Summary
Detail | |||
---|---|---|---|
Vendor | Imagemagick | First view | 2005-03-23 |
Product | Imagemagick | Last view | 2021-02-06 |
Version | 6.1.7 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:imagemagick:imagemagick |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.5 | 2021-02-06 | CVE-2021-20176 | A flaw was found in ImageMagick in MagickCore/gem.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.10-56. |
3.3 | 2020-12-08 | CVE-2020-27758 | A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. |
3.3 | 2020-12-08 | CVE-2020-27757 | A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68. |
5.5 | 2020-12-08 | CVE-2020-27756 | In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions. This flaw affects ImageMagick versions prior to 7.0.9-0. |
3.3 | 2020-12-08 | CVE-2020-27755 | in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0. |
3.3 | 2020-12-08 | CVE-2020-27754 | In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69. |
5.5 | 2020-12-08 | CVE-2020-27753 | There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0. |
6.1 | 2020-12-08 | CVE-2020-27752 | A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This flaw affects ImageMagick versions prior to 7.0.9-0. |
3.3 | 2020-12-08 | CVE-2020-27751 | A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. |
5.5 | 2020-12-08 | CVE-2020-27750 | A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. |
5.5 | 2020-12-08 | CVE-2020-25676 | In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. |
3.3 | 2020-12-08 | CVE-2020-25675 | In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0. |
5.5 | 2020-12-08 | CVE-2020-25674 | WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. |
5.5 | 2020-12-08 | CVE-2020-25667 | TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0. |
3.3 | 2020-12-08 | CVE-2020-25666 | There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0. |
5.5 | 2020-12-08 | CVE-2020-25665 | The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68. |
6.1 | 2020-12-08 | CVE-2020-25664 | In WriteOnePNGImage() of the PNG coder at coders/png.c, an improper call to AcquireVirtualMemory() and memset() allows for an out-of-bounds write later when PopShortPixel() from MagickCore/quantum-private.h is called. The patch fixes the calls by adding 256 to rowbytes. An attacker who is able to supply a specially crafted image could affect availability with a low impact to data integrity. This flaw affects ImageMagick versions prior to 6.9.10-68 and 7.0.8-68. |
5.5 | 2020-12-08 | CVE-2020-25663 | A call to ConformPixelInfo() in the SetImageAlphaChannel() routine of /MagickCore/channel.c caused a subsequent heap-use-after-free or heap-buffer-overflow READ when GetPixelRed() or GetPixelBlue() was called. This could occur if an attacker is able to submit a malicious image file to be processed by ImageMagick and could lead to denial of service. It likely would not lead to anything further because the memory is used as pixel data and not e.g. a function pointer. This flaw affects ImageMagick versions prior to 7.0.9-0. |
7.8 | 2020-12-07 | CVE-2020-29599 | ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c. |
3.3 | 2020-12-04 | CVE-2020-27776 | A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. |
3.3 | 2020-12-04 | CVE-2020-27775 | A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. |
3.3 | 2020-12-04 | CVE-2020-27774 | A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. |
3.3 | 2020-12-04 | CVE-2020-27773 | A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. |
3.3 | 2020-12-04 | CVE-2020-27772 | A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. |
3.3 | 2020-12-04 | CVE-2020-27771 | In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
15% (28) | CWE-125 | Out-of-bounds Read |
14% (26) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
13% (25) | CWE-190 | Integer Overflow or Wraparound |
7% (13) | CWE-20 | Improper Input Validation |
5% (10) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
4% (9) | CWE-772 | Missing Release of Resource after Effective Lifetime |
4% (9) | CWE-476 | NULL Pointer Dereference |
4% (9) | CWE-369 | Divide By Zero |
4% (8) | CWE-416 | Use After Free |
3% (6) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
3% (6) | CWE-189 | Numeric Errors |
2% (5) | CWE-200 | Information Exposure |
2% (5) | CWE-122 | Heap-based Buffer Overflow |
2% (4) | CWE-399 | Resource Management Errors |
1% (3) | CWE-787 | Out-of-bounds Write |
1% (3) | CWE-617 | Reachable Assertion |
1% (3) | CWE-284 | Access Control (Authorization) Issues |
1% (3) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
0% (1) | CWE-770 | Allocation of Resources Without Limits or Throttling |
0% (1) | CWE-754 | Improper Check for Unusual or Exceptional Conditions |
0% (1) | CWE-674 | Uncontrolled Recursion |
0% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
0% (1) | CWE-91 | XML Injection (aka Blind XPath Injection) |
0% (1) | CWE-19 | Data Handling |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
69445 | ImageMagick configure.c Search Path Subversion Local Privilege Escalation |
41332 | ImageMagick ReadDCMImage / ReadXCFImage Crafted Image Handling DoS |
41331 | ImageMagick xwd Module XWD File Handling Overflow |
41330 | ImageMagick xcf Module XCF File Handling Overflow |
41329 | ImageMagick xbm Module XBM File Handling Overflow |
41328 | ImageMagick dib Module DIB File Handling Overflow |
41327 | ImageMagick dcm Module DCM File Handling Overflow |
41326 | ImageMagick blob.c ReadBlobString Function Image File Handling Off-by-one |
41325 | ImageMagick ReadDIBImage Function Image File Handling Overflow |
28204 | ImageMagick sun.c Multiple Function Rasterfile Processing Overflow |
27951 | ImageMagick ReadSGIImage() Function SGI File Processing Overflow |
16775 | GraphicsMagick XWD Color Mask Decoding DoS |
16774 | ImageMagick XWD Color Mask Decoding DoS |
15891 | ImageMagick ReadPNMImage() PNM Image Decoding Overflow DoS |
15113 | ImageMagick PSD File DoS |
13028 | ImageMagick PSD Image Decoding Module Overflow |
ExploitDB Exploits
id | Description |
---|---|
31688 | ImageMagick 6.8.8-4 - Local Buffer Overflow (SEH) |
OpenVAS Exploits
id | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2462-2 (imagemagick - several vulnerabilities) File : nvt/deb_2462_2.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2427-1 (imagemagick - several vulnerabilities) File : nvt/deb_2427_1.nasl |
2012-08-30 | Name : Fedora Update for ImageMagick FEDORA-2012-11746 File : nvt/gb_fedora_2012_11746_ImageMagick_fc16.nasl |
2012-08-10 | Name : FreeBSD Ports: ImageMagick File : nvt/freebsd_ImageMagick7.nasl |
2012-08-03 | Name : Mandriva Update for imagemagick MDVSA-2012:078 (imagemagick) File : nvt/gb_mandriva_MDVSA_2012_078.nasl |
2012-08-03 | Name : Mandriva Update for imagemagick MDVSA-2012:077 (imagemagick) File : nvt/gb_mandriva_MDVSA_2012_077.nasl |
2012-07-30 | Name : CentOS Update for ImageMagick CESA-2012:0545 centos5 File : nvt/gb_CESA-2012_0545_ImageMagick_centos5.nasl |
2012-07-30 | Name : CentOS Update for ImageMagick CESA-2012:0544 centos6 File : nvt/gb_CESA-2012_0544_ImageMagick_centos6.nasl |
2012-07-09 | Name : RedHat Update for ImageMagick RHSA-2012:0544-01 File : nvt/gb_RHSA-2012_0544-01_ImageMagick.nasl |
2012-06-25 | Name : Fedora Update for ImageMagick FEDORA-2012-9313 File : nvt/gb_fedora_2012_9313_ImageMagick_fc16.nasl |
2012-05-08 | Name : RedHat Update for ImageMagick RHSA-2012:0545-01 File : nvt/gb_RHSA-2012_0545-01_ImageMagick.nasl |
2012-05-04 | Name : Ubuntu Update for imagemagick USN-1435-1 File : nvt/gb_ubuntu_USN_1435_1.nasl |
2012-03-12 | Name : Gentoo Security Advisory GLSA 201203-09 (ImageMagick) File : nvt/glsa_201203_09.nasl |
2012-02-21 | Name : RedHat Update for ImageMagick RHSA-2012:0301-03 File : nvt/gb_RHSA-2012_0301-03_ImageMagick.nasl |
2010-12-28 | Name : Fedora Update for ImageMagick FEDORA-2010-19056 File : nvt/gb_fedora_2010_19056_ImageMagick_fc13.nasl |
2010-12-28 | Name : Fedora Update for ImageMagick FEDORA-2010-19025 File : nvt/gb_fedora_2010_19025_ImageMagick_fc14.nasl |
2010-12-23 | Name : Ubuntu Update for imagemagick vulnerability USN-1028-1 File : nvt/gb_ubuntu_USN_1028_1.nasl |
2009-10-13 | Name : Debian Security Advisory DSA 1903-1 (graphicsmagick) File : nvt/deb_1903_1.nasl |
2009-08-17 | Name : Debian Security Advisory DSA 1858-1 (imagemagick) File : nvt/deb_1858_1.nasl |
2009-04-09 | Name : Mandriva Update for ImageMagick MDVSA-2008:035 (ImageMagick) File : nvt/gb_mandriva_MDVSA_2008_035.nasl |
2009-03-23 | Name : Ubuntu Update for imagemagick vulnerabilities USN-523-1 File : nvt/gb_ubuntu_USN_523_1.nasl |
2009-03-06 | Name : RedHat Update for ImageMagick RHSA-2008:0145-01 File : nvt/gb_RHSA-2008_0145-01_ImageMagick.nasl |
2009-03-06 | Name : RedHat Update for ImageMagick RHSA-2008:0165-01 File : nvt/gb_RHSA-2008_0165-01_ImageMagick.nasl |
2009-02-27 | Name : CentOS Update for ImageMagick CESA-2008:0145 centos4 i386 File : nvt/gb_CESA-2008_0145_ImageMagick_centos4_i386.nasl |
2009-02-27 | Name : CentOS Update for ImageMagick CESA-2008:0145 centos3 x86_64 File : nvt/gb_CESA-2008_0145_ImageMagick_centos3_x86_64.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2020-01-03 | Imagemagick XBM tranformation information leak attempt RuleID : 52312 - Type : FILE-IMAGE - Revision : 1 |
2019-02-21 | Imagemagick XBM tranformation information leak attempt RuleID : 48937 - Type : FILE-IMAGE - Revision : 1 |
2018-08-09 | Multiple Products SGI ZSIZE handling buffer overflow attempt RuleID : 47144 - Type : FILE-OTHER - Revision : 4 |
2018-08-09 | Multiple Products SGI ZSIZE handling buffer overflow attempt RuleID : 47143 - Type : FILE-OTHER - Revision : 4 |
2017-08-23 | Multiple Products SGI ZSIZE handling buffer overflow attempt RuleID : 43609 - Type : FILE-OTHER - Revision : 5 |
2017-08-23 | Multiple Products SGI ZSIZE handling buffer overflow attempt RuleID : 43608 - Type : FILE-OTHER - Revision : 5 |
2017-07-06 | ImageMagick SyncExifProfile out-of-bounds memory read attempt RuleID : 43098 - Type : FILE-IMAGE - Revision : 1 |
2017-07-06 | ImageMagick SyncExifProfile out-of-bounds memory read attempt RuleID : 43097 - Type : FILE-IMAGE - Revision : 1 |
2017-07-06 | ImageMagick SyncExifProfile out-of-bounds memory read attempt RuleID : 43096 - Type : FILE-IMAGE - Revision : 1 |
2017-07-06 | ImageMagick SyncExifProfile out-of-bounds memory read attempt RuleID : 43095 - Type : FILE-IMAGE - Revision : 1 |
2017-04-12 | ImageMagick magick vector graphics ephemeral access attempt RuleID : 41902 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick magick vector graphics ephemeral access attempt RuleID : 41901 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick magick vector graphics ephemeral access attempt RuleID : 41900 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick magick vector graphics ephemeral access attempt RuleID : 41899 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick magick vector graphics ephemeral access attempt RuleID : 41898 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick magick vector graphics ephemeral access attempt RuleID : 41897 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick magick vector graphics msl access attempt RuleID : 41894 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick magick vector graphics msl access attempt RuleID : 41893 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick magick vector graphics msl access attempt RuleID : 41892 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick magick vector graphics msl access attempt RuleID : 41891 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick magick vector graphics msl access attempt RuleID : 41890 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick magick vector graphics msl access attempt RuleID : 41889 - Type : POLICY-OTHER - Revision : 2 |
2017-04-12 | ImageMagick mvg label arbitrary file read attempt RuleID : 41888 - Type : SERVER-OTHER - Revision : 1 |
2017-04-12 | ImageMagick mvg label arbitrary file read attempt RuleID : 41887 - Type : SERVER-OTHER - Revision : 1 |
2017-04-12 | ImageMagick mvg label arbitrary file read attempt RuleID : 41886 - Type : SERVER-OTHER - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-10-04 | Name: The remote Debian host is missing a security update. File: debian_DLA-1530.nasl - Type: ACT_GATHER_INFO |
2018-08-03 | Name: The remote Debian host is missing a security update. File: debian_DLA-1456.nasl - Type: ACT_GATHER_INFO |
2018-07-16 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4245.nasl - Type: ACT_GATHER_INFO |
2018-06-28 | Name: The remote Debian host is missing a security update. File: debian_DLA-1401.nasl - Type: ACT_GATHER_INFO |
2018-06-27 | Name: The remote Debian host is missing a security update. File: debian_DLA-1394.nasl - Type: ACT_GATHER_INFO |
2018-05-24 | Name: The remote Debian host is missing a security update. File: debian_DLA-1381.nasl - Type: ACT_GATHER_INFO |
2018-05-21 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4204.nasl - Type: ACT_GATHER_INFO |
2018-01-15 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2017-f5a9805c5b.nasl - Type: ACT_GATHER_INFO |
2018-01-04 | Name: The remote Debian host is missing a security update. File: debian_DLA-1229.nasl - Type: ACT_GATHER_INFO |
2018-01-02 | Name: The remote Debian host is missing a security update. File: debian_DLA-1227.nasl - Type: ACT_GATHER_INFO |
2017-12-29 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4074.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-3168-1.nasl - Type: ACT_GATHER_INFO |
2017-11-20 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4040.nasl - Type: ACT_GATHER_INFO |
2017-11-13 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4032.nasl - Type: ACT_GATHER_INFO |
2017-11-13 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201711-07.nasl - Type: ACT_GATHER_INFO |
2017-11-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-1270.nasl - Type: ACT_GATHER_INFO |
2017-11-09 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-2949-1.nasl - Type: ACT_GATHER_INFO |
2017-11-06 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4019.nasl - Type: ACT_GATHER_INFO |
2017-10-30 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-1199.nasl - Type: ACT_GATHER_INFO |
2017-10-18 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2017-66d9113c7a.nasl - Type: ACT_GATHER_INFO |
2017-10-18 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2017-897a192750.nasl - Type: ACT_GATHER_INFO |
2017-10-11 | Name: The remote Debian host is missing a security update. File: debian_DLA-1131.nasl - Type: ACT_GATHER_INFO |
2017-09-20 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2017-3a568adb31.nasl - Type: ACT_GATHER_INFO |
2017-09-19 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2017-8f27031c8f.nasl - Type: ACT_GATHER_INFO |
2017-09-01 | Name: The remote Debian host is missing a security update. File: debian_DLA-1081.nasl - Type: ACT_GATHER_INFO |