Executive Summary
Summary | |
---|---|
Title | AMD64 x86 emulation base libraries: Multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | GLSA-201412-11 | First vendor Publication | 2014-12-12 |
Vendor | Gentoo | Last vendor Modification | 2014-12-12 |
Severity (Vendor) | Normal | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis Multiple vulnerabilities have been found in AMD64 x86 emulation base libraries, the worst of which may allow remote execution of arbitrary code. Background Description Impact Workaround Resolution NOTE: One or more of the issues described in this advisory have been fixed in previous updates. They are included in this advisory for the sake of completeness. It is likely that your system is already no longer affected by them. References Availability http://security.gentoo.org/glsa/glsa-201412-11.xml |
Original Source
Url : http://security.gentoo.org/glsa/glsa-201412-11.xml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
33 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
7 % | CWE-399 | Resource Management Errors |
7 % | CWE-264 | Permissions, Privileges, and Access Controls |
7 % | CWE-125 | Out-of-bounds Read |
7 % | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25) |
7 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10094 | |||
Oval ID: | oval:org.mitre.oval:def:10094 | ||
Title: | The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value. | ||
Description: | The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-2445 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10288 | |||
Oval ID: | oval:org.mitre.oval:def:10288 | ||
Title: | Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors. | ||
Description: | Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-4995 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10614 | |||
Oval ID: | oval:org.mitre.oval:def:10614 | ||
Title: | Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations. | ||
Description: | Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-5269 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10658 | |||
Oval ID: | oval:org.mitre.oval:def:10658 | ||
Title: | Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow. | ||
Description: | Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-1536 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10669 | |||
Oval ID: | oval:org.mitre.oval:def:10669 | ||
Title: | Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression. | ||
Description: | Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-5116 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10904 | |||
Oval ID: | oval:org.mitre.oval:def:10904 | ||
Title: | Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible. | ||
Description: | Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-5135 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11046 | |||
Oval ID: | oval:org.mitre.oval:def:11046 | ||
Title: | The CUPS service on multiple platforms allows remote attackers to cause a denial of service (service hang) via a "partially-negotiated" SSL connection, which prevents other requests from being accepted. | ||
Description: | The CUPS service on multiple platforms allows remote attackers to cause a denial of service (service hang) via a "partially-negotiated" SSL connection, which prevents other requests from being accepted. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-0720 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11851 | |||
Oval ID: | oval:org.mitre.oval:def:11851 | ||
Title: | Mozilla Firefox/Thunderbird/SeaMonkey 'libpng' Buffer Overflow Vulnerability | ||
Description: | Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1205 | Version: | 25 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla SeaMonkey |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17415 | |||
Oval ID: | oval:org.mitre.oval:def:17415 | ||
Title: | USN-522-1 -- openssl vulnerabilities | ||
Description: | It was discovered that OpenSSL did not correctly perform Montgomery multiplications. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-522-1 CVE-2007-3108 CVE-2007-5135 | Version: | 7 |
Platform(s): | Ubuntu 6.06 Ubuntu 6.10 Ubuntu 7.04 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17476 | |||
Oval ID: | oval:org.mitre.oval:def:17476 | ||
Title: | USN-552-1 -- perl vulnerability | ||
Description: | It was discovered that Perl's regular expression library did not correctly handle certain UTF sequences. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-552-1 CVE-2007-5116 | Version: | 7 |
Platform(s): | Ubuntu 6.06 Ubuntu 6.10 Ubuntu 7.04 Ubuntu 7.10 | Product(s): | perl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17495 | |||
Oval ID: | oval:org.mitre.oval:def:17495 | ||
Title: | USN-534-1 -- openssl vulnerability | ||
Description: | Andy Polyakov discovered that the DTLS implementation in OpenSSL was vulnerable. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-534-1 CVE-2007-4995 | Version: | 7 |
Platform(s): | Ubuntu 6.06 Ubuntu 6.10 Ubuntu 7.04 Ubuntu 7.10 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17563 | |||
Oval ID: | oval:org.mitre.oval:def:17563 | ||
Title: | USN-538-1 -- libpng vulnerabilities | ||
Description: | It was discovered that libpng did not properly perform bounds checking and comparisons in certain operations. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-538-1 CVE-2007-5268 CVE-2007-5269 | Version: | 7 |
Platform(s): | Ubuntu 6.06 Ubuntu 6.10 Ubuntu 7.04 Ubuntu 7.10 | Product(s): | libpng |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18148 | |||
Oval ID: | oval:org.mitre.oval:def:18148 | ||
Title: | USN-1734-1 -- nova vulnerability | ||
Description: | Nova could be made to crash if it received specially crafted input. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1734-1 CVE-2013-1664 | Version: | 7 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 Ubuntu 11.10 | Product(s): | nova |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18166 | |||
Oval ID: | oval:org.mitre.oval:def:18166 | ||
Title: | USN-1782-1 -- libxml2 vulnerability | ||
Description: | libxml2 could be made to hang if it received specially crafted input. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1782-1 CVE-2013-0338 | Version: | 7 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 Ubuntu 11.10 Ubuntu 10.04 Ubuntu 8.04 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18227 | |||
Oval ID: | oval:org.mitre.oval:def:18227 | ||
Title: | USN-1817-1 -- libxml2 vulnerability | ||
Description: | libxml2 could be made to crash or run programs if it opened a specially crafted file. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1817-1 CVE-2013-1969 | Version: | 7 |
Platform(s): | Ubuntu 13.04 | Product(s): | libxml2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18306 | |||
Oval ID: | oval:org.mitre.oval:def:18306 | ||
Title: | USN-1731-1 -- cinder vulnerability | ||
Description: | Cinder could be made to crash if it received specially crafted input. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1731-1 CVE-2013-1664 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | cinder |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18320 | |||
Oval ID: | oval:org.mitre.oval:def:18320 | ||
Title: | USN-1904-2 -- libxml2 regression | ||
Description: | USN-1904-1 introduced a regression in libxml2. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1904-2 CVE-2013-0339 CVE-2013-2877 | Version: | 7 |
Platform(s): | Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18347 | |||
Oval ID: | oval:org.mitre.oval:def:18347 | ||
Title: | USN-1904-1 -- libxml2 vulnerabilities | ||
Description: | Several security issues were fixed in libxml2. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1904-1 CVE-2013-0339 CVE-2013-2877 | Version: | 7 |
Platform(s): | Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18418 | |||
Oval ID: | oval:org.mitre.oval:def:18418 | ||
Title: | DSA-1613-1 libgd2 - multiple vulnerabilities | ||
Description: | Multiple vulnerabilities have been identified in libgd2, a library for programmatic graphics creation and manipulation. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1613-1 CVE-2007-3476 CVE-2007-3477 CVE-2007-3996 CVE-2007-2445 | Version: | 7 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | libgd2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18654 | |||
Oval ID: | oval:org.mitre.oval:def:18654 | ||
Title: | DSA-1379-1 openssl - arbitrary code execution | ||
Description: | An off-by-one error has been identified in the SSL_get_shared_ciphers() routine in the libssl library from OpenSSL, an implementation of Secure Socket Layer cryptographic libraries and utilities. This error could allow an attacker to crash an application making use of OpenSSL's libssl library, or potentially execute arbitrary code in the security context of the user running such an application. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1379-1 CVE-2007-5135 | Version: | 7 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | openssl openssl097 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18955 | |||
Oval ID: | oval:org.mitre.oval:def:18955 | ||
Title: | DSA-1274-1 file - buffer overflow | ||
Description: | An integer underflow bug has been found in the file_printf function in file, a tool to determine file types based analysis of file content. The bug could allow an attacker to execute arbitrary code by inducing a local user to examine a specially crafted file that triggers a buffer overflow. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1274-1 CVE-2007-1536 | Version: | 7 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | file |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20018 | |||
Oval ID: | oval:org.mitre.oval:def:20018 | ||
Title: | DSA-2652-1 libxml2 - external entity expansion | ||
Description: | Brad Hill of iSEC Partners discovered that many XML implementations are vulnerable to external entity expansion issues, which can be used for various purposes such as firewall circumvention, disguising an IP address, and denial-of-service. libxml2 was susceptible to these problems when performing string substitution during entity expansion. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2652-1 CVE-2013-0338 CVE-2013-0339 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20027 | |||
Oval ID: | oval:org.mitre.oval:def:20027 | ||
Title: | DSA-1400-1 perl - arbitrary code execution | ||
Description: | Will Drewry and Tavis Ormandy of the Google Security Team have discovered a UTF-8 related heap overflow in Perl's regular expression compiler, probably allowing attackers to execute arbitrary code by compiling specially crafted regular expressions. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1400-1 CVE-2007-5116 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | perl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20088 | |||
Oval ID: | oval:org.mitre.oval:def:20088 | ||
Title: | DSA-2779-1 libxml2 - denial of service | ||
Description: | Aki Helin of OUSPG discovered many out-of-bounds read issues in libxml2, the GNOME project's XML parser library, which can lead to denial of service issues when handling XML documents that end abruptly. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2779-1 CVE-2013-2877 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20219 | |||
Oval ID: | oval:org.mitre.oval:def:20219 | ||
Title: | DSA-1571-1 openssl - predictable random number generator | ||
Description: | Luciano Bello discovered that the random number generator in Debian's openssl package is predictable. This is caused by an incorrect Debian-specific change to the openssl package (<a href="http://security-tracker.debian.org/tracker/CVE-2008-0166">CVE-2008-0166</a>). As a result, cryptographic key material may be guessable. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1571-1 CVE-2008-0166 CVE-2007-4995 CVE-2007-3108 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | openssl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20491 | |||
Oval ID: | oval:org.mitre.oval:def:20491 | ||
Title: | VMware vSphere, ESX and ESXi updates to third party libraries | ||
Description: | libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0338 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20894 | |||
Oval ID: | oval:org.mitre.oval:def:20894 | ||
Title: | RHSA-2013:0581: libxml2 security update (Moderate) | ||
Description: | libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0581-01 CESA-2013:0581 CVE-2013-0338 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 CentOS Linux 5 CentOS Linux 6 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22341 | |||
Oval ID: | oval:org.mitre.oval:def:22341 | ||
Title: | ELSA-2007:0124: file security update (Moderate) | ||
Description: | Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0124-01 CVE-2007-1536 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | file |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22461 | |||
Oval ID: | oval:org.mitre.oval:def:22461 | ||
Title: | ELSA-2007:0966: perl security update (Important) | ||
Description: | Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0966-02 CVE-2007-5116 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | perl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22488 | |||
Oval ID: | oval:org.mitre.oval:def:22488 | ||
Title: | ELSA-2007:0964: openssl security update (Important) | ||
Description: | Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0964-02 CVE-2007-3108 CVE-2007-4995 CVE-2007-5135 | Version: | 17 |
Platform(s): | Oracle Linux 5 | Product(s): | openssl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22555 | |||
Oval ID: | oval:org.mitre.oval:def:22555 | ||
Title: | ELSA-2007:0992: libpng security update (Moderate) | ||
Description: | Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0992-02 CVE-2007-5269 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | libpng libpng10 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22569 | |||
Oval ID: | oval:org.mitre.oval:def:22569 | ||
Title: | ELSA-2007:0123: cups security update (Moderate) | ||
Description: | The CUPS service on multiple platforms allows remote attackers to cause a denial of service (service hang) via a "partially-negotiated" SSL connection, which prevents other requests from being accepted. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0123-01 CVE-2007-0720 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | cups |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22592 | |||
Oval ID: | oval:org.mitre.oval:def:22592 | ||
Title: | ELSA-2007:0356: libpng security update (Moderate) | ||
Description: | The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0356-03 CVE-2006-5793 CVE-2007-2445 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | libpng libpng10 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23449 | |||
Oval ID: | oval:org.mitre.oval:def:23449 | ||
Title: | ELSA-2013:0581: libxml2 security update (Moderate) | ||
Description: | libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0581-01 CVE-2013-0338 | Version: | 6 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23812 | |||
Oval ID: | oval:org.mitre.oval:def:23812 | ||
Title: | DEPRECATED: ELSA-2014:0376: openssl security update (Important) | ||
Description: | OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter. All OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014:0376-00 CVE-2014-0160 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | openssl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23963 | |||
Oval ID: | oval:org.mitre.oval:def:23963 | ||
Title: | Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors | ||
Description: | Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2007-4995 | Version: | 7 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23965 | |||
Oval ID: | oval:org.mitre.oval:def:23965 | ||
Title: | DEPRECATED: ELSA-2013:0581: libxml2 security update (Moderate) | ||
Description: | libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0581-01 CVE-2013-0338 | Version: | 6 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24241 | |||
Oval ID: | oval:org.mitre.oval:def:24241 | ||
Title: | The TLS and DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read | ||
Description: | The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-0160 | Version: | 10 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 7 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows Server 2012 Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24324 | |||
Oval ID: | oval:org.mitre.oval:def:24324 | ||
Title: | ELSA-2014:0376: openssl security update (Important) | ||
Description: | OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter. All OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014:0376-00 CESA-2014:0160 CVE-2014-0160 | Version: | 9 |
Platform(s): | Oracle Linux 6 CentOS Linux 6 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24718 | |||
Oval ID: | oval:org.mitre.oval:def:24718 | ||
Title: | RHSA-2014:0376: openssl security update (Important) | ||
Description: | OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter. All OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0376-00 CVE-2014-0160 CESA-2014:0376 | Version: | 9 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25431 | |||
Oval ID: | oval:org.mitre.oval:def:25431 | ||
Title: | SUSE-SU-2014:0150-1 -- Security update for libxml2 | ||
Description: | This update fixes a DoS vulnerability in libxml2. CVE-2013-2877 has been assigned to this issue. Security Issue reference: * CVE-2013-2877 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877 > | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:0150-1 CVE-2013-2877 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25457 | |||
Oval ID: | oval:org.mitre.oval:def:25457 | ||
Title: | SUSE-SU-2013:1627-1 -- Security update for libxml2 | ||
Description: | libxml2 has been updated to fix the following security issue: * CVE-2013-0338: libxml2 allowed context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:1627-1 CVE-2013-0338 CVE-2013-0339 CVE-2012-5134 CVE-2012-2807 CVE-2011-3102 CVE-2012-0841 CVE-2011-3919 CVE-2013-2877 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 10 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25714 | |||
Oval ID: | oval:org.mitre.oval:def:25714 | ||
Title: | SUSE-SU-2013:1625-1 -- Security update for libxml2 | ||
Description: | This is a LTSS rollup update for the libxml2 library that fixes various security issues. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:1625-1 CVE-2013-2877 CVE-2013-0338 CVE-2012-5134 CVE-2012-2807 CVE-2011-3102 CVE-2012-0841 CVE-2011-3919 CVE-2013-0339 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 10 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25816 | |||
Oval ID: | oval:org.mitre.oval:def:25816 | ||
Title: | SUSE-SU-2013:0743-1 -- Security update for libxml2 | ||
Description: | libxml2 has been updated to fix two security bugs. * CVE-2013-0338: Internal entity expansion within XML was not bounded, leading to simple small XML files being able to cause "out of memory" denial of service conditions. * CVE-2012-5134: Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:0743-1 CVE-2013-0338 CVE-2012-5134 CVE-2013-0339 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | libxml2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25923 | |||
Oval ID: | oval:org.mitre.oval:def:25923 | ||
Title: | SUSE-SU-2013:0744-1 -- Security update for libxml2 | ||
Description: | libxml2 has been updated to fix entity expansion problems: * CVE-2013-0338: Internal entity expansion within XML was not bounded, leading to simple small XML files being able to cause "out of memory" denial of service conditions. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:0744-1 CVE-2013-0338 CVE-2013-0339 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Server 10 SUSE Linux Enterprise Desktop 11 SUSE Linux Enterprise Desktop 10 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26734 | |||
Oval ID: | oval:org.mitre.oval:def:26734 | ||
Title: | Allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly | ||
Description: | parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-2877 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | Google Chrome |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:26742 | |||
Oval ID: | oval:org.mitre.oval:def:26742 | ||
Title: | DEPRECATED: ELSA-2014-0376 -- openssl security update (Important) | ||
Description: | OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter. All OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-0376 CVE-2014-0160 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | openssl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27000 | |||
Oval ID: | oval:org.mitre.oval:def:27000 | ||
Title: | DEPRECATED: ELSA-2013-0581 -- libxml2 security update (moderate) | ||
Description: | [2.7.6-12.0.1.el6_4.1] - Update doc/redhat.gif in tarball - Add libxml2-oracle-enterprise.patch and update logos in tarball | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0581 CVE-2013-0338 | Version: | 4 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:29321 | |||
Oval ID: | oval:org.mitre.oval:def:29321 | ||
Title: | DSA-2896-2 -- openssl -- security update | ||
Description: | A vulnerability has been discovered in OpenSSL's support for the TLS/DTLS Heartbeat extension. Up to 64KB of memory from either client or server can be recovered by an attacker. This vulnerability might allow an attacker to compromise the private key and other sensitive data in memory. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2896-2 CVE-2014-0160 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5337 | |||
Oval ID: | oval:org.mitre.oval:def:5337 | ||
Title: | Security Vulnerability in Solaris 10 OpenSSL SSL_get_shared_ciphers() Function | ||
Description: | Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-5135 | Version: | 1 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7842 | |||
Oval ID: | oval:org.mitre.oval:def:7842 | ||
Title: | DSA-1613 libgd2 -- multiple vulnerabilities | ||
Description: | Multiple vulnerabilities have been identified in libgd2, a library for programmatic graphics creation and manipulation. The Common Vulnerabilities and Exposures project identifies the following problems: Grayscale PNG files containing invalid tRNS chunk CRC values could cause a denial of service (crash), if a maliciously crafted image is loaded into an application using libgd. An array indexing error in libgd's GIF handling could induce a denial of service (crash with heap corruption) if exceptionally large color index values are supplied in a maliciously crafted GIF image file. The imagearc() and imagefilledarc() routines in libgd allow an attacker in control of the parameters used to specify the degrees of arc for those drawing functions to perform a denial of service attack (excessive CPU consumption). Multiple integer overflows exist in libgd's image resizing and creation routines; these weaknesses allow an attacker in control of the parameters passed to those routines to induce a crash or execute arbitrary code with the privileges of the user running an application or interpreter linked against libgd2. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1613 CVE-2007-3476 CVE-2007-3477 CVE-2007-3996 CVE-2007-2445 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | libgd2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7946 | |||
Oval ID: | oval:org.mitre.oval:def:7946 | ||
Title: | DSA-1571 openssl -- predictable random number generator | ||
Description: | Luciano Bello discovered that the random number generator in Debian's openssl package is predictable. This is caused by an incorrect Debian-specific change to the openssl package (CVE-2008-0166). As a result, cryptographic key material may be guessable. This is a Debian-specific vulnerability which does not affect other operating systems which are not based on Debian. However, other systems can be indirectly affected if weak keys are imported into them. It is strongly recommended that all cryptographic key material which has been generated by OpenSSL versions starting with 0.9.8c-1 on Debian systems is recreated from scratch. Furthermore, all DSA keys ever used on affected Debian systems for signing or authentication purposes should be considered compromised; the Digital Signature Algorithm relies on a secret random value used during signature generation. The first vulnerable version, 0.9.8c-1, was uploaded to the unstable distribution on 2006-09-17, and has since that date propagated to the testing and current stable (etch) distributions. The old stable distribution (sarge) is not affected. Affected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key material for use in X.509 certificates and session keys used in SSL/TLS connections. Keys generated with GnuPG or GNUTLS are not affected, though. A detector for known weak key material will be published at: http://security.debian.org/project/extra/dowkd/dowkd.pl.gz (OpenPGP signature) Instructions how to implement key rollover for various packages will be published at: http://www.debian.org/security/key-rollover/ This web site will be continuously updated to reflect new and updated instructions on key rollovers for packages using SSL certificates. Popular packages not affected will also be listed. In addition to this critical change, two other vulnerabilities have been fixed in the openssl package which were originally scheduled for release with the next etch point release: OpenSSL's DTLS (Datagram TLS, basically SSL over UDP) implementation did not actually implement the DTLS specification, but a potentially much weaker protocol, and contained a vulnerability permitting arbitrary code execution (CVE-2007-4995). A side channel attack in the integer multiplication routines is also addressed (CVE-2007-3108). | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1571 CVE-2008-0166 CVE-2007-4995 CVE-2007-3108 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | openssl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:9984 | |||
Oval ID: | oval:org.mitre.oval:def:9984 | ||
Title: | The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys. | ||
Description: | The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-3108 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2014-04-24 | Heartbleed OpenSSL - Information Leak Exploit (2) - DTLS Support |
2014-04-10 | Heartbleed OpenSSL - Information Leak Exploit (1) |
2014-04-09 | OpenSSL 1.0.1f TLS Heartbeat Extension - Memory Disclosure (Multiple SSL/TLS ... |
2014-04-08 | OpenSSL TLS Heartbeat Extension - Memory Disclosure |
2010-07-20 | libpng <= 1.4.2 Denial of Service Vulnerability |
OpenVAS Exploits
Date | Description |
---|---|
2012-10-03 | Name : Gentoo Security Advisory GLSA 201209-25 (vmware-server vmware-player vmware-w... File : nvt/glsa_201209_25.nasl |
2011-09-07 | Name : Mac OS X v10.6.4 Multiple Vulnerabilities (2010-007) File : nvt/gb_macosx_su10-007.nasl |
2011-08-26 | Name : Apple iTunes Multiple Vulnerabilities (Mac OS X) File : nvt/secpod_itunes_mult_vuln_macosx.nasl |
2011-08-09 | Name : CentOS Update for libpng CESA-2010:0534 centos5 i386 File : nvt/gb_CESA-2010_0534_libpng_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for thunderbird CESA-2010:0545 centos5 i386 File : nvt/gb_CESA-2010_0545_thunderbird_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for firefox CESA-2010:0547 centos5 i386 File : nvt/gb_CESA-2010_0547_firefox_centos5_i386.nasl |
2011-03-09 | Name : Gentoo Security Advisory GLSA 201010-01 (libpng) File : nvt/glsa_201010_01.nasl |
2010-08-21 | Name : Debian Security Advisory DSA 2072-1 (libpng) File : nvt/deb_2072_1.nasl |
2010-08-21 | Name : Debian Security Advisory DSA 2075-1 (xulrunner) File : nvt/deb_2075_1.nasl |
2010-08-21 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox49.nasl |
2010-08-20 | Name : CentOS Update for libpng10 CESA-2010:0534 centos3 i386 File : nvt/gb_CESA-2010_0534_libpng10_centos3_i386.nasl |
2010-08-20 | Name : CentOS Update for seamonkey CESA-2010:0546 centos3 i386 File : nvt/gb_CESA-2010_0546_seamonkey_centos3_i386.nasl |
2010-08-06 | Name : SuSE Update for MozillaFirefox,MozillaThunderbird,seamonkey SUSE-SA:2010:032 File : nvt/gb_suse_2010_032.nasl |
2010-07-30 | Name : Fedora Update for mingw32-libpng FEDORA-2010-10776 File : nvt/gb_fedora_2010_10776_mingw32-libpng_fc12.nasl |
2010-07-30 | Name : Fedora Update for mingw32-libpng FEDORA-2010-10793 File : nvt/gb_fedora_2010_10793_mingw32-libpng_fc13.nasl |
2010-07-30 | Name : Ubuntu Update for Firefox and Xulrunner vulnerability USN-957-2 File : nvt/gb_ubuntu_USN_957_2.nasl |
2010-07-30 | Name : Ubuntu Update for thunderbird vulnerabilities USN-958-1 File : nvt/gb_ubuntu_USN_958_1.nasl |
2010-07-26 | Name : Ubuntu Update for Firefox and Xulrunner vulnerabilities USN-930-4 File : nvt/gb_ubuntu_USN_930_4.nasl |
2010-07-26 | Name : Ubuntu Update USN-930-5 File : nvt/gb_ubuntu_USN_930_5.nasl |
2010-07-26 | Name : Ubuntu Update for Firefox and Xulrunner vulnerabilities USN-957-1 File : nvt/gb_ubuntu_USN_957_1.nasl |
2010-07-23 | Name : RedHat Update for seamonkey RHSA-2010:0546-01 File : nvt/gb_RHSA-2010_0546-01_seamonkey.nasl |
2010-07-23 | Name : RedHat Update for firefox RHSA-2010:0547-01 File : nvt/gb_RHSA-2010_0547-01_firefox.nasl |
2010-07-23 | Name : Fedora Update for libpng10 FEDORA-2010-10823 File : nvt/gb_fedora_2010_10823_libpng10_fc13.nasl |
2010-07-23 | Name : Fedora Update for libpng10 FEDORA-2010-10833 File : nvt/gb_fedora_2010_10833_libpng10_fc12.nasl |
2010-07-23 | Name : Fedora Update for seamonkey FEDORA-2010-11327 File : nvt/gb_fedora_2010_11327_seamonkey_fc13.nasl |
2010-07-23 | Name : Fedora Update for firefox FEDORA-2010-11345 File : nvt/gb_fedora_2010_11345_firefox_fc13.nasl |
2010-07-23 | Name : Fedora Update for galeon FEDORA-2010-11345 File : nvt/gb_fedora_2010_11345_galeon_fc13.nasl |
2010-07-23 | Name : Fedora Update for gnome-python2-extras FEDORA-2010-11345 File : nvt/gb_fedora_2010_11345_gnome-python2-extras_fc13.nasl |
2010-07-23 | Name : Fedora Update for gnome-web-photo FEDORA-2010-11345 File : nvt/gb_fedora_2010_11345_gnome-web-photo_fc13.nasl |
2010-07-23 | Name : Fedora Update for mozvoikko FEDORA-2010-11345 File : nvt/gb_fedora_2010_11345_mozvoikko_fc13.nasl |
2010-07-23 | Name : Fedora Update for perl-Gtk2-MozEmbed FEDORA-2010-11345 File : nvt/gb_fedora_2010_11345_perl-Gtk2-MozEmbed_fc13.nasl |
2010-07-23 | Name : Fedora Update for xulrunner FEDORA-2010-11345 File : nvt/gb_fedora_2010_11345_xulrunner_fc13.nasl |
2010-07-23 | Name : Fedora Update for sunbird FEDORA-2010-11361 File : nvt/gb_fedora_2010_11361_sunbird_fc12.nasl |
2010-07-23 | Name : Fedora Update for thunderbird FEDORA-2010-11361 File : nvt/gb_fedora_2010_11361_thunderbird_fc12.nasl |
2010-07-23 | Name : Fedora Update for seamonkey FEDORA-2010-11363 File : nvt/gb_fedora_2010_11363_seamonkey_fc12.nasl |
2010-07-23 | Name : Fedora Update for firefox FEDORA-2010-11375 File : nvt/gb_fedora_2010_11375_firefox_fc12.nasl |
2010-07-23 | Name : Fedora Update for galeon FEDORA-2010-11375 File : nvt/gb_fedora_2010_11375_galeon_fc12.nasl |
2010-07-23 | Name : Fedora Update for gnome-python2-extras FEDORA-2010-11375 File : nvt/gb_fedora_2010_11375_gnome-python2-extras_fc12.nasl |
2010-07-23 | Name : Fedora Update for gnome-web-photo FEDORA-2010-11375 File : nvt/gb_fedora_2010_11375_gnome-web-photo_fc12.nasl |
2010-07-23 | Name : Fedora Update for mozvoikko FEDORA-2010-11375 File : nvt/gb_fedora_2010_11375_mozvoikko_fc12.nasl |
2010-07-23 | Name : Fedora Update for perl-Gtk2-MozEmbed FEDORA-2010-11375 File : nvt/gb_fedora_2010_11375_perl-Gtk2-MozEmbed_fc12.nasl |
2010-07-23 | Name : Fedora Update for xulrunner FEDORA-2010-11375 File : nvt/gb_fedora_2010_11375_xulrunner_fc12.nasl |
2010-07-23 | Name : Fedora Update for sunbird FEDORA-2010-11379 File : nvt/gb_fedora_2010_11379_sunbird_fc13.nasl |
2010-07-23 | Name : Fedora Update for thunderbird FEDORA-2010-11379 File : nvt/gb_fedora_2010_11379_thunderbird_fc13.nasl |
2010-07-16 | Name : RedHat Update for libpng RHSA-2010:0534-01 File : nvt/gb_RHSA-2010_0534-01_libpng.nasl |
2010-07-16 | Name : Mandriva Update for libpng MDVSA-2010:133 (libpng) File : nvt/gb_mandriva_MDVSA_2010_133.nasl |
2010-07-12 | Name : Ubuntu Update for libpng vulnerabilities USN-960-1 File : nvt/gb_ubuntu_USN_960_1.nasl |
2010-07-06 | Name : FreeBSD Ports: png File : nvt/freebsd_png4.nasl |
2010-07-06 | Name : Fedora Update for libpng FEDORA-2010-10592 File : nvt/gb_fedora_2010_10592_libpng_fc12.nasl |
2010-07-02 | Name : Fedora Update for libpng FEDORA-2010-10557 File : nvt/gb_fedora_2010_10557_libpng_fc13.nasl |
2010-05-12 | Name : Mac OS X Security Update 2007-009 File : nvt/macosx_secupd_2007-009.nasl |
2010-05-12 | Name : Mac OS X Security Update 2008-005 File : nvt/macosx_secupd_2008-005.nasl |
2010-05-12 | Name : Mac OS X 10.5.3 Update / Mac OS X Security Update 2008-003 File : nvt/macosx_upd_10_5_3_secupd_2008-003.nasl |
2010-04-30 | Name : Mandriva Update for gdm MDVA-2010:133 (gdm) File : nvt/gb_mandriva_MDVA_2010_133.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-13 | Name : SLES10: Security update for compat-openssl097g File : nvt/sles10_compat-openssl01.nasl |
2009-10-13 | Name : SLES10: Security update for liblcms,liblcms-devel File : nvt/sles10_liblcms0.nasl |
2009-10-13 | Name : SLES10: Security update for perl File : nvt/sles10_perl0.nasl |
2009-10-10 | Name : SLES9: Security update for CUPS File : nvt/sles9p5009377.nasl |
2009-10-10 | Name : SLES9: Security update for cups File : nvt/sles9p5009576.nasl |
2009-10-10 | Name : SLES9: Security update for libpng File : nvt/sles9p5012132.nasl |
2009-10-10 | Name : SLES9: Security update for file File : nvt/sles9p5014323.nasl |
2009-10-10 | Name : SLES9: Security update for perl File : nvt/sles9p5018078.nasl |
2009-10-10 | Name : SLES9: Security update for OpenSSL File : nvt/sles9p5019012.nasl |
2009-10-10 | Name : SLES9: Security update for libpng File : nvt/sles9p5020060.nasl |
2009-10-10 | Name : SLES9: Security update for liblcms,liblcms-devel File : nvt/sles9p5021001.nasl |
2009-06-03 | Name : Solaris Update for kernel 127127-11 File : nvt/gb_solaris_127127_11.nasl |
2009-06-03 | Name : Solaris Update for kernel 127128-11 File : nvt/gb_solaris_127128_11.nasl |
2009-05-05 | Name : HP-UX Update for Apache HPSBUX02292 File : nvt/gb_hp_ux_HPSBUX02292.nasl |
2009-05-05 | Name : HP-UX Update for OpenSSL HPSBUX02296 File : nvt/gb_hp_ux_HPSBUX02296.nasl |
2009-04-09 | Name : Mandriva Update for file MDKSA-2007:067 (file) File : nvt/gb_mandriva_MDKSA_2007_067.nasl |
2009-04-09 | Name : Mandriva Update for cups MDKSA-2007:086 (cups) File : nvt/gb_mandriva_MDKSA_2007_086.nasl |
2009-04-09 | Name : Mandriva Update for file MDKSA-2007:114 (file) File : nvt/gb_mandriva_MDKSA_2007_114.nasl |
2009-04-09 | Name : Mandriva Update for libpng MDKSA-2007:116 (libpng) File : nvt/gb_mandriva_MDKSA_2007_116.nasl |
2009-04-09 | Name : Mandriva Update for openssl MDKSA-2007:193 (openssl) File : nvt/gb_mandriva_MDKSA_2007_193.nasl |
2009-04-09 | Name : Mandriva Update for perl MDKSA-2007:207 (perl) File : nvt/gb_mandriva_MDKSA_2007_207.nasl |
2009-04-09 | Name : Mandriva Update for libpng MDKSA-2007:217 (libpng) File : nvt/gb_mandriva_MDKSA_2007_217.nasl |
2009-04-09 | Name : Mandriva Update for openssl MDKSA-2007:237 (openssl) File : nvt/gb_mandriva_MDKSA_2007_237.nasl |
2009-04-09 | Name : Mandriva Update for cups MDVSA-2008:036 (cups) File : nvt/gb_mandriva_MDVSA_2008_036.nasl |
2009-03-31 | Name : Debian Security Advisory DSA 1750-1 (libpng) File : nvt/deb_1750_1.nasl |
2009-03-23 | Name : Ubuntu Update for file vulnerability USN-439-1 File : nvt/gb_ubuntu_USN_439_1.nasl |
2009-03-23 | Name : Ubuntu Update for libpng vulnerability USN-472-1 File : nvt/gb_ubuntu_USN_472_1.nasl |
2009-03-23 | Name : Ubuntu Update for openssl vulnerabilities USN-522-1 File : nvt/gb_ubuntu_USN_522_1.nasl |
2009-03-23 | Name : Ubuntu Update for openssl vulnerability USN-534-1 File : nvt/gb_ubuntu_USN_534_1.nasl |
2009-03-23 | Name : Ubuntu Update for libpng vulnerabilities USN-538-1 File : nvt/gb_ubuntu_USN_538_1.nasl |
2009-03-23 | Name : Ubuntu Update for perl vulnerability USN-552-1 File : nvt/gb_ubuntu_USN_552_1.nasl |
2009-03-23 | Name : Ubuntu Update for cupsys vulnerabilities USN-563-1 File : nvt/gb_ubuntu_USN_563_1.nasl |
2009-03-23 | Name : Ubuntu Update for lcms vulnerability USN-652-1 File : nvt/gb_ubuntu_USN_652_1.nasl |
2009-03-07 | Name : Ubuntu USN-730-1 (libpng) File : nvt/ubuntu_730_1.nasl |
2009-02-27 | Name : Fedora Update for libpng10 FEDORA-2007-0001 File : nvt/gb_fedora_2007_0001_libpng10_fc7.nasl |
2009-02-27 | Name : Fedora Update for openssl FEDORA-2007-1444 File : nvt/gb_fedora_2007_1444_openssl_fc7.nasl |
2009-02-27 | Name : Fedora Update for libpng10 FEDORA-2007-2521 File : nvt/gb_fedora_2007_2521_libpng10_fc7.nasl |
2009-02-27 | Name : Fedora Update for openssl FEDORA-2007-2530 File : nvt/gb_fedora_2007_2530_openssl_fc7.nasl |
2009-02-27 | Name : Fedora Update for libpng FEDORA-2007-2666 File : nvt/gb_fedora_2007_2666_libpng_fc7.nasl |
2009-02-27 | Name : Fedora Update for cups FEDORA-2007-2982 File : nvt/gb_fedora_2007_2982_cups_fc8.nasl |
2009-02-27 | Name : Fedora Update for cups FEDORA-2007-3100 File : nvt/gb_fedora_2007_3100_cups_fc7.nasl |
2009-02-27 | Name : Fedora Update for perl FEDORA-2007-3218 File : nvt/gb_fedora_2007_3218_perl_fc8.nasl |
2009-02-27 | Name : Fedora Update for perl FEDORA-2007-3255 File : nvt/gb_fedora_2007_3255_perl_fc7.nasl |
2009-02-27 | Name : Fedora Update for file FEDORA-2007-391 File : nvt/gb_fedora_2007_391_file_fc6.nasl |
2009-02-27 | Name : Fedora Update for libpng FEDORA-2007-528 File : nvt/gb_fedora_2007_528_libpng_fc5.nasl |
2009-02-27 | Name : Fedora Update for libpng FEDORA-2007-529 File : nvt/gb_fedora_2007_529_libpng_fc6.nasl |
2009-02-27 | Name : Fedora Update for openssl FEDORA-2007-661 File : nvt/gb_fedora_2007_661_openssl_fc6.nasl |
2009-02-27 | Name : Fedora Update for openssl FEDORA-2007-725 File : nvt/gb_fedora_2007_725_openssl_fc6.nasl |
2009-02-27 | Name : Fedora Update for libpng FEDORA-2007-734 File : nvt/gb_fedora_2007_734_libpng_fc6.nasl |
2009-02-27 | Name : Fedora Update for perl FEDORA-2007-748 File : nvt/gb_fedora_2007_748_perl_fc6.nasl |
2009-02-17 | Name : Fedora Update for perl FEDORA-2008-3392 File : nvt/gb_fedora_2008_3392_perl_fc8.nasl |
2009-02-17 | Name : Fedora Update for perl FEDORA-2008-3399 File : nvt/gb_fedora_2008_3399_perl_fc7.nasl |
2009-02-17 | Name : Fedora Update for libpng10 FEDORA-2008-3979 File : nvt/gb_fedora_2008_3979_libpng10_fc7.nasl |
2009-02-17 | Name : Fedora Update for libpng FEDORA-2008-4947 File : nvt/gb_fedora_2008_4947_libpng_fc7.nasl |
2009-01-28 | Name : SuSE Update for file SUSE-SA:2007:040 File : nvt/gb_suse_2007_040.nasl |
2009-01-23 | Name : SuSE Update for cups SUSE-SA:2008:002 File : nvt/gb_suse_2008_002.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200703-26 (file) File : nvt/glsa_200703_26.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200703-28 (cups) File : nvt/glsa_200703_28.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200704-13 (file) File : nvt/glsa_200704_13.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200705-24 (libpng) File : nvt/glsa_200705_24.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200710-06 (openssl) File : nvt/glsa_200710_06.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200710-19 (sleuthkit) File : nvt/glsa_200710_19.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200710-30 (openssl) File : nvt/glsa_200710_30.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200711-08 (libpng) File : nvt/glsa_200711_08.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200711-28 (perl) File : nvt/glsa_200711_28.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200712-14 (cups) File : nvt/glsa_200712_14.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200805-07 (ltsp) File : nvt/glsa_200805_07.nasl |
2008-09-04 | Name : FreeBSD Ports: cups-base File : nvt/freebsd_cups-base5.nasl |
2008-09-04 | Name : FreeBSD Ports: file File : nvt/freebsd_file.nasl |
2008-09-04 | Name : FreeBSD Ports: perl, perl-threaded File : nvt/freebsd_perl2.nasl |
2008-09-04 | Name : FreeBSD Ports: png File : nvt/freebsd_png0.nasl |
2008-09-04 | Name : FreeBSD Ports: png File : nvt/freebsd_png1.nasl |
2008-09-04 | Name : FreeBSD Security Advisory (FreeBSD-SA-07:04.file.asc) File : nvt/freebsdsa_file.nasl |
2008-09-04 | Name : FreeBSD Security Advisory (FreeBSD-SA-07:08.openssl.asc) File : nvt/freebsdsa_openssl5.nasl |
2008-08-15 | Name : Debian Security Advisory DSA 1613-1 (libgd2) File : nvt/deb_1613_1.nasl |
2008-05-27 | Name : Debian Security Advisory DSA 1571-1 (openssl) File : nvt/deb_1571_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1343-2 (file) File : nvt/deb_1343_2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1379-1 (openssl) File : nvt/deb_1379_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1379-2 (openssl097, openssl096) File : nvt/deb_1379_2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1400-1 (perl) File : nvt/deb_1400_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1437-1 (cupsys) File : nvt/deb_1437_1.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2007-093-01 file [and bin package] File : nvt/esoft_slk_ssa_2007_093_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2007-136-01 libpng File : nvt/esoft_slk_ssa_2007_136_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2007-325-01 libpng File : nvt/esoft_slk_ssa_2007_325_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2007-325-01a libpng for Slackware 10.1 and 10.2 File : nvt/esoft_slk_ssa_2007_325_01a.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2010-180-01 libpng File : nvt/esoft_slk_ssa_2010_180_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66600 | Mozilla Multiple Products PNG File Handling Overflow |
65852 | libpng pngpread.c PNG Image Data Height Overflow |
40719 | CUPS SNMP Back End (backend/snmp.c) asn1_get_string Function Crafted SNMP Res... |
40409 | Perl Regular Expression Engine (regcomp.c) Polymorphic opcode Support UTF Reg... |
38274 | libpng Chunk Handlers PNG Handling Multiple Method DoS |
38273 | libpng pngrtran.c Crafted PNG Multiple Method DoS |
38272 | libpng pngset.c png_set_iCCP Function PNG Handling Off-by-one DoS |
37895 | OpenSSL DTLS Implementation Unspecified Off-by-one Remote Code Execution |
37055 | OpenSSL crypto/bn/bn_mont.c BN_from_montgomery Function Local RSA Key Disclosure |
36196 | libpng png_handle_tRNS Function tRNS Chunk DoS |
36179 | Little CMS (lcms) ICC Profile Parsing Overflow |
34995 | GNU file Crafted Document Handling Local DoS |
34285 | Ian Darwin file file_printf() Local Underflow |
34072 | CUPS Incomplete SSL Negotiation Remote DoS |
29262 | OpenSSL SSL_get_shared_ciphers Function Unspecified Remote Overflow A remote overflow exists in OpenSSL. OpenSSL contains an unspecified issue in the SSL_get_shared_ciphers function. With a specially crafted request, an attacker can cause an unspecified impact. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2014-12-11 | IAVM : 2014-B-0161 - Multiple Vulnerabilities in VMware ESXi 5.1 Severity : Category I - VMSKEY : V0057717 |
2014-05-01 | IAVM : 2014-A-0063 - Multiple Vulnerabilities in McAfee VirusScan Enterprise for Linux Severity : Category I - VMSKEY : V0050009 |
2014-05-01 | IAVM : 2014-A-0062 - Multiple Vulnerabilities In McAfee Email Gateway Severity : Category I - VMSKEY : V0050005 |
2014-05-01 | IAVM : 2014-B-0050 - McAfee Web Gateway Information Disclosure Vulnerability Severity : Category I - VMSKEY : V0050003 |
2014-04-24 | IAVM : 2014-B-0046 - Multiple Vulnerabilities in HP System Management Homepage (SMH) Severity : Category I - VMSKEY : V0049737 |
2014-04-17 | IAVM : 2014-A-0055 - Multiple Vulnerabilities in Oracle Fusion Middleware Severity : Category I - VMSKEY : V0049585 |
2014-04-17 | IAVM : 2014-A-0057 - Multiple Vulnerabilities in Oracle MySQL Products Severity : Category I - VMSKEY : V0049591 |
2014-04-17 | IAVM : 2014-A-0053 - Multiple Vulnerabilities in Juniper Network JUNOS Severity : Category I - VMSKEY : V0049589 |
2014-04-17 | IAVM : 2014-A-0054 - Multiple Vulnerabilities in Oracle Database Severity : Category I - VMSKEY : V0049587 |
2014-04-17 | IAVM : 2014-A-0056 - Multiple Vulnerabilities in Oracle Java SE Severity : Category I - VMSKEY : V0049583 |
2014-04-17 | IAVM : 2014-A-0058 - Multiple Vulnerabilities in Oracle & Sun Systems Product Suite Severity : Category I - VMSKEY : V0049579 |
2014-04-17 | IAVM : 2014-B-0041 - Multiple Vulnerabilities in Splunk Severity : Category I - VMSKEY : V0049577 |
2014-04-17 | IAVM : 2014-B-0042 - Stunnel Information Disclosure Vulnerability Severity : Category I - VMSKEY : V0049575 |
2014-04-10 | IAVM : 2014-A-0051 - OpenSSL Information Disclosure Vulnerability Severity : Category I - VMSKEY : V0048667 |
2014-01-30 | IAVM : 2014-A-0017 - Multiple Vulnerabilities in Cisco TelePresence Video Communication Server Severity : Category I - VMSKEY : V0043846 |
2014-01-30 | IAVM : 2014-A-0019 - Multiple Vulnerabilities in VMware Fusion Severity : Category I - VMSKEY : V0043844 |
2013-11-21 | IAVM : 2013-A-0222 - Multiple Vulnerabilties in VMware Workstation Severity : Category II - VMSKEY : V0042383 |
2012-06-28 | IAVM : 2012-A-0104 - Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client Severity : Category I - VMSKEY : V0033046 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | SSLv2 openssl get shared ciphers overflow attempt RuleID : 8440 - Revision : 11 - Type : IMAP |
2014-01-10 | SSLv3 openssl get shared ciphers overflow attempt RuleID : 8439 - Revision : 16 - Type : IMAP |
2014-01-10 | SSLv2 openssl get shared ciphers overflow attempt RuleID : 8438 - Revision : 16 - Type : IMAP |
2014-01-10 | SSLv2 openssl get shared ciphers overflow attempt RuleID : 8437 - Revision : 15 - Type : SMTP |
2014-01-10 | SSLv2 openssl get shared ciphers overflow attempt RuleID : 8436 - Revision : 14 - Type : SMTP |
2014-01-10 | SSLv3 openssl get shared ciphers overflow attempt RuleID : 8435 - Revision : 16 - Type : SMTP |
2014-01-10 | SSLv3 openssl get shared ciphers overflow attempt RuleID : 8434 - Revision : 16 - Type : SMTP |
2014-01-10 | SSLv2 openssl get shared ciphers overflow attempt RuleID : 8433 - Revision : 15 - Type : SMTP |
2014-01-10 | SSLv2 openssl get shared ciphers overflow attempt RuleID : 8432 - Revision : 15 - Type : SMTP |
2014-01-10 | SSLv2 openssl get shared ciphers overflow attempt RuleID : 8431 - Revision : 14 - Type : POP3 |
2014-01-10 | SSLv3 openssl get shared ciphers overflow attempt RuleID : 8430 - Revision : 15 - Type : POP3 |
2014-01-10 | SSLv2 openssl get shared ciphers overflow attempt RuleID : 8429 - Revision : 14 - Type : POP3 |
2014-01-10 | SSLv2 openssl get shared ciphers overflow attempt RuleID : 8428 - Revision : 21 - Type : SERVER-OTHER |
2014-01-10 | SSLv2 openssl get shared ciphers overflow attempt RuleID : 8427 - Revision : 18 - Type : MISC |
2014-01-10 | SSLv3 openssl get shared ciphers overflow attempt RuleID : 8426 - Revision : 20 - Type : SERVER-OTHER |
2019-12-24 | Mutiple products libpng extra row heap overflow attempt RuleID : 52307 - Revision : 1 - Type : FILE-IMAGE |
2019-12-24 | Mutiple products libpng extra row heap overflow attempt RuleID : 52306 - Revision : 1 - Type : FILE-IMAGE |
2014-04-25 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30788-community - Revision : 5 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30788 - Revision : 5 - Type : SERVER-OTHER |
2014-04-25 | OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30787-community - Revision : 5 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30787 - Revision : 5 - Type : SERVER-OTHER |
2014-04-25 | OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30786-community - Revision : 4 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30786 - Revision : 4 - Type : SERVER-OTHER |
2014-04-25 | OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30785-community - Revision : 4 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30785 - Revision : 4 - Type : SERVER-OTHER |
2014-04-25 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30784-community - Revision : 4 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30784 - Revision : 4 - Type : SERVER-OTHER |
2014-04-25 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30783-community - Revision : 4 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30783 - Revision : 4 - Type : SERVER-OTHER |
2014-04-25 | OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30782-community - Revision : 4 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30782 - Revision : 4 - Type : SERVER-OTHER |
2014-04-25 | OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30781-community - Revision : 5 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30781 - Revision : 5 - Type : SERVER-OTHER |
2014-04-25 | OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30780-community - Revision : 4 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30780 - Revision : 4 - Type : SERVER-OTHER |
2014-04-25 | OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30779-community - Revision : 4 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30779 - Revision : 4 - Type : SERVER-OTHER |
2014-04-25 | OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30778-community - Revision : 4 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30778 - Revision : 4 - Type : SERVER-OTHER |
2014-04-25 | OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30777-community - Revision : 4 - Type : SERVER-OTHER |
2014-05-24 | OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30777 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed at... RuleID : 30742 - Revision : 2 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed at... RuleID : 30741 - Revision : 3 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed at... RuleID : 30740 - Revision : 2 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed at... RuleID : 30739 - Revision : 3 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30738 - Revision : 2 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30737 - Revision : 3 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30736 - Revision : 2 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30735 - Revision : 3 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.2 heartbeat read overrun attempt RuleID : 30734 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.2 heartbeat read overrun attempt RuleID : 30733 - Revision : 5 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.1 heartbeat read overrun attempt RuleID : 30732 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.1 heartbeat read overrun attempt RuleID : 30731 - Revision : 5 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1 heartbeat read overrun attempt RuleID : 30730 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1 heartbeat read overrun attempt RuleID : 30729 - Revision : 5 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL SSLv3 heartbeat read overrun attempt RuleID : 30728 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL SSLv3 heartbeat read overrun attempt RuleID : 30727 - Revision : 5 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed at... RuleID : 30726 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed at... RuleID : 30725 - Revision : 3 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed at... RuleID : 30724 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed at... RuleID : 30723 - Revision : 3 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30722 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30721 - Revision : 3 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30720 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30719 - Revision : 3 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.2 heartbeat read overrun attempt RuleID : 30718 - Revision : 5 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.2 heartbeat read overrun attempt RuleID : 30717 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.1 heartbeat read overrun attempt RuleID : 30716 - Revision : 5 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1.1 heartbeat read overrun attempt RuleID : 30715 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1 heartbeat read overrun attempt RuleID : 30714 - Revision : 5 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL TLSv1 heartbeat read overrun attempt RuleID : 30713 - Revision : 4 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL SSLv3 heartbeat read overrun attempt RuleID : 30712 - Revision : 5 - Type : SERVER-OTHER |
2014-05-17 | OpenVPN OpenSSL SSLv3 heartbeat read overrun attempt RuleID : 30711 - Revision : 4 - Type : SERVER-OTHER |
2014-04-15 | OpenSSL Heartbleed masscan access exploitation attempt RuleID : 30549-community - Revision : 2 - Type : SERVER-OTHER |
2014-05-15 | OpenSSL Heartbleed masscan access exploitation attempt RuleID : 30549 - Revision : 2 - Type : SERVER-OTHER |
2014-04-11 | OpenSSL TLSv1.2 heartbeat read overrun attempt RuleID : 30525-community - Revision : 4 - Type : SERVER-OTHER |
2014-05-11 | OpenSSL TLSv1.2 heartbeat read overrun attempt RuleID : 30525 - Revision : 4 - Type : SERVER-OTHER |
2014-04-11 | OpenSSL TLSv1.1 heartbeat read overrun attempt RuleID : 30524-community - Revision : 5 - Type : SERVER-OTHER |
2014-05-11 | OpenSSL TLSv1.1 heartbeat read overrun attempt RuleID : 30524 - Revision : 5 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL TLSv1.2 heartbeat read overrun attempt - vulnerable client response RuleID : 30523-community - Revision : 9 - Type : SERVER-OTHER |
2014-05-10 | OpenSSL TLSv1.2 heartbeat read overrun attempt - vulnerable client response RuleID : 30523 - Revision : 9 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL TLSv1.1 heartbeat read overrun attempt - vulnerable client response RuleID : 30522-community - Revision : 9 - Type : SERVER-OTHER |
2014-05-10 | OpenSSL TLSv1.1 heartbeat read overrun attempt - vulnerable client response RuleID : 30522 - Revision : 9 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL TLSv1 heartbeat read overrun attempt - vulnerable client response RuleID : 30521-community - Revision : 9 - Type : SERVER-OTHER |
2014-05-10 | OpenSSL TLSv1 heartbeat read overrun attempt - vulnerable client response RuleID : 30521 - Revision : 9 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL SSLv3 heartbeat read overrun attempt - vulnerable client response RuleID : 30520-community - Revision : 9 - Type : SERVER-OTHER |
2014-05-10 | OpenSSL SSLv3 heartbeat read overrun attempt - vulnerable client response RuleID : 30520 - Revision : 9 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30517-community - Revision : 11 - Type : SERVER-OTHER |
2014-05-08 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30517 - Revision : 11 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30516-community - Revision : 11 - Type : SERVER-OTHER |
2014-05-08 | OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30516 - Revision : 11 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30515-community - Revision : 11 - Type : SERVER-OTHER |
2014-05-08 | OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30515 - Revision : 11 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30514-community - Revision : 11 - Type : SERVER-OTHER |
2014-05-08 | OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30514 - Revision : 11 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL TLSv1.2 heartbeat read overrun attempt RuleID : 30513-community - Revision : 8 - Type : SERVER-OTHER |
2014-05-08 | OpenSSL TLSv1.2 heartbeat read overrun attempt RuleID : 30513 - Revision : 8 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL TLSv1.1 heartbeat read overrun attempt RuleID : 30512-community - Revision : 8 - Type : SERVER-OTHER |
2014-05-08 | OpenSSL TLSv1.1 heartbeat read overrun attempt RuleID : 30512 - Revision : 8 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL TLSv1 heartbeat read overrun attempt RuleID : 30511-community - Revision : 8 - Type : SERVER-OTHER |
2014-05-08 | OpenSSL TLSv1 heartbeat read overrun attempt RuleID : 30511 - Revision : 8 - Type : SERVER-OTHER |
2014-04-10 | OpenSSL SSLv3 heartbeat read overrun attempt RuleID : 30510-community - Revision : 8 - Type : SERVER-OTHER |
2014-05-08 | OpenSSL SSLv3 heartbeat read overrun attempt RuleID : 30510 - Revision : 8 - Type : SERVER-OTHER |
2014-03-15 | XML exponential entity expansion attack attempt RuleID : 29800 - Revision : 4 - Type : FILE-OTHER |
2014-01-10 | XML exponential entity expansion attack attempt RuleID : 27096 - Revision : 5 - Type : FILE-OTHER |
2014-01-10 | libpng malformed chunk denial of service attempt RuleID : 14772 - Revision : 7 - Type : FILE-IMAGE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-04 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_esx_VMSA-2013-0009_remote.nasl - Type : ACT_GATHER_INFO |
2015-12-30 | Name : The remote VMware ESXi host is missing a security-related patch. File : vmware_VMSA-2014-0004_remote.nasl - Type : ACT_GATHER_INFO |
2015-12-30 | Name : The remote VMware ESXi host is missing a security-related patch. File : vmware_VMSA-2014-0012_remote.nasl - Type : ACT_GATHER_INFO |
2015-09-18 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL8106.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-1627-1.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-062.nasl - Type : ACT_GATHER_INFO |
2015-03-12 | Name : The remote host has software installed that is affected by multiple vulnerabi... File : ibm_rational_clearquest_8_0_1_3_01.nasl - Type : ACT_GATHER_INFO |
2015-01-27 | Name : The remote web server is affected by multiple vulnerabilities. File : oracle_http_server_cpu_jan_2015.nasl - Type : ACT_GATHER_INFO |
2015-01-23 | Name : The remote device is missing a vendor-supplied security patch. File : juniper_jsa10669.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_libxml2_20130716.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_libxml2_20140731.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_openssl_20140731.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-08.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-11.nasl - Type : ACT_GATHER_INFO |
2014-12-12 | Name : The remote VMware ESXi 5.1 host is affected by multiple vulnerabilities. File : vmware_esxi_5_1_build_2323236_remote.nasl - Type : ACT_GATHER_INFO |
2014-12-06 | Name : The remote VMware ESXi host is missing a security-related patch. File : vmware_VMSA-2014-0012.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2014-0031.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2014-0032.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-0636.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0377.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0378.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0396.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0416.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-340.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15159.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL8108.nasl - Type : ACT_GATHER_INFO |
2014-08-29 | Name : The remote host has software installed that is affected by an information dis... File : kaspersky_internet_security_heartbleed.nasl - Type : ACT_GATHER_INFO |
2014-08-10 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9308.nasl - Type : ACT_GATHER_INFO |
2014-08-07 | Name : The remote Windows host has an application that is affected by an information... File : hp_loadrunner_12_00_1.nasl - Type : ACT_GATHER_INFO |
2014-08-06 | Name : The remote host contains software that is affected by an information disclosu... File : hp_vca_SSRT101531-rhel.nasl - Type : ACT_GATHER_INFO |
2014-08-06 | Name : The remote host contains software that is affected by an information disclosu... File : hp_vca_SSRT101531-sles.nasl - Type : ACT_GATHER_INFO |
2014-08-06 | Name : The remote host contains software that is affected by an information disclosu... File : hp_vca_SSRT101531.nasl - Type : ACT_GATHER_INFO |
2014-08-06 | Name : The remote host contains software that is affected by an information disclosu... File : hp_vcrm_SSRT101531.nasl - Type : ACT_GATHER_INFO |
2014-07-15 | Name : The remote host is affected by an information disclosure vulnerability. File : hp_onboard_admin_heartbleed_versions.nasl - Type : ACT_GATHER_INFO |
2014-07-15 | Name : The remote host contains an application that is affected by an information di... File : libreoffice_423.nasl - Type : ACT_GATHER_INFO |
2014-07-15 | Name : The remote host contains an application that is affected by an information di... File : macosx_libreoffice_423.nasl - Type : ACT_GATHER_INFO |
2014-07-14 | Name : The remote mail server is potentially affected by multiple vulnerabilities. File : ipswitch_imail_12_4_1_15.nasl - Type : ACT_GATHER_INFO |
2014-07-10 | Name : The remote Windows host has migration software installed that is affected by ... File : hp_insight_control_server_migration_7_3_2.nasl - Type : ACT_GATHER_INFO |
2014-07-08 | Name : The remote mail server is affected by the Heartbleed vulnerability File : kerio_connect_824.nasl - Type : ACT_GATHER_INFO |
2014-06-30 | Name : An application on the remote host is affected by an information disclosure vu... File : attachmate_reflection_heartbleed.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-237.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-263.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-374.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-592.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-277.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-318.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-398.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_MozillaFirefox-100727.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_MozillaThunderbird-100721.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_mozilla-xulrunner191-100722.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_seamonkey-100721.nasl - Type : ACT_GATHER_INFO |
2014-06-12 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2014-123.nasl - Type : ACT_GATHER_INFO |
2014-06-02 | Name : The remote HP OfficeJet printer is affected by an information disclosure vuln... File : hp_officejet_pro_heartbleed.nasl - Type : ACT_GATHER_INFO |
2014-06-02 | Name : The remote web server hosts a virtual appliance that is affected by multiple ... File : wd_arkeia_10_1_19_ver_check.nasl - Type : ACT_GATHER_INFO |
2014-05-27 | Name : An application on the remote host is affected by an information disclosure vu... File : attachmate_reflection_x_heartbleed.nasl - Type : ACT_GATHER_INFO |
2014-05-20 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0513.nasl - Type : ACT_GATHER_INFO |
2014-05-20 | Name : A clustered file system on the remote host is affected by multiple vulnerabil... File : ibm_gpfs_isg3T1020683.nasl - Type : ACT_GATHER_INFO |
2014-05-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0513.nasl - Type : ACT_GATHER_INFO |
2014-05-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0513.nasl - Type : ACT_GATHER_INFO |
2014-05-20 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140519_libxml2_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-05-16 | Name : The host is affected by an information disclosure vulnerability. File : bluecoat_proxy_av_3_5_1_9.nasl - Type : ACT_GATHER_INFO |
2014-05-14 | Name : The version of Cisco TelePresence Video Communication Server installed on the... File : cisco-vcs-CSCuo16472.nasl - Type : ACT_GATHER_INFO |
2014-05-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_e7bb3885da4011e39ecb2c4138874f7d.nasl - Type : ACT_GATHER_INFO |
2014-05-12 | Name : An application on the remote host is affected by an information disclosure vu... File : attachmate_reflection_secure_it_for_win_client_heartbleed.nasl - Type : ACT_GATHER_INFO |
2014-05-12 | Name : The version of Symantec Endpoint Protection Manager installed on the remote h... File : symantec_endpoint_prot_mgr_12_1_ru4_mp1a.nasl - Type : ACT_GATHER_INFO |
2014-05-08 | Name : The remote VMware ESXi 5.5 host is potentially affected by multiple vulnerabi... File : vmware_esxi_5_5_build_1746974_remote.nasl - Type : ACT_GATHER_INFO |
2014-05-06 | Name : The remote host has a device management application installed that is affecte... File : vmware_horizon_workspace_vmsa2014-0004.nasl - Type : ACT_GATHER_INFO |
2014-05-05 | Name : The remote host has VPN client software installed that is affected by an info... File : smb_kb2962393.nasl - Type : ACT_GATHER_INFO |
2014-05-03 | Name : The remote host is affected by an information disclosure vulnerability. File : mcafee_vsel_SB10071.nasl - Type : ACT_GATHER_INFO |
2014-05-03 | Name : The remote VMware ESXi host is missing one or more security-related patches. File : vmware_VMSA-2014-0004.nasl - Type : ACT_GATHER_INFO |
2014-05-02 | Name : The remote host is affected by an information disclosure vulnerability. File : mcafee_email_gateway_SB10071.nasl - Type : ACT_GATHER_INFO |
2014-05-02 | Name : The remote host is affected by an information disclosure vulnerability. File : mcafee_epo_sb10071.nasl - Type : ACT_GATHER_INFO |
2014-05-02 | Name : The remote host is affected by an information disclosure vulnerability. File : mcafee_firewall_enterprise_SB10071.nasl - Type : ACT_GATHER_INFO |
2014-05-02 | Name : The remote host is affected by an information disclosure vulnerability. File : mcafee_ngfw_SB10071.nasl - Type : ACT_GATHER_INFO |
2014-05-02 | Name : The remote host is affected by an information disclosure vulnerability. File : mcafee_web_gateway_SB10071.nasl - Type : ACT_GATHER_INFO |
2014-04-30 | Name : The remote Fedora host is missing a security update. File : fedora_2014-5321.nasl - Type : ACT_GATHER_INFO |
2014-04-30 | Name : The remote Fedora host is missing a security update. File : fedora_2014-5337.nasl - Type : ACT_GATHER_INFO |
2014-04-29 | Name : The remote host has an email security application installed that is affected ... File : websense_email_security_heartbleed.nasl - Type : ACT_GATHER_INFO |
2014-04-29 | Name : The remote host contains a web application that is affected by an information... File : websense_web_security_heartbleed.nasl - Type : ACT_GATHER_INFO |
2014-04-29 | Name : The remote Windows host has an application that is affected by an information... File : blackberry_es_UDS_kb35882.nasl - Type : ACT_GATHER_INFO |
2014-04-22 | Name : An application on the remote host is affected by an information disclosure vu... File : openvpn_2_3_3_0.nasl - Type : ACT_GATHER_INFO |
2014-04-21 | Name : The remote FTP server is affected by an information disclosure vulnerability. File : filezilla_server_0944.nasl - Type : ACT_GATHER_INFO |
2014-04-21 | Name : The remote host has a virtualization application that is affected by multiple... File : macosx_fusion_6_0_3.nasl - Type : ACT_GATHER_INFO |
2014-04-21 | Name : The remote host contains software that is affected by multiple vulnerabilities. File : vmware_player_linux_6_0_2.nasl - Type : ACT_GATHER_INFO |
2014-04-21 | Name : The remote host contains software that is affected by multiple vulnerabilities. File : vmware_player_multiple_vmsa_2014-0004.nasl - Type : ACT_GATHER_INFO |
2014-04-21 | Name : The remote host has a virtualization application that is affected by multiple... File : vmware_workstation_linux_10_0_2.nasl - Type : ACT_GATHER_INFO |
2014-04-21 | Name : The remote host has a virtualization application that is affected by multiple... File : vmware_workstation_multiple_vmsa_2014_0004.nasl - Type : ACT_GATHER_INFO |
2014-04-18 | Name : The remote Windows host has an application that is affected by multiple vulne... File : winscp_5_5_3.nasl - Type : ACT_GATHER_INFO |
2014-04-18 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_3_2.nasl - Type : ACT_GATHER_INFO |
2014-04-18 | Name : The remote device is missing a vendor-supplied security patch. File : juniper_jsa10623.nasl - Type : ACT_GATHER_INFO |
2014-04-18 | Name : The remote device is affected by an information disclosure vulnerability. File : junos_pulse_jsa10623.nasl - Type : ACT_GATHER_INFO |
2014-04-16 | Name : The remote Fedora host is missing a security update. File : fedora_2014-4999.nasl - Type : ACT_GATHER_INFO |
2014-04-16 | Name : The remote web server contains an application that is affected by multiple Op... File : splunk_603.nasl - Type : ACT_GATHER_INFO |
2014-04-15 | Name : The remote device is potentially affected by an information disclosure vulner... File : bluecoat_proxy_sg_6_5_3_6.nasl - Type : ACT_GATHER_INFO |
2014-04-15 | Name : The remote Fedora host is missing a security update. File : fedora_2014-4982.nasl - Type : ACT_GATHER_INFO |
2014-04-14 | Name : The remote service is affected by an information disclosure vulnerability. File : openvpn_heartbleed.nasl - Type : ACT_ATTACK |
2014-04-14 | Name : The remote Windows host contains a program that is affected by an information... File : stunnel_5_01.nasl - Type : ACT_GATHER_INFO |
2014-04-11 | Name : The remote AIX host is running a vulnerable version of OpenSSL. File : aix_openssl_advisory7.nasl - Type : ACT_GATHER_INFO |
2014-04-11 | Name : The remote host is affected by an information disclosure vulnerability. File : fortinet_FG-IR-14-011.nasl - Type : ACT_GATHER_INFO |
2014-04-09 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-320.nasl - Type : ACT_GATHER_INFO |
2014-04-09 | Name : The remote Fedora host is missing a security update. File : fedora_2014-4879.nasl - Type : ACT_GATHER_INFO |
2014-04-09 | Name : The remote Fedora host is missing a security update. File : fedora_2014-4910.nasl - Type : ACT_GATHER_INFO |
2014-04-08 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2014-098-01.nasl - Type : ACT_GATHER_INFO |
2014-04-08 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0376.nasl - Type : ACT_GATHER_INFO |
2014-04-08 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2896.nasl - Type : ACT_GATHER_INFO |
2014-04-08 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_5631ae98be9e11e3b5e3c80aa9043978.nasl - Type : ACT_GATHER_INFO |
2014-04-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201404-07.nasl - Type : ACT_GATHER_INFO |
2014-04-08 | Name : The remote service may be affected by multiple vulnerabilities. File : openssl_1_0_1g.nasl - Type : ACT_GATHER_INFO |
2014-04-08 | Name : The remote service is affected by an information disclosure vulnerability. File : openssl_heartbleed.nasl - Type : ACT_ATTACK |
2014-04-08 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0376.nasl - Type : ACT_GATHER_INFO |
2014-04-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0376.nasl - Type : ACT_GATHER_INFO |
2014-04-08 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140408_openssl_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-04-08 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2165-1.nasl - Type : ACT_GATHER_INFO |
2014-01-29 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libxml2-140106.nasl - Type : ACT_GATHER_INFO |
2014-01-20 | Name : The remote VMware ESXi 5.1 host is affected by multiple vulnerabilities. File : vmware_esxi_5_1_build_1483097_remote.nasl - Type : ACT_GATHER_INFO |
2013-11-13 | Name : The remote VMware ESXi 5.0 host is affected by multiple security vulnerabilit... File : vmware_esxi_5_0_build_1311177_remote.nasl - Type : ACT_GATHER_INFO |
2013-11-11 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201311-06.nasl - Type : ACT_GATHER_INFO |
2013-10-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2779.nasl - Type : ACT_GATHER_INFO |
2013-09-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201309-16.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-188.nasl - Type : ACT_GATHER_INFO |
2013-08-02 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2013-0009.nasl - Type : ACT_GATHER_INFO |
2013-07-25 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-198.nasl - Type : ACT_GATHER_INFO |
2013-07-19 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2724.nasl - Type : ACT_GATHER_INFO |
2013-07-18 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1904-2.nasl - Type : ACT_GATHER_INFO |
2013-07-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1904-1.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2007-0123.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2007-0124.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2007-0356.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2007-0391.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2007-0813.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2007-0964.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2007-0966.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2007-0992.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0534.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0546.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0547.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0581.nasl - Type : ACT_GATHER_INFO |
2013-07-11 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_3b80104fe96c11e28bac00262d5ed8ee.nasl - Type : ACT_GATHER_INFO |
2013-07-10 | Name : The remote host contains a web browser that is affected by multiple vulnerabi... File : google_chrome_28_0_1500_71.nasl - Type : ACT_GATHER_INFO |
2013-06-29 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-1003.nasl - Type : ACT_GATHER_INFO |
2013-05-08 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1817-1.nasl - Type : ACT_GATHER_INFO |
2013-05-03 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libxml2-130320.nasl - Type : ACT_GATHER_INFO |
2013-05-03 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libxml2-8513.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-056.nasl - Type : ACT_GATHER_INFO |
2013-04-08 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_843a4641981611e29c51080027019be0.nasl - Type : ACT_GATHER_INFO |
2013-03-29 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1782-1.nasl - Type : ACT_GATHER_INFO |
2013-03-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2652.nasl - Type : ACT_GATHER_INFO |
2013-03-08 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1757-1.nasl - Type : ACT_GATHER_INFO |
2013-03-05 | Name : The remote Fedora host is missing a security update. File : fedora_2013-2916.nasl - Type : ACT_GATHER_INFO |
2013-03-04 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0581.nasl - Type : ACT_GATHER_INFO |
2013-03-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0581.nasl - Type : ACT_GATHER_INFO |
2013-03-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130228_libxml2_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-02-25 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_21c59f5e7cc511e29c11080027a5ec9a.nasl - Type : ACT_GATHER_INFO |
2013-02-22 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1734-1.nasl - Type : ACT_GATHER_INFO |
2013-02-21 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1730-1.nasl - Type : ACT_GATHER_INFO |
2013-02-21 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1731-1.nasl - Type : ACT_GATHER_INFO |
2013-01-30 | Name : The remote AIX host is missing a security patch. File : aix_IZ10244.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0545.nasl - Type : ACT_GATHER_INFO |
2013-01-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201301-01.nasl - Type : ACT_GATHER_INFO |
2012-10-01 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201209-25.nasl - Type : ACT_GATHER_INFO |
2012-09-24 | Name : The remote Fedora host is missing a security update. File : fedora_2007-0004.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20070517_libpng_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20070530_file_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071012_openssl_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071022_openssl_on_SL3.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071023_libpng_on_SL3.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071023_libpng_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071105_perl_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071105_perl_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071115_openssl_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100714_libpng_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100720_firefox_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100720_seamonkey_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20100720_thunderbird_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-01-04 | Name : The remote server is affected by an unspecified buffer overflow vulnerability. File : openssl_0_9_7m_0_9_8e.nasl - Type : ACT_GATHER_INFO |
2012-01-04 | Name : The remote server is affected by multiple vulnerabilities. File : openssl_0_9_8f.nasl - Type : ACT_GATHER_INFO |
2011-08-11 | Name : The remote Windows host has an application that is affected by multiple vulne... File : blackberry_es_png_kb27244.nasl - Type : ACT_GATHER_INFO |
2011-03-10 | Name : The remote host contains a web browser that is affected by several vulnerabil... File : safari_5_0_4.nasl - Type : ACT_GATHER_INFO |
2011-03-03 | Name : The remote host contains an application that has multiple vulnerabilities. File : itunes_10_2.nasl - Type : ACT_GATHER_INFO |
2011-03-03 | Name : The remote host contains a multimedia application that has multiple vulnerabi... File : itunes_10_2_banner.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_MozillaFirefox-100722.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libpng-devel-100901.nasl - Type : ACT_GATHER_INFO |
2010-11-10 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_6_5.nasl - Type : ACT_GATHER_INFO |
2010-11-10 | Name : The remote host is missing a Mac OS X update that fixes security issues. File : macosx_SecUpd2010-007.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_MozillaFirefox-7101.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libpng-7144.nasl - Type : ACT_GATHER_INFO |
2010-10-06 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201010-01.nasl - Type : ACT_GATHER_INFO |
2010-09-12 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12642.nasl - Type : ACT_GATHER_INFO |
2010-09-12 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_libpng-devel-100901.nasl - Type : ACT_GATHER_INFO |
2010-09-12 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_libpng-devel-100901.nasl - Type : ACT_GATHER_INFO |
2010-08-24 | Name : The remote host is missing a Mac OS X update that fixes security issues. File : macosx_SecUpd2010-005.nasl - Type : ACT_GATHER_INFO |
2010-08-17 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0546.nasl - Type : ACT_GATHER_INFO |
2010-07-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-133.nasl - Type : ACT_GATHER_INFO |
2010-07-30 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_MozillaFirefox-100722.nasl - Type : ACT_GATHER_INFO |
2010-07-30 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_MozillaFirefox-100722.nasl - Type : ACT_GATHER_INFO |
2010-07-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2075.nasl - Type : ACT_GATHER_INFO |
2010-07-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0534.nasl - Type : ACT_GATHER_INFO |
2010-07-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0546.nasl - Type : ACT_GATHER_INFO |
2010-07-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0547.nasl - Type : ACT_GATHER_INFO |
2010-07-28 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_MozillaThunderbird-100721.nasl - Type : ACT_GATHER_INFO |
2010-07-27 | Name : The remote Fedora host is missing a security update. File : fedora_2010-10776.nasl - Type : ACT_GATHER_INFO |
2010-07-27 | Name : The remote Fedora host is missing a security update. File : fedora_2010-10793.nasl - Type : ACT_GATHER_INFO |
2010-07-27 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_seamonkey-100721.nasl - Type : ACT_GATHER_INFO |
2010-07-27 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-957-2.nasl - Type : ACT_GATHER_INFO |
2010-07-27 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-958-1.nasl - Type : ACT_GATHER_INFO |
2010-07-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-930-4.nasl - Type : ACT_GATHER_INFO |
2010-07-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-930-5.nasl - Type : ACT_GATHER_INFO |
2010-07-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-957-1.nasl - Type : ACT_GATHER_INFO |
2010-07-23 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2010-0545.nasl - Type : ACT_GATHER_INFO |
2010-07-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0547.nasl - Type : ACT_GATHER_INFO |
2010-07-23 | Name : The remote Fedora host is missing a security update. File : fedora_2010-11327.nasl - Type : ACT_GATHER_INFO |
2010-07-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2010-11345.nasl - Type : ACT_GATHER_INFO |
2010-07-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2010-11361.nasl - Type : ACT_GATHER_INFO |
2010-07-23 | Name : The remote Fedora host is missing a security update. File : fedora_2010-11363.nasl - Type : ACT_GATHER_INFO |
2010-07-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2010-11375.nasl - Type : ACT_GATHER_INFO |
2010-07-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2010-11379.nasl - Type : ACT_GATHER_INFO |
2010-07-22 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_8c2ea875949911df8e32000f20797ede.nasl - Type : ACT_GATHER_INFO |
2010-07-22 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_3511.nasl - Type : ACT_GATHER_INFO |
2010-07-21 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2072.nasl - Type : ACT_GATHER_INFO |
2010-07-21 | Name : The remote Fedora host is missing a security update. File : fedora_2010-10823.nasl - Type : ACT_GATHER_INFO |
2010-07-21 | Name : The remote Fedora host is missing a security update. File : fedora_2010-10833.nasl - Type : ACT_GATHER_INFO |
2010-07-21 | Name : The remote Windows host contains a mail client that is affected by multiple v... File : mozilla_thunderbird_306.nasl - Type : ACT_GATHER_INFO |
2010-07-21 | Name : The remote Windows host contains a mail client that is affected by multiple v... File : mozilla_thunderbird_311.nasl - Type : ACT_GATHER_INFO |
2010-07-21 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : seamonkey_206.nasl - Type : ACT_GATHER_INFO |
2010-07-16 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0534.nasl - Type : ACT_GATHER_INFO |
2010-07-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-960-1.nasl - Type : ACT_GATHER_INFO |
2010-07-06 | Name : The remote Fedora host is missing a security update. File : fedora_2010-10592.nasl - Type : ACT_GATHER_INFO |
2010-07-02 | Name : The remote Fedora host is missing a security update. File : fedora_2010-10557.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2010-180-01.nasl - Type : ACT_GATHER_INFO |
2010-06-29 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_edef3f2f82cf11dfbcce0018f3e2eb82.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0964.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11843.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11955.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11956.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11964.nasl - Type : ACT_GATHER_INFO |
2009-07-27 | Name : The remote VMware ESX host is missing one or more security-related patches. File : vmware_VMSA-2008-0001.nasl - Type : ACT_GATHER_INFO |
2009-07-27 | Name : The remote VMware ESX host is missing one or more security-related patches. File : vmware_VMSA-2008-0013.nasl - Type : ACT_GATHER_INFO |
2009-07-27 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2008-0014.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0966.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2008-036.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-652-1.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-730-1.nasl - Type : ACT_GATHER_INFO |
2009-03-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1750.nasl - Type : ACT_GATHER_INFO |
2008-08-20 | Name : The remote SSH service is affected by multiple vulnerabilities. File : attachmate_reflection_70_sp1.nasl - Type : ACT_GATHER_INFO |
2008-08-01 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-005.nasl - Type : ACT_GATHER_INFO |
2008-07-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1613.nasl - Type : ACT_GATHER_INFO |
2008-05-29 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_5_3.nasl - Type : ACT_GATHER_INFO |
2008-05-29 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-003.nasl - Type : ACT_GATHER_INFO |
2008-05-13 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U815030.nasl - Type : ACT_GATHER_INFO |
2008-05-13 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1571.nasl - Type : ACT_GATHER_INFO |
2008-05-01 | Name : The remote Fedora host is missing a security update. File : fedora_2008-3399.nasl - Type : ACT_GATHER_INFO |
2008-04-02 | Name : The remote Windows host has an application that is affected by multiple issues. File : vmware_multiple_vmsa_2008_0005.nasl - Type : ACT_GATHER_INFO |
2008-03-19 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-002.nasl - Type : ACT_GATHER_INFO |
2008-03-07 | Name : The remote openSUSE host is missing a security update. File : suse_compat-openssl097g-5054.nasl - Type : ACT_GATHER_INFO |
2008-03-07 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_compat-openssl097g-5055.nasl - Type : ACT_GATHER_INFO |
2008-03-04 | Name : The remote host is missing Sun Security Patch number 137080-11 File : solaris10_137080.nasl - Type : ACT_GATHER_INFO |
2008-03-04 | Name : The remote host is missing Sun Security Patch number 137081-11 File : solaris10_x86_137081.nasl - Type : ACT_GATHER_INFO |
2008-02-12 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U814193.nasl - Type : ACT_GATHER_INFO |
2008-01-10 | Name : The remote openSUSE host is missing a security update. File : suse_cups-4806.nasl - Type : ACT_GATHER_INFO |
2008-01-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-563-1.nasl - Type : ACT_GATHER_INFO |
2007-12-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1437.nasl - Type : ACT_GATHER_INFO |
2007-12-19 | Name : The remote printer service is affected by a buffer overflow vulnerability. File : cups_1_3_5.nasl - Type : ACT_GATHER_INFO |
2007-12-19 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200712-14.nasl - Type : ACT_GATHER_INFO |
2007-12-18 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2007-009.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_cups-3137.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_cups-3716.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_file-3034.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_liblcms-4626.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libpng-3740.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libpng-4627.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_openssl-4477.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_openssl-4559.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_perl-4665.nasl - Type : ACT_GATHER_INFO |
2007-12-07 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-237.nasl - Type : ACT_GATHER_INFO |
2007-12-07 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-552-1.nasl - Type : ACT_GATHER_INFO |
2007-12-04 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-748.nasl - Type : ACT_GATHER_INFO |
2007-11-26 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2007-325-01.nasl - Type : ACT_GATHER_INFO |
2007-11-26 | Name : The remote openSUSE host is missing a security update. File : suse_libpng-4628.nasl - Type : ACT_GATHER_INFO |
2007-11-20 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200711-28.nasl - Type : ACT_GATHER_INFO |
2007-11-20 | Name : The remote openSUSE host is missing a security update. File : suse_perl-4675.nasl - Type : ACT_GATHER_INFO |
2007-11-16 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-1003.nasl - Type : ACT_GATHER_INFO |
2007-11-14 | Name : The remote Fedora host is missing a security update. File : fedora_2007-3218.nasl - Type : ACT_GATHER_INFO |
2007-11-14 | Name : The remote Fedora host is missing a security update. File : fedora_2007-3255.nasl - Type : ACT_GATHER_INFO |
2007-11-14 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-217.nasl - Type : ACT_GATHER_INFO |
2007-11-12 | Name : The remote Fedora host is missing a security update. File : fedora_2007-3100.nasl - Type : ACT_GATHER_INFO |
2007-11-12 | Name : The remote openSUSE host is missing a security update. File : suse_liblcms-4629.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-353-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-439-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-472-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-522-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-534-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-538-1.nasl - Type : ACT_GATHER_INFO |
2007-11-08 | Name : The remote Fedora host is missing a security update. File : fedora_2007-2982.nasl - Type : ACT_GATHER_INFO |
2007-11-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200711-08.nasl - Type : ACT_GATHER_INFO |
2007-11-07 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1400.nasl - Type : ACT_GATHER_INFO |
2007-11-07 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_5b47c2798cb511dc88780016179b2dd5.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2007-1444.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2007-2521.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2007-2530.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2007-2666.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-734.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-207.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0966.nasl - Type : ACT_GATHER_INFO |
2007-10-31 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200710-30.nasl - Type : ACT_GATHER_INFO |
2007-10-25 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0813.nasl - Type : ACT_GATHER_INFO |
2007-10-25 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0992.nasl - Type : ACT_GATHER_INFO |
2007-10-25 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0813.nasl - Type : ACT_GATHER_INFO |
2007-10-25 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0992.nasl - Type : ACT_GATHER_INFO |
2007-10-24 | Name : The remote openSUSE host is missing a security update. File : suse_libopenssl-devel-4560.nasl - Type : ACT_GATHER_INFO |
2007-10-19 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200710-19.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_cups-3136.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_cups-3715.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_file-3033.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_libopenssl-devel-4476.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_libpng-3479.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_libpng-3739.nasl - Type : ACT_GATHER_INFO |
2007-10-16 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-725.nasl - Type : ACT_GATHER_INFO |
2007-10-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0964.nasl - Type : ACT_GATHER_INFO |
2007-10-12 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_172acf78780c11dcb3f40016179b2dd5.nasl - Type : ACT_GATHER_INFO |
2007-10-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200710-06.nasl - Type : ACT_GATHER_INFO |
2007-10-09 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-193.nasl - Type : ACT_GATHER_INFO |
2007-10-03 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1379.nasl - Type : ACT_GATHER_INFO |
2007-08-21 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-661.nasl - Type : ACT_GATHER_INFO |
2007-06-14 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_39988ee8191811dcb6bd0016179b2dd5.nasl - Type : ACT_GATHER_INFO |
2007-06-07 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-114.nasl - Type : ACT_GATHER_INFO |
2007-06-07 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-116.nasl - Type : ACT_GATHER_INFO |
2007-06-04 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200705-24.nasl - Type : ACT_GATHER_INFO |
2007-06-01 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2007-0391.nasl - Type : ACT_GATHER_INFO |
2007-06-01 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_8e01ab5b094911dc8163000e0c2e438a.nasl - Type : ACT_GATHER_INFO |
2007-06-01 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2007-0391.nasl - Type : ACT_GATHER_INFO |
2007-05-25 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-528.nasl - Type : ACT_GATHER_INFO |
2007-05-25 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-529.nasl - Type : ACT_GATHER_INFO |
2007-05-25 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2007-005.nasl - Type : ACT_GATHER_INFO |
2007-05-20 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2007-136-01.nasl - Type : ACT_GATHER_INFO |
2007-05-20 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0356.nasl - Type : ACT_GATHER_INFO |
2007-05-20 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_4cb9c51303ef11dca51d0019b95d4f14.nasl - Type : ACT_GATHER_INFO |
2007-05-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0356.nasl - Type : ACT_GATHER_INFO |
2007-04-19 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0123.nasl - Type : ACT_GATHER_INFO |
2007-04-19 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200704-13.nasl - Type : ACT_GATHER_INFO |
2007-04-19 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-086.nasl - Type : ACT_GATHER_INFO |
2007-04-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0123.nasl - Type : ACT_GATHER_INFO |
2007-04-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1274.nasl - Type : ACT_GATHER_INFO |
2007-04-05 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2007-093-01.nasl - Type : ACT_GATHER_INFO |
2007-04-05 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-391.nasl - Type : ACT_GATHER_INFO |
2007-04-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200703-26.nasl - Type : ACT_GATHER_INFO |
2007-04-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200703-28.nasl - Type : ACT_GATHER_INFO |
2007-03-27 | Name : The remote printer service is prone to a denial of service attack. File : cups_ssl_negotiation_dos.nasl - Type : ACT_DENIAL |
2007-03-26 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2007-0124.nasl - Type : ACT_GATHER_INFO |
2007-03-26 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-067.nasl - Type : ACT_GATHER_INFO |
2007-03-26 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2007-0124.nasl - Type : ACT_GATHER_INFO |
2007-03-16 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-1219.nasl - Type : ACT_GATHER_INFO |
2007-03-13 | Name : The remote host is missing a Mac OS X update which fixes a security issue. File : macosx_10_4_9.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-172.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-177.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-178.nasl - Type : ACT_GATHER_INFO |
2006-11-06 | Name : The remote host is missing Sun Security Patch number 114816-04 File : solaris8_114816.nasl - Type : ACT_GATHER_INFO |
2006-11-06 | Name : The remote host is missing Sun Security Patch number 114817-04 File : solaris8_x86_114817.nasl - Type : ACT_GATHER_INFO |
2004-07-12 | Name : The remote host is missing Sun Security Patch number 113713-30 File : solaris9_113713.nasl - Type : ACT_GATHER_INFO |
2004-07-12 | Name : The remote host is missing Sun Security Patch number 114568-29 File : solaris9_x86_114568.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-12-16 13:25:43 |
|
2014-12-12 05:26:35 |
|