This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Mit First view 1996-02-21
Product Kerberos Last view 2018-12-26
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:* 11
cpe:2.3:a:mit:kerberos:1.0:*:*:*:*:*:*:* 11
cpe:2.3:a:mit:kerberos:1.2.2.beta1:*:*:*:*:*:*:* 10
cpe:2.3:a:mit:kerberos:4.0:*:*:*:*:*:*:* 10
cpe:2.3:a:mit:kerberos:4:*:*:*:*:*:*:* 9
cpe:2.3:a:mit:kerberos:1.0.8:*:*:*:*:*:*:* 7
cpe:2.3:a:mit:kerberos:1.0.8mit:*:*:*:*:*:*:* 7
cpe:2.3:a:mit:kerberos:v:*:*:*:*:*:*:* 7
cpe:2.3:a:mit:kerberos:-:*:*:*:*:*:*:* 6
cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:* 6
cpe:2.3:a:mit:kerberos:4.0:-:*:*:*:*:*:* 6
cpe:2.3:a:mit:kerberos:4.0:patch10:*:*:*:*:*:* 6
cpe:2.3:a:mit:kerberos:5-1.10.5:*:*:*:*:*:*:* 5
cpe:2.3:a:mit:kerberos:5-1.10.6:*:*:*:*:*:*:* 5
cpe:2.3:a:mit:kerberos:5-1.10.7:*:*:*:*:*:*:* 5
cpe:2.3:a:mit:kerberos:5-1.8:alpha:*:*:*:*:*:* 4
cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:* 4
cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:* 4
cpe:2.3:a:mit:kerberos:5-1.13.7:*:*:*:*:*:*:* 4
cpe:2.3:a:mit:kerberos:5-1.8:alpha1:*:*:*:*:*:* 4
cpe:2.3:a:mit:kerberos:5-appl_1.0.1:*:*:*:*:*:*:* 3
cpe:2.3:a:mit:kerberos:5-1.14:*:*:*:*:*:*:* 3
cpe:2.3:a:mit:kerberos:5-1.15.2:*:*:*:*:*:*:* 3

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.3 2018-12-26 CVE-2018-20217

A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.

6.5 2018-01-16 CVE-2018-5710

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The pre-defined function "strlen" is getting a "NULL" string as a parameter value in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the Key Distribution Center (KDC), which allows remote authenticated users to cause a denial of service (NULL pointer dereference) via a modified kadmin client.

7.5 2018-01-16 CVE-2018-5709

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

6.5 2017-08-09 CVE-2017-11368

In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.

3.5 2014-12-16 CVE-2014-5354

plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.

5 2014-07-20 CVE-2014-4342

MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.

4 2013-11-17 CVE-2013-6800

An unspecified third-party database module for the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request, a different vulnerability than CVE-2013-1418.

5 2011-02-10 CVE-2011-0282

The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name.

5 2011-02-10 CVE-2011-0281

The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.

3.7 2010-12-02 CVE-2010-1323

MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.

4 2010-04-07 CVE-2010-0629

Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.

7.8 2010-02-22 CVE-2010-0283

The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2, and 1.8 alpha, allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid (1) AS-REQ or (2) TGS-REQ request.

10 2010-01-13 CVE-2009-4212

Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.

4.3 2009-04-08 CVE-2009-0847

The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.

10 2009-04-08 CVE-2009-0846

The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.

5.8 2009-04-08 CVE-2009-0844

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

5 2009-03-27 CVE-2009-0845

The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.

7.5 2004-10-20 CVE-2004-0772

Double free vulnerabilities in error handling code in krb524d for MIT Kerberos 5 (krb5) 1.2.8 and earlier may allow remote attackers to execute arbitrary code.

10 2004-08-18 CVE-2004-0523

Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and earlier allow remote attackers to execute arbitrary code as root.

5 2003-04-02 CVE-2003-0082

The Key Distribution Center (KDC) in Kerberos 5 (krb5) 1.2.7 and earlier allows remote, authenticated attackers to cause a denial of service (crash) on KDCs within the same realm using a certain protocol request that causes the KDC to corrupt its heap (aka "buffer underrun").

5 2003-04-02 CVE-2003-0072

The Key Distribution Center (KDC) in Kerberos 5 (krb5) 1.2.7 and earlier allows remote, authenticated attackers to cause a denial of service (crash) on KDCs within the same realm using a certain protocol request that causes an out-of-bounds read of an array (aka "array overrun").

7.5 2003-03-24 CVE-2003-0139

Certain weaknesses in the implementation of version 4 of the Kerberos protocol (krb4) in the krb5 distribution, when triple-DES keys are used to key krb4 services, allow an attacker to create krb4 tickets for unauthorized principals using a cut-and-paste attack and "ticket splicing."

7.5 2003-03-24 CVE-2003-0138

Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an attacker to impersonate any principal in a realm via a chosen-plaintext attack.

10 2001-08-14 CVE-2001-0554

Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.

2.1 2001-06-27 CVE-2001-0417

Kerberos 4 (aka krb4) allows local users to overwrite arbitrary files via a symlink attack on new ticket files.

CWE : Common Weakness Enumeration

%idName
16% (3) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
16% (3) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
16% (3) CWE-20 Improper Input Validation
11% (2) CWE-617 Reachable Assertion
11% (2) CWE-310 Cryptographic Issues
11% (2) CWE-189 Numeric Errors
5% (1) CWE-476 NULL Pointer Dereference
5% (1) CWE-399 Resource Management Errors
5% (1) CWE-190 Integer Overflow or Wraparound

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:1828 Buffer Overflow in "in.telnetd"or "telnetd"Process
oval:org.mitre.oval:def:4430 Kerberos 5 KDC Buffer Underrun in Principle Name Handling
oval:org.mitre.oval:def:2536 Kerberos 5 KDC Heap Corruption Vulnerability
oval:org.mitre.oval:def:244 Kerberos KDC Heap Corruption Denial of Service
oval:org.mitre.oval:def:248 Kerberos krb4 Plaintext Attack Vulnerability
oval:org.mitre.oval:def:250 Kerberos krb4 Ticket Splicing Vulnerability
oval:org.mitre.oval:def:991 Multiple BO Vulnerabilities in MIT Kerberos 5
oval:org.mitre.oval:def:724 MIT Kerberos 5 KRB5_AName_To_Localname Multiple Principal Name Buffer Overrun...
oval:org.mitre.oval:def:2002 Multiple Buffer Overflows in Kerberos 5 (krb5_aname_to_localname)
oval:org.mitre.oval:def:10295 Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5...
oval:org.mitre.oval:def:4661 MIT Kerberos 5 Multiple Double-Free Vulnerabilities
oval:org.mitre.oval:def:6449 Kerberos GSS-API SPNEGO Null Pointer Dereference and Invalid Memory Access Bu...
oval:org.mitre.oval:def:10044 The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c...
oval:org.mitre.oval:def:9474 The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (...
oval:org.mitre.oval:def:6339 MIT Kerberos SPNEGO and ASN.1 Multiple Remote Denial Of Service Vulnerabilities
oval:org.mitre.oval:def:8181 DSA-1766 krb5 -- several vulnerabilities
oval:org.mitre.oval:def:6301 HP-UX Running Kerberos, Remote Denial of Service (DoS), Execution of Arbitrar...
oval:org.mitre.oval:def:5483 Kerberos ASN.1 GeneralizedTime Decoder Bug Lets Remote Users Execute Arbitrar...
oval:org.mitre.oval:def:13177 DSA-1766-1 krb5 -- several
oval:org.mitre.oval:def:10694 The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the A...
oval:org.mitre.oval:def:22765 ELSA-2009:0408: krb5 security update (Important)
oval:org.mitre.oval:def:28421 RHSA-2009:0408 -- krb5 security update (Important)
oval:org.mitre.oval:def:6387 HP-UX Running Kerberos, Remote Denial of Service (DoS), Execution of Arbitrar...
oval:org.mitre.oval:def:13874 USN-755-1 -- krb5 vulnerabilities
oval:org.mitre.oval:def:8192 Integer Overflow Security Vulnerability in AES and RC4 Decryption in the Sola...

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
71972 Oracle Solaris Kerberos Checksum Acceptability Weakness KDC / KRB-SAFE Messag...
70909 Kerberos KDC LDAP Backend Principal Name Handling DoS
70908 Kerberos KDC LDAP Backend Unparse Implementation DoS
69610 MIT Kerberos 5 (krb5) Checksum Acceptability Weakness KDC / KRB-SAFE Message ...
63569 Kerberos src/kadmin/server/server_stubs.c init_2_svc() Function API Version N...
62391 Kerberos KDC Authorization Data Request Remote DoS
61795 MIT Kerberos 5 (krb5) Crypto Library AES / RC4 Decryption Functionality Malfo...
53385 MIT Kerberos 5 (krb5) ASN.1 Decoder PK-INIT asn1buf_imbed() Function Remote DoS
53384 MIT Kerberos 5 (krb5) SPNEGO GSS-API Mechanism Network Input Buffer Handling ...
53383 MIT Kerberos 5 (krb5) ASN.1 Decoder asn1_decode_generaltime() Function Remote...
52963 MIT Kerberos 5 (krb5) SPNEGO GSS-API Mechanism spnego_gss_accept_sec_context(...
9409 MIT Kerberos 5 krb524d Double-free Error Condition Code Execution
6846 MIT Kerberos 5 krb5_aname_to_localname() Buffer Overflow
4902 MIT Kerberos 5 Key Distribution Center Heap Corruption DoS
4901 MIT Kerberos 5 KDC Array Overrun DoS
4890 KTH Kerberos 4 Ticket File Symlink
4886 MIT Kerberos 4 KDC AUTH_MSG_KDC_REQUEST DoS
4884 MIT Kerberos 5 krb425_conv_principal Function Remote Overflow
4883 SSH Client Kerberos 5 TGT Overflow
4880 MIT Kerberos 4 Key Server Session Key Masquerade
4876 MIT Kerberos 5 krshd Overflow
4875 MIT Kerberos 4/5 e_msg Variable kerb_err_reply Function Remote Overflow
4873 MIT Kerberos localrealm Variable Overflow
4872 MIT Kerberos ksu Local Overflow
4871 MIT Kerberos lastrealm Variable Overflow

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-07-30 Name : CentOS Update for krb5-devel CESA-2011:0199 centos5 x86_64
File : nvt/gb_CESA-2011_0199_krb5-devel_centos5_x86_64.nasl
2012-06-15 Name : Fedora Update for krb5 FEDORA-2012-8805
File : nvt/gb_fedora_2012_8805_krb5_fc15.nasl
2012-06-05 Name : RedHat Update for krb5 RHSA-2011:0200-01
File : nvt/gb_RHSA-2011_0200-01_krb5.nasl
2012-04-16 Name : VMSA-2010-0009: ESXi utilities and ESX Service Console third party updates
File : nvt/gb_VMSA-2010-0009.nasl
2012-03-16 Name : VMSA-2011-0012.3 VMware ESXi and ESX updates to third party libraries and ESX...
File : nvt/gb_VMSA-2011-0012.nasl
2012-03-15 Name : VMSA-2010-0016 VMware ESXi and ESX third party updates for Service Console an...
File : nvt/gb_VMSA-2010-0016.nasl
2012-03-15 Name : VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates ...
File : nvt/gb_VMSA-2011-0007.nasl
2012-02-12 Name : Gentoo Security Advisory GLSA 201201-13 (mit-krb5)
File : nvt/glsa_201201_13.nasl
2012-02-01 Name : Fedora Update for krb5 FEDORA-2011-16284
File : nvt/gb_fedora_2011_16284_krb5_fc15.nasl
2011-11-18 Name : Fedora Update for krb5 FEDORA-2011-14650
File : nvt/gb_fedora_2011_14650_krb5_fc14.nasl
2011-11-18 Name : Fedora Update for krb5 FEDORA-2011-14673
File : nvt/gb_fedora_2011_14673_krb5_fc15.nasl
2011-08-26 Name : Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001)
File : nvt/secpod_macosx_su11-001.nasl
2011-08-09 Name : CentOS Update for krb5-devel CESA-2009:0408 centos5 i386
File : nvt/gb_CESA-2009_0408_krb5-devel_centos5_i386.nasl
2011-08-09 Name : CentOS Update for krb5-devel CESA-2009:0409 centos4 i386
File : nvt/gb_CESA-2009_0409_krb5-devel_centos4_i386.nasl
2011-08-09 Name : CentOS Update for krb5 CESA-2009:0410-01 centos2 i386
File : nvt/gb_CESA-2009_0410-01_krb5_centos2_i386.nasl
2011-08-09 Name : CentOS Update for krb5-devel CESA-2009:0410 centos3 i386
File : nvt/gb_CESA-2009_0410_krb5-devel_centos3_i386.nasl
2011-08-09 Name : CentOS Update for krb5-devel CESA-2010:0029 centos5 i386
File : nvt/gb_CESA-2010_0029_krb5-devel_centos5_i386.nasl
2011-08-09 Name : CentOS Update for krb5-devel CESA-2010:0343 centos5 i386
File : nvt/gb_CESA-2010_0343_krb5-devel_centos5_i386.nasl
2011-08-09 Name : CentOS Update for krb5-devel CESA-2010:0926 centos5 i386
File : nvt/gb_CESA-2010_0926_krb5-devel_centos5_i386.nasl
2011-08-09 Name : CentOS Update for krb5-devel CESA-2011:0199 centos5 i386
File : nvt/gb_CESA-2011_0199_krb5-devel_centos5_i386.nasl
2011-05-12 Name : FreeBSD Ports: krb5
File : nvt/freebsd_krb512.nasl
2011-05-05 Name : Fedora Update for krb5 FEDORA-2011-5343
File : nvt/gb_fedora_2011_5343_krb5_fc13.nasl
2011-05-05 Name : Fedora Update for krb5 FEDORA-2011-5345
File : nvt/gb_fedora_2011_5345_krb5_fc14.nasl
2011-03-25 Name : Fedora Update for krb5 FEDORA-2011-3462
File : nvt/gb_fedora_2011_3462_krb5_fc14.nasl
2011-03-25 Name : Fedora Update for krb5 FEDORA-2011-3464
File : nvt/gb_fedora_2011_3464_krb5_fc13.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2011-A-0147 Multiple Vulnerabilities in VMware ESX and ESXi
Severity: Category I - VMSKEY: V0030545
2011-A-0066 Multiple Vulnerabilities in VMware Products
Severity: Category I - VMSKEY: V0027158

Snort® IPS/IDS

Date Description
2014-01-10 MIT Kerberos libkdb_ldap principal name handling denial of service attempt
RuleID : 26759 - Type : SERVER-OTHER - Revision : 6
2014-01-10 kerberos principal name overflow TCP
RuleID : 2579-community - Type : SERVER-OTHER - Revision : 8
2014-01-10 kerberos principal name overflow TCP
RuleID : 2579 - Type : SERVER-OTHER - Revision : 8
2014-01-10 kerberos principal name overflow UDP
RuleID : 2578-community - Type : SERVER-OTHER - Revision : 10
2014-01-10 kerberos principal name overflow UDP
RuleID : 2578 - Type : SERVER-OTHER - Revision : 10
2014-01-10 MIT Kerberos KDC authentication denial of service attempt
RuleID : 18534 - Type : SERVER-OTHER - Revision : 9
2014-01-10 MIT Kerberos KDC authentication denial of service attempt
RuleID : 18533 - Type : SERVER-OTHER - Revision : 9
2014-01-10 MIT Kerberos asn1_decode_generaltime uninitialized pointer free attempt
RuleID : 17741 - Type : SERVER-OTHER - Revision : 5
2014-01-10 bsd exploit client finishing
RuleID : 1253-community - Type : PROTOCOL-TELNET - Revision : 24
2014-01-10 bsd exploit client finishing
RuleID : 1253 - Type : PROTOCOL-TELNET - Revision : 24
2014-01-10 bsd telnet exploit response
RuleID : 1252-community - Type : PROTOCOL-TELNET - Revision : 25
2014-01-10 bsd telnet exploit response
RuleID : 1252 - Type : PROTOCOL-TELNET - Revision : 25

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-11 Name: The remote Fedora host is missing a security update.
File: fedora_2019-ac7e19b0c8.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-7db7ccda4d.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1408.nasl - Type: ACT_GATHER_INFO
2018-11-07 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1361.nasl - Type: ACT_GATHER_INFO
2018-11-06 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1354.nasl - Type: ACT_GATHER_INFO
2018-09-07 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1010.nasl - Type: ACT_GATHER_INFO
2018-05-11 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1010.nasl - Type: ACT_GATHER_INFO
2018-04-27 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-0666.nasl - Type: ACT_GATHER_INFO
2017-10-19 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_3f3837cc48fb4414aa465b1c23c9feae.nasl - Type: ACT_GATHER_INFO
2017-08-15 Name: The remote Debian host is missing a security update.
File: debian_DLA-1058.nasl - Type: ACT_GATHER_INFO
2017-07-27 Name: The remote Fedora host is missing a security update.
File: fedora_2017-71c47e1e82.nasl - Type: ACT_GATHER_INFO
2017-07-27 Name: The remote Fedora host is missing a security update.
File: fedora_2017-8e9d9771c4.nasl - Type: ACT_GATHER_INFO
2017-07-26 Name: The remote Fedora host is missing a security update.
File: fedora_2017-e5b36383f4.nasl - Type: ACT_GATHER_INFO
2016-03-08 Name: The remote VMware ESX / ESXi host is missing a security-related patch.
File: vmware_VMSA-2010-0009_remote.nasl - Type: ACT_GATHER_INFO
2016-03-04 Name: The remote VMware ESX / ESXi host is missing a security-related patch.
File: vmware_VMSA-2011-0007_remote.nasl - Type: ACT_GATHER_INFO
2016-03-04 Name: The remote VMware ESX / ESXi host is missing a security-related patch.
File: vmware_VMSA-2011-0012_remote.nasl - Type: ACT_GATHER_INFO
2016-03-03 Name: The remote host is missing a security-related patch.
File: vmware_VMSA-2009-0008_remote.nasl - Type: ACT_GATHER_INFO
2015-07-24 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2015-1282-1.nasl - Type: ACT_GATHER_INFO
2015-07-22 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2015-1276-1.nasl - Type: ACT_GATHER_INFO
2015-03-26 Name: The remote Debian host is missing a security update.
File: debian_DLA-37.nasl - Type: ACT_GATHER_INFO
2015-03-26 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20150305_krb5_on_SL7_x.nasl - Type: ACT_GATHER_INFO
2015-03-20 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2015-246.nasl - Type: ACT_GATHER_INFO
2015-03-18 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2015-0439.nasl - Type: ACT_GATHER_INFO
2015-03-13 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2015-0439.nasl - Type: ACT_GATHER_INFO
2015-03-05 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-0439.nasl - Type: ACT_GATHER_INFO