Moderate security update for Clutter librar
Reporter | Title | Published | Views | Family All 16 |
---|---|---|---|---|
![]() | CentOS 7 : clutter (CESA-2015:1510) | 29 Jul 201500:00 | – | nessus |
![]() | Scientific Linux Security Update : clutter on SL7.x x86_64 (20150727) | 29 Jul 201500:00 | – | nessus |
![]() | Oracle Linux 7 : clutter (ELSA-2015-1510) | 28 Jul 201500:00 | – | nessus |
![]() | RHEL 7 : clutter (RHSA-2015:1510) | 28 Jul 201500:00 | – | nessus |
![]() | CVE-2015-3213 | 12 Aug 201514:00 | – | cvelist |
![]() | CVE-2015-3213 | 12 Aug 201500:00 | – | ubuntucve |
![]() | Code injection | 12 Aug 201514:59 | – | prion |
![]() | clutter security update | 27 Jul 201500:00 | – | oraclelinux |
![]() | Oracle: Security Advisory (ELSA-2015-1510) | 6 Oct 201500:00 | – | openvas |
![]() | RedHat Update for clutter RHSA-2015:1510-01 | 3 Aug 201500:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | s390 | clutter-debuginfo | 1.14.4-12.el7_1.1 | clutter-debuginfo-1.14.4-12.el7_1.1.s390.rpm |
RedHat | 7 | ppc64 | clutter-debuginfo | 1.14.4-12.el7_1.1 | clutter-debuginfo-1.14.4-12.el7_1.1.ppc64.rpm |
RedHat | 7 | ppc | clutter-debuginfo | 1.14.4-12.el7_1.1 | clutter-debuginfo-1.14.4-12.el7_1.1.ppc.rpm |
RedHat | 7 | ppc64 | clutter-devel | 1.14.4-12.el7_1.1 | clutter-devel-1.14.4-12.el7_1.1.ppc64.rpm |
RedHat | 7 | ppc | clutter-devel | 1.14.4-12.el7_1.1 | clutter-devel-1.14.4-12.el7_1.1.ppc.rpm |
RedHat | 7 | s390x | clutter-devel | 1.14.4-12.el7_1.1 | clutter-devel-1.14.4-12.el7_1.1.s390x.rpm |
RedHat | 7 | i686 | clutter-debuginfo | 1.14.4-12.el7_1.1 | clutter-debuginfo-1.14.4-12.el7_1.1.i686.rpm |
RedHat | 7 | s390x | clutter-doc | 1.14.4-12.el7_1.1 | clutter-doc-1.14.4-12.el7_1.1.s390x.rpm |
RedHat | 7 | ppc64 | clutter | 1.14.4-12.el7_1.1 | clutter-1.14.4-12.el7_1.1.ppc64.rpm |
RedHat | 7 | s390 | clutter | 1.14.4-12.el7_1.1 | clutter-1.14.4-12.el7_1.1.s390.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo