This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Qemu First view 2007-12-04
Product Qemu Last view 2020-06-09
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:* 193
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* 166
cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:* 108
cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:* 107
cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.4:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.3:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.2:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.1:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:* 106
cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:* 105
cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.4.4:*:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:*:r1:*:*:*:*:*:* 104
cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:* 103
cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:* 103
cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:* 103
cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:* 103
cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:* 103

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5 2020-06-09 CVE-2020-10761

An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.

6 2020-06-04 CVE-2020-13800

ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.

5.5 2020-06-04 CVE-2020-13791

hw/pci/pci.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access by providing an address near the end of the PCI configuration space.

5.6 2020-06-04 CVE-2020-13765

rom_copy() in hw/core/loader.c in QEMU 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.

5.5 2020-06-04 CVE-2020-10702

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

6.7 2020-06-02 CVE-2020-13754

hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation.

2.5 2020-06-02 CVE-2020-13659

address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.

3.2 2020-05-28 CVE-2020-13362

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

3.9 2020-05-28 CVE-2020-13361

In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.

5.5 2020-05-27 CVE-2020-13253

sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.

6.5 2020-05-04 CVE-2020-10717

A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version >= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host.

3.3 2020-04-27 CVE-2020-11869

An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.

5.6 2020-04-06 CVE-2020-11102

hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.

5.8 2020-03-10 CVE-2019-15034

hw/display/bochs-display.c in QEMU 4.0.0 does not ensure a sufficient PCI config space allocation, leading to a buffer overflow involving the PCIe extended config space.

3.5 2020-03-05 CVE-2019-20382

QEMU 4.1.0 has a memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a VNC disconnect operation because libz is misused, resulting in a situation where memory allocated in deflateInit2 is not freed in deflateEnd.

9.9 2020-02-11 CVE-2020-1711

An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.

8.8 2020-02-11 CVE-2013-4535

The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.

3.5 2020-01-31 CVE-2015-6815

The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.

6.5 2020-01-23 CVE-2015-5745

Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.

6.5 2020-01-23 CVE-2015-5278

The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

6.5 2020-01-23 CVE-2015-5239

Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.

9.8 2020-01-16 CVE-2020-7039

tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.

7.8 2020-01-02 CVE-2013-4532

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

7.5 2019-12-31 CVE-2019-20175

** DISPUTED ** An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a "privileged guest user has many ways to cause similar DoS effect, without triggering this assert."

7.8 2019-12-30 CVE-2013-2016

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
22% (69) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
10% (32) CWE-125 Out-of-bounds Read
9% (30) CWE-399 Resource Management Errors
7% (22) CWE-787 Out-of-bounds Write
5% (18) CWE-20 Improper Input Validation
5% (17) CWE-772 Missing Release of Resource after Effective Lifetime
5% (16) CWE-476 NULL Pointer Dereference
5% (16) CWE-190 Integer Overflow or Wraparound
3% (11) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
3% (10) CWE-200 Information Exposure
2% (9) CWE-189 Numeric Errors
2% (7) CWE-264 Permissions, Privileges, and Access Controls
1% (6) CWE-416 Use After Free
1% (6) CWE-369 Divide By Zero
1% (5) CWE-362 Race Condition
1% (4) CWE-94 Failure to Control Generation of Code ('Code Injection')
0% (3) CWE-284 Access Control (Authorization) Issues
0% (2) CWE-732 Incorrect Permission Assignment for Critical Resource
0% (2) CWE-617 Reachable Assertion
0% (2) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
0% (2) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
0% (2) CWE-59 Improper Link Resolution Before File Access ('Link Following')
0% (1) CWE-754 Improper Check for Unusual or Exceptional Conditions
0% (1) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
0% (1) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:9706 Qemu 0.9.1 and earlier does not perform range checks for block device read or...
oval:org.mitre.oval:def:11021 The drive_init function in QEMU 0.9.1 determines the format of a raw disk ima...
oval:org.mitre.oval:def:22720 ELSA-2008:0194: xen security and bug fix update (Important)
oval:org.mitre.oval:def:7961 DSA-1657 qemu -- insecure temporary files
oval:org.mitre.oval:def:20222 DSA-1657-1 qemu - denial of service
oval:org.mitre.oval:def:13656 USN-776-2 -- kvm regression
oval:org.mitre.oval:def:13482 USN-776-1 -- kvm vulnerabilities
oval:org.mitre.oval:def:11786 Buffer overflow in the usb_host_handle_control function in the USB passthroug...
oval:org.mitre.oval:def:21887 RHSA-2011:0345: qemu-kvm security update (Moderate)
oval:org.mitre.oval:def:13486 USN-1063-1 -- qemu-kvm vulnerability
oval:org.mitre.oval:def:22978 ELSA-2011:0345: qemu-kvm security update (Moderate)
oval:org.mitre.oval:def:27339 DEPRECATED: ELSA-2011-0345 -- qemu-kvm security update (moderate)
oval:org.mitre.oval:def:12987 DSA-2230-1 qemu-kvm -- several
oval:org.mitre.oval:def:21922 RHSA-2011:0534: qemu-kvm security, bug fix, and enhancement update (Important)
oval:org.mitre.oval:def:14005 USN-1145-1 -- qemu-kvm vulnerabilities
oval:org.mitre.oval:def:12667 DSA-2241-1 qemu-kvm -- implementation error
oval:org.mitre.oval:def:22883 ELSA-2011:0534: qemu-kvm security, bug fix, and enhancement update (Important)
oval:org.mitre.oval:def:27181 DEPRECATED: ELSA-2011-0534 -- qemu-kvm security, bug fix, and enhancement upd...
oval:org.mitre.oval:def:14171 USN-1177-1 -- qemu-kvm vulnerability
oval:org.mitre.oval:def:12960 DSA-2282-1 qemu-kvm -- several
oval:org.mitre.oval:def:26941 RHSA-2011:1531 -- qemu-kvm security, bug fix, and enhancement update (Moderate)
oval:org.mitre.oval:def:27567 ELSA-2011-1531 -- qemu-kvm security, bug fix, and enhancement update (moderate)
oval:org.mitre.oval:def:18066 USN-1522-1 -- qemu-kvm vulnerability
oval:org.mitre.oval:def:21575 RHSA-2012:1234: qemu-kvm security update (Important)
oval:org.mitre.oval:def:21464 RHSA-2012:1235: kvm security update (Important)

Open Source Vulnerability Database (OSVDB)

id Description
75279 Qemu hw/scsi-disk.c scsi_disk_emulate_command() Function Command Parsing Loca...
74752 qemu-kvm -runas Option Local Privilege Escalation
73756 KVM qemu-kvm hw/virtio-blk.c Multiple Function Local DoS
73618 Qemu VirtIO virtqueue Request Parsing Local Overflow
73395 Qemu PIIX4 Hotplug Invalid Memory Dereference Arbitrary Code Execution
70992 QEMU Empty VNC Password Authentication Bypass
62347 QEMU usb-linux.c usb_host_handle_control Function Crafted USB Packet Handling...
59287 VNC Server in QEMU vnc.c Use-after-free Fuzzy Screen Mode Protocol Arbitrary ...
59286 VNC Server in QEMU vnc.c Use-after-free Invalid Message Data Type Arbitrary C...
59285 VNC Server in QEMU vnc.c Use-after-free Data Transfer Disconnection Arbitrary...
52913 KVM kvm-79 VNC Server vnc.c protocol_client_msg Function Crafted Message Remo...
52912 QEMU VNC Server vnc.c protocol_client_msg Function Crafted Message Remote DoS
51033 Qemu monitor.c Off-by-one VNC Password Weakness
49165 QEMU qemu-make-debian-root Temporary File Symlink Arbitrary File Overwrite
44918 QEMU vl.c drive_init() Function Crafted Disk Image Header Arbitrary Local Fil...
42984 QEMU TranslationBlock (code_gen_buffer) Buffer Overwrite Local DoS
42983 QEMU Block Device Read/Write Request Arbitrary Memory Access
35494 QEMU Cirrus VGA Extension cirrus_invalidate_region Function Multiple Overflows

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-12-18 Name : Fedora Update for xen FEDORA-2012-19828
File : nvt/gb_fedora_2012_19828_xen_fc16.nasl
2012-12-14 Name : Fedora Update for xen FEDORA-2012-19717
File : nvt/gb_fedora_2012_19717_xen_fc17.nasl
2012-12-13 Name : SuSE Update for XEN openSUSE-SU-2012:1572-1 (XEN)
File : nvt/gb_suse_2012_1572_1.nasl
2012-12-13 Name : SuSE Update for Security openSUSE-SU-2012:1174-1 (Security)
File : nvt/gb_suse_2012_1174_1.nasl
2012-12-13 Name : SuSE Update for Security openSUSE-SU-2012:1172-1 (Security)
File : nvt/gb_suse_2012_1172_1.nasl
2012-12-13 Name : SuSE Update for qemu openSUSE-SU-2012:1170-1 (qemu)
File : nvt/gb_suse_2012_1170_1.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18249
File : nvt/gb_fedora_2012_18249_xen_fc16.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18242
File : nvt/gb_fedora_2012_18242_xen_fc17.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17408
File : nvt/gb_fedora_2012_17408_xen_fc16.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17204
File : nvt/gb_fedora_2012_17204_xen_fc17.nasl
2012-10-22 Name : Gentoo Security Advisory GLSA 201210-04 (ebuild)
File : nvt/glsa_201210_04.nasl
2012-10-19 Name : Fedora Update for qemu FEDORA-2012-15606
File : nvt/gb_fedora_2012_15606_qemu_fc16.nasl
2012-10-16 Name : Fedora Update for qemu FEDORA-2012-15740
File : nvt/gb_fedora_2012_15740_qemu_fc17.nasl
2012-10-03 Name : Ubuntu Update for qemu-kvm USN-1590-1
File : nvt/gb_ubuntu_USN_1590_1.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13443
File : nvt/gb_fedora_2012_13443_xen_fc16.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13434
File : nvt/gb_fedora_2012_13434_xen_fc17.nasl
2012-09-15 Name : Debian Security Advisory DSA 2545-1 (qemu)
File : nvt/deb_2545_1.nasl
2012-09-15 Name : Debian Security Advisory DSA 2543-1 (xen-qemu-dm-4.0)
File : nvt/deb_2543_1.nasl
2012-09-15 Name : Debian Security Advisory DSA 2542-1 (qemu-kvm)
File : nvt/deb_2542_1.nasl
2012-09-07 Name : RedHat Update for xen RHSA-2012:1236-01
File : nvt/gb_RHSA-2012_1236-01_xen.nasl
2012-09-07 Name : RedHat Update for qemu-kvm RHSA-2012:1234-01
File : nvt/gb_RHSA-2012_1234-01_qemu-kvm.nasl
2012-09-07 Name : CentOS Update for qemu-guest-agent CESA-2012:1234 centos6
File : nvt/gb_CESA-2012_1234_qemu-guest-agent_centos6.nasl
2012-09-07 Name : CentOS Update for xen CESA-2012:1236 centos5
File : nvt/gb_CESA-2012_1236_xen_centos5.nasl
2012-09-07 Name : CentOS Update for kmod-kvm CESA-2012:1235 centos5
File : nvt/gb_CESA-2012_1235_kmod-kvm_centos5.nasl
2012-08-30 Name : Fedora Update for qemu FEDORA-2012-11302
File : nvt/gb_fedora_2012_11302_qemu_fc17.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0112 Oracle Linux & Virtualization Buffer Overflow Vulnerability
Severity: Category I - VMSKEY: V0060735
2015-A-0115 QEMU Virtual Floppy Drive Controller (FDC) Buffer Overflow Vulnerability
Severity: Category II - VMSKEY: V0060741
2010-A-0037 Multiple Vulnerabilities in Linux Kernel
Severity: Category I - VMSKEY: V0022704

Snort® IPS/IDS

Date Description
2015-10-01 QEMU VNC set-pixel-format memory corruption attempt
RuleID : 35851 - Type : SERVER-OTHER - Revision : 2
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34488 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34487 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34486 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34485 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34484 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34483 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34482 - Type : OS-OTHER - Revision : 4
2015-06-23 QEMU floppy disk controller buffer overflow attempt
RuleID : 34481 - Type : OS-OTHER - Revision : 4

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-74fb8b257b.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-87f2ace20d.nasl - Type: ACT_GATHER_INFO
2018-12-01 Name: The remote Debian host is missing a security update.
File: debian_DLA-1599.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4338.nasl - Type: ACT_GATHER_INFO
2018-10-25 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1321.nasl - Type: ACT_GATHER_INFO
2018-09-27 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1313.nasl - Type: ACT_GATHER_INFO
2018-09-27 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1314.nasl - Type: ACT_GATHER_INFO
2018-09-19 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1073.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1247.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1259.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1268.nasl - Type: ACT_GATHER_INFO
2018-09-07 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1073.nasl - Type: ACT_GATHER_INFO
2018-09-07 Name: The remote Debian host is missing a security update.
File: debian_DLA-1497.nasl - Type: ACT_GATHER_INFO
2018-08-21 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2462.nasl - Type: ACT_GATHER_INFO
2018-07-16 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2162.nasl - Type: ACT_GATHER_INFO
2018-07-03 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1201.nasl - Type: ACT_GATHER_INFO
2018-06-12 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1034.nasl - Type: ACT_GATHER_INFO
2018-06-12 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1034.nasl - Type: ACT_GATHER_INFO
2018-05-31 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-1416.nasl - Type: ACT_GATHER_INFO
2018-05-30 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4213.nasl - Type: ACT_GATHER_INFO
2018-05-29 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1144.nasl - Type: ACT_GATHER_INFO
2018-05-29 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1145.nasl - Type: ACT_GATHER_INFO
2018-05-02 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1113.nasl - Type: ACT_GATHER_INFO
2018-04-27 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-0816.nasl - Type: ACT_GATHER_INFO