Summary
Detail | |||
---|---|---|---|
Vendor | Mozilla | First view | 2012-03-14 |
Product | Thunderbird Esr | Last view | 2018-06-11 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2018-06-11 | CVE-2018-5185 | Plaintext of decrypted emails can leak through by user submitting an embedded form. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8. |
7.5 | 2018-06-11 | CVE-2018-5184 | Using remote content in encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8. |
9.8 | 2018-06-11 | CVE-2018-5183 | Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8. |
8.1 | 2018-06-11 | CVE-2018-5178 | A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8. |
7.5 | 2018-06-11 | CVE-2018-5174 | In the Windows 10 April 2018 Update, Windows Defender SmartScreen honors the "SEE_MASK_FLAG_NO_UI" flag associated with downloaded files and will not show any UI. Files that are unknown and potentially dangerous will be allowed to run because SmartScreen will not prompt the user for a decision, and if the user is offline all files will be allowed to be opened because Windows won't prompt the user to ask what to do. Firefox incorrectly sets this flag when downloading files, leading to less secure behavior from SmartScreen. Note: this issue only affects Windows 10 users running the April 2018 update or later. It does not affect other Windows users or other operating systems. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8. |
4.3 | 2018-06-11 | CVE-2018-5170 | It is possible to spoof the filename of an attachment and display an arbitrary attachment name. This could lead to a user opening a remote attachment which is a different file type than expected. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8. |
5.3 | 2018-06-11 | CVE-2018-5168 | Sites can bypass security checks on permissions to install lightweight themes by manipulating the "baseURI" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8. |
7.5 | 2018-06-11 | CVE-2018-5162 | Plaintext of decrypted emails can leak through the src attribute of remote images, or links. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8. |
4.3 | 2018-06-11 | CVE-2018-5161 | Crafted message headers can cause a Thunderbird process to hang on receiving the message. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8. |
9.8 | 2018-06-11 | CVE-2018-5159 | An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8. |
9.8 | 2018-06-11 | CVE-2018-5155 | A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8. |
9.8 | 2018-06-11 | CVE-2018-5154 | A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8. |
9.8 | 2018-06-11 | CVE-2018-5150 | Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8. |
9.8 | 2018-06-11 | CVE-2017-5398 | Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
4.3 | 2014-02-17 | CVE-2014-2018 | Cross-site scripting (XSS) vulnerability in Mozilla Thunderbird 17.x through 17.0.8, Thunderbird ESR 17.x through 17.0.10, and SeaMonkey before 2.20 allows user-assisted remote attackers to inject arbitrary web script or HTML via an e-mail message containing a data: URL in a (1) OBJECT or (2) EMBED element, a related issue to CVE-2013-6674. |
4.3 | 2014-02-17 | CVE-2013-6674 | Cross-site scripting (XSS) vulnerability in Mozilla Thunderbird 17.x through 17.0.8, Thunderbird ESR 17.x through 17.0.10, and SeaMonkey before 2.20 allows user-assisted remote attackers to inject arbitrary web script or HTML via an e-mail message containing a data: URL in an IFRAME element, a related issue to CVE-2014-2018. |
9.3 | 2013-10-30 | CVE-2013-5604 | The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents. |
10 | 2013-10-30 | CVE-2013-5603 | Use-after-free vulnerability in the nsContentUtils::ContentIsHostIncludingDescendantOf function in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving HTML document templates. |
10 | 2013-10-30 | CVE-2013-5602 | The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies. |
10 | 2013-10-30 | CVE-2013-5601 | Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API. |
10 | 2013-10-30 | CVE-2013-5600 | Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL. |
10 | 2013-10-30 | CVE-2013-5599 | Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event. |
10 | 2013-10-30 | CVE-2013-5597 | Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache. |
6.8 | 2013-10-30 | CVE-2013-5596 | The cycle collection (CC) implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly determine the thread for release of an image object, which allows remote attackers to execute arbitrary code or cause a denial of service (race condition and application crash) via a large HTML document containing IMG elements, as demonstrated by the Never-Ending Reddit on reddit.com. |
4.3 | 2013-10-30 | CVE-2013-5595 | The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
22% (44) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
19% (39) | CWE-416 | Use After Free |
13% (26) | CWE-399 | Resource Management Errors |
10% (20) | CWE-264 | Permissions, Privileges, and Access Controls |
10% (20) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
5% (11) | CWE-20 | Improper Input Validation |
4% (9) | CWE-787 | Out-of-bounds Write |
2% (4) | CWE-200 | Information Exposure |
2% (4) | CWE-125 | Out-of-bounds Read |
2% (4) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (3) | CWE-326 | Inadequate Encryption Strength |
1% (3) | CWE-190 | Integer Overflow or Wraparound |
1% (2) | CWE-311 | Missing Encryption of Sensitive Data |
1% (2) | CWE-189 | Numeric Errors |
0% (1) | CWE-682 | Incorrect Calculation |
0% (1) | CWE-346 | Origin Validation Error |
0% (1) | CWE-295 | Certificate Issues |
0% (1) | CWE-287 | Improper Authentication |
0% (1) | CWE-269 | Improper Privilege Management |
0% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
0% (1) | CWE-74 | Failure to Sanitize Data into a Different Plane ('Injection') |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:14909 | CRLF injection vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR... |
oval:org.mitre.oval:def:14258 | Use-after-free vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR... |
oval:org.mitre.oval:def:14829 | Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 1... |
oval:org.mitre.oval:def:15007 | The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x throu... |
oval:org.mitre.oval:def:14775 | Use-after-free vulnerability in the nsSMILTimeValueSpec::ConvertBetweenTimeCo... |
oval:org.mitre.oval:def:15122 | Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 1... |
oval:org.mitre.oval:def:15066 | The Cascading Style Sheets (CSS) implementation in Mozilla Firefox 4.x throug... |
oval:org.mitre.oval:def:15114 | Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird... |
oval:org.mitre.oval:def:15009 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox... |
oval:org.mitre.oval:def:14980 | DSA-2437-1 icedove -- several |
oval:org.mitre.oval:def:14590 | DSA-2433-1 iceweasel -- several |
oval:org.mitre.oval:def:15012 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox... |
oval:org.mitre.oval:def:15143 | The nsWindow implementation in the browser engine in Mozilla Firefox before 3... |
oval:org.mitre.oval:def:21392 | RHSA-2012:0388: thunderbird security update (Critical) |
oval:org.mitre.oval:def:21087 | RHSA-2012:0387: firefox security and bug fix update (Critical) |
oval:org.mitre.oval:def:17946 | USN-1400-5 -- gsettings-desktop-schemas regression |
oval:org.mitre.oval:def:17944 | USN-1400-4 -- thunderbird regressions |
oval:org.mitre.oval:def:15457 | USN-1400-3 -- Thunderbird vulnerabilities |
oval:org.mitre.oval:def:15321 | USN-1400-1 -- Firefox vulnerabilities |
oval:org.mitre.oval:def:15260 | USN-1400-2 -- ubufox update |
oval:org.mitre.oval:def:14977 | USN-1401-2 -- Thunderbird vulnerabilities |
oval:org.mitre.oval:def:14716 | USN-1401-1 -- Xulrunner vulnerabilities |
oval:org.mitre.oval:def:14170 | Use-after-free vulnerability in the browser engine in Mozilla Firefox before ... |
oval:org.mitre.oval:def:23382 | ELSA-2012:0388: thunderbird security update (Critical) |
oval:org.mitre.oval:def:23093 | ELSA-2012:0387: firefox security and bug fix update (Critical) |
SAINT Exploits
Description | Link |
---|---|
Mozilla Firefox onreadystatechange Event Use After Free | More info here |
Mozilla Firefox XMLSerializer serializeToStream Use-after-free Vulnerability | More info here |
Firefox crypto.generateCRMFRequest command execution | More info here |
ExploitDB Exploits
id | Description |
---|---|
34363 | Firefox toString console.time Privileged Javascript Injection |
30474 | Firefox 5.0 - 15.0.1 - __exposedProps__ XCS Code Execution |
OpenVAS Exploits
id | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2457-2 (iceweasel - several vulnerabilities) File : nvt/deb_2457_2.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2458-2 (iceape - several vulnerabilities) File : nvt/deb_2458_2.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2513-1 (iceape - several vulnerabilities) File : nvt/deb_2513_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2553-1 (iceweasel - several vulnerabilities) File : nvt/deb_2553_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2583-1 (iceweasel - several vulnerabilities) File : nvt/deb_2583_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2584-1 (iceape - several vulnerabilities) File : nvt/deb_2584_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2588-1 (icedove - several vulnerabilities) File : nvt/deb_2588_1.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox, openSUSE-SU-2012:0760-1 (MozillaFirefox,) File : nvt/gb_suse_2012_0760_1.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:0899-1 (MozillaFirefox) File : nvt/gb_suse_2012_0899_1.nasl |
2012-12-13 | Name : SuSE Update for MozillaThunderbird openSUSE-SU-2012:0917-1 (MozillaThunderbird) File : nvt/gb_suse_2012_0917_1.nasl |
2012-12-13 | Name : SuSE Update for xulrunner openSUSE-SU-2012:0924-1 (xulrunner) File : nvt/gb_suse_2012_0924_1.nasl |
2012-12-13 | Name : SuSE Update for seamonkey openSUSE-SU-2012:0935-1 (seamonkey) File : nvt/gb_suse_2012_0935_1.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1064-1 (MozillaFirefox) File : nvt/gb_suse_2012_1064_1.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1345-1 (MozillaFirefox) File : nvt/gb_suse_2012_1345_1.nasl |
2012-12-13 | Name : SuSE Update for Mozilla Suite openSUSE-SU-2012:1412-1 (Mozilla Suite) File : nvt/gb_suse_2012_1412_1.nasl |
2012-12-06 | Name : Fedora Update for seamonkey FEDORA-2012-18931 File : nvt/gb_fedora_2012_18931_seamonkey_fc16.nasl |
2012-12-06 | Name : Fedora Update for seamonkey FEDORA-2012-18952 File : nvt/gb_fedora_2012_18952_seamonkey_fc17.nasl |
2012-12-04 | Name : Ubuntu Update for firefox USN-1638-3 File : nvt/gb_ubuntu_USN_1638_3.nasl |
2012-11-26 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox72.nasl |
2012-11-26 | Name : Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Windows) File : nvt/gb_mozilla_firefox_esr_mult_vuln01_nov12_win.nasl |
2012-11-26 | Name : Mozilla Firefox Multiple Vulnerabilities-01 November12 (Mac OS X) File : nvt/gb_mozilla_prdts_mult_vuln01_nov12_macosx.nasl |
2012-11-26 | Name : Mozilla Firefox Multiple Vulnerabilities-01 November12 (Windows) File : nvt/gb_mozilla_prdts_mult_vuln01_nov12_win.nasl |
2012-11-26 | Name : Mozilla Firefox Multiple Vulnerabilities-02 November12 (Mac OS X) File : nvt/gb_mozilla_prdts_mult_vuln02_nov12_macosx.nasl |
2012-11-26 | Name : Mozilla Firefox Multiple Vulnerabilities-02 November12 (Windows) File : nvt/gb_mozilla_prdts_mult_vuln02_nov12_win.nasl |
2012-11-26 | Name : Mozilla SeaMonkey Multiple Vulnerabilities-01 November12 (Windows) File : nvt/gb_mozilla_seamonkey_mult_vuln01_nov12_win.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2014-A-0021 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0043921 |
2013-A-0220 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0042380 |
2013-A-0203 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0041365 |
2012-A-0189 | Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1 Severity: Category I - VMSKEY: V0035032 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-10-08 | Mozilla Thunderbird input filter bypass cross site scripting attempt RuleID : 51405 - Type : SERVER-MAIL - Revision : 1 |
2017-04-06 | SSLv3 Client Hello attempt RuleID : 41807 - Type : POLICY-OTHER - Revision : 3 |
2017-03-01 | Mozilla Firefox generatecrmfrequest policy function call access attempt RuleID : 41423 - Type : BROWSER-PLUGINS - Revision : 3 |
2017-03-01 | Mozilla Firefox generatecrmfrequest policy function call access attempt RuleID : 41422 - Type : BROWSER-PLUGINS - Revision : 3 |
2015-09-23 | Mozilla Firefox generatecrmfrequest policy function call access attempt RuleID : 35686 - Type : BROWSER-PLUGINS - Revision : 3 |
2015-09-23 | Mozilla Firefox generatecrmfrequest policy function call access attempt RuleID : 35685 - Type : BROWSER-PLUGINS - Revision : 3 |
2015-09-08 | Mozilla Firefox InstallWrapper error handling code execution attempt RuleID : 35461 - Type : BROWSER-FIREFOX - Revision : 2 |
2015-09-08 | Mozilla Firefox InstallWrapper error handling code execution attempt RuleID : 35460 - Type : BROWSER-FIREFOX - Revision : 2 |
2015-02-18 | Mozilla Firefox 17 onreadystatechange memory corruption attempt RuleID : 33090 - Type : BROWSER-FIREFOX - Revision : 5 |
2015-02-18 | Mozilla Firefox 17 onreadystatechange memory corruption attempt RuleID : 33089 - Type : BROWSER-FIREFOX - Revision : 5 |
2015-02-18 | Mozilla Firefox 17 onreadystatechange memory corruption attempt RuleID : 33088 - Type : BROWSER-FIREFOX - Revision : 5 |
2015-02-11 | Mozilla Firefox XMLSerializer serializeToStream use-after-free attempt RuleID : 32994 - Type : BROWSER-FIREFOX - Revision : 6 |
2015-02-11 | Mozilla Firefox XMLSerializer serializeToStream use-after-free attempt RuleID : 32993 - Type : BROWSER-FIREFOX - Revision : 6 |
2014-03-06 | WAV processing buffer overflow attempt RuleID : 29546 - Type : FILE-MULTIMEDIA - Revision : 4 |
2014-03-06 | WAV processing buffer overflow attempt RuleID : 29545 - Type : FILE-MULTIMEDIA - Revision : 4 |
2014-03-06 | WAV processing buffer overflow attempt RuleID : 29544 - Type : FILE-MULTIMEDIA - Revision : 4 |
2014-03-06 | WAV processing buffer overflow attempt RuleID : 29543 - Type : FILE-MULTIMEDIA - Revision : 4 |
2014-03-06 | WAV processing buffer overflow attempt RuleID : 29542 - Type : FILE-MULTIMEDIA - Revision : 3 |
2014-03-06 | WAV processing buffer overflow attempt RuleID : 29541 - Type : FILE-MULTIMEDIA - Revision : 3 |
2014-03-06 | WAV processing buffer overflow attempt RuleID : 29540 - Type : FILE-MULTIMEDIA - Revision : 3 |
2014-03-06 | WAV processing buffer overflow attempt RuleID : 29539 - Type : FILE-MULTIMEDIA - Revision : 3 |
2014-01-10 | Mozilla Firefox 17 onreadystatechange memory corruption attempt RuleID : 27568 - Type : BROWSER-FIREFOX - Revision : 6 |
2014-01-10 | Nailed exploit kit Firefox exploit download - autopwn RuleID : 27080 - Type : EXPLOIT-KIT - Revision : 2 |
2014-01-10 | Mozilla Firefox IDB use-after-free attempt RuleID : 24574 - Type : BROWSER-FIREFOX - Revision : 10 |
2014-01-10 | Mozilla Firefox IDB use-after-free attempt RuleID : 24573 - Type : BROWSER-FIREFOX - Revision : 9 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-11-26 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201811-13.nasl - Type: ACT_GATHER_INFO |
2018-10-03 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201810-01.nasl - Type: ACT_GATHER_INFO |
2018-07-03 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1189.nasl - Type: ACT_GATHER_INFO |
2018-06-12 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1032.nasl - Type: ACT_GATHER_INFO |
2018-05-31 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2018-1415.nasl - Type: ACT_GATHER_INFO |
2018-05-30 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2018-1725.nasl - Type: ACT_GATHER_INFO |
2018-05-30 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2018-1726.nasl - Type: ACT_GATHER_INFO |
2018-05-29 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1125.nasl - Type: ACT_GATHER_INFO |
2018-05-29 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1126.nasl - Type: ACT_GATHER_INFO |
2018-05-29 | Name: The remote Debian host is missing a security update. File: debian_DLA-1382.nasl - Type: ACT_GATHER_INFO |
2018-05-25 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4209.nasl - Type: ACT_GATHER_INFO |
2018-05-22 | Name: The remote Windows host contains a mail client that is affected by multiple v... File: mozilla_thunderbird_52_8.nasl - Type: ACT_GATHER_INFO |
2018-05-21 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2018-1414.nasl - Type: ACT_GATHER_INFO |
2018-05-17 | Name: A web browser installed on the remote macOS or Mac OS X host is affected by m... File: macos_firefox_52_8_esr.nasl - Type: ACT_GATHER_INFO |
2018-05-17 | Name: A web browser installed on the remote macOS or Mac OS X host is affected by m... File: macos_firefox_60_0_0.nasl - Type: ACT_GATHER_INFO |
2018-05-17 | Name: A web browser installed on the remote Windows host is affected by multiple cr... File: mozilla_firefox_52_8_esr.nasl - Type: ACT_GATHER_INFO |
2018-05-17 | Name: A web browser installed on the remote Windows host is affected by multiple cr... File: mozilla_firefox_60_0_0.nasl - Type: ACT_GATHER_INFO |
2018-05-14 | Name: The remote Debian host is missing a security update. File: debian_DLA-1376.nasl - Type: ACT_GATHER_INFO |
2018-05-14 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4199.nasl - Type: ACT_GATHER_INFO |
2018-05-10 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_5aefc41ed3044ec88c82824f84f08244.nasl - Type: ACT_GATHER_INFO |
2017-07-13 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-0459.nasl - Type: ACT_GATHER_INFO |
2017-07-13 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-0461.nasl - Type: ACT_GATHER_INFO |
2017-07-13 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-0498.nasl - Type: ACT_GATHER_INFO |
2017-05-10 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201705-06.nasl - Type: ACT_GATHER_INFO |
2017-05-10 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201705-07.nasl - Type: ACT_GATHER_INFO |