Summary
Detail | |||
---|---|---|---|
Vendor | Suse | First view | 1997-07-17 |
Product | Suse Linux | Last view | 2018-07-24 |
Version | 12 | Type | |
Update | |||
Edition | desktop | ||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.2 | 2018-07-24 | CVE-2017-3224 | Open Shortest Path First (OSPF) protocol implementations may improperly determine Link State Advertisement (LSA) recency for LSAs with MaxSequenceNumber. According to RFC 2328 section 13.1, for two instances of the same LSA, recency is determined by first comparing sequence numbers, then checksums, and finally MaxAge. In a case where the sequence numbers are the same, the LSA with the larger checksum is considered more recent, and will not be flushed from the Link State Database (LSDB). Since the RFC does not explicitly state that the values of links carried by a LSA must be the same when prematurely aging a self-originating LSA with MaxSequenceNumber, it is possible in vulnerable OSPF implementations for an attacker to craft a LSA with MaxSequenceNumber and invalid links that will result in a larger checksum and thus a 'newer' LSA that will not be flushed from the LSDB. Propagation of the crafted LSA can result in the erasure or alteration of the routing tables of routers within the routing domain, creating a denial of service condition or the re-routing of traffic on the network. CVE-2017-3224 has been reserved for Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages). |
7.5 | 2010-01-22 | CVE-2010-0230 | SUSE Linux Enterprise 10 SP3 (SLE10-SP3) and openSUSE 11.2 configures postfix to listen on all network interfaces, which might allow remote attackers to bypass intended access restrictions. |
7.5 | 2009-07-05 | CVE-2009-1648 | The YaST2 LDAP module in yast2-ldap-server on SUSE Linux Enterprise Server 11 (aka SLE11) does not enable the firewall in certain circumstances involving reboots during online updates, which makes it easier for remote attackers to access network services. |
7.2 | 2008-09-22 | CVE-2008-3949 | emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file. |
7.2 | 2007-11-28 | CVE-2007-6167 | Untrusted search path vulnerability in yast2-core in SUSE Linux might allow local users to execute arbitrary code by creating a malicious yast2 module in the current working directory. |
7.8 | 2007-10-15 | CVE-2007-5471 | libgssapi before 0.6-13.7, as used by the ISC BIND named daemon in SUSE Linux Enterprise Server 10 SP 1, terminates upon an initialization error, which allows remote attackers to cause a denial of service (daemon exit) via a GSS-TSIG request. NOTE: this issue probably affects other daemons that attempt to initialize this library within a chroot configuration or other invalid configuration. |
7.5 | 2007-10-14 | CVE-2007-5196 | Unspecified vulnerability in the SSL implementation in Groupwise client system in the novell-groupwise-client package in SUSE Linux Enterprise Desktop 10 allows remote attackers to obtain credentials via a man-in-the-middle attack, a different vulnerability than CVE-2007-5195. |
6.8 | 2007-10-14 | CVE-2007-5195 | Unspecified vulnerability in the SSL implementation in Groupwise client system in the novell-groupwise-client package in SUSE Linux Enterprise Desktop 10 allows remote attackers to obtain credentials via a man-in-the-middle attack, a different vulnerability than CVE-2007-5196. |
4.6 | 2007-08-20 | CVE-2007-4432 | Untrusted search path vulnerability in the wrapper scripts for the (1) rug, (2) zen-updater, (3) zen-installer, and (4) zen-remover programs on SUSE Linux 10.1 and Enterprise 10 allows local users to gain privileges via modified (a) LD_LIBRARY_PATH and (b) MONO_GAC_PREFIX environment variables. |
2.1 | 2007-08-17 | CVE-2007-4394 | Unspecified vulnerability in a "core clean" cron job created by the findutils-locate package on SUSE Linux 10.0 and 10.1 and Enterprise Server 9 and 10 before 20070810 allows local users to delete of arbitrary files via unknown vectors. |
4.6 | 2007-08-17 | CVE-2007-4393 | The installation script for orarun on SUSE Linux before 20070810 places the oracle user into the disk group, which allows the local oracle user to read or write raw disk partitions. |
10 | 2007-07-30 | CVE-2007-4074 | The default configuration of Centre for Speech Technology Research (CSTR) Festival 1.95 beta (aka 2.0 beta) on Gentoo Linux, SUSE Linux, and possibly other distributions, is run locally with elevated privileges without requiring authentication, which allows local and remote attackers to execute arbitrary commands via the local daemon on port 1314, a different vulnerability than CVE-2001-0956. NOTE: this issue is local in some environments, but remote on others. |
4.4 | 2007-05-14 | CVE-2007-2654 | xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems. |
10 | 2007-02-15 | CVE-2007-0980 | Unspecified vulnerability in HP Serviceguard for Linux; packaged for SuSE SLES8 and United Linux 1.0 before SG A.11.15.07, SuSE SLES9 and SLES10 before SG A.11.16.10, and Red Hat Enterprise Linux (RHEL) before SG A.11.16.10; allows remote attackers to obtain unauthorized access via unspecified vectors. |
10 | 2007-01-23 | CVE-2007-0460 | Multiple buffer overflows in ulogd for SUSE Linux 9.3 up to 10.1, and possibly other distributions, have unknown impact and attack vectors related to "improper string length calculations." |
4.1 | 2006-12-20 | CVE-2006-6662 | Unspecified vulnerability in Linux User Management (novell-lum) on SUSE Linux Enterprise Desktop 10 and Open Enterprise Server 9, under unspecified conditions, allows local users to log in to the console without a password. |
10 | 2006-10-30 | CVE-2006-5616 | Multiple unspecified vulnerabilities in OpenPBS, as used in SUSE Linux 9.2 through 10.1, allow attackers to execute arbitrary code via unspecified vectors. |
5 | 2006-09-12 | CVE-2006-2658 | Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request. |
6.4 | 2006-06-01 | CVE-2006-2752 | The RedCarpet /etc/ximian/rcd.conf configuration file in Novell Linux Desktop 9 and SUSE SLES 9 has world-readable permissions, which allows attackers to obtain the rc (RedCarpet) password. |
5 | 2006-06-01 | CVE-2006-2703 | The RedCarpet command-line client (rug) does not verify SSL certificates from a server, which allows remote attackers to read network traffic and execute commands via a man-in-the-middle (MITM) attack. |
7.2 | 2006-03-20 | CVE-2006-0745 | X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. |
5 | 2006-02-23 | CVE-2006-0803 | The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used. |
4.4 | 2006-02-11 | CVE-2006-0646 | ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file. |
4.6 | 2006-01-30 | CVE-2006-0043 | Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks. |
6.9 | 2005-12-31 | CVE-2005-4790 | Multiple untrusted search path vulnerabilities in SUSE Linux 9.3 and 10.0, and possibly other distributions, cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) beagle, (2) tomboy, or (3) blam. NOTE: in August 2007, the tomboy vector was reported for other distributions. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
20% (5) | CWE-264 | Permissions, Privileges, and Access Controls |
8% (2) | CWE-399 | Resource Management Errors |
8% (2) | CWE-310 | Cryptographic Issues |
8% (2) | CWE-200 | Information Exposure |
8% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
8% (2) | CWE-20 | Improper Input Validation |
8% (2) | CWE-16 | Configuration |
4% (1) | CWE-362 | Race Condition |
4% (1) | CWE-345 | Insufficient Verification of Data Authenticity |
4% (1) | CWE-276 | Incorrect Default Permissions |
4% (1) | CWE-193 | Off-by-one Error |
4% (1) | CWE-189 | Numeric Errors |
4% (1) | CWE-131 | Incorrect Calculation of Buffer Size |
4% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
4% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-1 | Accessing Functionality Not Properly Constrained by ACLs |
CAPEC-15 | Command Delimiters |
CAPEC-19 | Embedding Scripts within Scripts |
CAPEC-21 | Exploitation of Session Variables, Resource IDs and other Trusted Credentials |
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-81 | Web Logs Tampering |
CAPEC-100 | Overflow Buffers |
CAPEC-123 | Buffer Attacks |
CAPEC-167 | Lifting Sensitive Data from the Client |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:4047 | Shell Redirect Symlink Attack Vulnerability |
oval:org.mitre.oval:def:10736 | The Internet Group Management Protocol (IGMP) allows local users to cause a d... |
oval:org.mitre.oval:def:2961 | Multiple Privilege Escalation Vulnerabilities in Linux Kernel |
oval:org.mitre.oval:def:10155 | Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local user... |
oval:org.mitre.oval:def:9867 | Unknown vulnerability in Linux kernel 2.x may allow local users to modify the... |
oval:org.mitre.oval:def:11136 | The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initia... |
oval:org.mitre.oval:def:9426 | Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local user... |
oval:org.mitre.oval:def:2915 | Linux Kernel Denial of Service Vulnerability via fsave and frstor Instructions |
oval:org.mitre.oval:def:9398 | Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allo... |
oval:org.mitre.oval:def:9187 | Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) P... |
oval:org.mitre.oval:def:11796 | Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2)... |
oval:org.mitre.oval:def:11281 | Konqueror in KDE 3.2.3 and earlier allows web sites to set cookies for countr... |
oval:org.mitre.oval:def:8896 | Multiple vulnerabilities in the RLE (run length encoding) decoders for libtif... |
oval:org.mitre.oval:def:100114 | libtiff RLE Decoder Buffer Overflow Vulnerabilities |
oval:org.mitre.oval:def:11141 | Samba 3.0.6 and earlier allows remote attackers to cause a denial of service ... |
oval:org.mitre.oval:def:8843 | Multiple heap-based buffer overflows in the imlib BMP image handler allow rem... |
oval:org.mitre.oval:def:11123 | Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.... |
oval:org.mitre.oval:def:10330 | Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 ... |
oval:org.mitre.oval:def:9907 | Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attacker... |
oval:org.mitre.oval:def:100116 | libtiff Malloc Error Denial of Service |
oval:org.mitre.oval:def:9714 | Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use x... |
oval:org.mitre.oval:def:11201 | Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Re... |
oval:org.mitre.oval:def:10873 | Stack-based buffer overflow in the writeGroup function in nsVCardObj.cpp for ... |
oval:org.mitre.oval:def:10378 | Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunder... |
oval:org.mitre.oval:def:9943 | Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in XFree86 ... |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
61983 | SUSE Linux postfix Network Interface Remote Access Restriction Bypass |
60300 | SuSE resmgr Local Terminal Spoofing Weakness |
60220 | susehelp in SuSE CGI Query Shell Metacharacter Arbitrary Remote Command Execu... |
60139 | Gnuplot French Documentation Patch Unspecified Local Overflow |
57715 | Linux knfsd / linuxnfs rpc.kstatd Remote Format String |
56093 | SUSE Linux Enterprise Server yast2-ldap-server YaST2 LDAP Module Online Updat... |
49558 | Emacs Python Path Handling Weakness Script Import Arbitrary Code Execution |
46784 | SUSE Linux zen-remover Wrapper Script Search Path Subversion Local Privilege ... |
46783 | SUSE Linux zen-installer Wrapper Script Search Path Subversion Local Privileg... |
46782 | SUSE Linux zen-updater Wrapper Script Search Path Subversion Local Privilege ... |
46781 | SUSE Linux rug Wrapper Script Search Path Subversion Local Privilege Escalation |
46404 | SUSE Linux findutils-locate Package core clean Cron Job Unspecified Arbitrary... |
46403 | SUSE Linux orarun Script Oracle Account disk Group Privilege Escalation |
45492 | Groupwise Client System on SUSE Linux Enterprise Desktop Unspecified MitM Cre... |
45491 | Groupwise Client System on SUSE Linux Enterprise Desktop Unspecified MitM Cre... |
44330 | CUPS on Red Hat 64-bit pdftops Crafted PDF File Handling Overflow |
44158 | SuSE Linux yast2-core Search Path Subversion Arbitrary Code Execution |
40935 | ISC BIND on SUSE Linux Enterprise Server libgssapi named GSS-TSIG Request Rem... |
39578 | SuSE Linux tomboy LD_LIBRARY_PATH Variable Path Subversion Local Privilege Es... |
39577 | SuSE Linux blam LD_LIBRARY_PATH Variable Path Subversion Local Privilege Esca... |
38622 | CSTR Festival on Linux Unauthenticated Arbitrary Command Execution |
36716 | xfsdump xfs_fsr Symlink Arbitrary File Manipulation |
35231 | Linux User Management (novell-lum) on SUSE Linux Local Privilege Escalation |
33201 | HP Serviceguard for Linux Unspecified Remote Access |
32939 | ulogd Multiple Unspecified Overflows |
ExploitDB Exploits
id | Description |
---|---|
718 | Linux Kernel 2.6.x chown() Group Ownership Alteration Exploit |
629 | Multiple AntiVirus (zip file) Detection Bypass Exploit |
OpenVAS Exploits
id | Description |
---|---|
2011-09-09 | Name : Nfs-utils rpc.statd Multiple Remote Format String Vulnerabilities File : nvt/secpod_nfs_rpc_statd_mult_format_string_vuln.nasl |
2011-02-28 | Name : Mandriva Update for tomboy MDVSA-2011:035 (tomboy) File : nvt/gb_mandriva_MDVSA_2011_035.nasl |
2010-05-12 | Name : Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002 File : nvt/macosx_upd_10_5_7_secupd_2009-002.nasl |
2010-02-19 | Name : SuSE Update for postfix SUSE-SA:2010:011 File : nvt/gb_suse_2010_011.nasl |
2010-02-03 | Name : Solaris Update for CDE 1.6 119280-22 File : nvt/gb_solaris_119280_22.nasl |
2010-02-03 | Name : Solaris Update for Runtime library for Solaris 10 119281-22 File : nvt/gb_solaris_119281_22.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-13 | Name : SLES10: Security update for festival File : nvt/sles10_festival.nasl |
2009-10-11 | Name : SLES11: Security update for YaST2 LDAP module File : nvt/sles11_yast2-ldap-serv.nasl |
2009-10-10 | Name : SLES9: Security update for Linux kernel File : nvt/sles9p5010817.nasl |
2009-10-10 | Name : SLES9: Security update for openmotif File : nvt/sles9p5010938.nasl |
2009-10-10 | Name : SLES9: Security update for ethereal File : nvt/sles9p5010966.nasl |
2009-10-10 | Name : SLES9: Security update for Linux kernel File : nvt/sles9p5011171.nasl |
2009-10-10 | Name : SLES9: Security update for enscript File : nvt/sles9p5011436.nasl |
2009-10-10 | Name : SLES9: Security update for Midnight Commander File : nvt/sles9p5011441.nasl |
2009-10-10 | Name : SLES9: Security update for cyrus-sasl File : nvt/sles9p5011476.nasl |
2009-10-10 | Name : SLES9: Security update for kdelibs3 File : nvt/sles9p5011912.nasl |
2009-10-10 | Name : SLES9: Security update for Mozilla File : nvt/sles9p5012017.nasl |
2009-10-10 | Name : SLES9: Security update for Perl File : nvt/sles9p5013510.nasl |
2009-10-10 | Name : SLES9: Security update for apache File : nvt/sles9p5014050.nasl |
2009-10-10 | Name : SLES9: Security update for imlib File : nvt/sles9p5014360.nasl |
2009-10-10 | Name : SLES9: Security update for Linux kernel core File : nvt/sles9p5014380.nasl |
2009-10-10 | Name : SLES9: Security update for CUPS File : nvt/sles9p5014529.nasl |
2009-10-10 | Name : SLES9: Security update for OpenMotif File : nvt/sles9p5014940.nasl |
2009-10-10 | Name : SLES9: Security update for unarj File : nvt/sles9p5015411.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2019-08-31 | Postfix IPv6 Relaying Security Issue RuleID : 50859 - Type : SERVER-MAIL - Revision : 1 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC unicode andx DACL overflow attempt RuleID : 4674 - Type : NETBIOS - Revision : 4 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC unicode DACL overflow attempt RuleID : 4673 - Type : NETBIOS - Revision : 4 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC andx DACL overflow attempt RuleID : 4672 - Type : NETBIOS - Revision : 4 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC DACL overflow attempt RuleID : 4671 - Type : NETBIOS - Revision : 4 |
2014-01-10 | SMB-DS NT Trans NT SET SECURITY DESC unicode andx DACL overflow attempt RuleID : 4670 - Type : NETBIOS - Revision : 3 |
2014-01-10 | SMB-DS NT Trans NT SET SECURITY DESC unicode DACL overflow attempt RuleID : 4669 - Type : NETBIOS - Revision : 3 |
2014-01-10 | SMB-DS NT Trans NT SET SECURITY DESC andx DACL overflow attempt RuleID : 4668 - Type : NETBIOS - Revision : 3 |
2014-01-10 | SMB-DS NT Trans NT SET SECURITY DESC DACL overflow attempt RuleID : 4667 - Type : NETBIOS - Revision : 3 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC unicode andx DACL overflow attempt RuleID : 4666 - Type : NETBIOS - Revision : 2 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC unicode DACL overflow attempt RuleID : 4665 - Type : NETBIOS - Revision : 2 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC andx DACL overflow attempt RuleID : 4664 - Type : NETBIOS - Revision : 2 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC DACL overflow attempt RuleID : 4663 - Type : NETBIOS - Revision : 2 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC unicode andx SACL overflow attempt RuleID : 4662 - Type : NETBIOS - Revision : 4 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC unicode SACL overflow attempt RuleID : 4661 - Type : NETBIOS - Revision : 4 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC andx SACL overflow attempt RuleID : 4660 - Type : NETBIOS - Revision : 4 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC SACL overflow attempt RuleID : 4659 - Type : NETBIOS - Revision : 4 |
2014-01-10 | SMB-DS NT Trans NT SET SECURITY DESC unicode andx SACL overflow attempt RuleID : 4658 - Type : NETBIOS - Revision : 3 |
2014-01-10 | SMB-DS NT Trans NT SET SECURITY DESC unicode SACL overflow attempt RuleID : 4657 - Type : NETBIOS - Revision : 3 |
2014-01-10 | SMB-DS NT Trans NT SET SECURITY DESC andx SACL overflow attempt RuleID : 4656 - Type : NETBIOS - Revision : 3 |
2014-01-10 | SMB-DS NT Trans NT SET SECURITY DESC SACL overflow attempt RuleID : 4655 - Type : NETBIOS - Revision : 3 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC unicode andx SACL overflow attempt RuleID : 4654 - Type : NETBIOS - Revision : 2 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC unicode SACL overflow attempt RuleID : 4653 - Type : NETBIOS - Revision : 2 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC andx SACL overflow attempt RuleID : 4652 - Type : NETBIOS - Revision : 2 |
2014-01-10 | SMB NT Trans NT SET SECURITY DESC SACL overflow attempt RuleID : 4651 - Type : NETBIOS - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2015-07-16 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_ca139c7f2a8c11e5a4a5002590263bf5.nasl - Type: ACT_GATHER_INFO |
2015-01-19 | Name: The remote Solaris system is missing a security patch for third-party software. File: solaris11_perl-58_20131015.nasl - Type: ACT_GATHER_INFO |
2014-01-27 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201401-28.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2008-0206.nasl - Type: ACT_GATHER_INFO |
2013-06-29 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2005-332-01.nasl - Type: ACT_GATHER_INFO |
2012-09-24 | Name: The remote Fedora Core host is missing a security update. File: fedora_2004-414.nasl - Type: ACT_GATHER_INFO |
2012-09-24 | Name: The remote Fedora Core host is missing a security update. File: fedora_2006-010.nasl - Type: ACT_GATHER_INFO |
2012-09-24 | Name: The remote Fedora Core host is missing a security update. File: fedora_2006-011.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing a security update. File: mandrake_MDKSA-2000-002.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing one or more security updates. File: mandrake_MDKSA-2000-021.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing one or more security updates. File: mandrake_MDKSA-2000-064.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing a security update. File: mandrake_MDKSA-2000-071.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing a security update. File: mandrake_MDKSA-2000-075.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing one or more security updates. File: mandrake_MDKSA-2001-018.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing a security update. File: mandrake_MDKSA-2001-027.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing a security update. File: mandrake_MDKSA-2001-034.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing one or more security updates. File: mandrake_MDKSA-2005-041.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing a security update. File: mandrake_MDKSA-2005-042.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing a security update. File: mandrake_MDKSA-2005-043.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing one or more security updates. File: mandrake_MDKSA-2005-044.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing one or more security updates. File: mandrake_MDKSA-2005-056.nasl - Type: ACT_GATHER_INFO |
2012-08-01 | Name: The remote Scientific Linux host is missing one or more security updates. File: sl_20080401_cups_on_SL3_x.nasl - Type: ACT_GATHER_INFO |
2011-08-29 | Name: The SSH service running on the remote host has an information disclosure vuln... File: sunssh_plaintext_recovery.nasl - Type: ACT_GATHER_INFO |
2011-02-23 | Name: The remote Mandriva Linux host is missing a security update. File: mandriva_MDVSA-2011-035.nasl - Type: ACT_GATHER_INFO |
2010-02-16 | Name: The remote openSUSE host is missing a security update. File: suse_11_2_postfix-100201.nasl - Type: ACT_GATHER_INFO |