zodb remote vulnerabilities update limiting object ids reques
Reporter | Title | Published | Views | Family All 34 |
---|---|---|---|---|
OpenVAS | Debian Security Advisory DSA 1863-1 (zope2.10/zope2.9) | 2 Sep 200900:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-1863-1) | 2 Sep 200900:00 | – | openvas |
OpenVAS | Ubuntu USN-848-1 (zope3) | 19 Oct 200900:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-2234-1) | 3 Aug 201100:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 2234-1 (zodb) | 3 Aug 201100:00 | – | openvas |
OpenVAS | Ubuntu: Security Advisory (USN-848-1) | 19 Oct 200900:00 | – | openvas |
UbuntuCve | CVE-2009-0669 | 7 Aug 200900:00 | – | ubuntucve |
UbuntuCve | CVE-2009-0668 | 7 Aug 200900:00 | – | ubuntucve |
Tenable Nessus | Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : zope3 vulnerabilities (USN-848-1) | 15 Oct 200900:00 | – | nessus |
Tenable Nessus | Debian DSA-1863-1 : zope2.10/zope2.9 - several vulnerabilities | 24 Feb 201000:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 5 | ia64 | python2.4-zodb | 1:3.6.0-2+lenny3 | python2.4-zodb_1:3.6.0-2+lenny3_ia64.deb |
Debian | 4 | all | zope2.9 | 2.9.6-4etch2 | zope2.9_2.9.6-4etch2_all.deb |
Debian | 4 | sparc | zope2.9 | 2.9.6-4etch2 | zope2.9_2.9.6-4etch2_sparc.deb |
Debian | 5 | amd64 | zope2.10 | 2.10.6-1+lenny1 | zope2.10_2.10.6-1+lenny1_amd64.deb |
Debian | 4 | hppa | zope2.9 | 2.9.6-4etch2 | zope2.9_2.9.6-4etch2_hppa.deb |
Debian | 5 | hppa | python2.4-zodb | 1:3.6.0-2+lenny3 | python2.4-zodb_1:3.6.0-2+lenny3_hppa.deb |
Debian | 5 | i386 | python2.4-zodb | 1:3.6.0-2+lenny3 | python2.4-zodb_1:3.6.0-2+lenny3_i386.deb |
Debian | 4 | powerpc | zope2.9 | 2.9.6-4etch2 | zope2.9_2.9.6-4etch2_powerpc.deb |
Debian | 4 | mips | zope2.9 | 2.9.6-4etch2 | zope2.9_2.9.6-4etch2_mips.deb |
Debian | 5 | alpha | zope2.10 | 2.10.6-1+lenny1 | zope2.10_2.10.6-1+lenny1_alpha.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo