| | | |
| | |
| Loading… |
|
oval:ru.altx-soft.nix:def:34546 | 3 | Red Hat -- уязвимость в java-1.6.0-ibm, java-1.7.0-ibm, java-1.7.0-oracle, java-1.6.0-sun (CVE-2013-5832) | vulnerability |
oval:ru.altx-soft.nix:def:34547 | 3 | Red Hat -- уязвимость в java-1.6.0-ibm, java-1.7.0-ibm, java-1.7.0-oracle, java-1.5.0-ibm, java-1.6.0-sun (CVE-2013-5843) | vulnerability |
oval:ru.altx-soft.nix:def:34548 | 3 | Red Hat -- уязвимость в java-1.6.0-ibm, java-1.7.0-ibm, java-1.7.0-oracle, java-1.6.0-sun (CVE-2013-5848) | vulnerability |
oval:ru.altx-soft.nix:def:34549 | 4 | Red Hat/CentOS -- уязвимость в java-1.6.0-ibm, java-1.7.0-ibm, java-1.7.0-oracle, java-1.7.0-openjdk (CVE-2013-5851) | vulnerability |
oval:ru.altx-soft.nix:def:34551 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-0401) | vulnerability |
oval:ru.altx-soft.nix:def:34552 | 3 | Red Hat -- уязвимость в java-1.5.0-ibm, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-1491) | vulnerability |
oval:ru.altx-soft.nix:def:34553 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-1537) | vulnerability |
oval:ru.altx-soft.nix:def:34554 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-1557) | vulnerability |
oval:ru.altx-soft.nix:def:34555 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-1569) | vulnerability |
oval:ru.altx-soft.nix:def:34556 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-2383) | vulnerability |
oval:ru.altx-soft.nix:def:34557 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-2384) | vulnerability |
oval:ru.altx-soft.nix:def:34558 | 3 | Red Hat -- уязвимость в java-1.5.0-ibm, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-2394) | vulnerability |
oval:ru.altx-soft.nix:def:34559 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-2417) | vulnerability |
oval:ru.altx-soft.nix:def:34560 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-2419) | vulnerability |
oval:ru.altx-soft.nix:def:34561 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-2420) | vulnerability |
oval:ru.altx-soft.nix:def:34562 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-2424) | vulnerability |
oval:ru.altx-soft.nix:def:34563 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-2429) | vulnerability |
oval:ru.altx-soft.nix:def:34564 | 4 | Red Hat/CentOS -- уязвимость в java-1.5.0-ibm, java-1.7.0-openjdk, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-2430) | vulnerability |
oval:ru.altx-soft.nix:def:34565 | 3 | Red Hat -- уязвимость в java-1.5.0-ibm, java-1.6.0-ibm, java-1.7.0-ibm, java-1.6.0-sun, java-1.7.0-oracle (CVE-2013-2432) | vulnerability |
oval:ru.altx-soft.nix:def:34687 | 3 | Red Hat -- уязвимость в java-1.7.0-oracle, java-1.7.0-ibm, java-1.6.0-ibm, java-1.6.0-sun (CVE-2012-1541) | vulnerability |
oval:ru.altx-soft.nix:def:34688 | 3 | Red Hat -- уязвимость в java-1.7.0-oracle, java-1.7.0-ibm, java-1.6.0-ibm, java-1.6.0-sun (CVE-2012-3213) | vulnerability |
oval:ru.altx-soft.nix:def:34689 | 3 | Red Hat -- уязвимость в java-1.7.0-oracle, java-1.7.0-ibm, java-1.6.0-ibm, java-1.6.0-sun (CVE-2012-3342) | vulnerability |
oval:ru.altx-soft.nix:def:34690 | 3 | Red Hat -- уязвимость в java-1.7.0-oracle, java-1.7.0-ibm, java-1.6.0-ibm, java-1.6.0-sun (CVE-2013-0351) | vulnerability |
oval:ru.altx-soft.nix:def:34691 | 3 | Red Hat -- уязвимость в java-1.7.0-oracle, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-sun (CVE-2013-0409) | vulnerability |
oval:ru.altx-soft.nix:def:34692 | 3 | Red Hat -- уязвимость в java-1.7.0-oracle, java-1.7.0-ibm, java-1.6.0-ibm, java-1.6.0-sun (CVE-2013-0419) | vulnerability |
oval:ru.altx-soft.nix:def:34693 | 3 | Red Hat -- уязвимость в java-1.7.0-oracle, java-1.7.0-ibm, java-1.6.0-ibm, java-1.6.0-sun (CVE-2013-0423) | vulnerability |
oval:ru.altx-soft.nix:def:34694 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0424) | vulnerability |
oval:ru.altx-soft.nix:def:34695 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0425) | vulnerability |
oval:ru.altx-soft.nix:def:34696 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0426) | vulnerability |
oval:ru.altx-soft.nix:def:34697 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0427) | vulnerability |
oval:ru.altx-soft.nix:def:34698 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0428) | vulnerability |
oval:ru.altx-soft.nix:def:34702 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0432) | vulnerability |
oval:ru.altx-soft.nix:def:34703 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0433) | vulnerability |
oval:ru.altx-soft.nix:def:34704 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0434) | vulnerability |
oval:ru.altx-soft.nix:def:34705 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0435) | vulnerability |
oval:ru.altx-soft.nix:def:34707 | 3 | Red Hat -- уязвимость в java-1.7.0-oracle, java-1.7.0-ibm, java-1.6.0-ibm, java-1.6.0-sun (CVE-2013-0438) | vulnerability |
oval:ru.altx-soft.nix:def:34708 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0440) | vulnerability |
oval:ru.altx-soft.nix:def:34709 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0441) | vulnerability |
oval:ru.altx-soft.nix:def:34710 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0442) | vulnerability |
oval:ru.altx-soft.nix:def:34711 | 4 | Red Hat/CentOS -- уязвимость в java-1.7.0-oracle, java-1.7.0-openjdk, java-1.7.0-ibm, java-1.6.0-ibm, java-1.5.0-ibm, java-1.6.0-openjdk, java-1.6.0-sun (CVE-2013-0443) | vulnerability |