Summary
Detail | |||
---|---|---|---|
Vendor | Canonical | First view | 2006-07-27 |
Product | Ubuntu Linux | Last view | 2023-12-12 |
Version | 6.10 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:canonical:ubuntu_linux |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.4 | 2023-12-12 | CVE-2023-5536 | A feature in LXD (LP#1829071), affects the default configuration of Ubuntu Server which allows privileged users in the lxd group to escalate their privilege to root without requiring a sudo password. |
7.8 | 2021-04-17 | CVE-2021-3493 | The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges. |
7.8 | 2021-04-17 | CVE-2021-3492 | Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (kernel memory exhaustion) or gain privileges via executing arbitrary code. AKA ZDI-CAN-13562. |
7.8 | 2016-12-16 | CVE-2016-9950 | An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system. |
7.8 | 2016-12-16 | CVE-2016-9949 | An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code. |
7.8 | 2016-11-27 | CVE-2015-1328 | The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace. |
7.5 | 2008-03-19 | CVE-2008-0063 | The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values." |
9.8 | 2008-03-19 | CVE-2008-0062 | KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free. |
9.3 | 2008-03-17 | CVE-2008-0888 | The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data. |
9.3 | 2008-03-06 | CVE-2008-1195 | Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs. |
9.3 | 2008-01-18 | CVE-2007-6427 | The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990. |
4.3 | 2008-01-11 | CVE-2008-0005 | mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding. |
7.5 | 2008-01-10 | CVE-2008-0226 | Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp. |
4 | 2008-01-09 | CVE-2007-4772 | The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression. |
4.3 | 2007-12-13 | CVE-2007-5000 | Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
2.1 | 2007-12-03 | CVE-2007-6206 | The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information. |
4.3 | 2007-10-08 | CVE-2007-5268 | pngrtran.c in libpng before 1.0.29 and 1.2.x before 1.2.21 use (1) logical instead of bitwise operations and (2) incorrect comparisons, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG image. |
7.2 | 2007-10-04 | CVE-2007-5191 | mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs. |
7.8 | 2007-09-24 | CVE-2007-4988 | Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow. |
6.9 | 2007-09-21 | CVE-2007-5023 | Unquoted Windows search path vulnerability in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075, and Server before 1.0.4 Build 56528 allows local users to gain privileges via unspecified vectors, possibly involving a malicious "program.exe" file in the C: folder. |
5.5 | 2007-09-21 | CVE-2007-4497 | Unspecified vulnerability in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows users with login access to a guest operating system to cause a denial of service (guest outage and host process crash or hang) via unspecified vectors. |
6.5 | 2007-09-21 | CVE-2007-4496 | Unspecified vulnerability in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows authenticated users with administrative privileges on a guest operating system to corrupt memory and possibly execute arbitrary code on the host operating system via unspecified vectors. |
10 | 2007-09-21 | CVE-2007-0063 | Integer underflow in the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed DHCP packet that triggers a stack-based buffer overflow. |
10 | 2007-09-21 | CVE-2007-0061 | The DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed packet that triggers "corrupt stack memory." |
9.3 | 2007-09-18 | CVE-2007-2834 | Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite); allows remote attackers to execute arbitrary code via a TIFF file with crafted values of unspecified length fields, which triggers allocation of an incorrect amount of memory, resulting in a heap-based buffer overflow. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
14% (9) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
8% (5) | CWE-264 | Permissions, Privileges, and Access Controls |
6% (4) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
6% (4) | CWE-20 | Improper Input Validation |
4% (3) | CWE-787 | Out-of-bounds Write |
4% (3) | CWE-200 | Information Exposure |
4% (3) | CWE-190 | Integer Overflow or Wraparound |
4% (3) | CWE-189 | Numeric Errors |
3% (2) | CWE-617 | Reachable Assertion |
3% (2) | CWE-415 | Double Free |
3% (2) | CWE-399 | Resource Management Errors |
3% (2) | CWE-254 | Security Features |
3% (2) | CWE-252 | Unchecked Return Value |
3% (2) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
3% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (1) | CWE-681 | Incorrect Conversion between Numeric Types |
1% (1) | CWE-674 | Uncontrolled Recursion |
1% (1) | CWE-667 | Insufficient Locking |
1% (1) | CWE-665 | Improper Initialization |
1% (1) | CWE-416 | Use After Free |
1% (1) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
1% (1) | CWE-306 | Missing Authentication for Critical Function |
1% (1) | CWE-276 | Incorrect Default Permissions |
1% (1) | CWE-269 | Improper Privilege Management |
1% (1) | CWE-191 | Integer Underflow (Wrap or Wraparound) |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-7 | Blind SQL Injection |
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-22 | Exploiting Trust in Client (aka Make the Client Invisible) |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-26 | Leveraging Race Conditions |
CAPEC-28 | Fuzzing |
CAPEC-29 | Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
CAPEC-30 | Hijacking a Privileged Thread of Execution |
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-32 | Embedding Scripts in HTTP Query Strings |
CAPEC-42 | MIME Conversion |
CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-52 | Embedding NULL Bytes |
CAPEC-53 | Postfix, Null Terminate, and Backslash |
CAPEC-63 | Simple Script Injection |
CAPEC-64 | Using Slashes and URL Encoding Combined to Bypass Validation Logic |
SAINT Exploits
Description | Link |
---|---|
Ubuntu overlayfs privilege elevation | More info here |
MySQL yaSSL SSL Hello message buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
43498 | Mozilla Firefox FTP Protocol PASV Response Client Manipulation |
43342 | MIT Kerberos 5 KDC (krb5kdc) Error Response Information Disclosure |
43341 | MIT Kerberos 5 KDC (krb5kdc) Arbitrary Memory Disclosure |
43332 | UnZip inflate.c inflate_dynamic() Function NEEDBITS Macro Unspecified Code Ex... |
43180 | MySQL sql_select.cc INFORMATION_SCHEMA Table Crafted Query Remote DoS |
42601 | Sun Java JRE JavaScript Arbitrary Java API Access |
42214 | Apache HTTP Server mod_proxy_ftp UTF-7 Encoded XSS |
41935 | yaSSL hash.cpp HASHwithTransform::Update Function Remote Overflow |
41325 | ImageMagick ReadDIBImage Function Image File Handling Overflow |
41196 | yaSSL yassl_imp.cpp input_buffer& operator>> Remote Overflow |
41195 | yaSSL handshake.cpp ProcessOldClientHello Function Remote Overflow |
40942 | X.Org Xserver XInput Extension Multiple Function Arbitrary Code Execution |
40912 | util-linux Multiple Utilities Function Check Weakness Local Privilege Escalat... |
40905 | TCL in PostgreSQL Crafted Regexp Infinite Loop Remote DoS |
40546 | OpenOffice.org (OOo) TIFF Handling Arbitrary Code Execution |
40127 | PDFedit StreamPredictor::StreamPredictor() PDF Handling Overflow |
40097 | VMware Multiple Products C: Folder Search Path Local Privilege Escalation |
40096 | VMware Multiple Products Guest Image Login Unspecified DoS |
40095 | VMware Multiple Products Unspecified Administrative Memory Corruption Guest I... |
40094 | VMware Multiple Products DHCP Server Packet Handling Multiple Remote Overflows |
40093 | VMware Multiple Products DHCP Server Remote Memory Corruption Arbitrary Code ... |
39243 | Linux Kernel fs/exec.c do_coredump() Function Local Information Disclosure |
39134 | Apache mod_imagemap Module Imagemap Unspecified XSS |
39133 | Apache mod_imap Module Imagemap File Unspecified XSS |
38939 | Apache HTTP Server Prefork MPM Module Array Modification Local DoS |
ExploitDB Exploits
id | Description |
---|---|
17393 | Oracle HTTP Server XSS Header Injection |
OpenVAS Exploits
id | Description |
---|---|
2012-06-21 | Name : PHP version smaller than 4.4.5 File : nvt/nopsec_php_4_4_5.nasl |
2012-06-21 | Name : PHP version smaller than 4.4.8 File : nvt/nopsec_php_4_4_8.nasl |
2012-06-21 | Name : PHP version smaller than 5.2.1 File : nvt/nopsec_php_5_2_1.nasl |
2011-08-09 | Name : CentOS Update for kernel CESA-2009:0001-01 centos2 i386 File : nvt/gb_CESA-2009_0001-01_kernel_centos2_i386.nasl |
2011-01-04 | Name : HP-UX Update for Apache-based Web Server HPSBUX02612 File : nvt/gb_hp_ux_HPSBUX02612.nasl |
2010-09-10 | Name : SuSE Update for kernel SUSE-SA:2010:036 File : nvt/gb_suse_2010_036.nasl |
2010-05-28 | Name : Java for Mac OS X 10.5 Update 2 File : nvt/macosx_java_for_10_5_upd_2.nasl |
2010-05-12 | Name : Mac OS X Security Update 2007-009 File : nvt/macosx_secupd_2007-009.nasl |
2010-05-12 | Name : Mac OS X Security Update 2008-007 File : nvt/macosx_secupd_2008-007.nasl |
2010-05-12 | Name : Mac OS X Security Update 2009-001 File : nvt/macosx_secupd_2009-001.nasl |
2010-05-12 | Name : Mac OS X 10.5.3 Update / Mac OS X Security Update 2008-003 File : nvt/macosx_upd_10_5_3_secupd_2008-003.nasl |
2010-05-12 | Name : Mac OS X 10.6.3 Update / Mac OS X Security Update 2010-002 File : nvt/macosx_upd_10_6_3_secupd_2010-002.nasl |
2010-04-23 | Name : PHP 5.2.0 and Prior Versions Multiple Vulnerabilities File : nvt/gb_php_22496.nasl |
2010-04-21 | Name : PHP sqlite_udf_decode_binary() Function Buffer Overflow Vulnerability File : nvt/gb_php_23235.nasl |
2010-02-15 | Name : Solaris Update for Samba 114684-15 File : nvt/gb_solaris_114684_15.nasl |
2010-02-15 | Name : Solaris Update for Samba 114685-15 File : nvt/gb_solaris_114685_15.nasl |
2010-02-03 | Name : Solaris Update for Apache 1.3 122911-19 File : nvt/gb_solaris_122911_19.nasl |
2010-02-03 | Name : Solaris Update for Apache 1.3 122912-19 File : nvt/gb_solaris_122912_19.nasl |
2009-11-23 | Name : Debian Security Advisory DSA 1936-1 (libgd2) File : nvt/deb_1936_1.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-22 | Name : HP-UX Update for Apache-based Web Server HPSBUX02465 File : nvt/gb_hp_ux_HPSBUX02465.nasl |
2009-10-13 | Name : Debian Security Advisory DSA 1903-1 (graphicsmagick) File : nvt/deb_1903_1.nasl |
2009-10-13 | Name : Solaris Update for Samba 114684-14 File : nvt/gb_solaris_114684_14.nasl |
2009-10-13 | Name : Solaris Update for Samba 114685-14 File : nvt/gb_solaris_114685_14.nasl |
2009-10-13 | Name : Solaris Update for Mozilla 1.7 119115-35 File : nvt/gb_solaris_119115_35.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2014-A-0009 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0043395 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-01-07 | yaSSL SSL Hello Message buffer overflow attempt RuleID : 52366 - Type : SERVER-MYSQL - Revision : 1 |
2017-09-21 | Mozilla Firefox memory corruption attempt RuleID : 44049 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla Firefox memory corruption attempt RuleID : 44048 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla Firefox memory corruption attempt RuleID : 44047 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla Firefox memory corruption attempt RuleID : 44046 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla Firefox invalid watchpoint memory corruption attempt RuleID : 44045 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla Firefox invalid watchpoint memory corruption attempt RuleID : 44044 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla browsers JavaScript argument passing code execution attempt RuleID : 44043 - Type : BROWSER-FIREFOX - Revision : 1 |
2017-01-19 | Ubuntu Apport CrashDB crash report code injection attempt RuleID : 41041 - Type : OS-LINUX - Revision : 2 |
2017-01-19 | Ubuntu Apport CrashDB crash report code injection attempt RuleID : 41040 - Type : OS-LINUX - Revision : 2 |
2014-01-10 | yaSSL SSL Hello Message Buffer Overflow attempt RuleID : 18513 - Type : SERVER-MYSQL - Revision : 13 |
2014-01-10 | Mozilla products frame comment objects manipulation memory corruption attempt RuleID : 18296 - Type : BROWSER-FIREFOX - Revision : 5 |
2014-01-10 | MIT Kerberos V% KAdminD klog_vsyslog server overflow attempt RuleID : 16207 - Type : SERVER-WEBAPP - Revision : 11 |
2014-01-10 | Mozilla browsers JavaScript argument passing code execution attempt RuleID : 16005 - Type : BROWSER-FIREFOX - Revision : 12 |
2014-01-10 | Mozilla products frame comment objects manipulation memory corruption attempt RuleID : 15999 - Type : BROWSER-FIREFOX - Revision : 9 |
2014-01-10 | OpenOffice TIFF parsing integer overflow attempt RuleID : 15976 - Type : FILE-IMAGE - Revision : 6 |
2014-01-10 | OpenOffice TIFF parsing integer overflow attempt RuleID : 15975 - Type : FILE-IMAGE - Revision : 6 |
2014-01-10 | yaSSL SSLv3 Client Hello Message Cipher Specs Buffer Overflow attempt RuleID : 13714 - Type : SERVER-MYSQL - Revision : 16 |
2014-01-10 | yaSSL SSLv2 Client Hello Message Challenge Buffer Overflow attempt RuleID : 13713 - Type : MYSQL - Revision : 9 |
2014-01-10 | yaSSL SSLv2 Client Hello Message Session ID Buffer Overflow attempt RuleID : 13712 - Type : MYSQL - Revision : 9 |
2014-01-10 | yaSSL SSLv2 Client Hello Message Cipher Length Buffer Overflow attempt RuleID : 13711 - Type : MYSQL - Revision : 9 |
2014-01-10 | yaSSL SSL Hello Message Buffer Overflow attempt RuleID : 13593 - Type : MYSQL - Revision : 7 |
2014-01-10 | OpenLDAP BIND request denial of service attempt RuleID : 13425 - Type : SERVER-OTHER - Revision : 6 |
2014-01-10 | Apache http server mod_proxy http response crafted date handling denial of se... RuleID : 13311 - Type : WEB-MISC - Revision : 7 |
2014-01-10 | Apache http server mod_proxy http response crafted date handling denial of se... RuleID : 13310 - Type : WEB-MISC - Revision : 7 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-05-01 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2018-120-01.nasl - Type: ACT_GATHER_INFO |
2016-12-15 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-3157-1.nasl - Type: ACT_GATHER_INFO |
2016-03-08 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2016-0677-1.nasl - Type: ACT_GATHER_INFO |
2016-02-26 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2016-271.nasl - Type: ACT_GATHER_INFO |
2016-02-25 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2016-0555-1.nasl - Type: ACT_GATHER_INFO |
2016-02-24 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2016-253.nasl - Type: ACT_GATHER_INFO |
2016-02-23 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2016-0539-1.nasl - Type: ACT_GATHER_INFO |
2015-10-29 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2015-604.nasl - Type: ACT_GATHER_INFO |
2015-07-16 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_ca139c7f2a8c11e5a4a5002590263bf5.nasl - Type: ACT_GATHER_INFO |
2015-06-22 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2640-2.nasl - Type: ACT_GATHER_INFO |
2015-06-22 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2642-2.nasl - Type: ACT_GATHER_INFO |
2015-06-22 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2643-2.nasl - Type: ACT_GATHER_INFO |
2015-06-22 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2644-2.nasl - Type: ACT_GATHER_INFO |
2015-06-22 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2646-2.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2640-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2642-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2643-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2644-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2645-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2646-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2647-1.nasl - Type: ACT_GATHER_INFO |
2015-04-02 | Name: The remote host is missing Sun security patch number 119059-46. File: solaris10_119059_46.nasl - Type: ACT_GATHER_INFO |
2015-04-02 | Name: The remote host is missing Sun security patch number 119060-45. File: solaris10_x86_119060_45.nasl - Type: ACT_GATHER_INFO |
2014-12-15 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201412-11.nasl - Type: ACT_GATHER_INFO |
2014-10-10 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL6669.nasl - Type: ACT_GATHER_INFO |