This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Canonical First view 2006-07-27
Product Ubuntu Linux Last view 2023-12-12
Version 6.10 Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:canonical:ubuntu_linux

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.4 2023-12-12 CVE-2023-5536

A feature in LXD (LP#1829071), affects the default configuration of Ubuntu Server which allows privileged users in the lxd group to escalate their privilege to root without requiring a sudo password.

7.8 2021-04-17 CVE-2021-3493

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

7.8 2021-04-17 CVE-2021-3492

Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (kernel memory exhaustion) or gain privileges via executing arbitrary code. AKA ZDI-CAN-13562.

7.8 2016-12-16 CVE-2016-9950

An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.

7.8 2016-12-16 CVE-2016-9949

An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.

7.8 2016-11-27 CVE-2015-1328

The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.

7.5 2008-03-19 CVE-2008-0063

The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."

9.8 2008-03-19 CVE-2008-0062

KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.

9.3 2008-03-17 CVE-2008-0888

The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data.

9.3 2008-03-06 CVE-2008-1195

Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.

9.3 2008-01-18 CVE-2007-6427

The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990.

4.3 2008-01-11 CVE-2008-0005

mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.

7.5 2008-01-10 CVE-2008-0226

Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.

4 2008-01-09 CVE-2007-4772

The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.

4.3 2007-12-13 CVE-2007-5000

Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

2.1 2007-12-03 CVE-2007-6206

The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.

4.3 2007-10-08 CVE-2007-5268

pngrtran.c in libpng before 1.0.29 and 1.2.x before 1.2.21 use (1) logical instead of bitwise operations and (2) incorrect comparisons, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG image.

7.2 2007-10-04 CVE-2007-5191

mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.

7.8 2007-09-24 CVE-2007-4988

Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.

6.9 2007-09-21 CVE-2007-5023

Unquoted Windows search path vulnerability in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075, and Server before 1.0.4 Build 56528 allows local users to gain privileges via unspecified vectors, possibly involving a malicious "program.exe" file in the C: folder.

5.5 2007-09-21 CVE-2007-4497

Unspecified vulnerability in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows users with login access to a guest operating system to cause a denial of service (guest outage and host process crash or hang) via unspecified vectors.

6.5 2007-09-21 CVE-2007-4496

Unspecified vulnerability in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows authenticated users with administrative privileges on a guest operating system to corrupt memory and possibly execute arbitrary code on the host operating system via unspecified vectors.

10 2007-09-21 CVE-2007-0063

Integer underflow in the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed DHCP packet that triggers a stack-based buffer overflow.

10 2007-09-21 CVE-2007-0061

The DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed packet that triggers "corrupt stack memory."

9.3 2007-09-18 CVE-2007-2834

Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite); allows remote attackers to execute arbitrary code via a TIFF file with crafted values of unspecified length fields, which triggers allocation of an incorrect amount of memory, resulting in a heap-based buffer overflow.

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
14% (9) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
8% (5) CWE-264 Permissions, Privileges, and Access Controls
6% (4) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
6% (4) CWE-20 Improper Input Validation
4% (3) CWE-787 Out-of-bounds Write
4% (3) CWE-200 Information Exposure
4% (3) CWE-190 Integer Overflow or Wraparound
4% (3) CWE-189 Numeric Errors
3% (2) CWE-617 Reachable Assertion
3% (2) CWE-415 Double Free
3% (2) CWE-399 Resource Management Errors
3% (2) CWE-254 Security Features
3% (2) CWE-252 Unchecked Return Value
3% (2) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
3% (2) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (1) CWE-681 Incorrect Conversion between Numeric Types
1% (1) CWE-674 Uncontrolled Recursion
1% (1) CWE-667 Insufficient Locking
1% (1) CWE-665 Improper Initialization
1% (1) CWE-416 Use After Free
1% (1) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
1% (1) CWE-306 Missing Authentication for Critical Function
1% (1) CWE-276 Incorrect Default Permissions
1% (1) CWE-269 Improper Privilege Management
1% (1) CWE-191 Integer Underflow (Wrap or Wraparound)

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-26 Leveraging Race Conditions
CAPEC-28 Fuzzing
CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-30 Hijacking a Privileged Thread of Execution
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-52 Embedding NULL Bytes
CAPEC-53 Postfix, Null Terminate, and Backslash
CAPEC-63 Simple Script Injection
CAPEC-64 Using Slashes and URL Encoding Combined to Bypass Validation Logic

SAINT Exploits

Description Link
Ubuntu overlayfs privilege elevation More info here
MySQL yaSSL SSL Hello message buffer overflow More info here

Open Source Vulnerability Database (OSVDB)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
43498 Mozilla Firefox FTP Protocol PASV Response Client Manipulation
43342 MIT Kerberos 5 KDC (krb5kdc) Error Response Information Disclosure
43341 MIT Kerberos 5 KDC (krb5kdc) Arbitrary Memory Disclosure
43332 UnZip inflate.c inflate_dynamic() Function NEEDBITS Macro Unspecified Code Ex...
43180 MySQL sql_select.cc INFORMATION_SCHEMA Table Crafted Query Remote DoS
42601 Sun Java JRE JavaScript Arbitrary Java API Access
42214 Apache HTTP Server mod_proxy_ftp UTF-7 Encoded XSS
41935 yaSSL hash.cpp HASHwithTransform::Update Function Remote Overflow
41325 ImageMagick ReadDIBImage Function Image File Handling Overflow
41196 yaSSL yassl_imp.cpp input_buffer& operator>> Remote Overflow
41195 yaSSL handshake.cpp ProcessOldClientHello Function Remote Overflow
40942 X.Org Xserver XInput Extension Multiple Function Arbitrary Code Execution
40912 util-linux Multiple Utilities Function Check Weakness Local Privilege Escalat...
40905 TCL in PostgreSQL Crafted Regexp Infinite Loop Remote DoS
40546 OpenOffice.org (OOo) TIFF Handling Arbitrary Code Execution
40127 PDFedit StreamPredictor::StreamPredictor() PDF Handling Overflow
40097 VMware Multiple Products C: Folder Search Path Local Privilege Escalation
40096 VMware Multiple Products Guest Image Login Unspecified DoS
40095 VMware Multiple Products Unspecified Administrative Memory Corruption Guest I...
40094 VMware Multiple Products DHCP Server Packet Handling Multiple Remote Overflows
40093 VMware Multiple Products DHCP Server Remote Memory Corruption Arbitrary Code ...
39243 Linux Kernel fs/exec.c do_coredump() Function Local Information Disclosure
39134 Apache mod_imagemap Module Imagemap Unspecified XSS
39133 Apache mod_imap Module Imagemap File Unspecified XSS
38939 Apache HTTP Server Prefork MPM Module Array Modification Local DoS

ExploitDB Exploits

id Description
17393 Oracle HTTP Server XSS Header Injection

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-06-21 Name : PHP version smaller than 4.4.5
File : nvt/nopsec_php_4_4_5.nasl
2012-06-21 Name : PHP version smaller than 4.4.8
File : nvt/nopsec_php_4_4_8.nasl
2012-06-21 Name : PHP version smaller than 5.2.1
File : nvt/nopsec_php_5_2_1.nasl
2011-08-09 Name : CentOS Update for kernel CESA-2009:0001-01 centos2 i386
File : nvt/gb_CESA-2009_0001-01_kernel_centos2_i386.nasl
2011-01-04 Name : HP-UX Update for Apache-based Web Server HPSBUX02612
File : nvt/gb_hp_ux_HPSBUX02612.nasl
2010-09-10 Name : SuSE Update for kernel SUSE-SA:2010:036
File : nvt/gb_suse_2010_036.nasl
2010-05-28 Name : Java for Mac OS X 10.5 Update 2
File : nvt/macosx_java_for_10_5_upd_2.nasl
2010-05-12 Name : Mac OS X Security Update 2007-009
File : nvt/macosx_secupd_2007-009.nasl
2010-05-12 Name : Mac OS X Security Update 2008-007
File : nvt/macosx_secupd_2008-007.nasl
2010-05-12 Name : Mac OS X Security Update 2009-001
File : nvt/macosx_secupd_2009-001.nasl
2010-05-12 Name : Mac OS X 10.5.3 Update / Mac OS X Security Update 2008-003
File : nvt/macosx_upd_10_5_3_secupd_2008-003.nasl
2010-05-12 Name : Mac OS X 10.6.3 Update / Mac OS X Security Update 2010-002
File : nvt/macosx_upd_10_6_3_secupd_2010-002.nasl
2010-04-23 Name : PHP 5.2.0 and Prior Versions Multiple Vulnerabilities
File : nvt/gb_php_22496.nasl
2010-04-21 Name : PHP sqlite_udf_decode_binary() Function Buffer Overflow Vulnerability
File : nvt/gb_php_23235.nasl
2010-02-15 Name : Solaris Update for Samba 114684-15
File : nvt/gb_solaris_114684_15.nasl
2010-02-15 Name : Solaris Update for Samba 114685-15
File : nvt/gb_solaris_114685_15.nasl
2010-02-03 Name : Solaris Update for Apache 1.3 122911-19
File : nvt/gb_solaris_122911_19.nasl
2010-02-03 Name : Solaris Update for Apache 1.3 122912-19
File : nvt/gb_solaris_122912_19.nasl
2009-11-23 Name : Debian Security Advisory DSA 1936-1 (libgd2)
File : nvt/deb_1936_1.nasl
2009-11-17 Name : Mac OS X Version
File : nvt/macosx_version.nasl
2009-10-22 Name : HP-UX Update for Apache-based Web Server HPSBUX02465
File : nvt/gb_hp_ux_HPSBUX02465.nasl
2009-10-13 Name : Debian Security Advisory DSA 1903-1 (graphicsmagick)
File : nvt/deb_1903_1.nasl
2009-10-13 Name : Solaris Update for Samba 114684-14
File : nvt/gb_solaris_114684_14.nasl
2009-10-13 Name : Solaris Update for Samba 114685-14
File : nvt/gb_solaris_114685_14.nasl
2009-10-13 Name : Solaris Update for Mozilla 1.7 119115-35
File : nvt/gb_solaris_119115_35.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2014-A-0009 Multiple Vulnerabilities in Oracle Fusion Middleware
Severity: Category I - VMSKEY: V0043395

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-01-07 yaSSL SSL Hello Message buffer overflow attempt
RuleID : 52366 - Type : SERVER-MYSQL - Revision : 1
2017-09-21 Mozilla Firefox memory corruption attempt
RuleID : 44049 - Type : BROWSER-FIREFOX - Revision : 2
2017-09-21 Mozilla Firefox memory corruption attempt
RuleID : 44048 - Type : BROWSER-FIREFOX - Revision : 2
2017-09-21 Mozilla Firefox memory corruption attempt
RuleID : 44047 - Type : BROWSER-FIREFOX - Revision : 2
2017-09-21 Mozilla Firefox memory corruption attempt
RuleID : 44046 - Type : BROWSER-FIREFOX - Revision : 2
2017-09-21 Mozilla Firefox invalid watchpoint memory corruption attempt
RuleID : 44045 - Type : BROWSER-FIREFOX - Revision : 2
2017-09-21 Mozilla Firefox invalid watchpoint memory corruption attempt
RuleID : 44044 - Type : BROWSER-FIREFOX - Revision : 2
2017-09-21 Mozilla browsers JavaScript argument passing code execution attempt
RuleID : 44043 - Type : BROWSER-FIREFOX - Revision : 1
2017-01-19 Ubuntu Apport CrashDB crash report code injection attempt
RuleID : 41041 - Type : OS-LINUX - Revision : 2
2017-01-19 Ubuntu Apport CrashDB crash report code injection attempt
RuleID : 41040 - Type : OS-LINUX - Revision : 2
2014-01-10 yaSSL SSL Hello Message Buffer Overflow attempt
RuleID : 18513 - Type : SERVER-MYSQL - Revision : 13
2014-01-10 Mozilla products frame comment objects manipulation memory corruption attempt
RuleID : 18296 - Type : BROWSER-FIREFOX - Revision : 5
2014-01-10 MIT Kerberos V% KAdminD klog_vsyslog server overflow attempt
RuleID : 16207 - Type : SERVER-WEBAPP - Revision : 11
2014-01-10 Mozilla browsers JavaScript argument passing code execution attempt
RuleID : 16005 - Type : BROWSER-FIREFOX - Revision : 12
2014-01-10 Mozilla products frame comment objects manipulation memory corruption attempt
RuleID : 15999 - Type : BROWSER-FIREFOX - Revision : 9
2014-01-10 OpenOffice TIFF parsing integer overflow attempt
RuleID : 15976 - Type : FILE-IMAGE - Revision : 6
2014-01-10 OpenOffice TIFF parsing integer overflow attempt
RuleID : 15975 - Type : FILE-IMAGE - Revision : 6
2014-01-10 yaSSL SSLv3 Client Hello Message Cipher Specs Buffer Overflow attempt
RuleID : 13714 - Type : SERVER-MYSQL - Revision : 16
2014-01-10 yaSSL SSLv2 Client Hello Message Challenge Buffer Overflow attempt
RuleID : 13713 - Type : MYSQL - Revision : 9
2014-01-10 yaSSL SSLv2 Client Hello Message Session ID Buffer Overflow attempt
RuleID : 13712 - Type : MYSQL - Revision : 9
2014-01-10 yaSSL SSLv2 Client Hello Message Cipher Length Buffer Overflow attempt
RuleID : 13711 - Type : MYSQL - Revision : 9
2014-01-10 yaSSL SSL Hello Message Buffer Overflow attempt
RuleID : 13593 - Type : MYSQL - Revision : 7
2014-01-10 OpenLDAP BIND request denial of service attempt
RuleID : 13425 - Type : SERVER-OTHER - Revision : 6
2014-01-10 Apache http server mod_proxy http response crafted date handling denial of se...
RuleID : 13311 - Type : WEB-MISC - Revision : 7
2014-01-10 Apache http server mod_proxy http response crafted date handling denial of se...
RuleID : 13310 - Type : WEB-MISC - Revision : 7

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-05-01 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2018-120-01.nasl - Type: ACT_GATHER_INFO
2016-12-15 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-3157-1.nasl - Type: ACT_GATHER_INFO
2016-03-08 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2016-0677-1.nasl - Type: ACT_GATHER_INFO
2016-02-26 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2016-271.nasl - Type: ACT_GATHER_INFO
2016-02-25 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2016-0555-1.nasl - Type: ACT_GATHER_INFO
2016-02-24 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2016-253.nasl - Type: ACT_GATHER_INFO
2016-02-23 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2016-0539-1.nasl - Type: ACT_GATHER_INFO
2015-10-29 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2015-604.nasl - Type: ACT_GATHER_INFO
2015-07-16 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_ca139c7f2a8c11e5a4a5002590263bf5.nasl - Type: ACT_GATHER_INFO
2015-06-22 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2640-2.nasl - Type: ACT_GATHER_INFO
2015-06-22 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2642-2.nasl - Type: ACT_GATHER_INFO
2015-06-22 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2643-2.nasl - Type: ACT_GATHER_INFO
2015-06-22 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2644-2.nasl - Type: ACT_GATHER_INFO
2015-06-22 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2646-2.nasl - Type: ACT_GATHER_INFO
2015-06-16 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2640-1.nasl - Type: ACT_GATHER_INFO
2015-06-16 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2642-1.nasl - Type: ACT_GATHER_INFO
2015-06-16 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2643-1.nasl - Type: ACT_GATHER_INFO
2015-06-16 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2644-1.nasl - Type: ACT_GATHER_INFO
2015-06-16 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2645-1.nasl - Type: ACT_GATHER_INFO
2015-06-16 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2646-1.nasl - Type: ACT_GATHER_INFO
2015-06-16 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-2647-1.nasl - Type: ACT_GATHER_INFO
2015-04-02 Name: The remote host is missing Sun security patch number 119059-46.
File: solaris10_119059_46.nasl - Type: ACT_GATHER_INFO
2015-04-02 Name: The remote host is missing Sun security patch number 119060-45.
File: solaris10_x86_119060_45.nasl - Type: ACT_GATHER_INFO
2014-12-15 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201412-11.nasl - Type: ACT_GATHER_INFO
2014-10-10 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL6669.nasl - Type: ACT_GATHER_INFO