Summary
Detail | |||
---|---|---|---|
Vendor | Apache | First view | 2009-07-05 |
Product | Http Server | Last view | 2022-03-14 |
Version | 2.2.13 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:apache:http_server |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2022-03-14 | CVE-2022-23943 | Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions. |
9.8 | 2022-03-14 | CVE-2022-22721 | If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier. |
9.8 | 2022-03-14 | CVE-2022-22720 | Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling |
7.5 | 2022-03-14 | CVE-2022-22719 | A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier. |
9.8 | 2021-12-20 | CVE-2021-44790 | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier. |
8.2 | 2021-12-20 | CVE-2021-44224 | A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). |
9 | 2021-09-16 | CVE-2021-40438 | A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier. |
9.8 | 2021-09-16 | CVE-2021-39275 | ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier. |
7.5 | 2021-09-16 | CVE-2021-36160 | A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive). |
7.5 | 2021-09-16 | CVE-2021-34798 | Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier. |
7.5 | 2021-08-16 | CVE-2021-33193 | A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48. |
6.1 | 2021-07-26 | CVE-2021-32792 | mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, there is an XSS vulnerability in when using `OIDCPreservePost On`. |
5.9 | 2021-07-26 | CVE-2021-32791 | mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines. |
6.1 | 2021-07-22 | CVE-2021-32786 | mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression. |
7.5 | 2021-07-22 | CVE-2021-32785 | mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed before use when this option is enabled. |
5.3 | 2021-06-10 | CVE-2021-30641 | Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF' |
9.8 | 2021-06-10 | CVE-2021-26691 | In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow |
7.5 | 2021-06-10 | CVE-2021-26690 | Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service |
7.3 | 2021-06-10 | CVE-2020-35452 | Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow |
7.5 | 2021-06-10 | CVE-2020-13950 | Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer dereference) with specially crafted requests using both Content-Length and Transfer-Encoding headers, leading to a Denial of Service |
5.5 | 2021-06-10 | CVE-2020-13938 | Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows |
5.3 | 2021-06-10 | CVE-2019-17567 | Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured. |
7.5 | 2020-08-07 | CVE-2020-9490 | Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers. |
7.5 | 2020-08-07 | CVE-2020-11993 | Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. |
5.3 | 2020-08-07 | CVE-2020-11985 | IP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
14% (11) | CWE-20 | Improper Input Validation |
10% (8) | CWE-399 | Resource Management Errors |
7% (6) | CWE-787 | Out-of-bounds Write |
7% (6) | CWE-476 | NULL Pointer Dereference |
6% (5) | CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli... |
6% (5) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
5% (4) | CWE-416 | Use After Free |
3% (3) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
3% (3) | CWE-264 | Permissions, Privileges, and Access Controls |
3% (3) | CWE-200 | Information Exposure |
2% (2) | CWE-362 | Race Condition |
2% (2) | CWE-310 | Cryptographic Issues |
2% (2) | CWE-287 | Improper Authentication |
2% (2) | CWE-189 | Numeric Errors |
2% (2) | CWE-125 | Out-of-bounds Read |
2% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
1% (1) | CWE-706 | Use of Incorrectly-Resolved Name or Reference |
1% (1) | CWE-665 | Improper Initialization |
1% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
1% (1) | CWE-384 | Session Fixation |
1% (1) | CWE-345 | Insufficient Verification of Data Authenticity |
1% (1) | CWE-330 | Use of Insufficiently Random Values |
1% (1) | CWE-284 | Access Control (Authorization) Issues |
1% (1) | CWE-190 | Integer Overflow or Wraparound |
1% (1) | CWE-134 | Uncontrolled Format String |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
78556 | Apache HTTP Server Status Code 400 Default Error Response httpOnly Cookie Dis... |
78293 | Apache HTTP Server Scoreboard Invalid Free Operation Local Security Bypass |
78079 | GoAhead WebServer Partial HTTP Request Parsing Remote DoS |
77832 | Parallels Plesk Panel Billing System TLS Renegotiation Handshakes MiTM Plaint... |
77444 | Apache HTTP Server mod_proxy Mdule Web Request HTTP/0.9 Protocol URL Parsing ... |
77310 | Apache HTTP Server mod_proxy Reverse Proxy Mode Security Bypass Weakness (201... |
77012 | Apache HTTP Server server/utils.c ap_pregsub() Function htaccess File Handlin... |
76744 | Apache HTTP Server server/utils.c ap_pregsub() Function htaccess File Handlin... |
76079 | Apache HTTP Server mod_proxy Mdule Web Request URL Parsing Proxy Remote Secur... |
75647 | Apache HTTP Server mod_proxy_ajp Module mod_proxy_balancer HTTP Request Remot... |
75622 | Blue Coat Director TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
74721 | Apache HTTP Server ByteRange Filter Memory Exhaustion Remote DoS |
74335 | Hitachi Web Server TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
73388 | Multiple Vendor libc Implentation fnmatch.c Memory Consumption DoS |
73383 | Apache HTTP Server Portable Runtime (APR) Library apr_fnmatch() Infinite Loop... |
71961 | Oracle Fusion Middleware Oracle WebLogic Server TLS Renegotiation Handshakes ... |
71951 | Oracle Multiple Products Oracle Security Service TLS Renegotiation Handshakes... |
70620 | mGuard TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
70055 | Oracle Supply Chain Transportation Management TLS Renegotiation Handshakes Mi... |
69561 | IBM WebSphere MQ Internet Pass-Thru TLS Renegotiation Handshake MiTM Plaintex... |
69032 | Oracle Java SE / Java for Business TLS Renegotiation Handshake MiTM Plaintext... |
67029 | HP Threat Management Services zl Module TLS Renegotiation Handshakes MiTM Pla... |
66745 | Apache HTTP Server Multiple Modules Pathless Request Remote DoS |
66315 | HP Insight Manager TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
65654 | Apache HTTP Server mod_proxy_http mod_proxy_http.c Timeout Detection Weakness... |
ExploitDB Exploits
id | Description |
---|---|
18221 | Apache HTTP Server Denial of Service |
17969 | Apache mod_proxy Reverse Proxy Exposure Vulnerability PoC |
14288 | Write-to-file Shellcode (Win32) |
11650 | Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit |
10579 | TLS Renegotiation Vulnerability PoC Exploit |
OpenVAS Exploits
id | Description |
---|---|
2012-12-06 | Name : Apache HTTP Server mod_proxy_ajp Process Timeout DoS Vulnerability (Windows) File : nvt/gb_apache_mod_proxy_ajp_process_timeout_dos_vuln_win.nasl |
2012-12-04 | Name : Debian Security Advisory DSA 2579-1 (apache2) File : nvt/deb_2579_1.nasl |
2012-11-26 | Name : FreeBSD Ports: apache22 File : nvt/freebsd_apache22.nasl |
2012-11-09 | Name : Ubuntu Update for apache2 USN-1627-1 File : nvt/gb_ubuntu_USN_1627_1.nasl |
2012-10-03 | Name : Mandriva Update for apache MDVSA-2012:154-1 (apache) File : nvt/gb_mandriva_MDVSA_2012_154_1.nasl |
2012-09-25 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004) File : nvt/gb_macosx_su12-004.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2011-133-01 apr/apr-util File : nvt/esoft_slk_ssa_2011_133_01.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2011-252-01 httpd File : nvt/esoft_slk_ssa_2011_252_01.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2011-284-01 httpd File : nvt/esoft_slk_ssa_2011_284_01.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2012-041-01 httpd File : nvt/esoft_slk_ssa_2012_041_01.nasl |
2012-08-10 | Name : FreeBSD Ports: apache File : nvt/freebsd_apache21.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-18 (GnuTLS) File : nvt/glsa_201206_18.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-25 (apache) File : nvt/glsa_201206_25.nasl |
2012-08-02 | Name : SuSE Update for apache2 openSUSE-SU-2012:0314-1 (apache2) File : nvt/gb_suse_2012_0314_1.nasl |
2012-07-30 | Name : CentOS Update for apr CESA-2011:0507 centos4 x86_64 File : nvt/gb_CESA-2011_0507_apr_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for apr CESA-2011:0507 centos5 x86_64 File : nvt/gb_CESA-2011_0507_apr_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for apr CESA-2011:0844 centos4 x86_64 File : nvt/gb_CESA-2011_0844_apr_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for apr CESA-2011:0844 centos5 x86_64 File : nvt/gb_CESA-2011_0844_apr_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for httpd CESA-2011:1245 centos4 x86_64 File : nvt/gb_CESA-2011_1245_httpd_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for httpd CESA-2011:1392 centos4 x86_64 File : nvt/gb_CESA-2011_1392_httpd_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for httpd CESA-2011:1392 centos5 x86_64 File : nvt/gb_CESA-2011_1392_httpd_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for httpd CESA-2012:0128 centos6 File : nvt/gb_CESA-2012_0128_httpd_centos6.nasl |
2012-07-09 | Name : RedHat Update for httpd RHSA-2011:1391-01 File : nvt/gb_RHSA-2011_1391-01_httpd.nasl |
2012-07-09 | Name : RedHat Update for httpd RHSA-2012:0128-01 File : nvt/gb_RHSA-2012_0128-01_httpd.nasl |
2012-04-30 | Name : Gentoo Security Advisory GLSA 201203-22 (nginx) File : nvt/glsa_201203_22.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0199 | Multiple Vulnerabilities in Apple Mac OS X Severity: Category I - VMSKEY: V0061337 |
2015-A-0174 | Multiple Vulnerabilities in Apache HTTP Server Severity: Category I - VMSKEY: V0061135 |
2015-A-0149 | Multiple Vulnerabilities in Juniper Networks and Security Manager(NSM) Appliance Severity: Category I - VMSKEY: V0061101 |
2015-B-0083 | Multiple Vulnerabilities in IBM Storwize V7000 Unified Severity: Category I - VMSKEY: V0060983 |
2014-A-0172 | Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform Severity: Category I - VMSKEY: V0057381 |
2014-A-0114 | Multiple Vulnerabilities in Apache HTTP Server Severity: Category I - VMSKEY: V0053307 |
2014-A-0084 | Multiple Vulnerabilities in Apache HTTP Server Severity: Category I - VMSKEY: V0052631 |
2014-B-0065 | Multiple Vulnerabilities in IBM WebSphere Application Server Severity: Category I - VMSKEY: V0051617 |
2014-A-0030 | Apple Mac OS X Security Update 2014-001 Severity: Category I - VMSKEY: V0044547 |
2014-A-0009 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0043395 |
2013-A-0177 | Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform Severity: Category I - VMSKEY: V0040288 |
2013-A-0146 | Multiple Security Vulnerabilities in Apache HTTP Server Severity: Category I - VMSKEY: V0039573 |
2012-B-0048 | Multiple Vulnerabilities in HP Systems Insight Manager Severity: Category I - VMSKEY: V0032178 |
2012-B-0038 | Multiple Vulnerabilities in HP Onboard Administrator Severity: Category I - VMSKEY: V0031972 |
2011-A-0066 | Multiple Vulnerabilities in VMware Products Severity: Category I - VMSKEY: V0027158 |
Snort® IPS/IDS
Date | Description |
---|---|
2021-01-12 | Apache Server mod_proxy Error Page cross site scripting attempt RuleID : 56563 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-17 | Apache cookie logging denial of service attempt RuleID : 51547 - Type : SERVER-APACHE - Revision : 1 |
2018-06-05 | HTTP request smuggling attempt RuleID : 46495 - Type : SERVER-OTHER - Revision : 4 |
2017-12-13 | Apache HTTP Server possible mod_dav.c remote denial of service vulnerability ... RuleID : 44808 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2017-10-26 | Apache HTTP Server possible OPTIONS method memory leak attempt RuleID : 44434 - Type : SERVER-APACHE - Revision : 6 |
2017-08-31 | Apache mod_auth_digest out of bounds read attempt RuleID : 43790 - Type : SERVER-OTHER - Revision : 3 |
2017-08-15 | httpd mod_mime content-type buffer overflow attempt RuleID : 43547 - Type : SERVER-APACHE - Revision : 2 |
2016-07-28 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737-community - Type : SERVER-WEBAPP - Revision : 2 |
2016-08-31 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737 - Type : SERVER-WEBAPP - Revision : 2 |
2016-04-05 | Apache HTTP server potential cookie disclosure attempt RuleID : 37968 - Type : SERVER-WEBAPP - Revision : 1 |
2015-09-01 | Apache HTTP Server mod_status heap buffer overflow attempt RuleID : 35406 - Type : SERVER-APACHE - Revision : 4 |
2014-01-10 | Apache mod_proxy_balancer cross site scripting attempt RuleID : 26431 - Type : SERVER-WEBAPP - Revision : 3 |
2014-01-10 | Apache server mod_proxy reverse proxy bypass attempt RuleID : 21214 - Type : SERVER-APACHE - Revision : 11 |
2014-01-10 | Apache server mod_proxy reverse proxy exposure attempt RuleID : 20580 - Type : WEB-MISC - Revision : 2 |
2014-01-10 | Apache mod_proxy reverse proxy information disclosure attempt RuleID : 20528 - Type : SERVER-APACHE - Revision : 13 |
2014-01-10 | Apache Killer denial of service tool exploit attempt RuleID : 19825 - Type : SERVER-APACHE - Revision : 13 |
2014-01-10 | Apache APR apr_fn match infinite loop denial of service attempt RuleID : 19709 - Type : SERVER-APACHE - Revision : 4 |
2014-01-10 | Apache mod_isapi dangling pointer exploit attempt RuleID : 19124 - Type : SERVER-APACHE - Revision : 7 |
2014-01-10 | Apache mod_isapi dangling pointer code execution attempt RuleID : 19107 - Type : SERVER-APACHE - Revision : 10 |
2014-01-10 | Apache mod_isapi dangling pointer exploit attempt RuleID : 16480 - Type : SERVER-APACHE - Revision : 5 |
2014-01-10 | Apache mod_isapi dangling pointer exploit attempt - public shell code RuleID : 16479 - Type : SERVER-APACHE - Revision : 5 |
2014-01-10 | Apache mod_ssl non-SSL connection to SSL port denial of service attempt RuleID : 11263 - Type : SERVER-APACHE - Revision : 8 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-6744ca470d.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-6ffb18592f.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-9cdbb641f9.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-eec13e2e8d.nasl - Type: ACT_GATHER_INFO |
2018-12-17 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1104.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2478.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2972.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1104.nasl - Type: ACT_GATHER_INFO |
2018-10-22 | Name: The remote Fedora host is missing a security update. File: fedora_2018-bb9d24c82d.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote web server is affected by a denial of service vulnerability. File: apache_2_4_35.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_e182c076c18911e8a6d2b499baebfeaf.nasl - Type: ACT_GATHER_INFO |
2018-09-11 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0089.nasl - Type: ACT_GATHER_INFO |
2018-09-05 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0181.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0027.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0126.nasl - Type: ACT_GATHER_INFO |
2018-08-16 | Name: The remote web server is affected by multiple vulnerabilities. File: apache_2_4_34.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0037.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0039.nasl - Type: ACT_GATHER_INFO |
2018-07-20 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2018-199-01.nasl - Type: ACT_GATHER_INFO |
2018-07-20 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_8b1a50ab8a8e11e8add2b499baebfeaf.nasl - Type: ACT_GATHER_INFO |
2018-07-03 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1212.nasl - Type: ACT_GATHER_INFO |
2018-07-03 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1213.nasl - Type: ACT_GATHER_INFO |
2018-05-31 | Name: The remote Debian host is missing a security update. File: debian_DLA-1389.nasl - Type: ACT_GATHER_INFO |
2018-05-29 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1151.nasl - Type: ACT_GATHER_INFO |
2018-05-29 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1152.nasl - Type: ACT_GATHER_INFO |