Summary
Detail | |||
---|---|---|---|
Vendor | Libpng | First view | 2004-08-18 |
Product | Libpng | Last view | 2022-08-24 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.5 | 2022-08-24 | CVE-2021-4214 | A heap overflow flaw was found in libpngs' pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service. |
8.8 | 2019-07-10 | CVE-2018-14550 | An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png. |
9.8 | 2019-07-10 | CVE-2017-12652 | libpng before 1.6.32 does not properly check the length of chunks against the user limit. |
5.3 | 2019-02-04 | CVE-2019-7317 | png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute. |
6.5 | 2019-01-11 | CVE-2019-6129 | png_create_info_struct in png.c in libpng 1.6.36 has a memory leak, as demonstrated by pngcp. NOTE: a third party has stated "I don't think it is libpng's job to free this buffer. |
6.5 | 2018-07-13 | CVE-2018-14048 | An issue has been found in libpng 1.6.34. It is a SEGV in the function png_free_data in png.c, related to the recommended error handling for png_read_image. |
6.5 | 2018-07-09 | CVE-2018-13785 | In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service. |
7.5 | 2017-01-30 | CVE-2016-10087 | The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure. |
7.8 | 2016-07-10 | CVE-2016-3751 | Unspecified vulnerability in libpng before 1.6.20, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01, allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23265085. |
8.8 | 2016-04-14 | CVE-2015-8540 | Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read. |
7.3 | 2016-01-21 | CVE-2015-8472 | Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126. |
5 | 2015-11-24 | CVE-2015-7981 | The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read. |
7.5 | 2015-11-12 | CVE-2015-8126 | Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. |
7.5 | 2015-01-18 | CVE-2015-0973 | Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495. |
10 | 2015-01-10 | CVE-2014-9495 | Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image. |
5 | 2014-05-06 | CVE-2013-7354 | Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow. |
5 | 2014-05-06 | CVE-2013-7353 | Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow. |
5 | 2014-02-27 | CVE-2014-0333 | The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero. |
5 | 2014-01-12 | CVE-2013-6954 | The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c. |
4.3 | 2012-08-13 | CVE-2012-3425 | The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image. |
7.5 | 2012-07-22 | CVE-2011-3464 | Off-by-one error in the png_formatted_warning function in pngerror.c in libpng 1.5.4 through 1.5.7 might allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unspecified vectors, which trigger a stack-based buffer overflow. |
6.8 | 2012-05-29 | CVE-2011-3048 | The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow. |
6.8 | 2012-03-22 | CVE-2011-3045 | Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026. |
5 | 2011-08-31 | CVE-2009-5063 | Memory leak in the embedded_profile_len function in pngwutil.c in libpng before 1.2.39beta5 allows context-dependent attackers to cause a denial of service (memory leak or segmentation fault) via a JPEG image containing an iCCP chunk with a negative embedded profile length. NOTE: this is due to an incomplete fix for CVE-2006-7244. |
5 | 2011-08-31 | CVE-2006-7244 | Memory leak in pngwutil.c in libpng 1.2.13beta1, and other versions before 1.2.15beta3, allows context-dependent attackers to cause a denial of service (memory leak or segmentation fault) via a JPEG image containing an iCCP chunk with a negative embedded profile length. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
21% (8) | CWE-189 | Numeric Errors |
18% (7) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
7% (3) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
7% (3) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
5% (2) | CWE-476 | NULL Pointer Dereference |
5% (2) | CWE-399 | Resource Management Errors |
5% (2) | CWE-200 | Information Exposure |
5% (2) | CWE-190 | Integer Overflow or Wraparound |
5% (2) | CWE-125 | Out-of-bounds Read |
5% (2) | CWE-20 | Improper Input Validation |
2% (1) | CWE-787 | Out-of-bounds Write |
2% (1) | CWE-416 | Use After Free |
2% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (1) | CWE-369 | Divide By Zero |
2% (1) | CWE-193 | Off-by-one Error |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:971 | libpng Malformed PNG Image Vulnerability |
oval:org.mitre.oval:def:11710 | The Portable Network Graphics library (libpng) 1.0.15 and earlier allows atta... |
oval:org.mitre.oval:def:17563 | USN-538-1 -- libpng vulnerabilities |
oval:org.mitre.oval:def:10614 | Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow ... |
oval:org.mitre.oval:def:22555 | ELSA-2007:0992: libpng security update (Moderate) |
oval:org.mitre.oval:def:6275 | mimeTeX and mathTeX Buffer Overflow and Command Injection Issues |
oval:org.mitre.oval:def:10326 | libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.... |
oval:org.mitre.oval:def:6557 | DSA-1750 libpng -- several vulnerabilities |
oval:org.mitre.oval:def:6458 | Libpng Library Uninitialized Pointer Arrays Memory Corruption Vulnerability |
oval:org.mitre.oval:def:13613 | DSA-1750-1 libpng -- several |
oval:org.mitre.oval:def:13052 | USN-730-1 -- libpng vulnerabilities |
oval:org.mitre.oval:def:10316 | The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35... |
oval:org.mitre.oval:def:22744 | ELSA-2009:0333: libpng security update (Moderate) |
oval:org.mitre.oval:def:29196 | RHSA-2009:0333 -- libpng security update (Moderate) |
oval:org.mitre.oval:def:7103 | DSA-2032 libpng -- several vulnerabilities |
oval:org.mitre.oval:def:13510 | DSA-2032-1 libpng -- several |
oval:org.mitre.oval:def:12991 | USN-913-1 -- libpng vulnerabilities |
oval:org.mitre.oval:def:11851 | Mozilla Firefox/Thunderbird/SeaMonkey 'libpng' Buffer Overflow Vulnerability |
oval:org.mitre.oval:def:22383 | RHSA-2010:0534: libpng security update (Important) |
oval:org.mitre.oval:def:13405 | USN-960-1 -- libpng vulnerabilities |
oval:org.mitre.oval:def:13338 | DSA-2072-1 libpng -- several |
oval:org.mitre.oval:def:11512 | DSA-2072 libpng -- several vulnerabilities |
oval:org.mitre.oval:def:23184 | ELSA-2010:0534: libpng security update (Important) |
oval:org.mitre.oval:def:21953 | RHSA-2011:1104: libpng security update (Moderate) |
oval:org.mitre.oval:def:21411 | RHSA-2011:1105: libpng security update (Moderate) |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
75210 | libpng pngwutil.c JPEG Image iCCP Chunk Memory Leak DoS |
74757 | libpng Unspecified Issue |
73984 | libpng png_rgb_to_gray Function PNG File Handling Overflow |
73983 | libpng pngerror.c png_err Function NULL Argument PNG File Handling DoS |
73982 | libpng pngrutil.c png_handle_sCAL Function PNG File Handling Memory Corruptio... |
73493 | libpng pngerror.c png_format_buffer() Off-by-one PNG Image Handling Remote DoS |
70417 | libpng pngrtran.c png_do_rgb_to_gray() Function PNG File Handling Overflow |
66600 | Mozilla Multiple Products PNG File Handling Overflow |
65853 | libpng pngrutil.c sCAL Chunk Memory Corruption DoS |
65852 | libpng pngpread.c PNG Image Data Height Overflow |
62670 | libpng pngrutil.c png_decompress_chunk Function Ancillary Chunks PNG File Dec... |
54915 | libpng 1-bit Interlaced Image Handling Memory Disclosure |
53317 | libpng 16-bit Gamma Table Handling Uninitialised Pointer Free Arbitrary Code ... |
53316 | libpng pCAL Chunk Handling Uninitialised Pointer Free Arbitrary Code Execution |
53315 | libpng png_read_png Function Uninitialised Pointer Free Arbitrary Code Execution |
53314 | libpng pngwutil.c png_check_keyword Function PNG File Handling Arbitrary Memo... |
49374 | libpng pngrutil.c png_handle_tEXt Function Crafted PNG File Handling Memory L... |
48298 | libpng pngread.c png_push_read_zTXt() Function Off-By-One |
44364 | libpng Zero-length Unknown Chunk Processing Uninitialized Memory Access |
38274 | libpng Chunk Handlers PNG Handling Multiple Method DoS |
38273 | libpng pngrtran.c Crafted PNG Multiple Method DoS |
38272 | libpng pngset.c png_set_iCCP Function PNG Handling Off-by-one DoS |
5726 | libpng Malformed PNG Image Error Handling DoS |
ExploitDB Exploits
id | Description |
---|---|
14422 | libpng <= 1.4.2 Denial of Service Vulnerability |
OpenVAS Exploits
id | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2439-1 (libpng - buffer overflow) File : nvt/deb_2439_1.nasl |
2012-12-13 | Name : SuSE Update for update openSUSE-SU-2012:0466-1 (update) File : nvt/gb_suse_2012_0466_1.nasl |
2012-10-23 | Name : Fedora Update for mingw-libpng FEDORA-2012-15613 File : nvt/gb_fedora_2012_15613_mingw-libpng_fc17.nasl |
2012-10-03 | Name : Gentoo Security Advisory GLSA 201209-25 (vmware-server vmware-player vmware-w... File : nvt/glsa_201209_25.nasl |
2012-09-25 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004) File : nvt/gb_macosx_su12-004.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2011-210-01 libpng File : nvt/esoft_slk_ssa_2011_210_01.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2012-206-01 libpng File : nvt/esoft_slk_ssa_2012_206_01.nasl |
2012-08-30 | Name : Fedora Update for libpng10 FEDORA-2012-3507 File : nvt/gb_fedora_2012_3507_libpng10_fc17.nasl |
2012-08-30 | Name : Fedora Update for libpng FEDORA-2012-3605 File : nvt/gb_fedora_2012_3605_libpng_fc17.nasl |
2012-08-30 | Name : Fedora Update for libpng10 FEDORA-2012-4902 File : nvt/gb_fedora_2012_4902_libpng10_fc17.nasl |
2012-08-30 | Name : Fedora Update for libpng FEDORA-2012-5526 File : nvt/gb_fedora_2012_5526_libpng_fc17.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-15 (libpng) File : nvt/glsa_201206_15.nasl |
2012-08-03 | Name : Mandriva Update for libpng MDVSA-2012:033 (libpng) File : nvt/gb_mandriva_MDVSA_2012_033.nasl |
2012-08-03 | Name : Mandriva Update for libpng MDVSA-2012:046 (libpng) File : nvt/gb_mandriva_MDVSA_2012_046.nasl |
2012-07-30 | Name : CentOS Update for libpng10 CESA-2011:1103 centos4 x86_64 File : nvt/gb_CESA-2011_1103_libpng10_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for libpng CESA-2011:1104 centos5 x86_64 File : nvt/gb_CESA-2011_1104_libpng_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for libpng CESA-2012:0407 centos5 File : nvt/gb_CESA-2012_0407_libpng_centos5.nasl |
2012-07-30 | Name : CentOS Update for libpng CESA-2012:0407 centos6 File : nvt/gb_CESA-2012_0407_libpng_centos6.nasl |
2012-07-30 | Name : CentOS Update for libpng CESA-2012:0523 centos5 File : nvt/gb_CESA-2012_0523_libpng_centos5.nasl |
2012-07-30 | Name : CentOS Update for libpng CESA-2012:0523 centos6 File : nvt/gb_CESA-2012_0523_libpng_centos6.nasl |
2012-07-09 | Name : RedHat Update for libpng RHSA-2011:1105-01 File : nvt/gb_RHSA-2011_1105-01_libpng.nasl |
2012-05-18 | Name : Mac OS X Multiple Vulnerabilities (2012-002) File : nvt/gb_macosx_su12-002.nasl |
2012-04-30 | Name : Debian Security Advisory DSA 2446-1 (libpng) File : nvt/deb_2446_1.nasl |
2012-04-30 | Name : FreeBSD Ports: chromium File : nvt/freebsd_chromium10.nasl |
2012-04-30 | Name : FreeBSD Ports: png File : nvt/freebsd_png5.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2010-A-0066 | Multiple Vulnerabilities in VMware Products Severity: Category I - VMSKEY: V0023997 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-12-24 | Mutiple products libpng extra row heap overflow attempt RuleID : 52307 - Type : FILE-IMAGE - Revision : 1 |
2019-12-24 | Mutiple products libpng extra row heap overflow attempt RuleID : 52306 - Type : FILE-IMAGE - Revision : 1 |
2014-01-10 | libpng chunk decompression integer overflow attempt RuleID : 25066 - Type : FILE-IMAGE - Revision : 4 |
2014-01-10 | libpng chunk decompression integer overflow attempt RuleID : 25065 - Type : FILE-IMAGE - Revision : 5 |
2014-01-10 | libpng chunk decompression integer overflow attempt RuleID : 22109 - Type : FILE-IMAGE - Revision : 10 |
2014-01-10 | libpng chunk decompression integer overflow attempt RuleID : 22108 - Type : FILE-IMAGE - Revision : 10 |
2014-01-10 | libpng chunk decompression integer overflow attempt RuleID : 22107 - Type : FILE-IMAGE - Revision : 10 |
2014-01-10 | libpng chunk decompression integer overflow attempt RuleID : 22106 - Type : FILE-IMAGE - Revision : 11 |
2014-01-10 | libpng chunk decompression integer overflow attempt RuleID : 22105 - Type : FILE-IMAGE - Revision : 12 |
2014-01-10 | libpng chunk decompression integer overflow attempt RuleID : 22104 - Type : FILE-IMAGE - Revision : 11 |
2014-01-10 | libpng png_inflate buffer overflow attempt RuleID : 21990 - Type : FILE-IMAGE - Revision : 4 |
2014-01-10 | libpng png_inflate buffer overflow attempt RuleID : 21989 - Type : FILE-IMAGE - Revision : 4 |
2014-01-10 | libpng png_inflate buffer overflow attempt RuleID : 21988 - Type : FILE-IMAGE - Revision : 4 |
2014-01-10 | libpng png_inflate buffer overflow attempt RuleID : 21987 - Type : FILE-IMAGE - Revision : 4 |
2014-01-10 | libpng png_inflate buffer overflow attempt RuleID : 21986 - Type : FILE-IMAGE - Revision : 4 |
2014-01-10 | libpng png_inflate buffer overflow attempt RuleID : 21985 - Type : FILE-IMAGE - Revision : 4 |
2014-01-10 | libpng malformed chunk denial of service attempt RuleID : 14772 - Type : FILE-IMAGE - Revision : 7 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-043bd3349e.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-04eded822e.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-b48e0b8761.nasl - Type: ACT_GATHER_INFO |
2018-07-30 | Name: The remote Fedora host is missing a security update. File: fedora_2018-3e04e9fe54.nasl - Type: ACT_GATHER_INFO |
2017-07-17 | Name: The remote Fedora host is missing a security update. File: fedora_2017-1d305fa070.nasl - Type: ACT_GATHER_INFO |
2017-04-18 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-477.nasl - Type: ACT_GATHER_INFO |
2017-04-17 | Name: The remote Fedora host is missing a security update. File: fedora_2017-84bc8ac268.nasl - Type: ACT_GATHER_INFO |
2017-04-17 | Name: The remote Fedora host is missing a security update. File: fedora_2017-bad9942e42.nasl - Type: ACT_GATHER_INFO |
2017-04-13 | Name: The remote Fedora host is missing a security update. File: fedora_2017-66fd940572.nasl - Type: ACT_GATHER_INFO |
2017-04-13 | Name: The remote Fedora host is missing a security update. File: fedora_2017-cf1944f480.nasl - Type: ACT_GATHER_INFO |
2017-04-07 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-0950-1.nasl - Type: ACT_GATHER_INFO |
2017-04-06 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-441.nasl - Type: ACT_GATHER_INFO |
2017-04-06 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-443.nasl - Type: ACT_GATHER_INFO |
2017-04-03 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-0901-1.nasl - Type: ACT_GATHER_INFO |
2017-03-30 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-0853-1.nasl - Type: ACT_GATHER_INFO |
2017-03-30 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-0860-1.nasl - Type: ACT_GATHER_INFO |
2017-01-30 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201701-74.nasl - Type: ACT_GATHER_INFO |
2017-01-10 | Name: The remote Fedora host is missing a security update. File: fedora_2016-1a7e14d084.nasl - Type: ACT_GATHER_INFO |
2017-01-10 | Name: The remote Fedora host is missing a security update. File: fedora_2016-a4b06a036b.nasl - Type: ACT_GATHER_INFO |
2017-01-03 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2016-365-01.nasl - Type: ACT_GATHER_INFO |
2016-11-15 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201611-08.nasl - Type: ACT_GATHER_INFO |
2016-10-31 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2016-1243.nasl - Type: ACT_GATHER_INFO |
2016-08-02 | Name: The remote Debian host is missing a security update. File: debian_DLA-375-1.nasl - Type: ACT_GATHER_INFO |
2016-07-19 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2016-1430.nasl - Type: ACT_GATHER_INFO |
2016-06-23 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2016-754.nasl - Type: ACT_GATHER_INFO |