Executive Summary
Summary | |
---|---|
Title | Adobe Flash Player: Multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | GLSA-201411-06 | First vendor Publication | 2014-11-21 |
Vendor | Gentoo | Last vendor Modification | 2014-11-21 |
Severity (Vendor) | Normal | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Background Description Impact Workaround Resolution References Availability http://security.gentoo.org/glsa/glsa-201411-06.xml |
Original Source
Url : http://security.gentoo.org/glsa/glsa-201411-06.xml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
25 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
8 % | CWE-264 | Permissions, Privileges, and Access Controls |
8 % | CWE-200 | Information Exposure |
8 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:26175 | |||
Oval ID: | oval:org.mitre.oval:def:26175 | ||
Title: | RHSA-2014:1648: flash-plugin security update (Critical) | ||
Description: | The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security Bulletin APSB14-22, listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2014-0558, CVE-2014-0564, CVE-2014-0569) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.411. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1648-00 CVE-2014-0558 CVE-2014-0564 CVE-2014-0569 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | flash-plugin |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27526 | |||
Oval ID: | oval:org.mitre.oval:def:27526 | ||
Title: | SUSE-SU-2014:1360-1 -- Security update for flash-player (important) | ||
Description: | This update fixes multiple code execution vulnerabilities in flash-player (APSB14-22). CVE-2014-0564, CVE-2014-0558 and CVE-2014-0569 have been assigned to this issue. Security Issues: * CVE-2014-0569 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0569> * CVE-2014-0564 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0564> * CVE-2014-0558 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0558> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1360-1 CVE-2014-0569 CVE-2014-0564 CVE-2014-0558 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Desktop 11 | Product(s): | flash-player |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28194 | |||
Oval ID: | oval:org.mitre.oval:def:28194 | ||
Title: | SUSE-SU-2014:1442-1 -- Security update for flash-player (important) | ||
Description: | flash-player was updated to version 11.2.202.418 to fix 18 security issues: * Memory corruption vulnerabilities that could lead to code execution (CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441). * Use-after-free vulnerabilities that could lead to code execution (CVE-2014-0573, CVE-2014-0588, CVE-2014-8438). * A double free vulnerability that could lead to code execution (CVE-2014-0574). * Type confusion vulnerabilities that could lead to code execution (CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0590). * Heap buffer overflow vulnerabilities that could lead to code execution (CVE-2014-0582, CVE-2014-0589). * An information disclosure vulnerability that could be exploited to disclose session tokens (CVE-2014-8437). * A heap buffer overflow vulnerability that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-0583). * A permission issue that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-8442). Further information can be found at http://helpx.adobe.com/security/products/flash-player/apsb14-24.html <http://helpx.adobe.com/security/products/flash-player/apsb14-24.html> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1442-1 CVE-2014-0576 CVE-2014-0581 CVE-2014-8440 CVE-2014-8441 CVE-2014-0573 CVE-2014-0588 CVE-2014-8438 CVE-2014-0574 CVE-2014-0577 CVE-2014-0584 CVE-2014-0585 CVE-2014-0586 CVE-2014-0590 CVE-2014-0582 CVE-2014-0589 CVE-2014-8437 CVE-2014-0583 CVE-2014-8442 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Desktop 11 | Product(s): | flash-player |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28250 | |||
Oval ID: | oval:org.mitre.oval:def:28250 | ||
Title: | SUSE-SU-2014:1465-1 -- Security update for flash-player (moderate) | ||
Description: | flash-player was updated to version 11.2.202.418 to fix 18 security issues. These security issues were fixed: - Memory corruption vulnerabilities that could lead to code execution (CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441). - Use-after-free vulnerabilities that could lead to code execution (CVE-2014-0573, CVE-2014-0588, CVE-2014-8438). - A double free vulnerability that could lead to code execution (CVE-2014-0574). - Type confusion vulnerabilities that could lead to code execution (CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0590). - Heap buffer overflow vulnerabilities that could lead to code execution (CVE-2014-0582, CVE-2014-0589). - An information disclosure vulnerability that could be exploited to disclose session tokens (CVE-2014-8437). - A heap buffer overflow vulnerability that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-0583). - A permission issue that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-8442). More information can be found at http://helpx.adobe.com/security/products/flash-player/apsb14-24.html | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1465-1 CVE-2014-0576 CVE-2014-0581 CVE-2014-8440 CVE-2014-8441 CVE-2014-0573 CVE-2014-0588 CVE-2014-8438 CVE-2014-0574 CVE-2014-0577 CVE-2014-0584 CVE-2014-0585 CVE-2014-0586 CVE-2014-0590 CVE-2014-0582 CVE-2014-0589 CVE-2014-8437 CVE-2014-0583 CVE-2014-8442 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Desktop 12 | Product(s): | flash-player |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28461 | |||
Oval ID: | oval:org.mitre.oval:def:28461 | ||
Title: | SUSE-SU-2014:1423-1 -- Security update for flash-player (important) | ||
Description: | Adobe Flash Player was updated to 11.2.202.411, fixing security issues and bugs. For more information please read: http://helpx.adobe.com/security/products/flash-player/apsb14-22.html | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1423-1 CVE-2014-0558 CVE-2014-0564 CVE-2014-0569 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Desktop 12 | Product(s): | flash-player |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2019-04-27 | Adobe Flash Player byteArray uncompress information disclosure attempt RuleID : 49586 - Revision : 2 - Type : FILE-FLASH |
2019-04-27 | Adobe Flash Player byteArray uncompress information disclosure attempt RuleID : 49585 - Revision : 2 - Type : FILE-FLASH |
2019-04-27 | Adobe Flash Player byteArray inflate information disclosure attempt RuleID : 49584 - Revision : 2 - Type : FILE-FLASH |
2019-04-27 | Adobe Flash Player byteArray inflate information disclosure attempt RuleID : 49583 - Revision : 2 - Type : FILE-FLASH |
2016-10-01 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 40010 - Revision : 1 - Type : FILE-FLASH |
2016-10-01 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 40009 - Revision : 1 - Type : FILE-FLASH |
2016-04-26 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 38335 - Revision : 1 - Type : FILE-FLASH |
2016-04-26 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 38334 - Revision : 1 - Type : FILE-FLASH |
2016-04-05 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37933 - Revision : 1 - Type : FILE-FLASH |
2016-04-05 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37932 - Revision : 1 - Type : FILE-FLASH |
2016-04-05 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37931 - Revision : 1 - Type : FILE-FLASH |
2016-04-05 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37930 - Revision : 1 - Type : FILE-FLASH |
2016-04-05 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37927 - Revision : 1 - Type : FILE-FLASH |
2016-04-05 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37926 - Revision : 1 - Type : FILE-FLASH |
2016-04-05 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37925 - Revision : 1 - Type : FILE-FLASH |
2016-04-05 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37924 - Revision : 2 - Type : FILE-FLASH |
2016-04-05 | Shockwave Flash file using doswf packer RuleID : 37923 - Revision : 2 - Type : POLICY-OTHER |
2016-03-22 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37723 - Revision : 2 - Type : FILE-FLASH |
2016-03-22 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37722 - Revision : 2 - Type : FILE-FLASH |
2016-03-22 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37721 - Revision : 1 - Type : FILE-FLASH |
2016-03-22 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 37720 - Revision : 1 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 36883 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 36882 - Revision : 1 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 36881 - Revision : 1 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 36880 - Revision : 1 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 36876 - Revision : 1 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 36875 - Revision : 1 - Type : FILE-FLASH |
2015-03-04 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 33270 - Revision : 3 - Type : FILE-FLASH |
2015-03-04 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 33269 - Revision : 3 - Type : FILE-FLASH |
2015-03-04 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 33268 - Revision : 3 - Type : FILE-FLASH |
2015-03-04 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 33267 - Revision : 4 - Type : FILE-FLASH |
2015-03-04 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 33266 - Revision : 4 - Type : FILE-FLASH |
2015-03-04 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 33265 - Revision : 2 - Type : FILE-FLASH |
2015-03-04 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 33264 - Revision : 2 - Type : FILE-FLASH |
2015-03-04 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 33263 - Revision : 2 - Type : FILE-FLASH |
2015-03-04 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 33262 - Revision : 3 - Type : FILE-FLASH |
2015-03-04 | Adobe Flash Player byte array uncompress information disclosure attempt RuleID : 33261 - Revision : 3 - Type : FILE-FLASH |
2015-02-24 | Adobe Flash AWM2 out of bounds corruption attempt RuleID : 33177 - Revision : 4 - Type : FILE-FLASH |
2015-02-24 | Adobe Flash AWM2 out of bounds corruption attempt RuleID : 33176 - Revision : 3 - Type : FILE-FLASH |
2015-02-24 | Adobe Flash Player Microsoft Internet Explorer sandbox escape attempt RuleID : 33163 - Revision : 4 - Type : FILE-FLASH |
2015-02-24 | Adobe Flash Player Microsoft Internet Explorer sandbox escape attempt RuleID : 33162 - Revision : 4 - Type : FILE-FLASH |
2015-02-24 | Adobe Flash Player AVM2 opcode type confusion denial of service attempt RuleID : 33160 - Revision : 4 - Type : FILE-FLASH |
2015-02-24 | Adobe Flash Player AVM2 opcode type confusion denial of service attempt RuleID : 33159 - Revision : 4 - Type : FILE-FLASH |
2015-01-20 | Adobe Flash Player ByteArray crash attempt RuleID : 32874 - Revision : 2 - Type : FILE-FLASH |
2015-01-20 | Adobe Flash Player ByteArray crash attempt RuleID : 32873 - Revision : 2 - Type : FILE-FLASH |
2015-01-13 | Adobe ActionScript malformed pushwith opcode attempt RuleID : 32767 - Revision : 2 - Type : FILE-FLASH |
2015-01-13 | Adobe ActionScript malformed pushwith opcode attempt RuleID : 32766 - Revision : 3 - Type : FILE-FLASH |
2015-01-13 | Adobe ActionScript malformed pushwith opcode attempt RuleID : 32765 - Revision : 2 - Type : FILE-FLASH |
2015-01-13 | Adobe ActionScript malformed pushwith opcode attempt RuleID : 32764 - Revision : 2 - Type : FILE-FLASH |
2015-01-13 | Adobe Flash Player malformed pushcode type confusion remote code execution at... RuleID : 32752 - Revision : 3 - Type : FILE-FLASH |
2015-01-13 | Adobe Flash Player malformed pushcode type confusion remote code execution at... RuleID : 32751 - Revision : 3 - Type : FILE-FLASH |
2015-01-13 | Adobe Flash Player malformed pushcode type confusion remote code execution at... RuleID : 32750 - Revision : 2 - Type : FILE-FLASH |
2015-01-13 | Adobe Flash Player malformed pushcode type confusion remote code execution at... RuleID : 32749 - Revision : 3 - Type : FILE-FLASH |
2015-01-06 | Adobe Flash Player byteArray.uncompress use after free attempt RuleID : 32669 - Revision : 2 - Type : FILE-FLASH |
2015-01-06 | Adobe Flash Player byteArray.uncompress use after free attempt RuleID : 32668 - Revision : 2 - Type : FILE-FLASH |
2015-01-06 | Adobe Flash broker privilege escalation file creation attempt RuleID : 32627 - Revision : 3 - Type : BROWSER-PLUGINS |
2015-01-06 | Adobe Flash broker privilege escalation file creation attempt RuleID : 32626 - Revision : 3 - Type : BROWSER-PLUGINS |
2014-12-18 | Adobe Flash Player setglobalslot malformed bytecode remote code execution att... RuleID : 32561 - Revision : 2 - Type : FILE-FLASH |
2014-12-18 | Adobe Flash Player setglobalslot malformed bytecode remote code execution att... RuleID : 32560 - Revision : 2 - Type : FILE-FLASH |
2014-12-18 | Adobe Flash Player setglobalslot malformed bytecode remote code execution att... RuleID : 32559 - Revision : 3 - Type : FILE-FLASH |
2014-12-18 | Adobe Flash Player setglobalslot malformed bytecode remote code execution att... RuleID : 32558 - Revision : 3 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player incorrect codec denial of service attempt RuleID : 32553 - Revision : 3 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player incorrect codec denial of service attempt RuleID : 32552 - Revision : 3 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player HTML focus with no data denial of service attempt RuleID : 32545 - Revision : 3 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player HTML focus with no data denial of service attempt RuleID : 32544 - Revision : 2 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player compressed microphone object codec denial of service attempt RuleID : 32543 - Revision : 2 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player compressed microphone object codec denial of service attempt RuleID : 32542 - Revision : 3 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player decompressed microphone object codec denial of service att... RuleID : 32541 - Revision : 2 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player decompressed microphone object codec denial of service att... RuleID : 32540 - Revision : 2 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player AS3 regular expression grouping depth denial of service at... RuleID : 32539 - Revision : 3 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player AS3 regular expression grouping depth denial of service at... RuleID : 32538 - Revision : 3 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player AS3 regular expression grouping depth denial of service at... RuleID : 32537 - Revision : 3 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player AS3 regular expression grouping depth denial of service at... RuleID : 32536 - Revision : 3 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player AS3 regular expression grouping depth denial of service at... RuleID : 32535 - Revision : 3 - Type : FILE-FLASH |
2014-12-16 | Adobe Flash Player AS3 regular expression grouping depth denial of service at... RuleID : 32534 - Revision : 2 - Type : FILE-FLASH |
2014-11-25 | Adobe Flash Player regex denial of service attempt RuleID : 32308 - Revision : 2 - Type : FILE-FLASH |
2014-11-25 | Adobe Flash Player regex denial of service attempt RuleID : 32307 - Revision : 2 - Type : FILE-FLASH |
2014-11-25 | Adobe Flash Player regex denial of service attempt RuleID : 32306 - Revision : 3 - Type : FILE-FLASH |
2014-11-25 | Adobe Flash Player regex denial of service attempt RuleID : 32305 - Revision : 3 - Type : FILE-FLASH |
2014-11-25 | Adobe Flash Player regex denial of service attempt RuleID : 32304 - Revision : 2 - Type : FILE-FLASH |
2014-11-25 | Adobe Flash Player regex denial of service attempt RuleID : 32303 - Revision : 3 - Type : FILE-FLASH |
2014-11-25 | Adobe Flash Player regex denial of service attempt RuleID : 32302 - Revision : 2 - Type : FILE-FLASH |
2014-11-25 | Adobe Flash Player regex denial of service attempt RuleID : 32301 - Revision : 3 - Type : FILE-FLASH |
2014-11-19 | Adobe Flash Player string concatenation memory corruption attempt RuleID : 32239 - Revision : 2 - Type : FILE-FLASH |
2014-11-19 | Adobe Flash Player string concatenation memory corruption attempt RuleID : 32238 - Revision : 2 - Type : FILE-FLASH |
2014-11-19 | Adobe Flash Player string concatenation memory corruption attempt RuleID : 32237 - Revision : 2 - Type : FILE-FLASH |
2014-11-19 | Adobe Flash Player string concatenation memory corruption attempt RuleID : 32236 - Revision : 3 - Type : FILE-FLASH |
2014-11-19 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 32229 - Revision : 2 - Type : FILE-FLASH |
2014-11-19 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 32228 - Revision : 2 - Type : FILE-FLASH |
2014-11-19 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 32227 - Revision : 2 - Type : FILE-FLASH |
2014-11-19 | Adobe Flash Player atomicCompareAndSwapLength integer overflow attempt RuleID : 32226 - Revision : 3 - Type : FILE-FLASH |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-12-15 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-764.nasl - Type : ACT_GATHER_INFO |
2014-11-24 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201411-06.nasl - Type : ACT_GATHER_INFO |
2014-11-19 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-683.nasl - Type : ACT_GATHER_INFO |
2014-11-19 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_google_chrome_39_0_2171_65.nasl - Type : ACT_GATHER_INFO |
2014-11-19 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : google_chrome_39_0_2171_65.nasl - Type : ACT_GATHER_INFO |
2014-11-19 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_d395e44f6f4f11e4a44400262d5ed8ee.nasl - Type : ACT_GATHER_INFO |
2014-11-18 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_flash-player-141114.nasl - Type : ACT_GATHER_INFO |
2014-11-13 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-1852.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : google_chrome_38_0_2125_122.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote Windows host has a browser plugin that is affected by multiple vul... File : smb_kb3004150.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_google_chrome_38_0_2125_122.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote Mac OS X host has a browser plugin that is affected by multiple vu... File : macosx_flash_player_15_0_0_223.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote Mac OS X host contains a version of Adobe AIR that is affected by ... File : macosx_adobe_air_15_0_0_356.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote Windows host has a browser plugin that is affected by multiple vul... File : flash_player_apsb14-24.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote Windows host contains a version of Adobe AIR that is affected by m... File : adobe_air_apsb14-24.nasl - Type : ACT_GATHER_INFO |
2014-11-06 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_flash-player-141020.nasl - Type : ACT_GATHER_INFO |
2014-10-29 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-603.nasl - Type : ACT_GATHER_INFO |
2014-10-16 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-1648.nasl - Type : ACT_GATHER_INFO |
2014-10-15 | Name : The remote Windows host contains a version of Adobe AIR that is affected by m... File : adobe_air_apsb14-22.nasl - Type : ACT_GATHER_INFO |
2014-10-15 | Name : The remote host has an ActiveX control installed that is affected by multiple... File : smb_kb3001237.nasl - Type : ACT_GATHER_INFO |
2014-10-15 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_google_chrome_38_0_2125_104.nasl - Type : ACT_GATHER_INFO |
2014-10-15 | Name : The remote Mac OS X host has a browser plugin that is affected by multiple vu... File : macosx_flash_player_15_0_0_189.nasl - Type : ACT_GATHER_INFO |
2014-10-15 | Name : The remote Mac OS X host contains a version of Adobe AIR that is affected by ... File : macosx_adobe_air_15_0_0_293.nasl - Type : ACT_GATHER_INFO |
2014-10-15 | Name : The remote host contains a web browser that is affected by multiple vulnerabi... File : google_chrome_38_0_2125_104.nasl - Type : ACT_GATHER_INFO |
2014-10-15 | Name : The remote Windows host has a browser plugin that is affected by multiple vul... File : flash_player_apsb14-22.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-11-26 13:28:27 |
|
2014-11-21 17:20:36 |
|