Summary
| Detail | |||
|---|---|---|---|
| Vendor | Vmware | First view | 2008-11-10 |
| Product | Esxi | Last view | 2025-03-04 |
| Version | Type | Os | |
| Update | |||
| Edition | |||
| Language | |||
| Sofware Edition | |||
| Target Software | |||
| Target Hardware | |||
| Other | |||
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
| Date | Alert | Description | |
|---|---|---|---|
| 6 | 2025-03-04 | CVE-2025-22226 | VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process. |
| 8.2 | 2025-03-04 | CVE-2025-22225 | VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox. |
| 8.2 | 2025-03-04 | CVE-2025-22224 | VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. |
| 0 | 2024-06-25 | CVE-2024-37086 | VMware ESXi contains an out-of-bounds read vulnerability. A |
| 7.2 | 2024-06-25 | CVE-2024-37085 | VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD. |
| 7.8 | 2024-05-21 | CVE-2024-22273 | The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability. A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues. |
| 0 | 2024-03-05 | CVE-2024-22255 | VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.  |
| 8.2 | 2024-03-05 | CVE-2024-22254 | VMware ESXi contains an out-of-bounds write vulnerability. A malicious actor with privileges within the VMX process may trigger an out-of-bounds write leading to an escape of the sandbox. |
| 6.7 | 2024-03-05 | CVE-2024-22253 | VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed. |
| 6.7 | 2024-03-05 | CVE-2024-22252 | VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed. |
| 7.5 | 2023-04-25 | CVE-2023-29552 | The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor. |
| 8.2 | 2022-12-14 | CVE-2022-31705 | VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed. |
| 3.3 | 2022-12-13 | CVE-2022-31699 | VMware ESXi contains a heap-overflow vulnerability. A malicious local actor with restricted privileges within a sandbox process may exploit this issue to achieve a partial information disclosure. |
| 8.8 | 2022-12-13 | CVE-2022-31696 | VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious actor with local access to ESXi may exploit this issue to corrupt memory leading to an escape of the ESXi sandbox. |
| 6.5 | 2022-10-07 | CVE-2022-31681 | VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host. |
| 6.5 | 2022-07-14 | CVE-2022-23825 | Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure. |
| 5.5 | 2022-06-15 | CVE-2022-21166 | Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. |
| 5.5 | 2022-06-15 | CVE-2022-21125 | Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. |
| 5.5 | 2022-06-15 | CVE-2022-21123 | Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. |
| 7.5 | 2022-02-16 | CVE-2021-22050 | ESXi contains a slow HTTP POST denial-of-service vulnerability in rhttpproxy. A malicious actor with network access to ESXi may exploit this issue to create a denial-of-service condition by overwhelming rhttpproxy service with multiple requests. |
| 7.5 | 2022-02-16 | CVE-2021-22043 | VMware ESXi contains a TOCTOU (Time-of-check Time-of-use) vulnerability that exists in the way temporary files are handled. A malicious actor with access to settingsd, may exploit this issue to escalate their privileges by writing arbitrary files. |
| 7.8 | 2022-02-16 | CVE-2021-22042 | VMware ESXi contains an unauthorized access vulnerability due to VMX having access to settingsd authorization tickets. A malicious actor with privileges within the VMX process only, may be able to access settingsd service running as a high privileged user. |
| 6.7 | 2022-02-16 | CVE-2021-22041 | VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. |
| 6.7 | 2022-02-16 | CVE-2021-22040 | VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. |
| 7.8 | 2022-01-04 | CVE-2021-22045 | VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine. |
CWE : Common Weakness Enumeration
| % | id | Name |
|---|---|---|
| 15% (14) | CWE-787 | Out-of-bounds Write |
| 15% (14) | CWE-125 | Out-of-bounds Read |
| 8% (8) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
| 7% (7) | CWE-416 | Use After Free |
| 6% (6) | CWE-264 | Permissions, Privileges, and Access Controls |
| 5% (5) | CWE-476 | NULL Pointer Dereference |
| 5% (5) | CWE-20 | Improper Input Validation |
| 4% (4) | CWE-367 | Time-of-check Time-of-use (TOCTOU) Race Condition |
| 3% (3) | CWE-459 | Incomplete Cleanup |
| 3% (3) | CWE-287 | Improper Authentication |
| 3% (3) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
| 2% (2) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
| 2% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
| 2% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
| 1% (1) | CWE-770 | Allocation of Resources Without Limits or Throttling |
| 1% (1) | CWE-668 | Exposure of Resource to Wrong Sphere |
| 1% (1) | CWE-617 | Reachable Assertion |
| 1% (1) | CWE-613 | Insufficient Session Expiration |
| 1% (1) | CWE-426 | Untrusted Search Path |
| 1% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
| 1% (1) | CWE-362 | Race Condition |
| 1% (1) | CWE-284 | Access Control (Authorization) Issues |
| 1% (1) | CWE-252 | Unchecked Return Value |
| 1% (1) | CWE-203 | Information Exposure Through Discrepancy |
| 1% (1) | CWE-193 | Off-by-one Error |
Oval Markup Language : Definitions
| OvalID | Name |
|---|---|
| oval:org.mitre.oval:def:6425 | VMware ESX Administrative Directory Traversal Bug May Allow Administrators to... |
| oval:org.mitre.oval:def:9262 | Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.... |
| oval:org.mitre.oval:def:7783 | VMware libxml2 use-after-free vulnerability |
| oval:org.mitre.oval:def:22743 | ELSA-2009:1206: libxml and libxml2 security update (Moderate) |
| oval:org.mitre.oval:def:28958 | RHSA-2009:1206 -- libxml and libxml2 security update (Moderate) |
| oval:org.mitre.oval:def:9142 | The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and ... |
| oval:org.mitre.oval:def:8557 | VMware kernel udp_sendmsg function vulnerability |
| oval:org.mitre.oval:def:11514 | Service Console update for COS kernel |
| oval:org.mitre.oval:def:22460 | ELSA-2009:1222: kernel security and bug fix update (Important) |
| oval:org.mitre.oval:def:28627 | RHSA-2009:1222 -- kernel security and bug fix update (Important) |
| oval:org.mitre.oval:def:20506 | VMware ESX third party updates for Service Console packages glibc, sudo, and ... |
| oval:org.mitre.oval:def:22008 | RHSA-2010:0792: kernel security update (Important) |
| oval:org.mitre.oval:def:21695 | RHSA-2010:0842: kernel security and bug fix update (Important) |
| oval:org.mitre.oval:def:20540 | VMware ESX third party updates for Service Console packages glibc and dhcp |
| oval:org.mitre.oval:def:23172 | ELSA-2010:0842: kernel security and bug fix update (Important) |
| oval:org.mitre.oval:def:23030 | ELSA-2010:0792: kernel security update (Important) |
| oval:org.mitre.oval:def:28217 | DEPRECATED: ELSA-2010-0792 -- kernel security update (important) |
| oval:org.mitre.oval:def:19965 | VMware ESX third party updates for Service Console packages glibc and dhcp |
| oval:org.mitre.oval:def:20594 | VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client,... |
| oval:org.mitre.oval:def:17183 | VMware Tools Display Driver Privilege Escalation |
| oval:org.mitre.oval:def:20252 | VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client,... |
| oval:org.mitre.oval:def:17258 | VMware Tools Display Driver Privilege Escalation |
| oval:org.mitre.oval:def:20625 | VMware ESXi and ESX address several security issues |
| oval:org.mitre.oval:def:17110 | VMware ROM Overwrite Privilege Escalation |
| oval:org.mitre.oval:def:15209 | BIOS ROM Corruption Vulnerability (CVE-2012-1515) |
SAINT Exploits
| Description | Link |
|---|---|
| VMware ESXi OpenSLP heap overflow | More info here |
Open Source Vulnerability Database (OSVDB)
| id | Description |
|---|---|
| 70483 | Linux Kernel igb Subsystem drivers/net/igb/igb_main.c igb_receive_skb Functio... |
| 69117 | Linux Kernel net/rds/page.c rds_page_copy_user() Function Local Privilege Esc... |
| 66470 | OpenLDAP servers/slapd/modrdn.c modrdn Request rdn String Memory Corruption |
| 57462 | Linux Kernel net/ipv*/udp.c MSG_MORE Flag Local Privilege Escalation |
| 56985 | libxml2 XML File Multiple Attribute Type Handling DoS |
| 49947 | VMware ESX / ESXi Datastore.FileManagement Unspecified Traversal Privilege Es... |
ExploitDB Exploits
| id | Description |
|---|---|
| 15285 | Linux RDS Protocol Local Privilege Escalation |
| 9575 | Linux Kernel < 2.6.19 - udp_sendmsg Local Root Exploit |
| 9574 | Linux Kernel < 2.6.19 udp_sendmsg Local Root Exploit (x86/x64) |
| 9542 | Linux Kernel 2.6 < 2.6.19 (32bit) ip_append_data() ring0 Root Exploit |
OpenVAS Exploits
| id | Description |
|---|---|
| 2012-11-16 | Name : VMSA-2012-0016: VMware security updates for vSphere API and ESX Service Console File : nvt/gb_VMSA-2012-0016.nasl |
| 2012-06-15 | Name : VMSA-2012-0011 VMware Workstation, Player, Fusion, ESXi and ESX patches addre... File : nvt/gb_VMSA-2012-0011.nasl |
| 2012-06-13 | Name : Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167) File : nvt/secpod_ms12-042.nasl |
| 2012-06-05 | Name : RedHat Update for kernel RHSA-2011:0007-01 File : nvt/gb_RHSA-2011_0007-01_kernel.nasl |
| 2012-05-03 | Name : VMSA-2012-0009 VMware Workstation, Player, ESXi and ESX patches address criti... File : nvt/gb_VMSA-2012-0009.nasl |
| 2012-04-13 | Name : VMSA-2012-0007 VMware hosted products and ESX patches address privilege escal... File : nvt/gb_VMSA-2012-0007.nasl |
| 2012-04-02 | Name : VMSA-2012-0006 VMware ESXi and ESX address several security issues File : nvt/gb_VMSA-2012-0006.nasl |
| 2012-03-16 | Name : VMSA-2011-0012.3 VMware ESXi and ESX updates to third party libraries and ESX... File : nvt/gb_VMSA-2011-0012.nasl |
| 2012-03-16 | Name : VMSA-2012-0005 VMware vCenter Server, Orchestrator, Update Manager, vShield, ... File : nvt/gb_VMSA-2012-0005.nasl |
| 2011-12-02 | Name : Fedora Update for kernel FEDORA-2011-16346 File : nvt/gb_fedora_2011_16346_kernel_fc14.nasl |
| 2011-11-08 | Name : Fedora Update for kernel FEDORA-2011-15241 File : nvt/gb_fedora_2011_15241_kernel_fc14.nasl |
| 2011-10-31 | Name : Fedora Update for kernel FEDORA-2011-14747 File : nvt/gb_fedora_2011_14747_kernel_fc14.nasl |
| 2011-10-10 | Name : Fedora Update for kernel FEDORA-2011-12874 File : nvt/gb_fedora_2011_12874_kernel_fc14.nasl |
| 2011-09-07 | Name : Mac OS X v10.6.4 Multiple Vulnerabilities (2010-007) File : nvt/gb_macosx_su10-007.nasl |
| 2011-08-27 | Name : Fedora Update for kernel FEDORA-2011-11103 File : nvt/gb_fedora_2011_11103_kernel_fc14.nasl |
| 2011-08-09 | Name : CentOS Update for libxml CESA-2009:1206 centos3 i386 File : nvt/gb_CESA-2009_1206_libxml_centos3_i386.nasl |
| 2011-08-09 | Name : CentOS Update for kernel CESA-2010:0792 centos5 i386 File : nvt/gb_CESA-2010_0792_kernel_centos5_i386.nasl |
| 2011-08-09 | Name : CentOS Update for compat-openldap CESA-2010:0542 centos5 i386 File : nvt/gb_CESA-2010_0542_compat-openldap_centos5_i386.nasl |
| 2011-08-09 | Name : CentOS Update for kernel CESA-2009:1233 centos3 i386 File : nvt/gb_CESA-2009_1233_kernel_centos3_i386.nasl |
| 2011-08-09 | Name : CentOS Update for kernel CESA-2009:1223 centos4 i386 File : nvt/gb_CESA-2009_1223_kernel_centos4_i386.nasl |
| 2011-08-09 | Name : CentOS Update for kernel CESA-2009:1222 centos5 i386 File : nvt/gb_CESA-2009_1222_kernel_centos5_i386.nasl |
| 2011-08-09 | Name : CentOS Update for libxml2 CESA-2009:1206 centos5 i386 File : nvt/gb_CESA-2009_1206_libxml2_centos5_i386.nasl |
| 2011-07-18 | Name : Ubuntu Update for linux-mvl-dove USN-1159-1 File : nvt/gb_ubuntu_USN_1159_1.nasl |
| 2011-07-08 | Name : Ubuntu Update for linux-mvl-dove USN-1162-1 File : nvt/gb_ubuntu_USN_1162_1.nasl |
| 2011-06-24 | Name : Fedora Update for kernel FEDORA-2011-6447 File : nvt/gb_fedora_2011_6447_kernel_fc13.nasl |
Information Assurance Vulnerability Management (IAVM)
| id | Description |
|---|---|
| 2015-A-0029 | Multiple Vulnerabilities in VMware Fusion Severity: Category I - VMSKEY: V0058535 |
| 2015-B-0012 | Multiple Vulnerabilities in VMware ESXi 5.0 Severity: Category I - VMSKEY: V0058517 |
| 2015-B-0013 | Multiple Vulnerabilities in VMware ESXi 5.1 Severity: Category I - VMSKEY: V0058515 |
| 2015-B-0014 | Multiple Vulnerabilities in VMware ESXi 5.5 Severity: Category I - VMSKEY: V0058513 |
| 2014-A-0104 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0053193 |
| 2014-B-0069 | VMware ESXi 5.1 Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0051857 |
| 2014-B-0070 | VMware ESXi 5.5 Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0051855 |
| 2014-B-0068 | VMware ESXi 5.0 Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0051851 |
| 2014-B-0009 | Multiple Vulnerabilities in VMware ESX 4.1 and ESXi 4.1 Severity: Category I - VMSKEY: V0043880 |
| 2014-B-0008 | Multiple Vulnerabilities in VMware ESX 4.0 and ESXi 4.0 Severity: Category I - VMSKEY: V0043879 |
| 2014-B-0010 | Multiple Vulnerabilities in VMware ESXi 5.1 Severity: Category I - VMSKEY: V0043881 |
| 2014-A-0019 | Multiple Vulnerabilities in VMware Fusion Severity: Category I - VMSKEY: V0043844 |
| 2013-A-0222 | Multiple Vulnerabilties in VMware Workstation Severity: Category II - VMSKEY: V0042383 |
| 2013-A-0221 | Multiple Vulnerabilties in VMware Player Severity: Category II - VMSKEY: V0042382 |
| 2013-A-0218 | VMware ESX/ESXi 4.1 Denial of Service Vulnerability Severity: Category I - VMSKEY: V0042309 |
| 2013-A-0205 | VMware ESXi 5.0 Denial of Service Vulnerability Severity: Category I - VMSKEY: V0041367 |
| 2013-A-0204 | VMware ESX/ESXi 4.0 Denial of Service Vulnerability Severity: Category I - VMSKEY: V0041366 |
| 2013-B-0098 | VMware ESXi 5.1 Remote Denial of Service Vulnerability Severity: Category I - VMSKEY: V0040211 |
| 2013-B-0095 | VMware ESX 4.0 and ESXi 4.0 Remote Denial of Service Vulnerability Severity: Category I - VMSKEY: V0040209 |
| 2013-B-0096 | VMware ESX 4.1 and ESXi 4.1 Remote Denial of Service Vulnerability Severity: Category I - VMSKEY: V0040208 |
| 2013-A-0055 | VMware ESXi 4.0 and ESX 4.0 Memory Corruption Vulnerability Severity: Category I - VMSKEY: V0037067 |
| 2013-A-0056 | VMware ESXi 3.5 and ESX 3.5 Memory Corruption Vulnerability Severity: Category I - VMSKEY: V0037066 |
| 2013-A-0053 | VMware ESXi 5.1 Memory Corruption Vulnerability Severity: Category I - VMSKEY: V0037065 |
| 2013-B-0018 | Multiple Vulnerabilities in VMware vCenter Server 5.0 Severity: Category I - VMSKEY: V0037063 |
| 2013-B-0012 | VMware vCenter 4.1 Server and vSphere 4.1 Client Memory Corruption Vulnerability Severity: Category II - VMSKEY: V0036789 |
Snort® IPS/IDS
| Date | Description |
|---|---|
| 2018-02-20 | Intel x64 side-channel analysis information leak attempt RuleID : 45444 - Type : OS-OTHER - Revision : 2 |
| 2018-02-20 | Intel x64 side-channel analysis information leak attempt RuleID : 45443 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x64 side-channel analysis information leak attempt RuleID : 45368 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x64 side-channel analysis information leak attempt RuleID : 45367 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45366 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45365 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45364 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45363 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45362 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45361 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45360 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45359 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45358 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45357 - Type : OS-OTHER - Revision : 2 |
| 2014-11-16 | VMWare vSphere API SOAP request RetrieveProperties remote denial of service a... RuleID : 31297 - Type : SERVER-WEBAPP - Revision : 3 |
| 2014-01-10 | OpenLDAP Modrdn utf-8 string code execution attempt RuleID : 18804 - Type : SERVER-WEBAPP - Revision : 11 |
Nessus® Vulnerability Scanner
| id | Description |
|---|---|
| 2018-11-12 | Name: A virtualization application installed on the remote macOS or Mac OS X host i... File: macosx_fusion_vmsa_2018_0027.nasl - Type: ACT_GATHER_INFO |
| 2018-11-02 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL91229003.nasl - Type: ACT_GATHER_INFO |
| 2018-10-31 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201810-06.nasl - Type: ACT_GATHER_INFO |
| 2018-10-26 | Name: A virtualization application installed on the remote macOS or Mac OS X host i... File: macosx_fusion_vmsa_2018_0026.nasl - Type: ACT_GATHER_INFO |
| 2018-09-18 | Name: The remote EulerOS Virtualization host is missing multiple security updates. File: EulerOS_SA-2018-1236.nasl - Type: ACT_GATHER_INFO |
| 2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0098.nasl - Type: ACT_GATHER_INFO |
| 2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0011.nasl - Type: ACT_GATHER_INFO |
| 2018-07-20 | Name: The remote Debian host is missing a security update. File: debian_DLA-1423.nasl - Type: ACT_GATHER_INFO |
| 2018-07-16 | Name: The remote Debian host is missing a security update. File: debian_DLA-1422.nasl - Type: ACT_GATHER_INFO |
| 2018-05-03 | Name: The remote Debian host is missing a security update. File: debian_DLA-1369.nasl - Type: ACT_GATHER_INFO |
| 2018-05-02 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4187.nasl - Type: ACT_GATHER_INFO |
| 2018-05-02 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4188.nasl - Type: ACT_GATHER_INFO |
| 2018-04-18 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-956.nasl - Type: ACT_GATHER_INFO |
| 2018-03-29 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_1ce95bc7327811e8b52700012e582166.nasl - Type: ACT_GATHER_INFO |
| 2018-03-27 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201803-12.nasl - Type: ACT_GATHER_INFO |
| 2018-03-15 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-0512.nasl - Type: ACT_GATHER_INFO |
| 2018-02-27 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2018-057-01.nasl - Type: ACT_GATHER_INFO |
| 2018-02-23 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4120.nasl - Type: ACT_GATHER_INFO |
| 2018-02-22 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-956.nasl - Type: ACT_GATHER_INFO |
| 2018-02-05 | Name: The remote Virtuozzo host is missing multiple security updates. File: Virtuozzo_VZA-2018-006.nasl - Type: ACT_GATHER_INFO |
| 2018-01-30 | Name: A web browser installed on the remote Windows host is affected by multiple se... File: google_chrome_64_0_3282_119.nasl - Type: ACT_GATHER_INFO |
| 2018-01-26 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-0151.nasl - Type: ACT_GATHER_INFO |
| 2018-01-25 | Name: The remote AIX host is missing a security patch. File: aix_IJ03029.nasl - Type: ACT_GATHER_INFO |
| 2018-01-25 | Name: The remote AIX host is missing a security patch. File: aix_IJ03030.nasl - Type: ACT_GATHER_INFO |
| 2018-01-25 | Name: The remote AIX host is missing a security patch. File: aix_IJ03032.nasl - Type: ACT_GATHER_INFO |















