval:org.opensuse.security:def:26568
    P
    java-1_6_0-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31460
    P
    Security update for postgresql94 (Important)
    2020-12-01
    oval:org.opensuse.security:def:25794
    P
    Security update for libssh (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31857
    P
    Security update for cups (Important)
    2020-12-01
    oval:org.opensuse.security:def:25165
    P
    Security update for squid (Important)
    2020-12-01
    oval:org.opensuse.security:def:27241
    P
    mono-core on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25542
    P
    Security update for java-1_8_0-openjdk (Important)
    2020-12-01
    oval:org.opensuse.security:def:31545
    P
    Security update for samba (Important)
    2020-12-01
    oval:org.opensuse.security:def:26356
    P
    Security update for chromium (Important)
    2020-12-01
    oval:org.opensuse.security:def:25882
    P
    Security update for python-tornado (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32539
    P
    krb5 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25240
    P
    Security update for mariadb (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25554
    P
    Security update for unzip (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31769
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:26560
    P
    gstreamer-0_10-plugins-base on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25940
    P
    Security update for mariadb (Important)
    2020-12-01
    oval:org.opensuse.security:def:25931
    P
    Security update for libcares2 (Low)
    2020-12-01
    oval:org.opensuse.security:def:25449
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:31862
    P
    Security update for curl (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26274
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:25746
    P
    Security update for openssl-1_1 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26648
    P
    wget on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26613
    P
    mono-core on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26006
    P
    Security update for mariadb (Important)
    2020-12-01
    oval:org.opensuse.security:def:25761
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:31967
    P
    Security update for intel-SINIT (Important)
    2020-12-01
    oval:org.opensuse.security:def:26956
    P
    libmysqlclient15-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25884
    P
    Security update for lhasa (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32375
    P
    Security update for tiff (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26706
    P
    ghostscript-fonts-other on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25965
    P
    Security update for xorg-x11-server (Important)
    2020-12-01
    oval:org.opensuse.security:def:32028
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:25336
    P
    Security update for gcc10 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31470
    P
    Security update for ppp
    2020-12-01
    oval:org.opensuse.security:def:26369
    P
    Security update for Chromium (Important)
    2020-12-01
    oval:org.opensuse.security:def:32463
    P
    Security update for xorg-x11-libXpm (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27379
    P
    bytefx-data-mysql on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25792
    P
    Security update for libvirt (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31795
    P
    Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)
    2020-12-01
    oval:org.opensuse.security:def:31535
    P
    Security update for samba (Important)
    2020-12-01
    oval:org.opensuse.security:def:32710
    P
    libexiv2-4 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25411
    P
    Security update for u-boot (Important)
    2020-12-01
    oval:org.opensuse.security:def:31826
    P
    Security update for bind (Important)
    2020-12-01
    oval:org.opensuse.security:def:26471
    P
    Security update for Mozilla Thunderbird (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32529
    P
    gzip on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25804
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:25620
    P
    Security update for ovmf (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26524
    P
    apache2-mod_php5 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33206
    P
    mono-core on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31459
    P
    Security update for postgresql94 (Important)
    2020-12-01
    oval:org.opensuse.security:def:25996
    P
    Security update for libvirt (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25741
    P
    Security update for vino (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31835
    P
    Security update for bind (Important)
    2020-12-01
    oval:org.opensuse.security:def:26784
    P
    mono-core on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25164
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:25968
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27206
    P
    libpixman-1-0 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31471
    P
    Security update for ppp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26272
    P
    Security update for openexr (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25843
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31901
    P
    Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25176
    P
    Security update for dpdk (Important)
    2020-12-01
    oval:org.opensuse.security:def:31391
    P
    Security update for pam (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25543
    P
    Security update for libgxps (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26507
    P
    Security update for cacti, cacti-spine (Important)
    2020-12-01
    oval:org.opensuse.security:def:25896
    P
    Security update for gstreamer-0_10-plugins-bad (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32578
    P
    mono-core on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25930
    P
    Security update for ImageMagick (Important)
    2020-12-01
    oval:org.opensuse.security:def:25368
    P
    Security update for libX11 (Important)
    2020-12-01
    oval:org.opensuse.security:def:26260
    P
    Security update for Mesa (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:29205
    P
    RHSA-2009:1201 -- java-1.6.0-openjdk security and bug fix update (Important)
    2015-08-17
    oval:org.mitre.oval:def:29320
    P
    RHSA-2009:1428 -- xmlsec1 security update (Moderate)
    2015-08-17
    oval:org.mitre.oval:def:8717
    V
    HP-UX Running Java, Remote Increase in Privilege, Denial of Service and Other Vulnerabilities
    2015-04-20
    oval:org.mitre.oval:def:7158
    V
    XML Signature HMAC Truncation Authentication Bypass Vulnerability
    2014-08-18
    oval:org.mitre.oval:def:13836
    P
    USN-814-1 -- openjdk-6 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:13875
    P
    USN-826-1 -- mono vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:13500
    P
    USN-903-1 -- openoffice.org vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:13798
    P
    DSA-1849-1 xml-security-c -- design flaw
    2014-06-23
    oval:org.mitre.oval:def:6910
    P
    DSA-1995 openoffice.org -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:12661
    P
    DSA-1995-1 openoffice.org -- several
    2014-06-23
    oval:org.mitre.oval:def:7932
    P
    DSA-1849 xml-security-c -- design flaw
    2014-06-23
    oval:org.mitre.oval:def:22856
    P
    ELSA-2009:1200: java-1.6.0-sun security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:22907
    P
    ELSA-2009:1694: java-1.6.0-ibm security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:22980
    P
    ELSA-2009:1428: xmlsec1 security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:22043
    P
    ELSA-2009:1201: java-1.6.0-openjdk security and bug fix update (Important)
    2014-05-26
    oval:org.mitre.oval:def:10186
    V
    The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
    2013-04-29
    oval:org.debian:def:1995
    V
    several vulnerabilities
    2010-02-12
    oval:com.redhat.rhsa:def:20091694
    P
    RHSA-2009:1694: java-1.6.0-ibm security update (Critical)
    2009-12-23
    oval:com.redhat.rhsa:def:20091428
    P
    RHSA-2009:1428: xmlsec1 security update (Moderate)
    2009-09-08
    oval:com.redhat.rhsa:def:20091200
    P
    RHSA-2009:1200: java-1.6.0-sun security update (Critical)
    2009-08-06
    oval:com.redhat.rhsa:def:20091201
    P
    RHSA-2009:1201: java-1.6.0-openjdk security and bug fix update (Important)
    2009-08-06
    oval:org.debian:def:1849
    V
    design flaw
    2009-08-02
    oval:com.ubuntu.precise:def:20090217000
    V
    CVE-2009-0217 on Ubuntu 12.04 LTS (precise) - medium.
    2009-07-14
    BACK
    ibm websphere application server 6.0
    ibm websphere application server 6.0.0.1
    ibm websphere application server 6.0.0.2
    ibm websphere application server 6.0.0.3
    ibm websphere application server 6.0.1
    ibm websphere application server 6.0.1.1
    ibm websphere application server 6.0.1.2
    ibm websphere application server 6.0.1.3
    ibm websphere application server 6.0.1.5
    ibm websphere application server 6.0.1.7
    ibm websphere application server 6.0.1.9
    ibm websphere application server 6.0.1.11
    ibm websphere application server 6.0.1.13
    ibm websphere application server 6.0.1.15
    ibm websphere application server 6.0.1.17
    ibm websphere application server 6.0.2
    ibm websphere application server 6.0.2
    ibm websphere application server 6.0.2.1
    ibm websphere application server 6.0.2.2
    ibm websphere application server 6.0.2.3
    ibm websphere application server 6.0.2.10
    ibm websphere application server 6.0.2.11
    ibm websphere application server 6.0.2.12
    ibm websphere application server 6.0.2.13
    ibm websphere application server 6.0.2.14
    ibm websphere application server 6.0.2.15
    ibm websphere application server 6.0.2.16
    ibm websphere application server 6.0.2.17
    ibm websphere application server 6.0.2.18
    ibm websphere application server 6.0.2.19
    ibm websphere application server 6.0.2.20
    ibm websphere application server 6.0.2.21
    ibm websphere application server 6.0.2.22
    ibm websphere application server 6.0.2.23
    ibm websphere application server 6.0.2.24
    ibm websphere application server 6.0.2.25
    ibm websphere application server 6.0.2.28
    ibm websphere application server 6.0.2.29
    ibm websphere application server 6.0.2.30
    ibm websphere application server 6.0.2.31
    ibm websphere application server 6.0.2.32
    ibm websphere application server 6.0.2.33
    ibm websphere application server 6.1
    ibm websphere application server 6.1.0
    ibm websphere application server 6.1.0.0
    ibm websphere application server 6.1.0.1
    ibm websphere application server 6.1.0.2
    ibm websphere application server 6.1.0.3
    ibm websphere application server 6.1.0.4
    ibm websphere application server 6.1.0.5
    ibm websphere application server 6.1.0.6
    ibm websphere application server 6.1.0.7
    ibm websphere application server 6.1.0.8
    ibm websphere application server 6.1.0.9
    ibm websphere application server 6.1.0.10
    ibm websphere application server 6.1.0.11
    ibm websphere application server 6.1.0.12
    ibm websphere application server 6.1.0.13
    ibm websphere application server 6.1.0.14
    ibm websphere application server 6.1.0.15
    ibm websphere application server 6.1.0.16
    ibm websphere application server 6.1.0.17
    ibm websphere application server 6.1.0.18
    ibm websphere application server 6.1.0.19
    ibm websphere application server 6.1.0.20
    ibm websphere application server 6.1.0.21
    ibm websphere application server 6.1.0.22
    ibm websphere application server 6.1.0.23
    ibm websphere application server 7.0
    ibm websphere application server 7.0.0.1
    mono_project mono 1.2.1
    mono_project mono 1.2.2
    mono_project mono 1.2.3
    mono_project mono 1.2.4
    mono_project mono 1.2.5
    mono_project mono 1.2.6
    mono_project mono 1.9
    mono_project mono 2.0
    oracle application server 10.1.2.3
    oracle application server 10.1.3.4
    oracle application server 10.1.4.3im
    oracle bea product suite 8.1 sp6
    oracle bea product suite 9.0
    oracle bea product suite 9.1
    oracle bea product suite 9.2 mp3
    oracle bea product suite 10.0 mp1
    oracle bea product suite 10.3
    oracle weblogic server component 8.1 sp6
    oracle weblogic server component 9.0
    oracle weblogic server component 9.1
    oracle weblogic server component 9.2 mp3
    oracle weblogic server component 10.0 mp1
    oracle weblogic server component 10.3
    microsoft .net framework 1.0 sp3
    ibm websphere application server 6.0
    microsoft .net framework 1.1 sp1
    ibm websphere application server 6.0.2
    ibm websphere application server 6.1.0
    ibm websphere application server 6.1
    ibm websphere application server 6.1.0.1
    ibm websphere application server 6.1.0.2
    ibm websphere application server 6.1.0.3
    ibm websphere application server 6.1.0.5
    ibm websphere application server 6.1.0.6
    ibm websphere application server 6.0.0.2
    ibm websphere application server 6.0.0.3
    ibm websphere application server 6.0.1
    ibm websphere application server 6.0.1.1
    ibm websphere application server 6.0.1.2
    ibm websphere application server 6.0.2.1
    ibm websphere application server 6.0.2.2
    ibm websphere application server 6.0.2.3
    ibm websphere application server 6.0.2.11
    ibm websphere application server 6.0.2.13
    ibm websphere application server 6.0.2.15
    ibm websphere application server 6.0.2.17
    ibm websphere application server 6.0.2.19
    ibm websphere application server 6.0.2.21
    ibm websphere application server 6.0.2.23
    ibm websphere application server 6.0.2.25
    ibm websphere application server 6.1.0.7
    ibm websphere application server 6.1.0.9
    ibm websphere application server 6.1.0.11
    ibm websphere application server 6.1.0.13
    ibm websphere application server 6.1.0.15
    ibm websphere application server 6.0.0.1
    ibm websphere application server 6.0.2.22
    ibm websphere application server 6.0.2.24
    ibm websphere application server 6.1.0.0
    ibm websphere application server 6.1.0.12
    mono mono 2.0
    oracle application server 10.1.3
    oracle application server 10.1.3.1.0
    oracle application server 10.1.3.2.0
    oracle application server 10.1.3.3
    oracle application server 10.1.3.3.0
    ibm websphere application server 6.1.0.4
    ibm websphere application server 7.0
    ibm websphere application server 6.1.0.17
    ibm websphere application server 6.1.0.19
    ibm websphere application server 6.1.0.21
    ibm websphere application server 6.0.2.29
    ibm websphere application server 6.0.2.31
    microsoft .net framework 2.0 sp1
    ibm websphere application server 6.0.2.28
    ibm websphere application server 6.1.0.16
    ibm websphere application server 6.1.0.18
    ibm websphere application server 6.0.1.11
    ibm websphere application server 6.0.1.13
    ibm websphere application server 6.0.1.15
    ibm websphere application server 6.0.1.17
    ibm websphere application server 6.0.1.3
    ibm websphere application server 6.0.1.5
    ibm websphere application server 6.0.1.7
    ibm websphere application server 6.0.1.9
    oracle application server 10.1.2.3
    ibm websphere application server 6.1.0.10
    ibm websphere application server 6.1.0.14
    ibm websphere application server 6.1.0.20
    ibm websphere application server 6.1.0.22
    ibm websphere application server 6.1.0.8
    ibm websphere application server 6.0.2.30
    ibm websphere application server 6.0.2.32
    microsoft windows server 2008 -
    oracle application server 10.1.3.4
    ibm websphere application server 6.0.2.10
    ibm websphere application server 6.0.2.12
    ibm websphere application server 6.0.2.14
    ibm websphere application server 6.0.2.16
    ibm websphere application server 6.0.2.18
    ibm websphere application server 6.0.2.20
    ibm websphere application server 6.0.2.33
    oracle application server 10g 10.1.3.2.1
    oracle application server 10g 10.1.3.3
    oracle application server 10g 10.1.3.4
    oracle bea product suite 8.1 sp6
    oracle bea product suite 9.1
    oracle bea product suite 9.0
    oracle bea product suite 10.3
    oracle bea product suite 10.0 mp1
    oracle bea product suite 9.2 mp3
    microsoft .net framework 2.0 sp2
    microsoft .net framework 3.5
    microsoft .net framework 3.5 sp1
    oracle application server 10.1.4.3im
    mono mono 1.2.6
    mono mono 1.2.3
    mono mono 1.2.2
    mono mono 1.2.5
    mono mono 1.2.4
    mono mono 1.2.1
    mono mono 1.9
    oracle weblogic server component 10.3
    oracle weblogic server component 10.0 mp1
    oracle weblogic server component 9.2 mp3
    oracle weblogic server component 9.1
    oracle weblogic server component 9.0
    oracle weblogic server component 8.1 sp6
    ibm websphere application server 6.0.2
    ibm websphere application server 6.1.0.23
    ibm websphere application server 7.0.0.1
    microsoft windows server 2008
    oracle opensso enterprise 8.0
    microsoft .net framework 3.5.1
    microsoft windows 2000 sp4
    microsoft windows xp sp2
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell linux desktop 9
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat linux advanced workstation 2.1
    redhat rhel extras 4
    mandrakesoft mandrake linux corporate server 4.0
    microsoft windows server_2003
    microsoft windows server_2003
    microsoft windows server_2003
    microsoft windows xp sp2
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0 x86_64
    debian debian linux 4.0
    redhat enterprise linux 5
    redhat rhel application server 2
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.1 x86_64
    microsoft windows vista sp1
    microsoft windows vista sp1
    mandrakesoft mandrake linux 2008.1
    canonical ubuntu 8.04
    opensuse opensuse 11.0
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    canonical ubuntu 8.10
    debian debian linux 5.0
    microsoft windows server 2008
    microsoft windows server 2008 -
    microsoft windows xp sp3
    microsoft windows vista sp2
    microsoft windows vista sp2
    microsoft windows server 2008 sp2
    microsoft windows server 2008 sp2
    microsoft windows 7
    mandriva linux 2009.1
    mandriva linux 2009.1
    redhat enterprise linux 4.8.z
    redhat enterprise linux 4.8.z
    microsoft windows 7
    microsoft windows server 2008 r2
    microsoft windows server 2008 r2
    sun openoffice.org 3.1.1
    mandriva enterprise server 5
    mandriva enterprise server 5
    ibm infosphere information server 11.7
    ibm storediq 7.6.0
    ibm tivoli business service manager 6.2.0