Summary
Detail | |||
---|---|---|---|
Vendor | Mozilla | First view | 2004-08-06 |
Product | Firefox | Last view | 2025-02-04 |
Version | 0.5 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:mozilla:firefox |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2025-02-04 | CVE-2025-1020 | Memory safety bugs present in Firefox 134 and Thunderbird 134. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135 and Thunderbird < 135. |
4.3 | 2025-02-04 | CVE-2025-1019 | The z-order of the browser windows could be manipulated to hide the fullscreen notification. This could potentially be leveraged to perform a spoofing attack. This vulnerability affects Firefox < 135 and Thunderbird < 135. |
5.3 | 2025-02-04 | CVE-2025-1018 | The fullscreen notification is prematurely hidden when fullscreen is re-requested quickly by the user. This could have been leveraged to perform a potential spoofing attack. This vulnerability affects Firefox < 135 and Thunderbird < 135. |
9.8 | 2025-02-04 | CVE-2025-1017 | Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135. |
9.8 | 2025-02-04 | CVE-2025-1016 | Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135. |
8.8 | 2025-02-04 | CVE-2025-1014 | Certificate length was not properly checked when added to a certificate store. In practice only trusted data was processed. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135. |
7.5 | 2025-02-04 | CVE-2025-1012 | A race during concurrent delazification could have led to a use-after-free. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135. |
8.8 | 2025-02-04 | CVE-2025-1011 | A bug in WebAssembly code generation could have lead to a crash. It may have been possible for an attacker to leverage this to achieve code execution. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135. |
8.8 | 2025-02-04 | CVE-2025-1010 | An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135. |
9.8 | 2025-02-04 | CVE-2025-1009 | An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135. |
6.5 | 2024-11-06 | CVE-2024-10941 | A malicious website could have included an iframe with an malformed URI resulting in a non-exploitable browser crash. This vulnerability affects Firefox < 126. |
5.3 | 2024-10-29 | CVE-2024-10468 | Potential race conditions in IndexedDB could have caused memory corruption, leading to a potentially exploitable crash. This vulnerability affects Firefox < 132 and Thunderbird < 132. |
8.8 | 2024-10-29 | CVE-2024-10467 | Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. |
7.5 | 2024-10-29 | CVE-2024-10466 | By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. |
6.5 | 2024-10-29 | CVE-2024-10465 | A clipboard "paste" button could persist across tabs which allowed a spoofing attack. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. |
6.5 | 2024-10-29 | CVE-2024-10464 | Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. |
6.5 | 2024-10-29 | CVE-2024-10463 | Video frames could have been leaked between origins in some situations. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132. |
6.5 | 2024-10-29 | CVE-2024-10462 | Truncation of a long URL could have allowed origin spoofing in a permission prompt. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. |
6.1 | 2024-10-29 | CVE-2024-10461 | In multipart/x-mixed-replace responses, `Content-Disposition: attachment` in the response header was not respected and did not force a download, which could allow XSS attacks. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. |
5.3 | 2024-10-29 | CVE-2024-10460 | The origin of an external protocol handler prompt could have been obscured using a data: URL within an `iframe`. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. |
7.5 | 2024-10-29 | CVE-2024-10459 | An attacker could have caused a use-after-free when accessibility was enabled, leading to a potentially exploitable crash. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132. |
7.5 | 2024-10-29 | CVE-2024-10458 | A permission leak could have occurred from a trusted site to an untrusted site via `embed` or `object` elements. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132. |
9.8 | 2024-10-09 | CVE-2024-9680 | An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0. |
7.5 | 2024-10-01 | CVE-2024-9399 | A website configured to initiate a specially crafted WebTransport session could crash the Firefox process leading to a denial of service condition. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131. |
5.3 | 2024-10-01 | CVE-2024-9398 | By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
15% (253) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
12% (215) | CWE-416 | Use After Free |
10% (177) | CWE-787 | Out-of-bounds Write |
7% (123) | CWE-20 | Improper Input Validation |
6% (111) | CWE-200 | Information Exposure |
6% (107) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
5% (98) | CWE-264 | Permissions, Privileges, and Access Controls |
4% (75) | CWE-399 | Resource Management Errors |
2% (43) | CWE-125 | Out-of-bounds Read |
2% (41) | CWE-362 | Race Condition |
2% (37) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (30) | CWE-346 | Origin Validation Error |
1% (28) | CWE-189 | Numeric Errors |
1% (21) | CWE-254 | Security Features |
1% (20) | CWE-190 | Integer Overflow or Wraparound |
0% (16) | CWE-17 | Code |
0% (15) | CWE-269 | Improper Privilege Management |
0% (14) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
0% (14) | CWE-203 | Information Exposure Through Discrepancy |
0% (13) | CWE-284 | Access Control (Authorization) Issues |
0% (11) | CWE-295 | Certificate Issues |
0% (10) | CWE-287 | Improper Authentication |
0% (9) | CWE-352 | Cross-Site Request Forgery (CSRF) |
0% (9) | CWE-310 | Cryptographic Issues |
0% (8) | CWE-74 | Failure to Sanitize Data into a Different Plane ('Injection') |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-26 | Leveraging Race Conditions |
CAPEC-29 | Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
CAPEC-172 | Time and State Attacks |
SAINT Exploits
Description | Link |
---|---|
Mozilla Firefox PKCS11 Module Installation Code Execution | More info here |
Firefox AttributeChildRemoved Use After Free | More info here |
Mozilla Firefox nsTreeRange Use After Free | More info here |
Firefox sensor.dll Insecure Library Loading | More info here |
Mozilla Firefox OBJECT mChannel Use-After-Free | More info here |
Mozilla Firefox UTF-8 URL buffer overflow | More info here |
Mozilla Firefox onreadystatechange Event Use After Free | More info here |
Mozilla Firefox XMLSerializer serializeToStream Use-after-free Vulnerability | More info here |
Firefox crypto.generateCRMFRequest command execution | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
77955 | Mozilla Multiple Product for Mac DOM Frame Deletion NULL Dereference Remote C... |
77609 | Mozilla Multiple Product CSS Token Sequence Parsing Timing Attack Remote Info... |
77539 | Mozilla Firefox Cache Objects IFRAME Handling Browsing History Disclosure |
76954 | Mozilla Multiple Product WebGL GPU Memory Random Image Disclosure |
76952 | Mozilla Multiple Product Firebug JavaScript File Profiling Remote Memory Corr... |
76950 | Mozilla Multiple Product Unchecked Allocation Failure Remote Memory Corruption |
76949 | Mozilla Multiple Product SVG <mpath> Non-SVG Link Remote Memory Corruption |
76948 | Mozilla Multiple Product Shift-JIS XSS |
76947 | Mozilla Multiple Product JSSubScriptLoader loadSubScript Method XPCNativeWrap... |
75847 | Mozilla Multiple Product Multiple Tab Handling Keystroke Disclosure |
75844 | Mozilla Multiple Product YARR Unspecified Memory Corruption |
75843 | Mozilla Multiple Product WebGL Test Case Unspecified Out-of-bounds Write Memo... |
75842 | Mozilla Multiple Product WebGL ANGLE GrowAtomTable() Function Overflow |
75841 | Mozilla Multiple Product Enter Key Download Dialog Verification Bypass |
75840 | Mozilla Multiple Product PLUGINSPAGE Enter Key Addon Installation Verificatio... |
75839 | Mozilla Multiple Product Multiple Header Handling HTTP Response Splitting Wea... |
75838 | Mozilla Multiple Product window.location Named Frame Creation Same Origin Pol... |
75834 | Mozilla Multiple Product Multiple Unspecified Memory Corruption (2011-2995) |
74587 | Mozilla Multiple Products Tab Element Dropping Weakness Remote Code Execution |
74586 | Mozilla Multiple Products RegExp.input Property Same Origin Policy Bypass Inf... |
74585 | Mozilla Multiple Products Multiple Unspecified Memory Corruption (2011-2982) |
74584 | Mozilla Multiple Products Event-Management Same Origin Policy Bypass Remote C... |
74583 | Mozilla Multiple Products ThinkPadSensor::Startup() Function Path Subversion ... |
74582 | Mozilla Multiple Products .appendChild() Function DOM Object Handling Remote ... |
74581 | Mozilla Multiple Products SVGTextElement.getCharNumAtPosition() Function SVG ... |
ExploitDB Exploits
id | Description |
---|---|
34363 | Firefox toString console.time Privileged Javascript Injection |
30474 | Firefox 5.0 - 15.0.1 - __exposedProps__ XCS Code Execution |
18531 | Mozilla Firefox Firefox 4.0.1 Array.reduceRight() Exploit |
17974 | Mozilla Firefox Array.reduceRight() Integer Overflow Exploit |
14422 | libpng <= 1.4.2 Denial of Service Vulnerability |
10544 | Mozilla Firefox Location Bar Spoofing Vulnerability |
9663 | Mozilla Firefox 2.0.0.16 UTF-8 URL Remote Buffer Overflow Exploit |
3340 | Mozilla Firefox <= 2.0.0.1 (location.hostname) Cross-Domain Vulnerability |
OpenVAS Exploits
id | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2406-1 (icedove - several vulnerabilities) File : nvt/deb_2406_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2458-2 (iceape - several vulnerabilities) File : nvt/deb_2458_2.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2553-1 (iceweasel - several vulnerabilities) File : nvt/deb_2553_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2583-1 (iceweasel - several vulnerabilities) File : nvt/deb_2583_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2584-1 (iceape - several vulnerabilities) File : nvt/deb_2584_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2588-1 (icedove - several vulnerabilities) File : nvt/deb_2588_1.nasl |
2013-04-01 | Name : Mozilla Firefox ESR Code Execution Vulnerabilities - November12 (Mac OS X) File : nvt/gb_mozilla_firefox_esr_code_exec_vuln_nov12_macosx.nasl |
2013-04-01 | Name : Mozilla Firefox ESR Code Execution Vulnerabilities - November12 (Windows) File : nvt/gb_mozilla_firefox_esr_code_exec_vuln_nov12_win.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox, openSUSE-SU-2012:0760-1 (MozillaFirefox,) File : nvt/gb_suse_2012_0760_1.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1064-1 (MozillaFirefox) File : nvt/gb_suse_2012_1064_1.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1345-1 (MozillaFirefox) File : nvt/gb_suse_2012_1345_1.nasl |
2012-12-13 | Name : SuSE Update for Mozilla Suite openSUSE-SU-2012:1412-1 (Mozilla Suite) File : nvt/gb_suse_2012_1412_1.nasl |
2012-12-06 | Name : Fedora Update for seamonkey FEDORA-2012-18931 File : nvt/gb_fedora_2012_18931_seamonkey_fc16.nasl |
2012-12-06 | Name : Fedora Update for seamonkey FEDORA-2012-18952 File : nvt/gb_fedora_2012_18952_seamonkey_fc17.nasl |
2012-12-04 | Name : Ubuntu Update for firefox USN-1638-3 File : nvt/gb_ubuntu_USN_1638_3.nasl |
2012-11-26 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox72.nasl |
2012-11-26 | Name : Mozilla Firefox Code Execution Vulnerabilities - November12 (Mac OS X) File : nvt/gb_mozilla_firefox_code_exec_vuln_nov12_macosx.nasl |
2012-11-26 | Name : Mozilla Firefox Code Execution Vulnerabilities - November12 (Windows) File : nvt/gb_mozilla_firefox_code_exec_vuln_nov12_win.nasl |
2012-11-26 | Name : Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Windows) File : nvt/gb_mozilla_firefox_esr_mult_vuln01_nov12_win.nasl |
2012-11-26 | Name : Mozilla Firefox Multiple Vulnerabilities - November12 (Mac OS X) File : nvt/gb_mozilla_firefox_mult_vuln_nov12_macosx.nasl |
2012-11-26 | Name : Mozilla Firefox Multiple Vulnerabilities - November12 (Windows) File : nvt/gb_mozilla_firefox_mult_vuln_nov12_win.nasl |
2012-11-26 | Name : Mozilla Firefox Multiple Vulnerabilities-01 November12 (Mac OS X) File : nvt/gb_mozilla_prdts_mult_vuln01_nov12_macosx.nasl |
2012-11-26 | Name : Mozilla Firefox Multiple Vulnerabilities-01 November12 (Windows) File : nvt/gb_mozilla_prdts_mult_vuln01_nov12_win.nasl |
2012-11-26 | Name : Mozilla Firefox Multiple Vulnerabilities-02 November12 (Mac OS X) File : nvt/gb_mozilla_prdts_mult_vuln02_nov12_macosx.nasl |
2012-11-26 | Name : Mozilla Firefox Multiple Vulnerabilities-02 November12 (Windows) File : nvt/gb_mozilla_prdts_mult_vuln02_nov12_win.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0223 | Multiple Security Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0061473 |
2014-A-0113 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0053309 |
2014-A-0082 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0052487 |
2014-A-0064 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0050011 |
2014-A-0043 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0046769 |
2014-B-0024 | Multiple Security Vulnerabilities in Apple iOS Severity: Category I - VMSKEY: V0046157 |
2014-A-0030 | Apple Mac OS X Security Update 2014-001 Severity: Category I - VMSKEY: V0044547 |
2014-A-0021 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0043921 |
2014-A-0009 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0043395 |
2013-A-0233 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0042596 |
2013-A-0220 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0042380 |
2013-B-0124 | Multiple Vulnerabilities in Google Chrome Severity: Category I - VMSKEY: V0042301 |
2013-A-0203 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0041365 |
2011-A-0160 | Multiple Vulnerabilities in VMware vCenter Server 4.0 and vCenter Update Mana... Severity: Category I - VMSKEY: V0030769 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Mozilla regular expression heap corruption attempt RuleID : 8443 - Type : BROWSER-FIREFOX - Revision : 15 |
2014-01-10 | Mozilla regular expression heap corruption attempt RuleID : 8442 - Type : SMTP - Revision : 2 |
2021-01-05 | Mozilla Firefox default content process DACL sandbox escape attempt RuleID : 56542 - Type : BROWSER-FIREFOX - Revision : 1 |
2021-01-05 | Mozilla Firefox default content process DACL sandbox escape attempt RuleID : 56541 - Type : BROWSER-FIREFOX - Revision : 1 |
2020-07-23 | Mozilla Firefox ReadableStreamCloseInternal out-of-bounds access attempt RuleID : 54380 - Type : BROWSER-FIREFOX - Revision : 1 |
2020-07-23 | Mozilla Firefox ReadableStreamCloseInternal out-of-bounds access attempt RuleID : 54379 - Type : BROWSER-FIREFOX - Revision : 1 |
2020-05-07 | Mozilla Firefox potential use after free attempt RuleID : 53581 - Type : BROWSER-FIREFOX - Revision : 1 |
2020-05-07 | Mozilla Firefox potential use after free attempt RuleID : 53580 - Type : BROWSER-FIREFOX - Revision : 1 |
2020-02-11 | Mozilla multiple products SharedWorker MessagePort memory corruption attempt RuleID : 52569 - Type : BROWSER-FIREFOX - Revision : 1 |
2020-01-16 | Mozilla Firefox JavaScript engine integer overflow attempt RuleID : 52473 - Type : BROWSER-FIREFOX - Revision : 1 |
2020-01-16 | Mozilla Firefox JavaScript engine integer overflow attempt RuleID : 52472 - Type : BROWSER-FIREFOX - Revision : 1 |
2020-01-14 | IonMonkey MArraySlice buffer overflow attempt RuleID : 52431 - Type : BROWSER-FIREFOX - Revision : 1 |
2020-01-14 | IonMonkey MArraySlice buffer overflow attempt RuleID : 52430 - Type : BROWSER-FIREFOX - Revision : 1 |
2020-01-14 | Mozilla Firefox RemotePrompt sandbox escape attempt RuleID : 52425 - Type : BROWSER-FIREFOX - Revision : 1 |
2020-01-14 | Mozilla Firefox RemotePrompt sandbox escape attempt RuleID : 52424 - Type : BROWSER-FIREFOX - Revision : 1 |
2019-12-24 | Mutiple products libpng extra row heap overflow attempt RuleID : 52307 - Type : FILE-IMAGE - Revision : 1 |
2019-12-24 | Mutiple products libpng extra row heap overflow attempt RuleID : 52306 - Type : FILE-IMAGE - Revision : 1 |
2019-10-08 | Mozilla Firefox Custom Elements write-after-free attempt RuleID : 51440 - Type : BROWSER-FIREFOX - Revision : 1 |
2019-10-08 | Mozilla Firefox Custom Elements write-after-free attempt RuleID : 51439 - Type : BROWSER-FIREFOX - Revision : 1 |
2019-08-13 | Mozilla Firefox RemotePrompt sandbox escape attempt RuleID : 50697 - Type : BROWSER-FIREFOX - Revision : 2 |
2019-08-13 | Mozilla Firefox RemotePrompt sandbox escape attempt RuleID : 50696 - Type : BROWSER-FIREFOX - Revision : 2 |
2019-07-31 | Mozilla Firefox Array.prototype.pop type confusion attempt RuleID : 50519 - Type : BROWSER-FIREFOX - Revision : 2 |
2019-07-31 | Mozilla Firefox Array.prototype.pop type confusion attempt RuleID : 50518 - Type : BROWSER-FIREFOX - Revision : 2 |
2019-05-24 | Mozilla Firefox DOMSVGLength appendItem use after free attempt RuleID : 49918 - Type : BROWSER-FIREFOX - Revision : 1 |
2019-05-24 | Mozilla Firefox DOMSVGLength appendItem use after free attempt RuleID : 49917 - Type : BROWSER-FIREFOX - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-34f7f68029.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-def329f680.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-fd194a1f14.nasl - Type: ACT_GATHER_INFO |
2018-12-28 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1414.nasl - Type: ACT_GATHER_INFO |
2018-12-27 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2018-3831.nasl - Type: ACT_GATHER_INFO |
2018-12-27 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2018-3833.nasl - Type: ACT_GATHER_INFO |
2018-12-18 | Name: A web browser installed on the remote macOS host is affected by multiple vuln... File: macosx_firefox_62_0.nasl - Type: ACT_GATHER_INFO |
2018-12-14 | Name: The remote Debian host is missing a security update. File: debian_DLA-1605.nasl - Type: ACT_GATHER_INFO |
2018-12-13 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4354.nasl - Type: ACT_GATHER_INFO |
2018-12-13 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_d10b49b28d0249e8afde0844626317af.nasl - Type: ACT_GATHER_INFO |
2018-12-12 | Name: A web browser installed on the remote macOS host is affected by multiple vuln... File: macosx_firefox_60_4_esr.nasl - Type: ACT_GATHER_INFO |
2018-12-12 | Name: A web browser installed on the remote macOS host is affected by multiple vuln... File: macosx_firefox_64_0.nasl - Type: ACT_GATHER_INFO |
2018-12-12 | Name: A web browser installed on the remote Windows host is affected by multiple vu... File: mozilla_firefox_60_4_esr.nasl - Type: ACT_GATHER_INFO |
2018-12-12 | Name: A web browser installed on the remote Windows host is affected by multiple vu... File: mozilla_firefox_64_0.nasl - Type: ACT_GATHER_INFO |
2018-12-11 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1384.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2831.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2885.nasl - Type: ACT_GATHER_INFO |
2018-11-26 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201811-10.nasl - Type: ACT_GATHER_INFO |
2018-11-26 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201811-13.nasl - Type: ACT_GATHER_INFO |
2018-11-21 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2018-3531.nasl - Type: ACT_GATHER_INFO |
2018-11-21 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2018-3532.nasl - Type: ACT_GATHER_INFO |
2018-11-13 | Name: The remote Debian host is missing a security update. File: debian_DLA-1575.nasl - Type: ACT_GATHER_INFO |
2018-11-13 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4337.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2018-3403.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201811-04.nasl - Type: ACT_GATHER_INFO |