Summary
Detail | |||
---|---|---|---|
Vendor | Canonical | First view | 2012-06-05 |
Product | Ubuntu Linux | Last view | 2020-02-06 |
Version | 12.10 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:canonical:ubuntu_linux |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2020-02-06 | CVE-2014-2030 | Stack-based buffer overflow in the WritePSDImage function in coders/psd.c in ImageMagick, possibly 6.8.8-5, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PSD image, involving the L%06ld string, a different vulnerability than CVE-2014-1947. |
8.8 | 2020-02-06 | CVE-2014-1958 | Buffer overflow in the DecodePSDPixels function in coders/psd.c in ImageMagick before 6.8.8-5 might allow remote attackers to execute arbitrary code via a crafted PSD image, involving the L%06ld string, a different vulnerability than CVE-2014-2030. |
7.8 | 2016-12-16 | CVE-2016-9950 | An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system. |
7.8 | 2016-12-16 | CVE-2016-9949 | An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code. |
7.8 | 2016-11-27 | CVE-2015-1328 | The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace. |
3.5 | 2015-07-16 | CVE-2015-4771 | Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to RBR. |
4.3 | 2014-05-16 | CVE-2014-3730 | The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com." |
6.4 | 2014-05-16 | CVE-2014-1418 | Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers. |
7.5 | 2014-05-15 | CVE-2014-0211 | Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow. |
7.5 | 2014-05-15 | CVE-2014-0210 | Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function. |
4.6 | 2014-05-15 | CVE-2014-0209 | Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata. |
4.9 | 2014-05-08 | CVE-2013-4544 | hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information. |
6.9 | 2014-05-07 | CVE-2014-0196 | The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings. |
9.8 | 2014-04-30 | CVE-2014-1532 | Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution. |
8.8 | 2014-04-30 | CVE-2014-1531 | Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation. |
6.1 | 2014-04-30 | CVE-2014-1530 | The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation. |
8.8 | 2014-04-30 | CVE-2014-1529 | The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted. |
10 | 2014-04-30 | CVE-2014-1528 | The sse2_composite_src_x888_8888 function in Pixman, as used in Cairo in Mozilla Firefox 28.0 and SeaMonkey 2.25 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by painting on a CANVAS element. |
6.8 | 2014-04-30 | CVE-2014-1526 | The XrayWrapper implementation in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM methods on the unwrapped objects. |
9.3 | 2014-04-30 | CVE-2014-1525 | The mozilla::dom::TextTrack::AddCue function in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 does not properly perform garbage collection for Text Track Manager variables, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) via a crafted VIDEO element in an HTML document. |
9.8 | 2014-04-30 | CVE-2014-1524 | The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object. |
6.5 | 2014-04-30 | CVE-2014-1523 | Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image. |
9.3 | 2014-04-30 | CVE-2014-1522 | The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via crafted content. |
9.3 | 2014-04-30 | CVE-2014-1519 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. |
8.8 | 2014-04-30 | CVE-2014-1518 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
15% (30) | CWE-416 | Use After Free |
11% (22) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
10% (20) | CWE-264 | Permissions, Privileges, and Access Controls |
10% (19) | CWE-20 | Improper Input Validation |
7% (14) | CWE-787 | Out-of-bounds Write |
5% (10) | CWE-189 | Numeric Errors |
4% (9) | CWE-200 | Information Exposure |
4% (8) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
3% (7) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
3% (6) | CWE-399 | Resource Management Errors |
3% (6) | CWE-125 | Out-of-bounds Read |
3% (6) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
2% (5) | CWE-310 | Cryptographic Issues |
2% (4) | CWE-362 | Race Condition |
2% (4) | CWE-269 | Improper Privilege Management |
1% (3) | CWE-326 | Inadequate Encryption Strength |
1% (3) | CWE-190 | Integer Overflow or Wraparound |
1% (2) | CWE-287 | Improper Authentication |
1% (2) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
1% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
0% (1) | CWE-522 | Insufficiently Protected Credentials |
0% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
0% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
0% (1) | CWE-346 | Origin Validation Error |
0% (1) | CWE-295 | Certificate Issues |
SAINT Exploits
Description | Link |
---|---|
Ubuntu overlayfs privilege elevation | More info here |
Mozilla Firefox XMLSerializer serializeToStream Use-after-free Vulnerability | More info here |
ExploitDB Exploits
id | Description |
---|---|
33516 | Linux kernel 3.14-rc1 <= 3.15-rc4 - Raw Mode PTY Local Echo Race Condition... |
32998 | Heartbleed OpenSSL - Information Leak Exploit (2) - DTLS Support |
32791 | Heartbleed OpenSSL - Information Leak Exploit (1) |
32764 | OpenSSL 1.0.1f TLS Heartbeat Extension - Memory Disclosure (Multiple SSL/TLS ... |
32745 | OpenSSL TLS Heartbeat Extension - Memory Disclosure |
28338 | Vino VNC Server 3.7.3 - Persistent Denial of Service |
27778 | Samba nttrans Reply - Integer Overflow Vulnerability |
24487 | cURL Buffer Overflow Vulnerability |
OpenVAS Exploits
id | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2588-1 (icedove - several vulnerabilities) File : nvt/deb_2588_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2584-1 (iceape - several vulnerabilities) File : nvt/deb_2584_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2583-1 (iceweasel - several vulnerabilities) File : nvt/deb_2583_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2581-1 (mysql-5.1 - several vulnerabilities) File : nvt/deb_2581_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2462-2 (imagemagick - several vulnerabilities) File : nvt/deb_2462_2.nasl |
2012-12-31 | Name : Fedora Update for libtiff FEDORA-2012-20446 File : nvt/gb_fedora_2012_20446_libtiff_fc17.nasl |
2012-12-31 | Name : Fedora Update for bind FEDORA-2012-19822 File : nvt/gb_fedora_2012_19822_bind_fc16.nasl |
2012-12-31 | Name : Fedora Update for libtiff FEDORA-2012-20404 File : nvt/gb_fedora_2012_20404_libtiff_fc16.nasl |
2012-12-26 | Name : Fedora Update for qt FEDORA-2012-19715 File : nvt/gb_fedora_2012_19715_qt_fc16.nasl |
2012-12-26 | Name : RedHat Update for libtiff RHSA-2012:1590-01 File : nvt/gb_RHSA-2012_1590-01_libtiff.nasl |
2012-12-26 | Name : CentOS Update for libtiff CESA-2012:1590 centos6 File : nvt/gb_CESA-2012_1590_libtiff_centos6.nasl |
2012-12-26 | Name : CentOS Update for libtiff CESA-2012:1590 centos5 File : nvt/gb_CESA-2012_1590_libtiff_centos5.nasl |
2012-12-14 | Name : Google Chrome Multiple Vulnerabilities-03 Dec2012 (Linux) File : nvt/gb_google_chrome_mult_vuln03_dec12_lin.nasl |
2012-12-14 | Name : Google Chrome Multiple Vulnerabilities-03 Dec2012 (Mac OS X) File : nvt/gb_google_chrome_mult_vuln03_dec12_macosx.nasl |
2012-12-14 | Name : Fedora Update for bind FEDORA-2012-19830 File : nvt/gb_fedora_2012_19830_bind_fc17.nasl |
2012-12-14 | Name : Google Chrome Multiple Vulnerabilities-03 Dec2012 (Windows) File : nvt/gb_google_chrome_mult_vuln03_dec12_win.nasl |
2012-12-14 | Name : Fedora Update for qt FEDORA-2012-19759 File : nvt/gb_fedora_2012_19759_qt_fc17.nasl |
2012-12-13 | Name : SuSE Update for Mozilla Suite openSUSE-SU-2012:1412-1 (Mozilla Suite) File : nvt/gb_suse_2012_1412_1.nasl |
2012-12-10 | Name : CentOS Update for bind CESA-2012:1549 centos6 File : nvt/gb_CESA-2012_1549_bind_centos6.nasl |
2012-12-10 | Name : Ubuntu Update for bind9 USN-1657-1 File : nvt/gb_ubuntu_USN_1657_1.nasl |
2012-12-10 | Name : RedHat Update for bind RHSA-2012:1549-01 File : nvt/gb_RHSA-2012_1549-01_bind.nasl |
2012-12-06 | Name : Mandriva Update for bind MDVSA-2012:177 (bind) File : nvt/gb_mandriva_MDVSA_2012_177.nasl |
2012-12-06 | Name : Fedora Update for seamonkey FEDORA-2012-18952 File : nvt/gb_fedora_2012_18952_seamonkey_fc17.nasl |
2012-12-06 | Name : Fedora Update for seamonkey FEDORA-2012-18931 File : nvt/gb_fedora_2012_18931_seamonkey_fc16.nasl |
2012-12-04 | Name : Ubuntu Update for firefox USN-1638-3 File : nvt/gb_ubuntu_USN_1638_3.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0155 | Multiple Vulnerabilities in Oracle MySQL Product Suite Severity: Category I - VMSKEY: V0061083 |
2015-B-0007 | Multiple Vulnerabilities in Juniper Secure Analytics (JSA) and Security Threa... Severity: Category I - VMSKEY: V0058213 |
2014-A-0064 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0050011 |
2014-A-0063 | Multiple Vulnerabilities in McAfee VirusScan Enterprise for Linux Severity: Category I - VMSKEY: V0050009 |
2014-A-0062 | Multiple Vulnerabilities In McAfee Email Gateway Severity: Category I - VMSKEY: V0050005 |
2014-B-0050 | McAfee Web Gateway Information Disclosure Vulnerability Severity: Category I - VMSKEY: V0050003 |
2014-B-0046 | Multiple Vulnerabilities in HP System Management Homepage (SMH) Severity: Category I - VMSKEY: V0049737 |
2014-A-0057 | Multiple Vulnerabilities in Oracle MySQL Products Severity: Category I - VMSKEY: V0049591 |
2014-B-0042 | Stunnel Information Disclosure Vulnerability Severity: Category I - VMSKEY: V0049575 |
2014-B-0041 | Multiple Vulnerabilities in Splunk Severity: Category I - VMSKEY: V0049577 |
2014-A-0058 | Multiple Vulnerabilities in Oracle & Sun Systems Product Suite Severity: Category I - VMSKEY: V0049579 |
2014-A-0056 | Multiple Vulnerabilities in Oracle Java SE Severity: Category I - VMSKEY: V0049583 |
2014-A-0055 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0049585 |
2014-A-0054 | Multiple Vulnerabilities in Oracle Database Severity: Category I - VMSKEY: V0049587 |
2014-A-0053 | Multiple Vulnerabilities in Juniper Network JUNOS Severity: Category I - VMSKEY: V0049589 |
2014-A-0051 | OpenSSL Information Disclosure Vulnerability Severity: Category I - VMSKEY: V0048667 |
2014-A-0043 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0046769 |
2014-A-0030 | Apple Mac OS X Security Update 2014-001 Severity: Category I - VMSKEY: V0044547 |
2014-B-0021 | Multiple Vulnerabilities in PHP Severity: Category I - VMSKEY: V0044541 |
2014-A-0021 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0043921 |
2014-A-0017 | Multiple Vulnerabilities in Cisco TelePresence Video Communication Server Severity: Category I - VMSKEY: V0043846 |
2014-A-0019 | Multiple Vulnerabilities in VMware Fusion Severity: Category I - VMSKEY: V0043844 |
2014-A-0011 | Multiple Vulnerabilities in Oracle MySQL Products Severity: Category I - VMSKEY: V0043399 |
2014-A-0009 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0043395 |
2013-A-0233 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0042596 |
Snort® IPS/IDS
Date | Description |
---|---|
2018-01-18 | Multiple browser pressure function denial of service attempt RuleID : 45206 - Type : BROWSER-FIREFOX - Revision : 3 |
2017-04-06 | SSLv3 Client Hello attempt RuleID : 41807 - Type : POLICY-OTHER - Revision : 3 |
2017-01-19 | Ubuntu Apport CrashDB crash report code injection attempt RuleID : 41041 - Type : OS-LINUX - Revision : 2 |
2017-01-19 | Ubuntu Apport CrashDB crash report code injection attempt RuleID : 41040 - Type : OS-LINUX - Revision : 2 |
2016-03-15 | Mozilla Firefox IDL fragment privilege escalation attempt RuleID : 37626 - Type : BROWSER-FIREFOX - Revision : 2 |
2016-03-14 | Oracle Java System.arraycopy race condition attempt RuleID : 36240 - Type : FILE-JAVA - Revision : 2 |
2016-03-14 | Oracle Java System.arraycopy race condition attempt RuleID : 36239 - Type : FILE-JAVA - Revision : 2 |
2015-08-04 | Mozilla Firefox IDL fragment privilege escalation attempt RuleID : 35052 - Type : BROWSER-FIREFOX - Revision : 2 |
2015-08-04 | Mozilla Firefox IDL fragment privilege escalation attempt RuleID : 35051 - Type : BROWSER-FIREFOX - Revision : 2 |
2015-02-11 | Mozilla Firefox XMLSerializer serializeToStream use-after-free attempt RuleID : 32994 - Type : BROWSER-FIREFOX - Revision : 6 |
2015-02-11 | Mozilla Firefox XMLSerializer serializeToStream use-after-free attempt RuleID : 32993 - Type : BROWSER-FIREFOX - Revision : 6 |
2014-11-16 | Multiple browser pressure function denial of service attempt RuleID : 31513 - Type : BROWSER-FIREFOX - Revision : 3 |
2014-06-28 | Vino VNC multiple client authentication denial of service attempt RuleID : 31082 - Type : SERVER-OTHER - Revision : 4 |
2014-04-25 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30788-community - Type : SERVER-OTHER - Revision : 5 |
2014-05-24 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30788 - Type : SERVER-OTHER - Revision : 5 |
2014-04-25 | OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30787-community - Type : SERVER-OTHER - Revision : 5 |
2014-05-24 | OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30787 - Type : SERVER-OTHER - Revision : 5 |
2014-04-25 | OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30786-community - Type : SERVER-OTHER - Revision : 4 |
2014-05-24 | OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt RuleID : 30786 - Type : SERVER-OTHER - Revision : 4 |
2014-04-25 | OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30785-community - Type : SERVER-OTHER - Revision : 4 |
2014-05-24 | OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt RuleID : 30785 - Type : SERVER-OTHER - Revision : 4 |
2014-04-25 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30784-community - Type : SERVER-OTHER - Revision : 4 |
2014-05-24 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30784 - Type : SERVER-OTHER - Revision : 4 |
2014-04-25 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30783-community - Type : SERVER-OTHER - Revision : 4 |
2014-05-24 | OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt RuleID : 30783 - Type : SERVER-OTHER - Revision : 4 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2017-09-25 | Name: The remote Debian host is missing a security update. File: debian_DLA-1107.nasl - Type: ACT_GATHER_INFO |
2017-05-02 | Name: An application installed on the remote host is affected by multiple vulnerabi... File: oracle_secure_global_desktop_apr_2017_cpu.nasl - Type: ACT_GATHER_INFO |
2017-04-21 | Name: The remote OracleVM host is missing one or more security updates. File: oraclevm_OVMSA-2017-0066.nasl - Type: ACT_GATHER_INFO |
2017-04-03 | Name: The remote OracleVM host is missing one or more security updates. File: oraclevm_OVMSA-2017-0057.nasl - Type: ACT_GATHER_INFO |
2016-12-15 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-3157-1.nasl - Type: ACT_GATHER_INFO |
2016-10-12 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201610-06.nasl - Type: ACT_GATHER_INFO |
2016-07-25 | Name: An application installed on the remote host is affected by multiple vulnerabi... File: oracle_secure_global_desktop_jul_2016_cpu.nasl - Type: ACT_GATHER_INFO |
2016-06-23 | Name: The remote device is affected by multiple vulnerabilities. File: juniper_space_jsa10698.nasl - Type: ACT_GATHER_INFO |
2016-06-22 | Name: The remote OracleVM host is missing a security update. File: oraclevm_OVMSA-2016-0056.nasl - Type: ACT_GATHER_INFO |
2016-06-22 | Name: The remote OracleVM host is missing a security update. File: oraclevm_OVMSA-2016-0062.nasl - Type: ACT_GATHER_INFO |
2016-05-18 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL16716.nasl - Type: ACT_GATHER_INFO |
2016-04-18 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2016-473.nasl - Type: ACT_GATHER_INFO |
2016-03-04 | Name: The remote Fedora host is missing a security update. File: fedora_2016-50abc3e885.nasl - Type: ACT_GATHER_INFO |
2016-03-04 | Name: The remote Fedora host is missing a security update. File: fedora_2016-52b294538d.nasl - Type: ACT_GATHER_INFO |
2016-03-04 | Name: The remote VMware ESX / ESXi host is missing a security-related patch. File: vmware_esx_VMSA-2013-0009_remote.nasl - Type: ACT_GATHER_INFO |
2016-02-22 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL40131068.nasl - Type: ACT_GATHER_INFO |
2016-02-22 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL75253136.nasl - Type: ACT_GATHER_INFO |
2015-12-30 | Name: The remote VMware ESXi host is missing a security-related patch. File: vmware_VMSA-2014-0004_remote.nasl - Type: ACT_GATHER_INFO |
2015-10-29 | Name: The remote host is missing a Mac OS X update that fixes multiple security vul... File: macosx_10_11_1.nasl - Type: ACT_GATHER_INFO |
2015-10-22 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2015-1788-1.nasl - Type: ACT_GATHER_INFO |
2015-10-01 | Name: The remote HP-UX host is missing a security-related patch. File: hpux_PHSS_43690.nasl - Type: ACT_GATHER_INFO |
2015-09-28 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2015-608.nasl - Type: ACT_GATHER_INFO |
2015-09-24 | Name: The remote HP-UX host is missing a security-related patch. File: hpux_PHSS_44149.nasl - Type: ACT_GATHER_INFO |
2015-09-24 | Name: The remote HP-UX host is missing a security-related patch. File: hpux_PHSS_44188.nasl - Type: ACT_GATHER_INFO |
2015-08-19 | Name: The remote host is missing one or more security updates. File: mysql_5_6_25_rpm.nasl - Type: ACT_GATHER_INFO |