This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Redhat First view 2015-11-25
Product Openshift Container Platform Last view 2025-06-09
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* 127
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* 70
cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:* 37
cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:* 24
cpe:2.3:a:redhat:openshift_container_platform:3.3:*:*:*:*:*:*:* 22
cpe:2.3:a:redhat:openshift_container_platform:3.1:*:*:*:*:*:*:* 21
cpe:2.3:a:redhat:openshift_container_platform:3.2:*:*:*:*:*:*:* 21
cpe:2.3:a:redhat:openshift_container_platform:3.5:*:*:*:*:*:*:* 21
cpe:2.3:a:redhat:openshift_container_platform:3.4:*:*:*:*:*:*:* 21
cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:* 21
cpe:2.3:a:redhat:openshift_container_platform:3.6:*:*:*:*:*:*:* 20
cpe:2.3:a:redhat:openshift_container_platform:-:*:*:*:*:*:*:* 19
cpe:2.3:a:redhat:openshift_container_platform:2.2:*:*:*:*:*:*:* 19
cpe:2.3:a:redhat:openshift_container_platform:3.7:*:*:*:*:*:*:* 19
cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:* 18
cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:* 18
cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:* 17
cpe:2.3:a:redhat:openshift_container_platform:3.8:*:*:*:*:*:*:* 16
cpe:2.3:a:redhat:openshift_container_platform:3.9.31:*:*:*:*:*:*:* 15
cpe:2.3:a:redhat:openshift_container_platform:4.4:*:*:*:*:*:*:* 11
cpe:2.3:a:redhat:openshift_container_platform:4.3:*:*:*:*:*:*:* 11
cpe:2.3:a:redhat:openshift_container_platform:3.11.286:*:*:*:*:*:*:* 11
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:* 11
cpe:2.3:a:redhat:openshift_container_platform:4.5:*:*:*:*:*:*:* 10
cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:* 8
cpe:2.3:a:redhat:openshift_container_platform:4.6.1:*:*:*:*:*:*:* 7
cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:* 7
cpe:2.3:a:redhat:openshift_container_platform:4.5.16:*:*:*:*:*:*:* 7
cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:*:* 6
cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:* 6
cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:* 5
cpe:2.3:a:redhat:openshift_container_platform:4.8:*:*:*:*:*:*:* 5
cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:* 5
cpe:2.3:a:redhat:openshift_container_platform:4.9:*:*:*:*:*:*:* 4
cpe:2.3:a:redhat:openshift_container_platform:4.17:*:*:*:*:*:*:* 4
cpe:2.3:a:redhat:openshift_container_platform:4.16:*:*:*:*:*:*:* 4
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:arm64:* 2
cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:arm64:* 2
cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:arm64:* 2

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
9.8 2025-06-09 CVE-2025-5914

A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.

7.8 2025-03-03 CVE-2025-0678

A flaw was found in grub2. When reading data from a squash4 filesystem, grub's squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the direct_read() will perform a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections.

7.8 2025-03-03 CVE-2024-45782

A flaw was found in the HFS filesystem. When reading an HFS volume's name at grub_fs_mount(), the HFS filesystem driver performs a strcpy() using the user-provided volume name as input without properly validating the volume name's length. This issue may read to a heap-based out-of-bounds writer, impacting grub's sensitive data integrity and eventually leading to a secure boot protection bypass.

5.5 2025-03-03 CVE-2024-45778

A stack overflow flaw was found when reading a BFS file system. A crafted BFS filesystem may lead to an uncontrolled loop, causing grub2 to crash.

6.8 2025-02-18 CVE-2025-26465

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

7.5 2025-01-14 CVE-2024-12088

A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.

6.8 2025-01-14 CVE-2024-12086

A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.

0 2024-10-22 CVE-2024-50312

A vulnerability was found in GraphQL due to improper access controls on the GraphQL introspection query. This flaw allows unauthorized users to retrieve a comprehensive list of available queries and mutations. Exposure to this flaw increases the attack surface, as it can facilitate the discovery of flaws or errors specific to the application's GraphQL implementation.

0 2024-10-22 CVE-2024-50311

A denial of service (DoS) vulnerability was found in OpenShift. This flaw allows attackers to exploit the GraphQL batching functionality. The vulnerability arises when multiple queries can be sent within a single request, enabling an attacker to submit a request containing thousands of aliases in one query. This issue causes excessive resource consumption, leading to application unavailability for legitimate users.

6.5 2024-10-15 CVE-2024-9676

A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.

0 2024-10-09 CVE-2024-9675

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

8.2 2024-10-01 CVE-2024-9341

A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.

6.1 2024-09-19 CVE-2024-8883

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

0 2024-08-02 CVE-2024-3056

A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious container will continue to exhaust resources until it is out-of-memory (OOM) killed. While the malicious container's cgroup will be removed, the IPC resources it created are not. Those resources are tied to the IPC namespace that will not be removed until all containers using it are stopped, and one non-malicious container is holding the namespace open. The malicious container is restarted, either automatically or by attacker control, repeating the process and increasing the amount of memory consumed. With a container configured to restart always, such as `podman run --restart=always`, this can result in a memory-based denial of service of the system.

0 2024-07-24 CVE-2024-7079

A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.

8.1 2024-07-01 CVE-2024-6387

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

7.5 2024-06-05 CVE-2024-5037

A flaw was found in OpenShift's Telemeter. If certain conditions are in place, an attacker can use a forged token to bypass the issue ("iss") check during JSON web token (JWT) authentication.

7.8 2024-04-06 CVE-2024-0406

A flaw was discovered in the mholt/archiver package. This flaw allows an attacker to create a specially crafted tar file, which, when unpacked, may allow access to restricted files or directories. This issue can allow the creation or overwriting of files with the user's or application's privileges using the library.

6.5 2024-03-07 CVE-2024-1725

A flaw was found in the kubevirt-csi component of OpenShift Virtualization's Hosted Control Plane (HCP). This issue could allow an authenticated attacker to gain access to the root HCP worker node's volume by creating a custom Persistent Volume that matches the name of a worker node.

0 2024-02-19 CVE-2024-1635

A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available.

At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.

7.5 2024-01-09 CVE-2023-6476

A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.

8.1 2023-12-21 CVE-2023-2585

Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.

5.9 2023-12-18 CVE-2023-48795

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

5.4 2023-12-14 CVE-2023-6134

A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.

7.2 2023-11-02 CVE-2023-5408

A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
12% (16) CWE-502 Deserialization of Untrusted Data
6% (9) CWE-416 Use After Free
6% (8) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
5% (7) CWE-770 Allocation of Resources Without Limits or Throttling
4% (6) CWE-787 Out-of-bounds Write
4% (6) CWE-532 Information Leak Through Log Files
3% (5) CWE-362 Race Condition
3% (5) CWE-125 Out-of-bounds Read
3% (5) CWE-20 Improper Input Validation
3% (4) CWE-732 Incorrect Permission Assignment for Critical Resource
3% (4) CWE-522 Insufficiently Protected Credentials
3% (4) CWE-276 Incorrect Default Permissions
3% (4) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
2% (3) CWE-704 Incorrect Type Conversion or Cast
2% (3) CWE-352 Cross-Site Request Forgery (CSRF)
2% (3) CWE-269 Improper Privilege Management
2% (3) CWE-190 Integer Overflow or Wraparound
2% (3) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (2) CWE-706 Use of Incorrectly-Resolved Name or Reference
1% (2) CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
1% (2) CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsa...
1% (2) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (2) CWE-200 Information Exposure
1% (2) CWE-59 Improper Link Resolution Before File Access ('Link Following')
0% (1) CWE-776 Unrestricted Recursive Entity References in DTDs ('XML Bomb')

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-02-27 Kibana Timelion prototype pollution code execution attempt
RuleID : 52835 - Type : SERVER-WEBAPP - Revision : 1
2019-06-11 Jenkins CI Server ASTTest code execution attempt
RuleID : 50041 - Type : SERVER-WEBAPP - Revision : 2
2019-04-23 Jenkins Groovy metaprogramming remote code execution attempt
RuleID : 49499 - Type : SERVER-WEBAPP - Revision : 1
2019-04-23 Jenkins Groovy metaprogramming remote code execution attempt
RuleID : 49498 - Type : SERVER-WEBAPP - Revision : 1
2019-02-07 Kibana Console for Elasticsearch local file inclusion attempt
RuleID : 48815 - Type : SERVER-WEBAPP - Revision : 3
2019-01-10 Kubernetes API Server bypass attempt
RuleID : 48548 - Type : SERVER-OTHER - Revision : 1
2019-01-08 Kubernetes API Server bypass attempt
RuleID : 48500 - Type : SERVER-OTHER - Revision : 1
2018-04-03 Jackson databind deserialization remote code execution attempt
RuleID : 45779 - Type : SERVER-OTHER - Revision : 1
2018-04-03 Jackson databind deserialization remote code execution attempt
RuleID : 45778 - Type : SERVER-OTHER - Revision : 1
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45016 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45015 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45014 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45013 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45012 - Type : FILE-OTHER - Revision : 4
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45011 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45010 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45009 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45008 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45007 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45006 - Type : FILE-OTHER - Revision : 4
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45005 - Type : FILE-OTHER - Revision : 4
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45004 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45003 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45002 - Type : FILE-OTHER - Revision : 3
2016-03-29 Java Library CommonsCollection unauthorized serialized object attempt
RuleID : 37860 - Type : SERVER-WEBAPP - Revision : 5

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-11 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZA-2018-077.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2019-1138.nasl - Type: ACT_GATHER_INFO
2019-01-08 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2019-1010.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-56221eb24b.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-0b038c7047.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-12b934e224.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-314913636b.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-381ab64b59.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-54a5bcc7e4.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-81ee973d7c.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-9dbe983805.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-bf292e6cdf.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-c8c7d35b83.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-ca03363d57.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-fb2afee474.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1430.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1419.nasl - Type: ACT_GATHER_INFO
2018-12-18 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-2_0-0112.nasl - Type: ACT_GATHER_INFO
2018-12-14 Name: The remote Kubernetes server is affected by a proxy request handling vulnerab...
File: kube_cve_2018_1002105.nasl - Type: ACT_ATTACK
2018-12-10 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1393.nasl - Type: ACT_GATHER_INFO
2018-12-10 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1391.nasl - Type: ACT_GATHER_INFO
2018-12-07 Name: A job scheduling and management system hosted on the remote web server is aff...
File: jenkins_2_154.nasl - Type: ACT_GATHER_INFO
2018-12-07 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1110.nasl - Type: ACT_GATHER_INFO
2018-12-04 Name: The remote host contains an application affected by a privilege escalation vu...
File: kube_1_12_3.nasl - Type: ACT_GATHER_INFO
2018-12-01 Name: The remote Debian host is missing a security update.
File: debian_DLA-1601.nasl - Type: ACT_GATHER_INFO