Vulnerability Name:

CVE-2010-4476 (CCN-65089)

Assigned:2010-12-06
Published:2011-02-01
Updated:2018-10-30
Summary:The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.9 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.9 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MISC
Type: UNKNOWN
http://blog.fortify.com/blog/2011/02/08/Double-Trouble

Source: CONFIRM
Type: UNKNOWN
http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html

Source: MITRE
Type: CNA
CVE-2010-4476

Source: CCN
Type: HP Security Bulletin HPSBNS02633 SSRT100390
HP NonStop Server NonStop Java Double Literal Parsing Denial of Service

Source: CCN
Type: HP Security Bulletin HPSBUX02641 SSRT100412
HP OpenView Network Node Manager (OV NNM) for HP-UX, Linux, Solaris, and Windows running Java, Remote Denial of Service (DoS)

Source: CCN
Type: HP Security Bulletin HPSBMU02690 SSRT100569
HP Business Availability Center (BAC) Running on Solaris and Windows, Remote Denial of Service (DoS)

Source: CCN
Type: HP Security Bulletin HPSBMU02769 SSRT100846
HP Systems Insight Manager (SIM) for HP-UX, Linux, and Windows, Remote Unauthorized Access, Execution of Arbitrary Code, and Other Vulnerabilities

Source: FEDORA
Type: UNKNOWN
FEDORA-2011-1231

Source: FEDORA
Type: UNKNOWN
FEDORA-2011-1263

Source: SUSE
Type: UNKNOWN
SUSE-SA:2011:024

Source: SUSE
Type: UNKNOWN
SUSE-SU-2011:0823

Source: HP
Type: UNKNOWN
SSRT100387

Source: HP
Type: UNKNOWN
SSRT100412

Source: HP
Type: UNKNOWN
HPSBUX02645

Source: HP
Type: UNKNOWN
HPSBUX02642

Source: HP
Type: UNKNOWN
HPSBOV02634

Source: HP
Type: UNKNOWN
HPSBTU02684

Source: HP
Type: UNKNOWN
HPSBMA02642

Source: HP
Type: UNKNOWN
HPSBMU02690

Source: HP
Type: UNKNOWN
SSRT100627

Source: HP
Type: UNKNOWN
HPSBOV02762

Source: HP
Type: UNKNOWN
HPSBUX02777

Source: HP
Type: UNKNOWN
HPSBMU02799

Source: HP
Type: UNKNOWN
SSRT100867

Source: HP
Type: UNKNOWN
HPSBUX02860

Source: CCN
Type: RHSA-2011-0210
Important: jbossweb security update

Source: CCN
Type: RHSA-2011-0214
Moderate: java-1.6.0-openjdk security update

Source: CCN
Type: RHSA-2011-0282
Critical: java-1.6.0-sun security update

Source: CCN
Type: RHSA-2011-0290
Moderate: java-1.6.0-ibm security update

Source: CCN
Type: RHSA-2011-0291
Moderate: java-1.5.0-ibm security update

Source: CCN
Type: RHSA-2011-0292
Moderate: java-1.4.2-ibm security update

Source: CCN
Type: RHSA-2011-0299
Moderate: java-1.4.2-ibm-sap security update

Source: CCN
Type: RHSA-2011-0335
Important: tomcat6 security and bug fix update

Source: CCN
Type: RHSA-2011-0336
Important: tomcat5 security update

Source: CCN
Type: RHSA-2011-0348
Important: tomcat6 security update

Source: CCN
Type: RHSA-2011-0349
Important: tomcat5 security update

Source: CCN
Type: RHSA-2011-0880
Low: Red Hat Network Satellite server IBM Java Runtime security update

Source: SECUNIA
Type: Vendor Advisory
43048

Source: SECUNIA
Type: Vendor Advisory
43280

Source: CCN
Type: SA43295
IBM Java doubleValue() Denial of Service Vulnerability

Source: SECUNIA
Type: Vendor Advisory
43295

Source: CCN
Type: SA43296
IBM WebSphere Application Server Java Denial of Service Vulnerability

Source: SECUNIA
Type: Vendor Advisory
43304

Source: CCN
Type: SA43325
IBM OS/400 Java parseDouble() Denial of Service Vulnerability

Source: SECUNIA
Type: Vendor Advisory
43333

Source: CCN
Type: SA43378
IBM CICS Transaction Gateway Java Double Literal Parsing Denial of Service

Source: SECUNIA
Type: Vendor Advisory
43378

Source: CCN
Type: SA43400
HP NonStop Server NonStop Java Double Literal Parsing Denial of Service

Source: SECUNIA
Type: Vendor Advisory
43400

Source: CCN
Type: SA43489
IBM Tivoli Common Reporting Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA43509
IBM Tivoli Monitoring Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA43514
IBM Tivoli Storage Manager Administration Center Java Double Literal Denial of Service

Source: CCN
Type: SA43558
IBM WebSphere MQ File Transfer Edition Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA43619
IBM WebSphere Application Server Community Edition Java Double Literal Denial of Service

Source: CCN
Type: SA43627
Hitachi Cosminexus Products Java Multiple Vulnerabilities

Source: CCN
Type: SA43659
HP OpenView Network Node Manager Denial of Service Vulnerability

Source: SECUNIA
Type: Vendor Advisory
43659

Source: CCN
Type: SA43704
JBoss Enterprise Portal Platform Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA43705
JBoss Enterprise SOA Platform Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA43769
Novell Access Manager Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA43994
IBM Tivoli Directory Server Multiple Vulnerabilities

Source: CCN
Type: SA44138
IBM Virtual I/O Server Java Double Literal Parsing Denial of Service Vulnerability

Source: CCN
Type: SA44186
HP Network Node Manager i Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA44232
Fujitsu Interstage Products Java Double Literal Denial of Service

Source: CCN
Type: SA44261
IBM Tivoli Netview for z/OS Java Double Literal Denial of Service

Source: CCN
Type: SA44291
Oracle JRockit Multiple Vulnerabilities

Source: CCN
Type: SA44303
Oracle iPlanet Web Server Java Double Literal Parsing Denial of Service Vulnerability

Source: CCN
Type: SA44382
IBM Tivoli Management Framework Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA44462
IBM InfoSphere Information Server Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA44535
HP Tru64 UNIX and OpenVMS update for Java

Source: CCN
Type: SA44576
Hitachi JP1 Products Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA44769
Hitachi Command Suite Products Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA44786
Hitachi IT Operations Analyzer and Director Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA44859
IBM Cognos 8 Planning Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA44905
Attachmate Reflection X 2011 PKI Services Manager Two Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
44954

Source: CCN
Type: SA45022
Novell Sentinel Log Manager Java and Tomcat Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
45022

Source: CCN
Type: SA45172
HP Business Availability Center Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA45523
IBM Tivoli Netcool/OMNIbus Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA45555
IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
45555

Source: CCN
Type: SA45556
IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA45700
IBM Tivoli Storage Productivity Center Products Java Double Literal Denial of Service

Source: CCN
Type: SA45733
IBM Rational ClearCase / ClearQuest Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA45819
Novell Identity Manager Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA46676
Attachmate Reflection for the Web Java Double Literal Denial of Service Vulnerability

Source: CCN
Type: SA49108
IBM Tivoli Access Manager for e-business Java Double Literal Denial of Service Vulnerability

Source: SECUNIA
Type: UNKNOWN
49198

Source: GENTOO
Type: UNKNOWN
GLSA-201406-32

Source: CCN
Type: Attachmate Web site
Security Updates and Reflection for the Web

Source: CCN
Type: Novell Document ID: 5098550
Sentinel Log Manager 1.2.0.1 (1.2 Hot Fix 1)

Source: CONFIRM
Type: UNKNOWN
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html

Source: CCN
Type: IBM APAR SE46871
JVA-RUN JDK60-64 CRITICAL SECURITY VULNERABILITY ALERT

Source: CCN
Type: IBM APAR IZ94331
ORACLE SECURITY FIX : 4421494

Source: AIXAPAR
Type: UNKNOWN
IZ94423

Source: AIXAPAR
Type: UNKNOWN
PM31983

Source: CCN
Type: IBM APAR PM32387
Denial of Service Security Exposure with Java JRE/JDK hanging when converting 2.2250738585072012e-308 number (CVE-2010-4476)

Source: CCN
Type: IBM Support and Downloads
CICS Transaction Gateway and Java security issue CVE-2010-4476

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21468358

Source: CCN
Type: IBM APAR PM32177
Ship SDK IFIX to address SECURITY VULNERABILITY - WSAS V6.1.0.35

Source: CCN
Type: IBM Web site
Tivoli Access Manager for e-Business Base, Patch 6.1.1-TIV-TAM-FP0005

Source: DEBIAN
Type: UNKNOWN
DSA-2161

Source: DEBIAN
Type: DSA-2161
openjdk-6 -- denial of service

Source: CCN
Type: Exploring Binary Blog
Java Hangs When Converting 2.2250738585072012e-308

Source: MISC
Type: UNKNOWN
http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/

Source: CCN
Type: Fujitsu Web site
Fujitsu

Source: CCN
Type: Hitachi Security Vulnerability Information HS11-003
Multiple Vulnerabilities in Cosminexus

Source: CONFIRM
Type: UNKNOWN
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html

Source: CONFIRM
Type: UNKNOWN
http://www.ibm.com/support/docview.wss?uid=swg24029497

Source: CONFIRM
Type: UNKNOWN
http://www.ibm.com/support/docview.wss?uid=swg24029498

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2011:054

Source: CCN
Type: Novell Document ID: 7008129
Access Manager security vulnerability with JRE double-precision binary floating-point number

Source: CCN
Type: Novell Document ID: 7009249
Identity Manager 3.6.1 security vulnerability with JRE double-precision binary floating-point number (CVE-2010-4476)

Source: CCN
Type: Sun Security Blog 08 Feb 2011
Oracle Security Alert for CVE-2010-4476

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html

Source: CCN
Type: Oracle Critical Patch Update Advisory - April 2011
Oracle Critical Patch Update Advisory - April 2011

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html

Source: CCN
Type: Oracle Critical Patch Update - February 2011
Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html

Source: CCN
Type: OSVDB ID: 70965
Oracle Java SE / Java for Business Double.parseDouble Method Floating Point Number Conversion DoS

Source: REDHAT
Type: Vendor Advisory
RHSA-2011:0210

Source: REDHAT
Type: Vendor Advisory
RHSA-2011:0211

Source: REDHAT
Type: Vendor Advisory
RHSA-2011:0212

Source: REDHAT
Type: Vendor Advisory
RHSA-2011:0213

Source: REDHAT
Type: Vendor Advisory
RHSA-2011:0214

Source: REDHAT
Type: Vendor Advisory
RHSA-2011:0282

Source: REDHAT
Type: Vendor Advisory
RHSA-2011:0333

Source: REDHAT
Type: Vendor Advisory
RHSA-2011:0334

Source: REDHAT
Type: Vendor Advisory
RHSA-2011:0880

Source: CCN
Type: BID-46091
Oracle Java Floating-Point Value Denial of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1025062

Source: CCN
Type: Sun Microsystems Web site
Sun Java System Web Server

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0365

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0377

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0379

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0422

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0434

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0605

Source: HP
Type: UNKNOWN
HPSBNS02633

Source: XF
Type: UNKNOWN
sun-java-parsedouble-dos(65089)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:12662

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:12745

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:14328

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:14589

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:19493

Source: CCN
Type: RHSA-2011:0333-1
Important: JBoss Enterprise SOA Platform 4.3.CP04 and 5.0.2 security update

Source: CCN
Type: RHSA-2011:0334-1
Important: JBoss Enterprise Portal Platform 4.3.CP06 and 5.1.0 security update

Source: SUSE
Type: SUSE-SA:2011:010
Sun Java Security update

Source: SUSE
Type: SUSE-SA:2011:014
IBM Java security update

Source: SUSE
Type: SUSE-SA:2011:024
IBM Java 1.4.2 security problems

Source: SUSE
Type: SUSE-SR:2011:008
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sun:jre:1.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_14:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_17:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_18:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_20:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_21:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_22:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:update_23:*:*:*:*:*:* (Version <= 1.6.0)
  • OR cpe:/a:sun:jre:1.6.0:update_3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.6.0:update_7:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:sun:jdk:1.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:*:update_23:*:*:*:*:*:* (Version <= 1.6.0)
  • OR cpe:/a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update10:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update11:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update12:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update13:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update14:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update15:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update16:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update17:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update18:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update19:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update20:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update21:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update22:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update23:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update24:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update25:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update26:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:*:update27:*:*:*:*:*:* (Version <= 1.5.0)
  • OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.5.0:update9:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_27:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_28:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:*:*:*:*:*:*:*:* (Version <= 1.4.2_29)

  • Configuration 5:
  • cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update10:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update11:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update12:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update13:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update14:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update15:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update16:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update17:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update18:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update19:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update20:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update21:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update22:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update23:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update24:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update25:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update26:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:update27:*:*:*:*:*:* (Version <= 1.5.0)
  • OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update8:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.5.0:update9:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_25:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_26:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_27:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_28:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:*:*:*:*:*:*:*:* (Version <= 1.4.2_29)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:sun:jdk:-:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:-:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:4.2:sp1:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:4.2:sp2:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.0:sp2:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.0:sp3:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.0:sp5:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:update1:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:update2:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:update3:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:update4:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2:update5:linux:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*
  • OR cpe:/a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*
  • OR cpe:/a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*
  • OR cpe:/a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*
  • OR cpe:/a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_13:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_14:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_15:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_16:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_17:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_18:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_20:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_23:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_22:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.3:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:5.3:update_1:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_24:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_25:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_26:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_27:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_27:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_29:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.2_28:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_28:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.2_29:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:hp:systems_insight_manager:6.3:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_management_framework:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:*:*:*:*:*:*:*:*
  • OR cpe:/a:novell:identity_manager:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_access_manager_for_e-business:6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_enterprise_console:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_monitoring_express:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netview:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_mq:-:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/h:hp:nonstop_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_storage_manager:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:access_manager:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:java:5.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:sentinel_log_manager:1.1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_application_server:7:-:enterprise:*:*:*:*:*
  • OR cpe:/a:hp:business_availability_center:7.55:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/omnibus:7.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/reporter:2.2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:application_manager_for_smart_business:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/a:hp:network_node_manager_i:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:it_operations_director:02-50-01:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:it_operations_analyzer:02-01:*:*:*:*:*:*:*
  • OR cpe:/a:attachmate:reflection_for_secure_it:7.0::unix_client:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:5.6.z::server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7707
    P
    libykcs11-1-1.6.2-4.30 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:7729
    P
    p7zip-16.02-150200.14.9.2 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:42329
    P
    Security update for dwarves and elfutils (Moderate)
    2022-08-01
    oval:org.opensuse.security:def:20104476
    V
    CVE-2010-4476
    2022-05-20
    oval:org.opensuse.security:def:31756
    P
    Security update for apache2 (Important)
    2022-01-12
    oval:org.opensuse.security:def:7005
    P
    Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP1) (Important)
    2021-12-14
    oval:org.opensuse.security:def:31699
    P
    Security update for binutils (Moderate)
    2021-11-02
    oval:org.opensuse.security:def:32209
    P
    Security update for postgresql10 (Important)
    2021-10-20
    oval:org.opensuse.security:def:26151
    P
    Security update for python3 (Moderate)
    2021-10-20
    oval:org.opensuse.security:def:42128
    P
    Security update for rpm (Important)
    2021-10-15
    oval:org.opensuse.security:def:6980
    P
    Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP1) (Important)
    2021-10-14
    oval:org.opensuse.security:def:42127
    P
    Security update for glibc (Moderate)
    2021-10-12
    oval:org.opensuse.security:def:31274
    P
    Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)
    2021-09-23
    oval:org.opensuse.security:def:31275
    P
    Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)
    2021-09-23
    oval:org.opensuse.security:def:32165
    P
    Security update for cpio (Important)
    2021-08-23
    oval:org.opensuse.security:def:26102
    P
    Security update for php72 (Important)
    2021-08-06
    oval:org.opensuse.security:def:32143
    P
    Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)
    2021-07-21
    oval:org.opensuse.security:def:31642
    P
    Security update for webkit2gtk3 (Important)
    2021-06-17
    oval:org.opensuse.security:def:31643
    P
    Security update for apache2 (Important)
    2021-06-17
    oval:org.opensuse.security:def:31200
    P
    Security update for java-1_8_0-openjdk (Moderate)
    2021-06-15
    oval:org.opensuse.security:def:36495
    P
    libtirpc-devel-0.2.1-1.7.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:36537
    P
    perl-base-32bit-5.10.0-64.72.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:31188
    P
    Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)
    2021-06-04
    oval:org.opensuse.security:def:32104
    P
    Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)
    2021-06-04
    oval:org.opensuse.security:def:31189
    P
    Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)
    2021-06-04
    oval:org.opensuse.security:def:31190
    P
    Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)
    2021-06-04
    oval:org.opensuse.security:def:6905
    P
    Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP1) (Important)
    2021-05-25
    oval:org.opensuse.security:def:26049
    P
    Security update for lz4 (Important)
    2021-05-14
    oval:org.opensuse.security:def:26048
    P
    Security update for the Linux Kernel (Important)
    2021-05-13
    oval:org.opensuse.security:def:26047
    P
    Security update for xen (Important)
    2021-05-12
    oval:org.opensuse.security:def:13238
    P
    java-1_6_0-ibm-1.6.0_sr16.1-5.9 on GA media (Moderate)
    2021-04-29
    oval:org.opensuse.security:def:46358
    P
    java-1_6_0-ibm-1.6.0_sr16.1-5.9 on GA media (Moderate)
    2021-04-29
    oval:org.opensuse.security:def:6886
    P
    Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP1) (Important)
    2021-04-28
    oval:org.opensuse.security:def:31607
    P
    Security update for qemu (Important)
    2021-04-16
    oval:org.opensuse.security:def:6871
    P
    Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP1) (Important)
    2021-04-07
    oval:org.opensuse.security:def:7069
    P
    Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)
    2021-04-07
    oval:org.opensuse.security:def:26204
    P
    Security update for freeradius-server (Low)
    2021-03-04
    oval:org.opensuse.security:def:26190
    P
    Security update for MozillaFirefox (Low)
    2021-02-10
    oval:org.opensuse.security:def:31201
    P
    Security update for ImageMagick (Important)
    2021-01-22
    oval:org.opensuse.security:def:7056
    P
    Security update for the Linux Kernel (Important)
    2020-12-10
    oval:org.opensuse.security:def:32008
    P
    Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)
    2020-12-07
    oval:org.opensuse.security:def:32009
    P
    Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)
    2020-12-07
    oval:org.opensuse.security:def:35638
    P
    squid-2.7.STABLE5-2.4.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35813
    P
    python-sssd-config-1.5.11-0.9.96 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35720
    P
    java-1_4_2-ibm-1.4.2_sr13.10-0.4.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35697
    P
    findutils-4.4.0-38.26.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35857
    P
    PackageKit-0.3.14-2.28.46 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35721
    P
    java-1_6_0-ibm-1.6.0_sr9.3-0.4.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35746
    P
    libfreebl3-3.13.1-0.2.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35922
    P
    java-1_6_0-ibm-1.6.0_sr13.1-0.9.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35785
    P
    mono-core-2.6.7-0.7.19 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:25347
    P
    Security update for mariadb (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25697
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25989
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:26720
    P
    java-1_4_2-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25284
    P
    Security update for xrdp (Important)
    2020-12-01
    oval:org.opensuse.security:def:25614
    P
    Security update for perl-DBI (Important)
    2020-12-01
    oval:org.opensuse.security:def:25951
    P
    Security update for pcsc-lite (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26686
    P
    dhcpcd on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:34998
    P
    Security update for glibc (Important)
    2020-12-01
    oval:org.opensuse.security:def:25757
    P
    Security update for flash-player (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26248
    P
    Security update for freerdp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25271
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:6824
    P
    python-libxml2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31942
    P
    Security update for gnome-session (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32685
    P
    java-1_4_2-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31556
    P
    Security update for xorg-x11-server (Important)
    2020-12-01
    oval:org.opensuse.security:def:31904
    P
    Security update for foomatic-filters (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32647
    P
    cyrus-imapd on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31390
    P
    Security update for pam
    2020-12-01
    oval:org.opensuse.security:def:32055
    P
    Security update for kvm (Important)
    2020-12-01
    oval:org.opensuse.security:def:35230
    P
    Security update for libmspack (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25475
    P
    Security update for libssh (Important)
    2020-12-01
    oval:org.opensuse.security:def:25848
    P
    Security update for flex, at, bogofilter, cyrus-imapd, kdelibs4, libQtWebKit4, libbonobo, mdbtools, netpbm, openslp, sgmltool, virtuoso, libqt5-qtwebkit (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26003
    P
    Security update for yaml-cpp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25348
    P
    Security update for ucode-intel (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25698
    P
    Security update for dpdk (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25990
    P
    Security update for libvpx (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26721
    P
    java-1_6_0-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25484
    P
    Security update for libqt4 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25814
    P
    Security update for flash-player (Important)
    2020-12-01
    oval:org.opensuse.security:def:26886
    P
    ecryptfs-utils-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25273
    P
    Security update for ceph (Important)
    2020-12-01
    oval:org.opensuse.security:def:25272
    P
    Security update for vino (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31406
    P
    Security update for perl-PlRPC (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31798
    P
    Security update for OpenEXR (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31964
    P
    Security update for icu (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31943
    P
    Security update for gnutls (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32686
    P
    java-1_6_0-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31401
    P
    Security update for perl-DBD-mysql (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32847
    P
    dbus-1-glib on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:34999
    P
    Security update for glibc (Important)
    2020-12-01
    oval:org.opensuse.security:def:35331
    P
    Security update for minicom (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25556
    P
    Security update for ntp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25901
    P
    Security update for flash-player (Important)
    2020-12-01
    oval:org.opensuse.security:def:25476
    P
    Security update for git (Important)
    2020-12-01
    oval:org.opensuse.security:def:25849
    P
    Security update for mariadb (Important)
    2020-12-01
    oval:org.opensuse.security:def:26004
    P
    Security update for shotwell (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25548
    P
    Security update for ceph (Important)
    2020-12-01
    oval:org.opensuse.security:def:25898
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:26921
    P
    java-1_6_0-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:6756
    P
    libsndfile1 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:7038
    P
    libgadu3 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25473
    P
    Security update for strongswan (Important)
    2020-12-01
    oval:org.opensuse.security:def:31498
    P
    Security update for python-numpy (Important)
    2020-12-01
    oval:org.opensuse.security:def:31854
    P
    Security update for cracklib (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25472
    P
    Security update for apache2-mod_perl (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31407
    P
    Security update for perl-XML-LibXML (Important)
    2020-12-01
    oval:org.opensuse.security:def:31799
    P
    Security update for SDL (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31965
    P
    Security update for icu (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31475
    P
    Security update for procps (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31843
    P
    Security update for cairo (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32886
    P
    java-1_6_0-ibm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:35010
    P
    Security update for gnutls (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:35388
    P
    Security update for openldap2 (Important)
    2020-12-01
    oval:org.opensuse.security:def:25283
    P
    Security update for SUSE Manager Client Tools (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25613
    P
    Security update for libsolv (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25950
    P
    Security update for evince (Important)
    2020-12-01
    oval:org.opensuse.security:def:26685
    P
    dhcp on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31389
    P
    Security update for orca (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25557
    P
    Security update for transfig (Low)
    2020-12-01
    oval:org.opensuse.security:def:25902
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25676
    P
    Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:6778
    P
    libvte9 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:7047
    P
    libhogweed2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31555
    P
    Security update for sqlite3 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31903
    P
    Security update for fontconfig (Low)
    2020-12-01
    oval:org.opensuse.security:def:32646
    P
    curl on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31499
    P
    Security update for python-paramiko (Important)
    2020-12-01
    oval:org.opensuse.security:def:31855
    P
    Security update for crash (Low)
    2020-12-01
    oval:org.opensuse.security:def:6748
    P
    libqt4-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31999
    P
    Security update for xorg-x11-server (Important)
    2020-12-01
    oval:org.opensuse.security:def:35094
    P
    Security update for Linux kernel
    2020-12-01
    oval:org.opensuse.security:def:35478
    P
    Security update for php53 (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:14589
    V
    HP-UX Apache Running Tomcat Servlet Engine, Remote Information Disclosure, Authentication Bypass, Cross-Site Scripting (XSS), Unauthorized Access, Denial of Service (DoS)
    2015-04-20
    oval:org.mitre.oval:def:12662
    V
    HP-UX Running Java, Remote Execution of Arbitrary Code, Disclosure of Information, and Other Vulnerabilities
    2015-04-20
    oval:org.mitre.oval:def:19493
    V
    HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Access Restriction Bypass, Unauthorized Modification and Other Vulnerabilities
    2015-04-20
    oval:org.mitre.oval:def:12745
    V
    HP-UX Apache Web Server, Remote Information Disclosure, Cross-Site Scripting (XSS), Denial of Service (DoS)
    2015-04-20
    oval:org.mitre.oval:def:14328
    V
    The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
    2015-03-23
    oval:org.mitre.oval:def:21713
    P
    RHSA-2011:0214: java-1.6.0-openjdk security update (Moderate)
    2015-03-09
    oval:org.mitre.oval:def:13407
    P
    USN-1079-3 -- openjdk-6b18 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:13733
    P
    USN-1079-2 -- openjdk-6b18 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:13241
    P
    USN-1079-1 -- openjdk-6 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:12879
    P
    DSA-2161-1 openjdk-6 -- denial of service
    2014-06-23
    oval:org.mitre.oval:def:22977
    P
    ELSA-2011:0336: tomcat5 security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:23615
    P
    ELSA-2011:0282: java-1.6.0-sun security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:23319
    P
    ELSA-2011:0214: java-1.6.0-openjdk security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:23625
    P
    ELSA-2011:0335: tomcat6 security and bug fix update (Important)
    2014-05-26
    oval:org.mitre.oval:def:23406
    P
    ELSA-2011:0290: java-1.6.0-ibm security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:22826
    P
    ELSA-2011:0292: java-1.4.2-ibm security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:23595
    P
    ELSA-2011:0291: java-1.5.0-ibm security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:21859
    P
    RHSA-2011:0282: java-1.6.0-sun security update (Critical)
    2014-02-24
    oval:org.mitre.oval:def:21420
    P
    RHSA-2011:0336: tomcat5 security update (Important)
    2014-02-24
    oval:org.mitre.oval:def:21891
    P
    RHSA-2011:0335: tomcat6 security and bug fix update (Important)
    2014-02-24
    oval:org.mitre.oval:def:21907
    P
    RHSA-2011:0292: java-1.4.2-ibm security update (Moderate)
    2014-02-24
    oval:org.mitre.oval:def:21809
    P
    RHSA-2011:0291: java-1.5.0-ibm security update (Moderate)
    2014-02-24
    oval:org.mitre.oval:def:21273
    P
    RHSA-2011:0290: java-1.6.0-ibm security update (Moderate)
    2014-02-24
    oval:org.mitre.oval:def:20649
    V
    VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
    2014-01-20
    oval:com.redhat.rhsa:def:20110335
    P
    RHSA-2011:0335: tomcat6 security and bug fix update (Important)
    2011-03-09
    oval:com.redhat.rhsa:def:20110336
    P
    RHSA-2011:0336: tomcat5 security update (Important)
    2011-03-09
    oval:com.redhat.rhsa:def:20110292
    P
    RHSA-2011:0292: java-1.4.2-ibm security update (Moderate)
    2011-02-22
    oval:com.redhat.rhsa:def:20110290
    P
    RHSA-2011:0290: java-1.6.0-ibm security update (Moderate)
    2011-02-22
    oval:com.redhat.rhsa:def:20110291
    P
    RHSA-2011:0291: java-1.5.0-ibm security update (Moderate)
    2011-02-22
    oval:com.redhat.rhsa:def:20110282
    P
    RHSA-2011:0282: java-1.6.0-sun security update (Critical)
    2011-02-17
    oval:com.redhat.rhsa:def:20110214
    P
    RHSA-2011:0214: java-1.6.0-openjdk security update (Moderate)
    2011-02-11
    BACK
    sun jre 1.6.0
    sun jre 1.6.0 update_1
    sun jre 1.6.0 update_10
    sun jre 1.6.0 update_11
    sun jre 1.6.0 update_12
    sun jre 1.6.0 update_13
    sun jre 1.6.0 update_14
    sun jre 1.6.0 update_15
    sun jre 1.6.0 update_16
    sun jre 1.6.0 update_17
    sun jre 1.6.0 update_18
    sun jre 1.6.0 update_19
    sun jre 1.6.0 update_2
    sun jre 1.6.0 update_20
    sun jre 1.6.0 update_21
    sun jre 1.6.0 update_22
    sun jre * update_23
    sun jre 1.6.0 update_3
    sun jre 1.6.0 update_4
    sun jre 1.6.0 update_5
    sun jre 1.6.0 update_6
    sun jre 1.6.0 update_7
    sun jdk 1.6.0
    sun jdk 1.6.0 update1
    sun jdk 1.6.0 update1_b06
    sun jdk 1.6.0 update2
    sun jdk 1.6.0 update_10
    sun jdk 1.6.0 update_11
    sun jdk 1.6.0 update_12
    sun jdk 1.6.0 update_13
    sun jdk 1.6.0 update_14
    sun jdk 1.6.0 update_15
    sun jdk 1.6.0 update_16
    sun jdk 1.6.0 update_17
    sun jdk 1.6.0 update_18
    sun jdk 1.6.0 update_19
    sun jdk 1.6.0 update_20
    sun jdk 1.6.0 update_21
    sun jdk 1.6.0 update_22
    sun jdk * update_23
    sun jdk 1.6.0 update_3
    sun jdk 1.6.0 update_4
    sun jdk 1.6.0 update_5
    sun jdk 1.6.0 update_6
    sun jdk 1.6.0 update_7
    sun jdk 1.5.0
    sun jdk 1.5.0 update1
    sun jdk 1.5.0 update10
    sun jdk 1.5.0 update11
    sun jdk 1.5.0 update12
    sun jdk 1.5.0 update13
    sun jdk 1.5.0 update14
    sun jdk 1.5.0 update15
    sun jdk 1.5.0 update16
    sun jdk 1.5.0 update17
    sun jdk 1.5.0 update18
    sun jdk 1.5.0 update19
    sun jdk 1.5.0 update2
    sun jdk 1.5.0 update20
    sun jdk 1.5.0 update21
    sun jdk 1.5.0 update22
    sun jdk 1.5.0 update23
    sun jdk 1.5.0 update24
    sun jdk 1.5.0 update25
    sun jdk 1.5.0 update26
    sun jdk * update27
    sun jdk 1.5.0 update3
    sun jdk 1.5.0 update4
    sun jdk 1.5.0 update5
    sun jdk 1.5.0 update6
    sun jdk 1.5.0 update7
    sun jdk 1.5.0 update8
    sun jdk 1.5.0 update9
    sun sdk 1.4.2
    sun sdk 1.4.2_1
    sun sdk 1.4.2_02
    sun sdk 1.4.2_3
    sun sdk 1.4.2_4
    sun sdk 1.4.2_5
    sun sdk 1.4.2_6
    sun sdk 1.4.2_7
    sun sdk 1.4.2_8
    sun sdk 1.4.2_9
    sun sdk 1.4.2_10
    sun sdk 1.4.2_11
    sun sdk 1.4.2_12
    sun sdk 1.4.2_13
    sun sdk 1.4.2_14
    sun sdk 1.4.2_15
    sun sdk 1.4.2_16
    sun sdk 1.4.2_17
    sun sdk 1.4.2_18
    sun sdk 1.4.2_19
    sun sdk 1.4.2_20
    sun sdk 1.4.2_21
    sun sdk 1.4.2_22
    sun sdk 1.4.2_23
    sun sdk 1.4.2_24
    sun sdk 1.4.2_25
    sun sdk 1.4.2_26
    sun sdk 1.4.2_27
    sun sdk 1.4.2_28
    sun sdk *
    sun jre 1.5.0
    sun jre 1.5.0 update1
    sun jre 1.5.0 update10
    sun jre 1.5.0 update11
    sun jre 1.5.0 update12
    sun jre 1.5.0 update13
    sun jre 1.5.0 update14
    sun jre 1.5.0 update15
    sun jre 1.5.0 update16
    sun jre 1.5.0 update17
    sun jre 1.5.0 update18
    sun jre 1.5.0 update19
    sun jre 1.5.0 update2
    sun jre 1.5.0 update20
    sun jre 1.5.0 update21
    sun jre 1.5.0 update22
    sun jre 1.5.0 update23
    sun jre 1.5.0 update24
    sun jre 1.5.0 update25
    sun jre 1.5.0 update26
    sun jre * update27
    sun jre 1.5.0 update3
    sun jre 1.5.0 update4
    sun jre 1.5.0 update5
    sun jre 1.5.0 update6
    sun jre 1.5.0 update7
    sun jre 1.5.0 update8
    sun jre 1.5.0 update9
    sun jre 1.4.2
    sun jre 1.4.2_1
    sun jre 1.4.2_2
    sun jre 1.4.2_3
    sun jre 1.4.2_4
    sun jre 1.4.2_5
    sun jre 1.4.2_6
    sun jre 1.4.2_7
    sun jre 1.4.2_8
    sun jre 1.4.2_9
    sun jre 1.4.2_10
    sun jre 1.4.2_11
    sun jre 1.4.2_12
    sun jre 1.4.2_13
    sun jre 1.4.2_14
    sun jre 1.4.2_15
    sun jre 1.4.2_16
    sun jre 1.4.2_17
    sun jre 1.4.2_18
    sun jre 1.4.2_19
    sun jre 1.4.2_20
    sun jre 1.4.2_21
    sun jre 1.4.2_22
    sun jre 1.4.2_23
    sun jre 1.4.2_24
    sun jre 1.4.2_25
    sun jre 1.4.2_26
    sun jre 1.4.2_27
    sun jre 1.4.2_28
    sun jre *
    sun jdk -
    sun jre -
    sun jre 1.4.2
    sun sdk 1.4.2
    hp systems insight manager 4.2 sp1
    hp systems insight manager 4.2 sp2
    hp systems insight manager 5.0 sp1
    hp systems insight manager 5.0 sp2
    hp systems insight manager 5.0 sp3
    hp systems insight manager 5.0 sp5
    sun sdk 1.4.2_11
    sun sdk 1.4.2_12
    sun sdk 1.4.2_13
    sun sdk 1.4.2_14
    hp systems insight manager 4.0
    hp systems insight manager 5.0
    sun jre 1.4.2 update1
    sun jre 1.4.2 update2
    sun jre 1.4.2 update3
    sun jre 1.4.2 update4
    sun jre 1.4.2 update5
    sun sdk 1.4.2_10
    sun sdk 1.4.2_15
    sun sdk 1.4.2_17
    sun sdk 1.4.2_02
    sun sdk 1.4.2_16
    sun sdk 1.4.2_18
    hp openview network node manager 7.53 -
    hp openview network node manager 7.53 -
    hp openview network node manager 7.53 -
    hp openview network node manager 7.53 -
    sun jre 1.4.2_1
    sun jre 1.4.2_10
    sun jre 1.4.2_11
    sun jre 1.4.2_12
    sun jre 1.4.2_13
    sun jre 1.4.2_14
    sun jre 1.4.2_15
    sun jre 1.4.2_16
    sun jre 1.4.2_17
    sun jre 1.4.2_18
    sun sdk 1.4.2_1
    sun sdk 1.4.2_3
    sun sdk 1.4.2_4
    sun sdk 1.4.2_5
    sun sdk 1.4.2_6
    sun sdk 1.4.2_7
    sun sdk 1.4.2_8
    sun sdk 1.4.2_9
    sun jre 1.4.2_19
    sun sdk 1.4.2_19
    sun sdk 1.4.2_20
    sun sdk 1.4.2_21
    sun jre 1.4.2_20
    sun jre 1.4.2_21
    sun sdk 1.4.2_23
    sun jre 1.4.2_23
    sun sdk 1.4.2_22
    sun jre 1.4.2_22
    sun sdk 1.4.2_25
    hp systems insight manager 5.3
    hp systems insight manager 5.3 update_1
    hp systems insight manager 6.0
    hp systems insight manager 6.1
    sun jre 1.4.2_24
    sun jre 1.4.2_25
    sun jre 1.4.2_26
    sun jre 1.4.2_27
    sun sdk 1.4.2_24
    sun sdk 1.4.2_26
    sun sdk 1.4.2_27
    sun sdk 1.4.2_29
    sun sdk 1.4.2_28
    sun jre 1.4.2_28
    sun jre 1.4.2_29
    hp systems insight manager 6.2
    hp systems insight manager 6.3
    ibm websphere application server 6.0
    ibm tivoli management framework 4.1.1
    ibm tivoli directory server 6.0
    redhat rhel extras 4
    hp tru64 *
    novell identity manager 3.0.1
    novell suse linux enterprise server 10 sp2
    ibm websphere application server 6.1
    redhat enterprise linux 5
    redhat enterprise linux 5
    redhat enterprise linux 5
    ibm rational clearquest 7.0
    ibm tivoli access manager for e-business 6.0.0
    ibm tivoli enterprise console -
    ibm tivoli monitoring express -
    ibm tivoli netview -
    ibm websphere application server 2.0
    ibm websphere mq -
    novell open enterprise server *
    hp nonstop server *
    ibm rational clearcase 7.0
    ibm websphere application server 7.0
    ibm tivoli storage manager 6.0
    novell access manager 3.1
    ibm infosphere information server 8.1
    ibm java 5.0.0.0
    redhat jboss enterprise application platform 4.2.0
    redhat jboss enterprise soa platform 5.0.0
    novell sentinel log manager 1.1.0.0
    hitachi ucosminexus application server 7 -
    hp business availability center 7.55
    ibm tivoli netcool/omnibus 7.3.0
    ibm tivoli netcool/reporter 2.2.0.1
    ibm application manager for smart business 1.2.1
    redhat enterprise linux 6
    redhat enterprise linux 6
    hp network node manager i 9.0
    ibm infosphere information server 8.5
    ibm infosphere information server 8.0
    ibm tivoli application dependency discovery manager 7.1.2
    ibm tivoli application dependency discovery manager 7.1.2
    ibm tivoli application dependency discovery manager 7.2.0
    hitachi it operations director 02-50-01
    hitachi it operations analyzer 02-01
    attachmate reflection for secure it 7.0
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6
    redhat enterprise linux eus 5.6.z
    redhat enterprise linux long life 5.6
    redhat jboss enterprise web server 1.0.0