| | | |
| | |
| Loading… |
|
oval:ru.altx-soft.nix:def:3910 | 3 | Обновление ELSA-2008:0244: устранение уязвимостей в java-1.5.0-bea | patch |
oval:ru.altx-soft.nix:def:3930 | 3 | Обновление ELSA-2008:0156: устранение уязвимостей в java-1.5.0-bea | patch |
oval:ru.altx-soft.nix:def:3972 | 3 | Обновление ELSA-2007:0956: устранение уязвимостей в java-1.5.0-bea | patch |
oval:ru.altx-soft.nix:def:4247 | 2 | Обновление ELSA-2008:1044: устранение уязвимостей в java-1.5.0-bea (важное) | patch |
oval:ru.altx-soft.nix:def:8548 | 5 | Обновление RHSA-2008:0244 : устранение уязвимостей в java-1.5.0-bea | patch |
oval:ru.altx-soft.nix:def:8549 | 5 | Обновление RHSA-2008:0156 : устранение уязвимостей в java-1.5.0-bea | patch |
oval:com.altx-soft.nix:def:4247 | 2 | ELSA-2008:1044: java-1.5.0-bea security update (Important) | patch |
oval:com.altx-soft.nix:def:3972 | 3 | ELSA-2007:0956: java-1.5.0-bea security update | patch |
oval:com.altx-soft.nix:def:3930 | 3 | ELSA-2008:0156: java-1.5.0-bea security update | patch |
oval:com.altx-soft.nix:def:3910 | 3 | ELSA-2008:0244: java-1.5.0-bea security update | patch |
oval:com.altx-soft.nix:def:8548 | 5 | RHSA-2008:0244 -- java-1.5.0-bea security update | patch |
oval:com.altx-soft.nix:def:8549 | 5 | RHSA-2008:0156 -- java-1.5.0-bea security update | patch |
oval:ru.altx-soft.nix:def:40350 | 2 | Red Hat -- уязвимость в java-1.4.2-bea, java-1.4.2-ibm, java-1.6.0-bea, java-1.6.0-ibm, java-1.5.0-bea, java-1.5.0-ibm (CVE-2008-1187) | vulnerability |
oval:ru.altx-soft.nix:def:40699 | 2 | Red Hat -- уязвимость в java-1.6.0-bea, java-1.6.0-ibm, java-1.5.0-bea, java-1.5.0-ibm (CVE-2008-1193) | vulnerability |
oval:ru.altx-soft.nix:def:40700 | 2 | Red Hat -- уязвимость в java-1.6.0-bea, java-1.6.0-ibm, java-1.5.0-bea, java-1.5.0-ibm (CVE-2008-1194) | vulnerability |
oval:ru.altx-soft.nix:def:40996 | 2 | Red Hat -- уязвимость в java-1.5.0-ibm, java-1.5.0-bea (CVE-2008-0657) | vulnerability |
oval:ru.altx-soft.nix:def:40997 | 2 | Red Hat -- уязвимость в java-1.5.0-bea, java-1.4.2-ibm, java-1.4.2-bea (CVE-2007-5232) | vulnerability |
oval:ru.altx-soft.nix:def:40998 | 2 | Red Hat -- уязвимость в java-1.5.0-bea, java-1.4.2-ibm, java-1.4.2-bea (CVE-2007-5239) | vulnerability |
oval:ru.altx-soft.nix:def:40999 | 2 | Red Hat -- уязвимость в java-1.5.0-bea, java-1.4.2-ibm, java-1.4.2-bea (CVE-2007-5240) | vulnerability |
oval:ru.altx-soft.nix:def:41000 | 2 | Red Hat -- уязвимость в java-1.5.0-bea, java-1.4.2-ibm, java-1.4.2-bea (CVE-2007-5273) | vulnerability |
oval:com.altx-soft.nix:def:40350 | 2 | Red Hat -- vulnerability in java-1.4.2-bea, java-1.4.2-ibm, java-1.6.0-bea, java-1.6.0-ibm, java-1.5.0-bea, java-1.5.0-ibm (CVE-2008-1187) | vulnerability |
oval:com.altx-soft.nix:def:40699 | 2 | Red Hat -- vulnerability in java-1.6.0-bea, java-1.6.0-ibm, java-1.5.0-bea, java-1.5.0-ibm (CVE-2008-1193) | vulnerability |
oval:com.altx-soft.nix:def:40700 | 2 | Red Hat -- vulnerability in java-1.6.0-bea, java-1.6.0-ibm, java-1.5.0-bea, java-1.5.0-ibm (CVE-2008-1194) | vulnerability |
oval:com.altx-soft.nix:def:40996 | 2 | Red Hat -- vulnerability in java-1.5.0-ibm, java-1.5.0-bea (CVE-2008-0657) | vulnerability |
oval:com.altx-soft.nix:def:40997 | 2 | Red Hat -- vulnerability in java-1.5.0-bea, java-1.4.2-ibm, java-1.4.2-bea (CVE-2007-5232) | vulnerability |
oval:com.altx-soft.nix:def:40998 | 2 | Red Hat -- vulnerability in java-1.5.0-bea, java-1.4.2-ibm, java-1.4.2-bea (CVE-2007-5239) | vulnerability |
oval:com.altx-soft.nix:def:40999 | 2 | Red Hat -- vulnerability in java-1.5.0-bea, java-1.4.2-ibm, java-1.4.2-bea (CVE-2007-5240) | vulnerability |
oval:com.altx-soft.nix:def:41000 | 2 | Red Hat -- vulnerability in java-1.5.0-bea, java-1.4.2-ibm, java-1.4.2-bea (CVE-2007-5273) | vulnerability |
oval:ru.altx-soft.nix:def:65897 | 2 | Oracle Linux -- уязвимость в java-1.6.0-bea, java-1.6.0-ibm, java-1.5.0-sun, java-1.5.0-ibm, java-1.5.0-bea, java-1.4.2-ibm, java-1.4.2-bea (CVE-2008-1187) | vulnerability |
oval:ru.altx-soft.nix:def:65898 | 2 | Oracle Linux -- уязвимость в java-1.6.0-bea, java-1.6.0-ibm, java-1.5.0-sun, java-1.5.0-ibm, java-1.5.0-bea (CVE-2008-1193) | vulnerability |
oval:ru.altx-soft.nix:def:65899 | 2 | Oracle Linux -- уязвимость в java-1.6.0-bea, java-1.6.0-ibm, java-1.5.0-sun, java-1.5.0-ibm, java-1.5.0-bea (CVE-2008-1194) | vulnerability |
oval:ru.altx-soft.nix:def:65985 | 2 | Oracle Linux -- уязвимость в java-1.4.2-bea, java-1.5.0-bea, java-1.4.2-ibm, java-1.5.0-ibm (CVE-2007-4381) | vulnerability |
oval:ru.altx-soft.nix:def:65986 | 2 | Oracle Linux -- уязвимость в java-1.4.2-bea, java-1.5.0-bea, java-1.4.2-ibm, java-1.5.0-ibm (CVE-2007-2788) | vulnerability |
oval:ru.altx-soft.nix:def:65987 | 2 | Oracle Linux -- уязвимость в java-1.4.2-bea, java-1.5.0-bea, java-1.4.2-ibm, java-1.5.0-ibm (CVE-2007-2789) | vulnerability |
oval:ru.altx-soft.nix:def:65988 | 2 | Oracle Linux -- уязвимость в java-1.4.2-bea, java-1.5.0-bea, java-1.4.2-ibm (CVE-2007-3698) | vulnerability |
oval:ru.altx-soft.nix:def:65989 | 2 | Oracle Linux -- уязвимость в java-1.4.2-bea, java-1.5.0-ibm, java-1.5.0-bea, java-1.4.2-ibm, java-1.5.0-sun (CVE-2007-5232) | vulnerability |
oval:ru.altx-soft.nix:def:65990 | 2 | Oracle Linux -- уязвимость в java-1.4.2-bea, java-1.5.0-ibm, java-1.5.0-bea, java-1.4.2-ibm, java-1.5.0-sun (CVE-2007-5240) | vulnerability |
oval:ru.altx-soft.nix:def:65991 | 2 | Oracle Linux -- уязвимость в java-1.4.2-bea, java-1.5.0-ibm, java-1.5.0-bea, java-1.4.2-ibm, java-1.5.0-sun (CVE-2007-5273) | vulnerability |
oval:ru.altx-soft.nix:def:65992 | 2 | Oracle Linux -- уязвимость в java-1.4.2-bea, java-1.5.0-ibm, java-1.5.0-bea, java-1.4.2-ibm, java-1.5.0-sun (CVE-2007-5239) | vulnerability |
oval:ru.altx-soft.nix:def:66130 | 2 | Oracle Linux -- уязвимость в java-1.4.2-ibm, java-1.5.0-bea, java-1.5.0-ibm (CVE-2007-0243) | vulnerability |