This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Perl First view 2005-12-01
Product Perl Last view 2020-06-05
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:* 26
cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:* 26
cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:* 25
cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:* 24
cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:* 24

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.5 2020-06-05 CVE-2020-12723

regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.

8.6 2020-06-05 CVE-2020-10878

Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.

8.2 2020-06-05 CVE-2020-10543

Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.

9.8 2018-12-07 CVE-2018-18314

Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.

9.1 2018-12-07 CVE-2018-18313

Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.

9.8 2018-12-07 CVE-2018-18311

Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.

9.8 2018-12-05 CVE-2018-18312

Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.

7.5 2018-06-07 CVE-2018-12015

In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.

9.8 2018-04-17 CVE-2018-6913

Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.

7.5 2018-04-17 CVE-2018-6798

An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.

9.8 2018-04-17 CVE-2018-6797

An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.

9.8 2017-09-27 CVE-2017-12814

Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.

9.1 2017-09-19 CVE-2017-12883

Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.

7.5 2017-09-19 CVE-2017-12837

Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive modifier.

9.8 2017-02-07 CVE-2015-8608

The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.

7.8 2016-08-02 CVE-2016-6185

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

7.8 2016-08-02 CVE-2016-1238

(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.

7.5 2016-05-25 CVE-2015-8853

The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80."

7.5 2016-04-08 CVE-2016-2381

Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.

7.5 2015-08-16 CVE-2013-7422

Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.

2.1 2014-09-30 CVE-2014-4330

The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.

4.3 2014-02-10 CVE-2010-4777

The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.

7.5 2013-03-13 CVE-2013-1667

The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.

7.5 2013-01-04 CVE-2012-6329

The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.

4.3 2012-12-21 CVE-2011-2728

The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.

CWE : Common Weakness Enumeration

%idName
20% (7) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
11% (4) CWE-787 Out-of-bounds Write
11% (4) CWE-264 Permissions, Privileges, and Access Controls
11% (4) CWE-189 Numeric Errors
8% (3) CWE-125 Out-of-bounds Read
8% (3) CWE-20 Improper Input Validation
5% (2) CWE-399 Resource Management Errors
5% (2) CWE-190 Integer Overflow or Wraparound
2% (1) CWE-287 Improper Authentication
2% (1) CWE-134 Uncontrolled Format String
2% (1) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
2% (1) CWE-94 Failure to Control Generation of Code ('Code Injection')
2% (1) CWE-59 Improper Link Resolution Before File Access ('Link Following')

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:1074 Perl Format String Integer Overflow Vulnerability
oval:org.mitre.oval:def:10598 Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Per...
oval:org.mitre.oval:def:8071 DSA-1556 perl -- heap buffer overflow
oval:org.mitre.oval:def:20069 DSA-1556-2 perl - denial of service
oval:org.mitre.oval:def:10579 Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to...
oval:org.mitre.oval:def:22433 ELSA-2008:0522: perl security update (Important)
oval:org.mitre.oval:def:21868 RHSA-2011:0558: perl security and bug fix update (Moderate)
oval:org.mitre.oval:def:13932 USN-1129-1 -- perl vulnerabilities
oval:org.mitre.oval:def:13047 DSA-2265-1 perl -- lack of tainted flag propagation
oval:org.mitre.oval:def:23460 ELSA-2011:0558: perl security and bug fix update (Moderate)
oval:org.mitre.oval:def:27690 DEPRECATED: ELSA-2011-0558 -- perl security and bug fix update (moderate)
oval:org.mitre.oval:def:15090 DSA-2327-1 libfcgi-perl -- authentication bypass
oval:org.mitre.oval:def:21318 RHSA-2012:1116: perl-DBD-Pg security update (Moderate)
oval:org.mitre.oval:def:15390 DSA-2431-1 libdbd-pg-perl -- format string vulnerabilities
oval:org.mitre.oval:def:23752 ELSA-2012:1116: perl-DBD-Pg security update (Moderate)
oval:org.mitre.oval:def:23007 DEPRECATED: ELSA-2012:1116: perl-DBD-Pg security update (Moderate)
oval:org.mitre.oval:def:27876 DEPRECATED: ELSA-2012-1116 -- perl-DBD-Pg security update (moderate)
oval:org.mitre.oval:def:22490 USN-2099-1 -- perl vulnerability
oval:org.mitre.oval:def:24564 Security vulnerability in Perl for AIX
oval:org.mitre.oval:def:26263 SUSE-SU-2013:0441-1 -- Security update for Perl
oval:org.mitre.oval:def:26050 SUSE-SU-2013:0442-1 -- Security update for Perl
oval:org.mitre.oval:def:27634 DEPRECATED: ELSA-2013-0685 -- perl security update (moderate)
oval:org.mitre.oval:def:20994 RHSA-2013:0685: perl security update (Moderate)
oval:org.mitre.oval:def:20945 Security vulnerabilities in Perl for AIX
oval:org.mitre.oval:def:20923 DEPRECATED: Security vulnerabilities in Perl for AIX

Open Source Vulnerability Database (OSVDB)

id Description
76724 Perl Encode decode_xs() Function Input Parsing Remote Overflow
76723 Perl File::Glob::bsd_glob() Function GLOB_ALTDIRFUNC Flag Handling Remote Cod...
75685 Perl Fast CGI (FCGI) Module Environment Variable Sharing HTTP Headers Remote ...
75047 Perl Multiple Function Taint Protection Mechanism Bypass
74745 Perl regcomp.c Perl_reg_numbered_buff_fetch Function DoS
74175 Perl Multiple Function Call Argument Injection NULL Dereference DoS
72962 Perl Data::FormValidator Module D::F::Results Field Validation Bypass
64082 Perl RegEx String Handling Overflow DoS
59283 Perl Interpreter RegEx UTF-8 Character Handling DoS
46563 Perl File::Path::rmtree lib/File/Path.pm Symlink Arbitrary File chmod
44588 Perl UTF8 Character Handling Double-free DoS
22255 OpenBSD Perl Interpreter sprintf Function Local Overflow
21345 Perl Explicit Format Parameter Index Overflow

ExploitDB Exploits

id Description
23579 TWiki MAKETEXT Remote Command Execution

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2013-09-18 Name : Debian Security Advisory DSA 2586-1 (perl - several vulnerabilities)
File : nvt/deb_2586_1.nasl
2012-12-27 Name : TWiki 'MAKETEXT' variable Remote Command Execution Vulnerability
File : nvt/gb_twiki_maketext_rce_vuln.nasl
2012-12-18 Name : Fedora Update for perl FEDORA-2012-18330
File : nvt/gb_fedora_2012_18330_perl_fc16.nasl
2012-12-04 Name : Ubuntu Update for perl USN-1643-1
File : nvt/gb_ubuntu_USN_1643_1.nasl
2012-08-30 Name : Fedora Update for perl-DBD-Pg FEDORA-2012-10892
File : nvt/gb_fedora_2012_10892_perl-DBD-Pg_fc17.nasl
2012-08-03 Name : Fedora Update for perl-DBD-Pg FEDORA-2012-10871
File : nvt/gb_fedora_2012_10871_perl-DBD-Pg_fc16.nasl
2012-07-30 Name : CentOS Update for perl-DBD-Pg CESA-2012:1116 centos5
File : nvt/gb_CESA-2012_1116_perl-DBD-Pg_centos5.nasl
2012-07-30 Name : CentOS Update for perl-DBD-Pg CESA-2012:1116 centos6
File : nvt/gb_CESA-2012_1116_perl-DBD-Pg_centos6.nasl
2012-07-30 Name : Mandriva Update for perl-DBD-Pg MDVSA-2012:112 (perl-DBD-Pg)
File : nvt/gb_mandriva_MDVSA_2012_112.nasl
2012-07-26 Name : RedHat Update for perl-DBD-Pg RHSA-2012:1116-01
File : nvt/gb_RHSA-2012_1116-01_perl-DBD-Pg.nasl
2012-07-09 Name : RedHat Update for perl RHSA-2011:0558-01
File : nvt/gb_RHSA-2011_0558-01_perl.nasl
2012-07-09 Name : RedHat Update for perl RHSA-2011:1424-01
File : nvt/gb_RHSA-2011_1424-01_perl.nasl
2012-04-30 Name : Debian Security Advisory DSA 2431-1 (libdbd-pg-perl)
File : nvt/deb_2431_1.nasl
2012-04-30 Name : Gentoo Security Advisory GLSA 201204-08 (DBD-Pg)
File : nvt/glsa_201204_08.nasl
2012-04-02 Name : Fedora Update for perl-FCGI FEDORA-2011-13130
File : nvt/gb_fedora_2011_13130_perl-FCGI_fc16.nasl
2012-04-02 Name : Fedora Update for perl-Data-FormValidator FEDORA-2011-11680
File : nvt/gb_fedora_2011_11680_perl-Data-FormValidator_fc16.nasl
2012-02-11 Name : Debian Security Advisory DSA 2327-1 (libfcgi-perl)
File : nvt/deb_2327_1.nasl
2012-01-20 Name : Mandriva Update for perl MDVSA-2012:008 (perl)
File : nvt/gb_mandriva_MDVSA_2012_008.nasl
2012-01-17 Name : Strawberry Perl Modules Multiple Vulnerabilities (Windows)
File : nvt/gb_perl_modules_mult_vuln_win.nasl
2012-01-09 Name : Mandriva Update for fcgi MDVSA-2012:001 (fcgi)
File : nvt/gb_mandriva_MDVSA_2012_001.nasl
2011-11-03 Name : Fedora Update for perl FEDORA-2011-13874
File : nvt/gb_fedora_2011_13874_perl_fc14.nasl
2011-10-04 Name : Fedora Update for perl-FCGI FEDORA-2011-13230
File : nvt/gb_fedora_2011_13230_perl-FCGI_fc15.nasl
2011-10-04 Name : Fedora Update for perl-FCGI FEDORA-2011-13236
File : nvt/gb_fedora_2011_13236_perl-FCGI_fc14.nasl
2011-09-12 Name : Fedora Update for perl-Data-FormValidator FEDORA-2011-11756
File : nvt/gb_fedora_2011_11756_perl-Data-FormValidator_fc15.nasl
2011-09-12 Name : Fedora Update for perl-Data-FormValidator FEDORA-2011-11805
File : nvt/gb_fedora_2011_11805_perl-Data-FormValidator_fc14.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0199 Multiple Vulnerabilities in Apple Mac OS X
Severity: Category I - VMSKEY: V0061337

Snort® IPS/IDS

Date Description
2014-01-10 Foswiki/Twiki MAKETEXT command execution attempt
RuleID : 26906 - Type : SERVER-OTHER - Revision : 3
2014-01-10 FosWiki and TWiki MAKETEXT macro memory consumption denial of service attempt
RuleID : 26905 - Type : SERVER-WEBAPP - Revision : 5

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-4e088b6d7c.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-9dbe983805.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-ca03363d57.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-d1ba58394e.nasl - Type: ACT_GATHER_INFO
2018-12-17 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201812-07.nasl - Type: ACT_GATHER_INFO
2018-12-01 Name: The remote Debian host is missing a security update.
File: debian_DLA-1601.nasl - Type: ACT_GATHER_INFO
2018-11-30 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4347.nasl - Type: ACT_GATHER_INFO
2018-11-14 Name: The remote Debian host is missing a security update.
File: debian_DLA-1578.nasl - Type: ACT_GATHER_INFO
2018-10-31 Name: The remote host is missing a macOS or Mac OS X security update that fixes mul...
File: macosx_SecUpd2018-005.nasl - Type: ACT_GATHER_INFO
2018-09-27 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1307.nasl - Type: ACT_GATHER_INFO
2018-09-27 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1308.nasl - Type: ACT_GATHER_INFO
2018-09-27 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_613193a0c1b411e8ae2d54e1ad3d6335.nasl - Type: ACT_GATHER_INFO
2018-08-21 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-2_0-0084.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2017-0037.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-1_0-0167.nasl - Type: ACT_GATHER_INFO
2018-07-24 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-2_0-0050.nasl - Type: ACT_GATHER_INFO
2018-07-17 Name: The remote host is missing a macOS update that fixes multiple security vulner...
File: macos_10_13_6.nasl - Type: ACT_GATHER_INFO
2018-07-17 Name: The remote host is missing a macOS or Mac OS X security update that fixes mul...
File: macosx_SecUpd2018-004.nasl - Type: ACT_GATHER_INFO
2018-06-19 Name: The remote Fedora host is missing a security update.
File: fedora_2018-10ae521efa.nasl - Type: ACT_GATHER_INFO
2018-06-12 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4226.nasl - Type: ACT_GATHER_INFO
2018-04-26 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2018-0050f7c0d1.nasl - Type: ACT_GATHER_INFO
2018-04-23 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2018-1c8b49fbc7.nasl - Type: ACT_GATHER_INFO
2018-04-16 Name: The remote Debian host is missing a security update.
File: debian_DLA-1345.nasl - Type: ACT_GATHER_INFO
2018-04-16 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4172.nasl - Type: ACT_GATHER_INFO
2018-04-16 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_41c96ffd29a64dcc9a8865f5038fa6eb.nasl - Type: ACT_GATHER_INFO