Summary
Detail | |||
---|---|---|---|
Vendor | Redhat | First view | 2007-03-29 |
Product | Enterprise Linux Server | Last view | 2019-10-17 |
Version | 5.0 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:redhat:enterprise_linux_server |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2019-10-17 | CVE-2019-14287 | In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. |
5.9 | 2018-08-01 | CVE-2016-8635 | It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group. |
7.5 | 2018-07-27 | CVE-2017-2634 | It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. |
9.8 | 2018-06-11 | CVE-2017-7793 | A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4. |
9.8 | 2018-06-11 | CVE-2017-7792 | A buffer overflow will occur when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
5.3 | 2018-06-11 | CVE-2017-7791 | On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
7.5 | 2018-06-11 | CVE-2017-7787 | Same-origin policy protections can be bypassed on pages with embedded iframes during page reloads, allowing the iframes to access content on the top level page, leading to information disclosure. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
9.8 | 2018-06-11 | CVE-2017-7786 | A buffer overflow can occur when the image renderer attempts to paint non-displayable SVG elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
9.8 | 2018-06-11 | CVE-2017-7785 | A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
9.8 | 2018-06-11 | CVE-2017-7784 | A use-after-free vulnerability can occur when reading an image observer during frame reconstruction after the observer has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. |
9.8 | 2018-06-11 | CVE-2017-5410 | Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
5.3 | 2018-06-11 | CVE-2017-5408 | Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
6.5 | 2018-06-11 | CVE-2017-5407 | Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
5.3 | 2018-06-11 | CVE-2017-5405 | Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5404 | A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5402 | A use-after-free can occur when events are fired for a "FontFace" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5401 | A crash triggerable by web content in which an "ErrorResult" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5400 | JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5398 | Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. |
9.8 | 2018-06-11 | CVE-2017-5396 | A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51. |
9.8 | 2018-06-11 | CVE-2017-5390 | The JSON viewer in the Developer Tools uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51. |
7.3 | 2018-06-11 | CVE-2017-5386 | WebExtension scripts can use the "data:" protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. This vulnerability affects Firefox ESR < 45.7 and Firefox < 51. |
5.3 | 2018-06-11 | CVE-2017-5383 | URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display, allowing for domain name spoofing attacks in the location bar. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51. |
9.8 | 2018-06-11 | CVE-2017-5380 | A potential use-after-free found through fuzzing during DOM manipulation of SVG content. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51. |
7.5 | 2018-06-11 | CVE-2017-5378 | Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
28% (46) | CWE-416 | Use After Free |
15% (25) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
9% (15) | CWE-200 | Information Exposure |
7% (12) | CWE-787 | Out-of-bounds Write |
6% (10) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
6% (10) | CWE-20 | Improper Input Validation |
3% (5) | CWE-190 | Integer Overflow or Wraparound |
2% (4) | CWE-476 | NULL Pointer Dereference |
2% (4) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (4) | CWE-269 | Improper Privilege Management |
2% (4) | CWE-125 | Out-of-bounds Read |
1% (3) | CWE-346 | Origin Validation Error |
1% (3) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
1% (2) | CWE-264 | Permissions, Privileges, and Access Controls |
1% (2) | CWE-254 | Security Features |
1% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
0% (1) | CWE-755 | Improper Handling of Exceptional Conditions |
0% (1) | CWE-617 | Reachable Assertion |
0% (1) | CWE-388 | Error Handling |
0% (1) | CWE-362 | Race Condition |
0% (1) | CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
0% (1) | CWE-320 | Key Management Errors |
0% (1) | CWE-295 | Certificate Issues |
0% (1) | CWE-287 | Improper Authentication |
0% (1) | CWE-284 | Access Control (Authorization) Issues |
SAINT Exploits
Description | Link |
---|---|
Mozilla Firefox XMLSerializer serializeToStream Use-after-free Vulnerability | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
75652 | Qt src/3rdparty/harfbuzz/src/harfbuzz-gpos.c Font Handling Overflow |
75241 | Linux Kernel SAHF Instruction Emulation Remote DoS |
74660 | Linux Kernel NFS Server File Locking Local DoS |
74658 | Linux Kernel trigger_scan / sched_scan SSID Length Handling Bypass |
74654 | Linux Kernel EFI GUID Partition Table (GPT) Implementation Crafted Partition ... |
74653 | Linux Kernel net/ipv4/inet_diag.c inet_diag_bc_audit() Function Local DoS |
73882 | Linux Kernel DCCP net/dccp/input.c dccp_rcv_state_process Function CLOSED End... |
73802 | Linux Kernel fs/gfs2/file.c GFS2 gfs2_fallocate() Function Local DoS |
73460 | Linux Kernel Bluetooth net/bluetooth/rfcomm/sock.c rfcomm_sock_getsockopt_old... |
73459 | Linux Kernel Bluetooth net/bluetooth/l2cap_sock.c l2cap_sock_getsockopt_old()... |
73046 | Linux Kernel fs/partitions/osf.c osf_partition Function Partition Table Parsi... |
73045 | Linux Kernel drivers/char/agp/generic.c agp_generic_remove_memory Function AG... |
73043 | Linux Kernel drivers/char/agp/generic.c Multiple Function Memory Page Call Lo... |
73042 | Linux Kernel drivers/char/agp/generic.c agp_generic_insert_memory Function AG... |
72993 | Linux Kernel drivers/infiniband/core/uverbs_cmd.c ib_uverbs_poll_cq Function ... |
71992 | Linux Kernel kernel/pid.c next_pidmap() Function Local DoS |
71653 | Linux Kernel rt_*sigqueueinfo() Functions SI_TKILL Signal Spoofing |
71649 | Linux Kernel drivers/infiniband/core/uverbs_cmd.c ib_uverbs_poll_cq Function ... |
71480 | Linux Kernel cm_work_handler() Function InfiniBand Request Handling DoS |
70950 | Linux Kernel fs/xfs/xfs_fsops.c xfs_fs_geometry() Local Memory Disclosure |
69064 | Poppler Gfx::getPos PDF Handling Uninitialized Pointer Dereference DoS |
60311 | Linux Kernel drivers/scsi/gdth.c gdth_read_event() Function IOCTL Handling Lo... |
59082 | Linux Kernel on x86_64 arch/x86/ia32/ia32entry.S 64-bit Mode ia32 Process Loc... |
59070 | Linux Kernel tc Subsystem net/sched/sch_api.c tc_fill_tclass Function Local M... |
57821 | Linux Kernel net/sched/sch_api.c tc_fill_tclass() Function Kernel Memory Disc... |
OpenVAS Exploits
id | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2389-1 (linux-2.6 - privilege escalation/denial ... File : nvt/deb_2389_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2427-1 (imagemagick - several vulnerabilities) File : nvt/deb_2427_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2462-2 (imagemagick - several vulnerabilities) File : nvt/deb_2462_2.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2553-1 (iceweasel - several vulnerabilities) File : nvt/deb_2553_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2583-1 (iceweasel - several vulnerabilities) File : nvt/deb_2583_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2584-1 (iceape - several vulnerabilities) File : nvt/deb_2584_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2588-1 (icedove - several vulnerabilities) File : nvt/deb_2588_1.nasl |
2012-12-31 | Name : Fedora Update for libtiff FEDORA-2012-20404 File : nvt/gb_fedora_2012_20404_libtiff_fc16.nasl |
2012-12-31 | Name : Fedora Update for libtiff FEDORA-2012-20446 File : nvt/gb_fedora_2012_20446_libtiff_fc17.nasl |
2012-12-26 | Name : CentOS Update for libtiff CESA-2012:1590 centos5 File : nvt/gb_CESA-2012_1590_libtiff_centos5.nasl |
2012-12-26 | Name : CentOS Update for libtiff CESA-2012:1590 centos6 File : nvt/gb_CESA-2012_1590_libtiff_centos6.nasl |
2012-12-26 | Name : RedHat Update for libtiff RHSA-2012:1590-01 File : nvt/gb_RHSA-2012_1590-01_libtiff.nasl |
2012-12-18 | Name : Fedora Update for xen FEDORA-2012-19828 File : nvt/gb_fedora_2012_19828_xen_fc16.nasl |
2012-12-14 | Name : Fedora Update for xen FEDORA-2012-19717 File : nvt/gb_fedora_2012_19717_xen_fc17.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox, openSUSE-SU-2012:0760-1 (MozillaFirefox,) File : nvt/gb_suse_2012_0760_1.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1064-1 (MozillaFirefox) File : nvt/gb_suse_2012_1064_1.nasl |
2012-12-13 | Name : SuSE Update for qemu openSUSE-SU-2012:1170-1 (qemu) File : nvt/gb_suse_2012_1170_1.nasl |
2012-12-13 | Name : SuSE Update for Security openSUSE-SU-2012:1172-1 (Security) File : nvt/gb_suse_2012_1172_1.nasl |
2012-12-13 | Name : SuSE Update for Security openSUSE-SU-2012:1174-1 (Security) File : nvt/gb_suse_2012_1174_1.nasl |
2012-12-13 | Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1345-1 (MozillaFirefox) File : nvt/gb_suse_2012_1345_1.nasl |
2012-12-13 | Name : SuSE Update for Mozilla Suite openSUSE-SU-2012:1412-1 (Mozilla Suite) File : nvt/gb_suse_2012_1412_1.nasl |
2012-12-13 | Name : SuSE Update for XEN openSUSE-SU-2012:1572-1 (XEN) File : nvt/gb_suse_2012_1572_1.nasl |
2012-12-06 | Name : Fedora Update for seamonkey FEDORA-2012-18931 File : nvt/gb_fedora_2012_18931_seamonkey_fc16.nasl |
2012-12-06 | Name : Fedora Update for seamonkey FEDORA-2012-18952 File : nvt/gb_fedora_2012_18952_seamonkey_fc17.nasl |
2012-12-04 | Name : Ubuntu Update for firefox USN-1638-3 File : nvt/gb_ubuntu_USN_1638_3.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0155 | Multiple Vulnerabilities in Oracle MySQL Product Suite Severity: Category I - VMSKEY: V0061083 |
2015-A-0158 | Multiple Vulnerabilities in Oracle Java SE Severity: Category I - VMSKEY: V0061089 |
2014-A-0064 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0050011 |
2014-A-0057 | Multiple Vulnerabilities in Oracle MySQL Products Severity: Category I - VMSKEY: V0049591 |
2014-A-0043 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0046769 |
2014-A-0021 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0043921 |
2014-A-0011 | Multiple Vulnerabilities in Oracle MySQL Products Severity: Category I - VMSKEY: V0043399 |
2013-A-0233 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0042596 |
2013-A-0201 | Multiple Vulnerabilities in Oracle MySQL Products Severity: Category I - VMSKEY: V0040782 |
2012-A-0189 | Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1 Severity: Category I - VMSKEY: V0035032 |
2012-A-0020 | Multiple Vulnerabilities in VMware ESX 4.1 and ESXi 4.1 Severity: Category I - VMSKEY: V0031252 |
2011-A-0075 | Multiple Vulnerabilities in VMware Products Severity: Category I - VMSKEY: V0028311 |
2010-A-0015 | Multiple Vulnerabilities in Red Hat Linux Kernel Severity: Category I - VMSKEY: V0022631 |
2010-A-0001 | Multiple Vulnerabilities in Linux Kernel Severity: Category I - VMSKEY: V0022180 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-12-05 | ISC BIND DHCP client DNAME resource record parsing denial of service attempt RuleID : 52078 - Type : SERVER-OTHER - Revision : 1 |
2019-09-24 | MIT Kerberos kpasswd UDP denial of service attempt RuleID : 51212 - Type : SERVER-OTHER - Revision : 1 |
2018-01-18 | Multiple browser pressure function denial of service attempt RuleID : 45206 - Type : BROWSER-FIREFOX - Revision : 3 |
2017-07-27 | Mozilla Firefox domFuzzLite3 table use after free attempt RuleID : 43347 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-07-27 | Mozilla Firefox domFuzzLite3 table use after free attempt RuleID : 43346 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-04-12 | SSL/TLS weak RC4 cipher suite use attempt RuleID : 41907 - Type : POLICY-OTHER - Revision : 3 |
2017-02-21 | Adobe Flash Player Primetime SDK ShimContentResolver memory corruption attempt RuleID : 41358 - Type : FILE-FLASH - Revision : 3 |
2017-02-21 | Adobe Flash Player Primetime SDK ShimContentResolver memory corruption attempt RuleID : 41357 - Type : FILE-FLASH - Revision : 2 |
2016-12-02 | Mozilla Firefox ESR NotifyTimeChange use after free attempt RuleID : 40896-community - Type : BROWSER-FIREFOX - Revision : 3 |
2017-01-04 | Mozilla Firefox ESR NotifyTimeChange use after free attempt RuleID : 40896 - Type : BROWSER-FIREFOX - Revision : 3 |
2016-12-01 | Mozilla Firefox ESR NotifyTimeChange use after free attempt RuleID : 40888-community - Type : BROWSER-FIREFOX - Revision : 3 |
2017-01-04 | Mozilla Firefox ESR NotifyTimeChange use after free attempt RuleID : 40888 - Type : BROWSER-FIREFOX - Revision : 3 |
2016-07-19 | Adobe Flash Player ShimOpportunityGenerator out of bounds memory access attempt RuleID : 39319 - Type : FILE-FLASH - Revision : 4 |
2016-07-19 | Adobe Flash Player ShimOpportunityGenerator out of bounds memory access attempt RuleID : 39318 - Type : FILE-FLASH - Revision : 3 |
2016-07-19 | Adobe Flash Player RegExp numbered backreference out of bounds read attempt RuleID : 39315 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player RegExp numbered backreference out of bounds read attempt RuleID : 39314 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player malformed Adobe Texture Format image load memory corruptio... RuleID : 39313 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player malformed Adobe Texture Format image load memory corruptio... RuleID : 39312 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player same origin policy security bypass attempt RuleID : 39311 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player same origin policy security bypass attempt RuleID : 39310 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player malformed ATF file length load buffer overflow attempt RuleID : 39309 - Type : FILE-FLASH - Revision : 4 |
2016-07-19 | Adobe Flash Player malformed ATF file length load buffer overflow attempt RuleID : 39308 - Type : FILE-FLASH - Revision : 4 |
2016-07-19 | Adobe Flash Player sound object use-after-free attempt RuleID : 39307 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player sound object use-after-free attempt RuleID : 39306 - Type : FILE-FLASH - Revision : 2 |
2016-07-19 | Adobe Flash Player request for dbghelp.dll over SMB attempt RuleID : 39296 - Type : FILE-FLASH - Revision : 4 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-16 | Name: The remote database server is affected by multiple vulnerabilities File: mariadb_5_5_42.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2831.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2885.nasl - Type: ACT_GATHER_INFO |
2018-05-07 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2018-124-01.nasl - Type: ACT_GATHER_INFO |
2018-05-07 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_8719b9358bae41ad92ba3c826f651219.nasl - Type: ACT_GATHER_INFO |
2018-04-04 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201803-14.nasl - Type: ACT_GATHER_INFO |
2018-02-20 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201802-03.nasl - Type: ACT_GATHER_INFO |
2017-12-04 | Name: The remote host is missing a vendor-supplied security patch. File: check_point_gaia_sk106499.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-2872-2.nasl - Type: ACT_GATHER_INFO |
2017-11-02 | Name: The remote Debian host is missing a security update. File: debian_DLA-1153.nasl - Type: ACT_GATHER_INFO |
2017-11-02 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4014.nasl - Type: ACT_GATHER_INFO |
2017-10-30 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-2872-1.nasl - Type: ACT_GATHER_INFO |
2017-10-19 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2017-1248.nasl - Type: ACT_GATHER_INFO |
2017-10-19 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2017-1249.nasl - Type: ACT_GATHER_INFO |
2017-10-13 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2017-2885.nasl - Type: ACT_GATHER_INFO |
2017-10-13 | Name: The remote Oracle Linux host is missing a security update. File: oraclelinux_ELSA-2017-2885.nasl - Type: ACT_GATHER_INFO |
2017-10-13 | Name: The remote Scientific Linux host is missing one or more security updates. File: sl_20171012_thunderbird_on_SL6_x.nasl - Type: ACT_GATHER_INFO |
2017-10-12 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_9164f51eae2011e7a633009c02a2ab30.nasl - Type: ACT_GATHER_INFO |
2017-10-12 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-1144.nasl - Type: ACT_GATHER_INFO |
2017-10-12 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2017-2885.nasl - Type: ACT_GATHER_INFO |
2017-10-12 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-3436-1.nasl - Type: ACT_GATHER_INFO |
2017-10-11 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-2688-1.nasl - Type: ACT_GATHER_INFO |
2017-10-06 | Name: A web browser installed on the remote macOS or Mac OS X host is affected by m... File: macosx_firefox_52_4_esr.nasl - Type: ACT_GATHER_INFO |
2017-10-06 | Name: A web browser installed on the remote macOS or Mac OS X host is affected by m... File: macosx_firefox_56_0.nasl - Type: ACT_GATHER_INFO |
2017-10-06 | Name: A web browser installed on the remote Windows host is affected by multiple vu... File: mozilla_firefox_52_4_esr.nasl - Type: ACT_GATHER_INFO |