OVALdb logo

Professional OVAL Repository

Id
oval:org.mitre.oval:tst:1459
Version
1
Scheme
http://oval.mitre.org/XMLSchema/oval-definitions-5#windows

Comment
Patch Q313675 Installed

OVAL item
  • Свернуть
    REGISTRY_TEST  (ID = oval:org.mitre.oval:tst:1459)  xmlns=http://oval.mitre.org/XMLSchema/oval-definitions-5#windows, version=1, check=at least one, comment=Patch Q313675 Installed, check_existence=at_least_one_exists
    • registry_object (ID = oval:org.mitre.oval:obj:993)
      hive HKEY_LOCAL_MACHINE
      key operation=equals | value=Software\Microsoft\Active Setup\Installed Components\{716E024F-7F74-47F3-B93B-9FF7F3CBF94C}
      name operation=equals | value=IsInstalled
    • registry_state (ID = oval:org.mitre.oval:ste:1317)
      value operation=equals | datatype=int | value=1

Referencing Items
Id 
Comment 
Type 
Open filter row popup menu
Open filter row popup menu
Open filter row popup menu
oval:org.mitre.oval:def:921 IE File Execution User-prompt Bypass Vulnerabilityvulnerability
oval:org.mitre.oval:def:1014 IE File Download Dialog Deception Vulnerabilityvulnerability
oval:ru.altx-soft.win:def:21354 Уязвимость, позволяющая обойти запрос пользователя на выполнение файла в IE (CVE-2001-0727)vulnerability
oval:com.altx-soft.win:def:21354 IE File Execution User-prompt Bypass Vulnerability (CVE-2001-0727)vulnerability

company ALTEX-SOFT 2008-2020, © AO ALTEX-SOFT , ovaldb@altx-soft.com

OVAL and the OVAL logo are registered trademarks of The MITRE Corporation. Other names may be trademarks of their respective owners.