Summary
Detail | |||
---|---|---|---|
Vendor | Redhat | First view | 2007-03-29 |
Product | Enterprise Linux Desktop | Last view | 2022-09-29 |
Version | 5.0 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:redhat:enterprise_linux_desktop |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.5 | 2022-09-29 | CVE-2015-1931 | IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores plaintext information in memory dumps, which allows local users to obtain sensitive information by reading a file. |
3.3 | 2021-05-14 | CVE-2020-27769 | In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c. |
5.9 | 2018-08-01 | CVE-2016-8635 | It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group. |
7.5 | 2018-07-27 | CVE-2017-2634 | It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. |
9.8 | 2018-06-11 | CVE-2017-7793 | A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4. |
9.8 | 2018-06-11 | CVE-2017-7792 | A buffer overflow will occur when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
5.3 | 2018-06-11 | CVE-2017-7791 | On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
7.5 | 2018-06-11 | CVE-2017-7787 | Same-origin policy protections can be bypassed on pages with embedded iframes during page reloads, allowing the iframes to access content on the top level page, leading to information disclosure. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
9.8 | 2018-06-11 | CVE-2017-7786 | A buffer overflow can occur when the image renderer attempts to paint non-displayable SVG elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
9.8 | 2018-06-11 | CVE-2017-7785 | A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
9.8 | 2018-06-11 | CVE-2017-7784 | A use-after-free vulnerability can occur when reading an image observer during frame reconstruction after the observer has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
9.8 | 2018-06-11 | CVE-2017-5410 | Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
5.3 | 2018-06-11 | CVE-2017-5408 | Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
6.5 | 2018-06-11 | CVE-2017-5407 | Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
5.3 | 2018-06-11 | CVE-2017-5405 | Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5404 | A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5402 | A use-after-free can occur when events are fired for a "FontFace" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5401 | A crash triggerable by web content in which an "ErrorResult" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5400 | JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5398 | Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5396 | A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51. |
9.8 | 2018-06-11 | CVE-2017-5390 | The JSON viewer in the Developer Tools uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51. |
7.3 | 2018-06-11 | CVE-2017-5386 | WebExtension scripts can use the "data:" protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. This vulnerability affects Firefox ESR < 45.7 and Firefox < 51. |
5.3 | 2018-06-11 | CVE-2017-5383 | URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display, allowing for domain name spoofing attacks in the location bar. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51. |
9.8 | 2018-06-11 | CVE-2017-5380 | A potential use-after-free found through fuzzing during DOM manipulation of SVG content. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
23% (49) | CWE-416 | Use After Free |
11% (25) | CWE-787 | Out-of-bounds Write |
11% (25) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
7% (15) | CWE-200 | Information Exposure |
5% (12) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
5% (12) | CWE-20 | Improper Input Validation |
3% (7) | CWE-476 | NULL Pointer Dereference |
3% (7) | CWE-190 | Integer Overflow or Wraparound |
2% (6) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (5) | CWE-125 | Out-of-bounds Read |
1% (4) | CWE-269 | Improper Privilege Management |
1% (3) | CWE-362 | Race Condition |
1% (3) | CWE-346 | Origin Validation Error |
1% (3) | CWE-189 | Numeric Errors |
1% (3) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
0% (2) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
0% (2) | CWE-295 | Certificate Issues |
0% (2) | CWE-254 | Security Features |
0% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
0% (2) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
0% (2) | CWE-74 | Failure to Sanitize Data into a Different Plane ('Injection') |
0% (1) | CWE-776 | Unrestricted Recursive Entity References in DTDs ('XML Bomb') |
0% (1) | CWE-770 | Allocation of Resources Without Limits or Throttling |
0% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
0% (1) | CWE-672 | Operation on a Resource after Expiration or Release |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-1 | Accessing Functionality Not Properly Constrained by ACLs |
CAPEC-17 | Accessing, Modifying or Executing Executable Files |
CAPEC-60 | Reusing Session IDs (aka Session Replay) |
CAPEC-61 | Session Fixation |
CAPEC-62 | Cross Site Request Forgery (aka Session Riding) |
CAPEC-122 | Exploitation of Authorization |
CAPEC-180 | Exploiting Incorrectly Configured Access Control Security Levels |
CAPEC-232 | Exploitation of Privilege/Trust |
CAPEC-234 | Hijacking a privileged process |
SAINT Exploits
Description | Link |
---|---|
Oracle Java Runtime Hotspot Bytecode Verifier Type Confusion | More info here |
Mozilla Firefox onreadystatechange Event Use After Free | More info here |
Bash environment variable code injection over HTTP | More info here |
Bash Environment Variable Handling Shell Command Injection Via CUPS | More info here |
ShellShock DHCP Server | More info here |
Mozilla Firefox XMLSerializer serializeToStream Use-after-free Vulnerability | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
75652 | Qt src/3rdparty/harfbuzz/src/harfbuzz-gpos.c Font Handling Overflow |
75241 | Linux Kernel SAHF Instruction Emulation Remote DoS |
74829 | SSL Chained Initialization Vector CBC Mode MiTM Weakness |
74660 | Linux Kernel NFS Server File Locking Local DoS |
74658 | Linux Kernel trigger_scan / sched_scan SSID Length Handling Bypass |
74654 | Linux Kernel EFI GUID Partition Table (GPT) Implementation Crafted Partition ... |
74653 | Linux Kernel net/ipv4/inet_diag.c inet_diag_bc_audit() Function Local DoS |
73882 | Linux Kernel DCCP net/dccp/input.c dccp_rcv_state_process Function CLOSED End... |
73802 | Linux Kernel fs/gfs2/file.c GFS2 gfs2_fallocate() Function Local DoS |
73460 | Linux Kernel Bluetooth net/bluetooth/rfcomm/sock.c rfcomm_sock_getsockopt_old... |
73459 | Linux Kernel Bluetooth net/bluetooth/l2cap_sock.c l2cap_sock_getsockopt_old()... |
73046 | Linux Kernel fs/partitions/osf.c osf_partition Function Partition Table Parsi... |
73045 | Linux Kernel drivers/char/agp/generic.c agp_generic_remove_memory Function AG... |
73043 | Linux Kernel drivers/char/agp/generic.c Multiple Function Memory Page Call Lo... |
73042 | Linux Kernel drivers/char/agp/generic.c agp_generic_insert_memory Function AG... |
72993 | Linux Kernel drivers/infiniband/core/uverbs_cmd.c ib_uverbs_poll_cq Function ... |
71992 | Linux Kernel kernel/pid.c next_pidmap() Function Local DoS |
71653 | Linux Kernel rt_*sigqueueinfo() Functions SI_TKILL Signal Spoofing |
71649 | Linux Kernel drivers/infiniband/core/uverbs_cmd.c ib_uverbs_poll_cq Function ... |
71480 | Linux Kernel cm_work_handler() Function InfiniBand Request Handling DoS |
70950 | Linux Kernel fs/xfs/xfs_fsops.c xfs_fs_geometry() Local Memory Disclosure |
69064 | Poppler Gfx::getPos PDF Handling Uninitialized Pointer Dereference DoS |
68951 | CUPS IPP Request Handling Use-After-Free Arbitrary Code Execution |
65696 | SquirrelMail Mail Fetch Plugin Modified POP3 Port Number Access Restriction B... |
64630 | Linux Kernel Xen Hypervisor MMIO Instruction Decoder Instruction Emulation DoS |
ExploitDB Exploits
id | Description |
---|---|
35146 | PHP 5.x Shellshock Exploit (bypass disable_functions) |
35115 | CUPS Filter Bash Environment Variable Code Injection |
34879 | OpenVPN 2.2.29 - ShellShock Exploit |
34860 | GNU bash 4.3.11 Environment Variable dhclient Exploit |
34839 | IPFire Cgi Web Interface Authenticated Bash Environment Variable Code Injecti... |
34777 | GNU bash Environment Variable Command Injection (MSF) |
19717 | Java Applet Field Bytecode Verifier Cache Remote Code Execution |
9575 | Linux Kernel < 2.6.19 - udp_sendmsg Local Root Exploit |
9574 | Linux Kernel < 2.6.19 udp_sendmsg Local Root Exploit (x86/x64) |
9542 | Linux Kernel 2.6 < 2.6.19 (32bit) ip_append_data() ring0 Root Exploit |
9479 | Linux Kernel 2.4/2.6 - sock_sendpage() ring0 Root Exploit (simple ver) |
9477 | Linux Kernel 2.x sock_sendpage() Local Root Exploit (Android Edition) |
OpenVAS Exploits
id | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2389-1 (linux-2.6 - privilege escalation/denial ... File : nvt/deb_2389_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2427-1 (imagemagick - several vulnerabilities) File : nvt/deb_2427_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2439-1 (libpng - buffer overflow) File : nvt/deb_2439_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2462-2 (imagemagick - several vulnerabilities) File : nvt/deb_2462_2.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2534-1 (postgresql-8.4 - several vulnerabilities) File : nvt/deb_2534_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2553-1 (iceweasel - several vulnerabilities) File : nvt/deb_2553_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2583-1 (iceweasel - several vulnerabilities) File : nvt/deb_2583_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2584-1 (iceape - several vulnerabilities) File : nvt/deb_2584_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2588-1 (icedove - several vulnerabilities) File : nvt/deb_2588_1.nasl |
2012-12-31 | Name : Fedora Update for libtiff FEDORA-2012-20404 File : nvt/gb_fedora_2012_20404_libtiff_fc16.nasl |
2012-12-31 | Name : Fedora Update for libtiff FEDORA-2012-20446 File : nvt/gb_fedora_2012_20446_libtiff_fc17.nasl |
2012-12-26 | Name : CentOS Update for libtiff CESA-2012:1590 centos5 File : nvt/gb_CESA-2012_1590_libtiff_centos5.nasl |
2012-12-26 | Name : CentOS Update for libtiff CESA-2012:1590 centos6 File : nvt/gb_CESA-2012_1590_libtiff_centos6.nasl |
2012-12-26 | Name : RedHat Update for libtiff RHSA-2012:1590-01 File : nvt/gb_RHSA-2012_1590-01_libtiff.nasl |
2012-12-24 | Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Mac OS X) File : nvt/gb_libreoffice_graphic_object_bof_vuln_macosx.nasl |
2012-12-24 | Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Windows) File : nvt/gb_libreoffice_graphic_object_bof_vuln_win.nasl |
2012-12-24 | Name : OpenOffice Multiple Buffer Overflow Vulnerabilities - Dec12 (Windows) File : nvt/gb_openoffice_mult_bof_vuln_dec12_win.nasl |
2012-12-18 | Name : Fedora Update for xen FEDORA-2012-19828 File : nvt/gb_fedora_2012_19828_xen_fc16.nasl |
2012-12-14 | Name : Fedora Update for xen FEDORA-2012-19717 File : nvt/gb_fedora_2012_19717_xen_fc17.nasl |
2012-12-13 | Name : SuSE Update for update openSUSE-SU-2012:0466-1 (update) File : nvt/gb_suse_2012_0466_1.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox, openSUSE-SU-2012:0760-1 (MozillaFirefox,) File : nvt/gb_suse_2012_0760_1.nasl |
2012-12-13 | Name : SuSE Update for java-1_6_0-openjdk openSUSE-SU-2012:0828-1 (java-1_6_0-openjdk) File : nvt/gb_suse_2012_0828_1.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1064-1 (MozillaFirefox) File : nvt/gb_suse_2012_1064_1.nasl |
2012-12-13 | Name : SuSE Update for qemu openSUSE-SU-2012:1170-1 (qemu) File : nvt/gb_suse_2012_1170_1.nasl |
2012-12-13 | Name : SuSE Update for Security openSUSE-SU-2012:1172-1 (Security) File : nvt/gb_suse_2012_1172_1.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0149 | Multiple Vulnerabilities in Juniper Networks and Security Manager(NSM) Appliance Severity: Category I - VMSKEY: V0061101 |
2015-A-0158 | Multiple Vulnerabilities in Oracle Java SE Severity: Category I - VMSKEY: V0061089 |
2015-A-0155 | Multiple Vulnerabilities in Oracle MySQL Product Suite Severity: Category I - VMSKEY: V0061083 |
2014-A-0142 | GNU Bash Shell Code Execution Vulnerability Severity: Category I - VMSKEY: V0054753 |
2014-A-0064 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0050011 |
2014-A-0057 | Multiple Vulnerabilities in Oracle MySQL Products Severity: Category I - VMSKEY: V0049591 |
2014-A-0055 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0049585 |
2014-A-0043 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0046769 |
2014-A-0030 | Apple Mac OS X Security Update 2014-001 Severity: Category I - VMSKEY: V0044547 |
2014-A-0021 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0043921 |
2014-A-0011 | Multiple Vulnerabilities in Oracle MySQL Products Severity: Category I - VMSKEY: V0043399 |
2014-A-0009 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0043395 |
2013-A-0233 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0042596 |
2013-A-0200 | Multiple Vulnerabilities in Oracle Java Severity: Category I - VMSKEY: V0040783 |
2013-A-0199 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0040786 |
2013-A-0201 | Multiple Vulnerabilities in Oracle MySQL Products Severity: Category I - VMSKEY: V0040782 |
2013-A-0191 | Multiple Vulnerabilities in Java for Mac OS X Severity: Category I - VMSKEY: V0040779 |
2013-A-0177 | Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform Severity: Category I - VMSKEY: V0040288 |
2013-A-0146 | Multiple Security Vulnerabilities in Apache HTTP Server Severity: Category I - VMSKEY: V0039573 |
2012-A-0189 | Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1 Severity: Category I - VMSKEY: V0035032 |
2012-A-0153 | Multiple Vulnerabilities in VMware ESX 4.0 and ESXi 4.0 Severity: Category I - VMSKEY: V0033884 |
2012-A-0146 | Multiple Vulnerabilities in VMware vCenter Update Manager 4.1 Severity: Category I - VMSKEY: V0033792 |
2012-A-0048 | Multiple Vulnerabilities in VMware vCenter Update Manager 5.0 Severity: Category I - VMSKEY: V0031901 |
2012-A-0020 | Multiple Vulnerabilities in VMware ESX 4.1 and ESXi 4.1 Severity: Category I - VMSKEY: V0031252 |
2012-B-0006 | Microsoft SSL/TLS Information Disclosure Vulnerability Severity: Category I - VMSKEY: V0031054 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-12-05 | ISC BIND DHCP client DNAME resource record parsing denial of service attempt RuleID : 52078 - Type : SERVER-OTHER - Revision : 1 |
2019-09-24 | MIT Kerberos kpasswd UDP denial of service attempt RuleID : 51212 - Type : SERVER-OTHER - Revision : 1 |
2018-01-18 | Multiple browser pressure function denial of service attempt RuleID : 45206 - Type : BROWSER-FIREFOX - Revision : 3 |
2017-12-13 | Apache HTTP Server possible mod_dav.c remote denial of service vulnerability ... RuleID : 44808 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2017-07-27 | Mozilla Firefox domFuzzLite3 table use after free attempt RuleID : 43347 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-07-27 | Mozilla Firefox domFuzzLite3 table use after free attempt RuleID : 43346 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-04-12 | SSL/TLS weak RC4 cipher suite use attempt RuleID : 41907 - Type : POLICY-OTHER - Revision : 3 |
2017-02-21 | Adobe Flash Player Primetime SDK ShimContentResolver memory corruption attempt RuleID : 41358 - Type : FILE-FLASH - Revision : 3 |
2017-02-21 | Adobe Flash Player Primetime SDK ShimContentResolver memory corruption attempt RuleID : 41357 - Type : FILE-FLASH - Revision : 2 |
2016-12-02 | Mozilla Firefox ESR NotifyTimeChange use after free attempt RuleID : 40896-community - Type : BROWSER-FIREFOX - Revision : 3 |
2017-01-04 | Mozilla Firefox ESR NotifyTimeChange use after free attempt RuleID : 40896 - Type : BROWSER-FIREFOX - Revision : 3 |
2016-12-01 | Mozilla Firefox ESR NotifyTimeChange use after free attempt RuleID : 40888-community - Type : BROWSER-FIREFOX - Revision : 3 |
2017-01-04 | Mozilla Firefox ESR NotifyTimeChange use after free attempt RuleID : 40888 - Type : BROWSER-FIREFOX - Revision : 3 |
2016-07-19 | Adobe Flash Player ShimOpportunityGenerator out of bounds memory access attempt RuleID : 39319 - Type : FILE-FLASH - Revision : 4 |
2016-07-19 | Adobe Flash Player ShimOpportunityGenerator out of bounds memory access attempt RuleID : 39318 - Type : FILE-FLASH - Revision : 3 |
2016-07-19 | Adobe Flash Player RegExp numbered backreference out of bounds read attempt RuleID : 39315 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player RegExp numbered backreference out of bounds read attempt RuleID : 39314 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player malformed Adobe Texture Format image load memory corruptio... RuleID : 39313 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player malformed Adobe Texture Format image load memory corruptio... RuleID : 39312 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player same origin policy security bypass attempt RuleID : 39311 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player same origin policy security bypass attempt RuleID : 39310 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player malformed ATF file length load buffer overflow attempt RuleID : 39309 - Type : FILE-FLASH - Revision : 4 |
2016-07-19 | Adobe Flash Player malformed ATF file length load buffer overflow attempt RuleID : 39308 - Type : FILE-FLASH - Revision : 4 |
2016-07-19 | Adobe Flash Player sound object use-after-free attempt RuleID : 39307 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player sound object use-after-free attempt RuleID : 39306 - Type : FILE-FLASH - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-16 | Name: The remote database server is affected by multiple vulnerabilities File: mariadb_5_5_42.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2831.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2885.nasl - Type: ACT_GATHER_INFO |
2018-05-07 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2018-124-01.nasl - Type: ACT_GATHER_INFO |
2018-05-07 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_8719b9358bae41ad92ba3c826f651219.nasl - Type: ACT_GATHER_INFO |
2018-04-04 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201803-14.nasl - Type: ACT_GATHER_INFO |
2018-02-20 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201802-03.nasl - Type: ACT_GATHER_INFO |
2017-12-15 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2017-3453.nasl - Type: ACT_GATHER_INFO |
2017-12-07 | Name: The remote database server is affected by multiple vulnerabilities. File: mariadb_10_2_10.nasl - Type: ACT_GATHER_INFO |
2017-12-04 | Name: The remote host is missing a vendor-supplied security patch. File: check_point_gaia_sk102673.nasl - Type: ACT_GATHER_INFO |
2017-12-04 | Name: The remote host is missing a vendor-supplied security patch. File: check_point_gaia_sk106499.nasl - Type: ACT_GATHER_INFO |
2017-11-29 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2017-3267.nasl - Type: ACT_GATHER_INFO |
2017-11-29 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2017-3268.nasl - Type: ACT_GATHER_INFO |
2017-11-28 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2017-3264.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-2872-2.nasl - Type: ACT_GATHER_INFO |
2017-11-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-1269.nasl - Type: ACT_GATHER_INFO |
2017-11-13 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-2989-1.nasl - Type: ACT_GATHER_INFO |
2017-11-02 | Name: The remote Debian host is missing a security update. File: debian_DLA-1153.nasl - Type: ACT_GATHER_INFO |
2017-11-02 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4014.nasl - Type: ACT_GATHER_INFO |
2017-10-30 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-2872-1.nasl - Type: ACT_GATHER_INFO |
2017-10-25 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2017-3046.nasl - Type: ACT_GATHER_INFO |
2017-10-24 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2017-2999.nasl - Type: ACT_GATHER_INFO |
2017-10-19 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2017-1248.nasl - Type: ACT_GATHER_INFO |
2017-10-19 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2017-1249.nasl - Type: ACT_GATHER_INFO |
2017-10-19 | Name: The remote Windows host contains a programming platform that is affected by m... File: oracle_java_cpu_oct_2017.nasl - Type: ACT_GATHER_INFO |