Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2013:150 | First vendor Publication | 2013-04-22 |
Vendor | Mandriva | Last vendor Modification | 2013-04-22 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple unspecified vulnerabilites has been found and corrected in mysql. Please read the Oracle Critical Patch Updates pages for further information. The updated packages provides the latest supported mysql version from the 5.1.x branch (5.1.69). Additionally the mysql 5.0 client libraries is also being provided to maintain compability where needed. |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
17 % | CWE-20 | Improper Input Validation |
10 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
10 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
7 % | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
7 % | CWE-399 | Resource Management Errors |
7 % | CWE-287 | Improper Authentication |
7 % | CWE-200 | Information Exposure |
7 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
3 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
3 % | CWE-776 | Unrestricted Recursive Entity References in DTDs ('XML Bomb') |
3 % | CWE-770 | Allocation of Resources Without Limits or Throttling |
3 % | CWE-667 | Insufficient Locking |
3 % | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') (CWE/SANS Top 25) |
3 % | CWE-264 | Permissions, Privileges, and Access Controls |
3 % | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
3 % | CWE-16 | Configuration |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10270 | |||
Oval ID: | oval:org.mitre.oval:def:10270 | ||
Title: | The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564. | ||
Description: | The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1955 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10968 | |||
Oval ID: | oval:org.mitre.oval:def:10968 | ||
Title: | The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow. | ||
Description: | The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-0023 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11491 | |||
Oval ID: | oval:org.mitre.oval:def:11491 | ||
Title: | DEPRECATED: Apache 'mod_proxy_http' Timeout Handling Information Disclosure Vulnerability | ||
Description: | mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2068 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows 7 | Product(s): | Apache |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:11567 | |||
Oval ID: | oval:org.mitre.oval:def:11567 | ||
Title: | Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input. | ||
Description: | Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1956 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:12891 | |||
Oval ID: | oval:org.mitre.oval:def:12891 | ||
Title: | DSA-2284-1 opensaml2 -- implementation error | ||
Description: | Juraj Somorovsky, Andreas Mayer, Meiko Jensen, Florian Kohlar, Marco Kampmann and Joerg Schwenk discovered that Shibboleth, a federated web single sign-on system is vulnerable to XML signature wrapping attacks | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2284-1 CVE-2011-1411 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | opensaml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:12951 | |||
Oval ID: | oval:org.mitre.oval:def:12951 | ||
Title: | DSA-2237-1 apr -- denial of service | ||
Description: | A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. If a directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2237-1 CVE-2011-0419 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | apr |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13067 | |||
Oval ID: | oval:org.mitre.oval:def:13067 | ||
Title: | DSA-2237-2 apr -- denial of service | ||
Description: | The recent APR update DSA-2237-1 introduced a regression that could lead to an endless loop in the apr_fnmatch function, causing a denial of service. This update fixes this problem. For reference, the description of the original DSA, which fixed CVE-2011-0419: A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. If a directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2237-2 CVE-2011-0419 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | apr |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13171 | |||
Oval ID: | oval:org.mitre.oval:def:13171 | ||
Title: | DSA-1812-1 apr-util -- denial of service | ||
Description: | Apr-util, the Apache Portable Runtime Utility library, is used by Apache 2.x, Subversion, and other applications. Two denial of service vulnerabilities have been found in apr-util: "kcope" discovered a flaw in the handling of internal XML entities in the apr_xml_* interface that can be exploited to use all available memory. This denial of service can be triggered remotely in the Apache mod_dav and mod_dav_svn modules. Matthew Palmer discovered an underflow flaw in the apr_strmatch_precompile function that can be exploited to cause a daemon crash. The vulnerability can be triggered remotely in mod_dav_svn for Apache if the "SVNMasterURI"directive is in use, remotely in mod_apreq2 for Apache or other applications using libapreq2, or locally in Apache by a crafted ".htaccess" file. Other exploit paths in other applications using apr-util may exist. If you use Apache, or if you use svnserve in standalone mode, you need to restart the services after you upgraded the libaprutil1 package. For the stable distribution, these problems have been fixed in version 1.2.12+dfsg-8+lenny2. The oldstable distribution, these problems have been fixed in version 1.2.7+dfsg-2+etch2. For the testing distribution and the unstable distribution, these problems will be fixed soon. We recommend that you upgrade your apr-util packages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1812-1 CVE-2009-0023 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 4.0 | Product(s): | apr-util |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13719 | |||
Oval ID: | oval:org.mitre.oval:def:13719 | ||
Title: | USN-786-1 -- apr-util vulnerabilities | ||
Description: | Matthew Palmer discovered an underflow flaw in apr-util. An attacker could cause a denial of service via application crash in Apache using a crafted SVNMasterURI directive, .htaccess file, or when using mod_apreq2. Applications using libapreq2 are also affected. It was discovered that the XML parser did not properly handle entity expansion. A remote attacker could cause a denial of service via memory resource consumption by sending a crafted request to an Apache server configured to use mod_dav or mod_dav_svn. C. Michael Pilato discovered an off-by-one buffer overflow in apr-util when formatting certain strings. For big-endian machines, a remote attacker could cause a denial of service or information disclosure leak. All other architectures for Ubuntu are not considered to be at risk | ||
Family: | unix | Class: | patch |
Reference(s): | USN-786-1 CVE-2009-0023 CVE-2009-1955 CVE-2009-1956 | Version: | 5 |
Platform(s): | Ubuntu 8.10 Ubuntu 8.04 Ubuntu 9.04 | Product(s): | apr-util |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13813 | |||
Oval ID: | oval:org.mitre.oval:def:13813 | ||
Title: | USN-787-1 -- apache2 vulnerabilities | ||
Description: | Matthew Palmer discovered an underflow flaw in apr-util as included in Apache. An attacker could cause a denial of service via application crash in Apache using a crafted SVNMasterURI directive, .htaccess file, or when using mod_apreq2. This issue only affected Ubuntu 6.06 LTS. Sander de Boer discovered that mod_proxy_ajp would reuse connections when a client closed a connection without sending a request body. A remote attacker could exploit this to obtain sensitive response data. This issue only affected Ubuntu 9.04. Jonathan Peatfield discovered that Apache did not process Includes options correctly. With certain configurations of Options and AllowOverride, a local attacker could use an .htaccess file to override intended restrictions and execute arbitrary code via a Server-Side-Include file. This issue affected Ubuntu 8.04 LTS, 8.10 and 9.04. It was discovered that the XML parser did not properly handle entity expansion. A remote attacker could cause a denial of service via memory resource consumption by sending a crafted request to an Apache server configured to use mod_dav or mod_dav_svn. This issue only affected Ubuntu 6.06 LTS. C. Michael Pilato discovered an off-by-one buffer overflow in apr-util when formatting certain strings. For big-endian machines, a remote attacker could cause a denial of service or information disclosure leak. All other architectures for Ubuntu are not considered to be at risk. This issue only affected Ubuntu 6.06 LTS | ||
Family: | unix | Class: | patch |
Reference(s): | USN-787-1 CVE-2009-0023 CVE-2009-1191 CVE-2009-1195 CVE-2009-1955 CVE-2009-1956 | Version: | 5 |
Platform(s): | Ubuntu 8.04 Ubuntu 9.04 Ubuntu 6.06 Ubuntu 8.10 | Product(s): | apache2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14772 | |||
Oval ID: | oval:org.mitre.oval:def:14772 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0497 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14834 | |||
Oval ID: | oval:org.mitre.oval:def:14834 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - XII | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3109 | Version: | 6 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14878 | |||
Oval ID: | oval:org.mitre.oval:def:14878 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0499 | Version: | 9 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14882 | |||
Oval ID: | oval:org.mitre.oval:def:14882 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - V | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1770 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14887 | |||
Oval ID: | oval:org.mitre.oval:def:14887 | ||
Title: | DSA-2417-1 libxml2 -- computational denial of service | ||
Description: | It was discovered that the internal hashing routine of libxml2, a library providing an extensive API to handle XML data, is vulnerable to predictable hash collisions. Given an attacker with knowledge of the hashing algorithm, it is possible to craft input that creates a large amount of collisions. As a result it is possible to perform denial of service attacks against applications using libxml2 functionality because of the computational overhead. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2417-1 CVE-2012-0841 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | libxml2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:14942 | |||
Oval ID: | oval:org.mitre.oval:def:14942 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-3563 | Version: | 9 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15018 | |||
Oval ID: | oval:org.mitre.oval:def:15018 | ||
Title: | USN-1359-1 -- Tomcat vulnerabilities | ||
Description: | tomcat6: Servlet and JSP engine Tomcat could be made to crash or expose sensitive information if it received specially crafted network traffic. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1359-1 CVE-2011-3375 CVE-2011-4858 CVE-2012-0022 | Version: | 5 |
Platform(s): | Ubuntu 11.04 Ubuntu 11.10 Ubuntu 10.04 Ubuntu 10.10 | Product(s): | Tomcat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15069 | |||
Oval ID: | oval:org.mitre.oval:def:15069 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0501 | Version: | 9 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15075 | |||
Oval ID: | oval:org.mitre.oval:def:15075 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0498 | Version: | 9 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15135 | |||
Oval ID: | oval:org.mitre.oval:def:15135 | ||
Title: | DSA-2298-2 apache2 -- denial of service | ||
Description: | The apache2 Upgrade from DSA-2298-1 has caused a regression that prevented some video players from seeking in video files served by Apache HTTPD. This update fixes this bug. The text of the original advisory is reproduced for reference: Two issues have been found in the Apache HTTPD web server: CVE-2011-3192 A vulnerability has been found in the way the multiple overlapping ranges are handled by the Apache HTTPD server. This vulnerability allows an attacker to cause Apache HTTPD to use an excessive amount of memory, causing a denial of service. CVE-2010-1452 A vulnerability has been found in mod_dav that allows an attacker to cause a daemon crash, causing a denial of service. This issue only affects the Debian 5.0 oldstable/lenny distribution. The regression has been fixed in the following packages: For the oldstable distribution, this problem has been fixed in version 2.2.9-10+lenny11. For the stable distribution, this problem has been fixed in version 2.2.16-6+squeeze3. For the testing distribution, this problem will be fixed in version 2.2.20-1. For the unstable distribution, this problem has been fixed in version 2.2.20-1. We recommend that you upgrade your apache2 packages. This update also contains updated apache2-mpm-itk packages which have been recompiled against the updated apache2 packages. The new version number | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2298-2 CVE-2010-1452 CVE-2011-3192 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | apache2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15145 | |||
Oval ID: | oval:org.mitre.oval:def:15145 | ||
Title: | DSA-2298-1 apache2 -- denial of service | ||
Description: | Two issues have been found in the Apache HTTPD web server: CVE-2011-3192 A vulnerability has been found in the way the multiple overlapping ranges are handled by the Apache HTTPD server. This vulnerability allows an attacker to cause Apache HTTPD to use an excessive amount of memory, causing a denial of service. CVE-2010-1452 A vulnerability has been found in mod_dav that allows an attacker to cause a daemon crash, causing a denial of service. This issue only affects the Debian 5.0 oldstable/lenny distribution. For the oldstable distribution, these problems have been fixed in version 2.2.9-10+lenny10. For the stable distribution, this problem has been fixed in version 2.2.16-6+squeeze2. For the testing distribution, this problem will be fixed soon. For the unstable distribution, this problem has been fixed in version 2.2.19-2. We recommend that you upgrade your apache2 packages. This update also contains updated apache2-mpm-itk packages which have been recompiled against the updated apache2 packages. The new version number | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2298-1 CVE-2010-1452 CVE-2011-3192 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | apache2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15249 | |||
Oval ID: | oval:org.mitre.oval:def:15249 | ||
Title: | DSA-2359-1 mojarra -- EL injection | ||
Description: | It was discovered that Mojarra, an implementation of JavaServer Faces, evaluates untrusted values as EL expressions if includeViewParameters is set to true. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2359-1 CVE-2011-4358 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | mojarra |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15275 | |||
Oval ID: | oval:org.mitre.oval:def:15275 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - III | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1768 | Version: | 6 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15282 | |||
Oval ID: | oval:org.mitre.oval:def:15282 | ||
Title: | USN-1368-1 -- Apache HTTP Server vulnerabilities | ||
Description: | apache2: Apache HTTP server Several security issues were fixed in the Apache HTTP Server. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1368-1 CVE-2011-3607 CVE-2011-4317 CVE-2012-0021 CVE-2012-0031 CVE-2012-0053 | Version: | 5 |
Platform(s): | Ubuntu 11.04 Ubuntu 11.10 Ubuntu 8.04 Ubuntu 10.04 Ubuntu 10.10 | Product(s): | Apache |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15309 | |||
Oval ID: | oval:org.mitre.oval:def:15309 | ||
Title: | DSA-2401-1 tomcat6 -- several | ||
Description: | Several vulnerabilities have been found in Tomcat, a servlet and JSP engine: CVE-2011-1184 CVE-2011-5062 CVE-2011-5063 CVE-2011-5064 The HTTP Digest Access Authentication implementation performed insufficient countermeasures against replay attacks. CVE-2011-2204 In rare setups passwords were written into a logfile. CVE-2011-2526 Missing input sanisiting in the HTTP APR or HTTP NIO connectors could lead to denial of service. CVE-2011-3190 AJP requests could be spoofed in some setups. CVE-2011-3375 Incorrect request caching could lead to information disclosure. CVE-2011-4858 CVE-2012-0022 This update adds countermeasures against a collision denial of service vulnerability in the Java hashtable implementation and addresses denial of service potentials when processing large amounts of requests | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2401-1 CVE-2011-1184 CVE-2011-2204 CVE-2011-2526 CVE-2011-3190 CVE-2011-3375 CVE-2011-4858 CVE-2011-5062 CVE-2011-5063 CVE-2011-5064 CVE-2012-0022 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | tomcat6 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15323 | |||
Oval ID: | oval:org.mitre.oval:def:15323 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - VII | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1772 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15347 | |||
Oval ID: | oval:org.mitre.oval:def:15347 | ||
Title: | USN-1199-1 -- Apache vulnerability | ||
Description: | apache2: Apache HTTP server A remote attacker could send crafted input to Apache and cause it to crash. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1199-1 CVE-2011-3192 | Version: | 5 |
Platform(s): | Ubuntu 11.04 Ubuntu 8.04 Ubuntu 10.04 Ubuntu 10.10 | Product(s): | Apache |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15373 | |||
Oval ID: | oval:org.mitre.oval:def:15373 | ||
Title: | DSA-2405-1 apache2 -- multiple issues | ||
Description: | Several vulnerabilities have been found in the Apache HTTPD Server: CVE-2011-3607: An integer overflow in ap_pregsub could allow local attackers to execute arbitrary code at elevated privileges via crafted .htaccess files. CVE-2011-3368 CVE-2011-3639 CVE-2011-4317: The Apache HTTP Server did not properly validate the request URI for proxied requests. In certain reverse proxy configurations using the ProxyPassMatch directive or using the RewriteRule directive with the [P] flag, a remote attacker could make the proxy connect to an arbitrary server. The could allow the attacker to access internal servers that are not otherwise accessible from the outside. The three CVE ids denote slightly different variants of the same issue. Note that, even with this issue fixed, it is the responsibility of the administrator to ensure that the regular expression replacement pattern for the target URI does not allow a client to append arbitrary strings to the host or port parts of the target URI. This is a violation of the privilege separation between the apache2 processes and could potentially be used to worsen the impact of other vulnerabilities. CVE-2012-0053: The response message for error code 400 could be used to expose "httpOnly" cookies. This could allow a remote attacker using cross site scripting to steal authentication cookies. For the oldstable distribution, these problems have been fixed in version apache2 2.2.9-10+lenny12. For the stable distribution, these problems have been fixed in version apache2 2.2.16-6+squeeze6 For the testing distribution, these problems will be fixed in version 2.2.22-1. For the unstable distribution, these problems have been fixed in version 2.2.22-1. We recommend that you upgrade your apache2 packages. This update also contains updated apache2-mpm-itk packages which have been recompiled against the updated apache2 packages. The new version number | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2405-1 CVE-2011-3607 CVE-2011-3368 CVE-2011-3639 CVE-2011-4317 CVE-2012-0031 CVE-2012-0053 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | apache2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15454 | |||
Oval ID: | oval:org.mitre.oval:def:15454 | ||
Title: | USN-1376-1 -- libxml2 vulnerability | ||
Description: | libxml2: GNOME XML library libxml2 could be made to cause a denial of service by consuming excessive CPU resources. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1376-1 CVE-2012-0841 | Version: | 5 |
Platform(s): | Ubuntu 11.04 Ubuntu 11.10 Ubuntu 8.04 Ubuntu 10.04 Ubuntu 10.10 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15568 | |||
Oval ID: | oval:org.mitre.oval:def:15568 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - VIII | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1773 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15596 | |||
Oval ID: | oval:org.mitre.oval:def:15596 | ||
Title: | User Mode Scheduler Memory Corruption Vulnerability (CVE-2012-0217) | ||
Description: | The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0217 | Version: | 8 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 R2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15608 | |||
Oval ID: | oval:org.mitre.oval:def:15608 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - IX | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3106 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15648 | |||
Oval ID: | oval:org.mitre.oval:def:15648 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - X | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3107 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15668 | |||
Oval ID: | oval:org.mitre.oval:def:15668 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - VI | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1771 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15721 | |||
Oval ID: | oval:org.mitre.oval:def:15721 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - IV | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1769 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15724 | |||
Oval ID: | oval:org.mitre.oval:def:15724 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - I | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1766 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15747 | |||
Oval ID: | oval:org.mitre.oval:def:15747 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - XIII | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3110 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15763 | |||
Oval ID: | oval:org.mitre.oval:def:15763 | ||
Title: | Unspecified vulnerability in the VirtualBox component in Oracle Virtualization 4.0, 4.1, and 4.2 | ||
Description: | Unspecified vulnerability in the VirtualBox component in Oracle Virtualization 4.0, 4.1, and 4.2 allows local users to affect integrity and availability via unknown vectors related to Core. NOTE: The previous information was obtained from the January 2013 Oracle CPU. Oracle has not commented on claims from another vendor that this issue is related to an incorrect comparison in the vga_draw_text function in Devices/Graphics/DevVGA.cpp, which can cause VirtualBox to "draw more lines than necessary." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0420 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows XP | Product(s): | VirtualBox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15804 | |||
Oval ID: | oval:org.mitre.oval:def:15804 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - XI | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3108 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15812 | |||
Oval ID: | oval:org.mitre.oval:def:15812 | ||
Title: | Oracle Outside In contains multiple exploitable vulnerabilities - II | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1767 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15911 | |||
Oval ID: | oval:org.mitre.oval:def:15911 | ||
Title: | Oracle Outside In Contains Multiple Exploitable Vulnerabilities-II MS12-080 | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7.0 allows context-dependent attackers to affect availability, related to Outside In HTML Export SDK. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3217 | Version: | 3 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15923 | |||
Oval ID: | oval:org.mitre.oval:def:15923 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE (subcomponent: Security) 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1718 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16011 | |||
Oval ID: | oval:org.mitre.oval:def:16011 | ||
Title: | Vulnerability in the Java Runtime Environment component of Oracle Java SE (subcomponent: JAX-WS) 7 Update 17 and before. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized read access to a subset of Java Runtime Environment accessible data. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows local users to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "processing of MTOM attachments" and the creation of temporary files with weak permissions. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-2415 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16043 | |||
Oval ID: | oval:org.mitre.oval:def:16043 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-5081 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16080 | |||
Oval ID: | oval:org.mitre.oval:def:16080 | ||
Title: | Oracle Outside In Contains Multiple Exploitable Vulnerability - CVE-2012-3217 (MS13-013) | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7.0 allows context-dependent attackers to affect availability, related to Outside In HTML Export SDK. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3217 | Version: | 3 |
Platform(s): | Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16178 | |||
Oval ID: | oval:org.mitre.oval:def:16178 | ||
Title: | Oracle Outside In Contains Multiple Exploitable Vulnerabilities-I MS12-080 | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7.0 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3214 | Version: | 3 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16202 | |||
Oval ID: | oval:org.mitre.oval:def:16202 | ||
Title: | Vulnerability in Microsoft Exchange Server Could Allow Remote Code Execution - CVE-2013-0393 - MS13-012 | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7 and 8.4 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2013-0418. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0393 | Version: | 3 |
Platform(s): | Microsoft Windows Server 2008 Microsoft Windows Server 2003 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16251 | |||
Oval ID: | oval:org.mitre.oval:def:16251 | ||
Title: | Vulnerability in Microsoft Exchange Server Could Allow Remote Code Execution - CVE-2013-0418 - MS13-012 | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7 and 8.4 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2013-0393. NOTE: the previous information was obtained from the January 2013 CPU. Oracle has not commented on claims from an independent researcher that this is a heap-based buffer overflow in the Paradox database stream filter (vspdx.dll) that can be triggered using a table header with a crafted "number of fields" value. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0418 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2008 Microsoft Windows Server 2003 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16267 | |||
Oval ID: | oval:org.mitre.oval:def:16267 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Replication). Supported versions that are affected are 5.1.66 and earlier and 5.5.28 and earlier. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized write access to any arbitrary Operating System location as well as read access to any arbitrary Operating System location | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows local users to affect confidentiality and integrity via unknown vectors related to Server Replication. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0385 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.1 MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16395 | |||
Oval ID: | oval:org.mitre.oval:def:16395 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Privileges). Supported versions that are affected are 5.1.66 and earlier and 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution | ||
Description: | Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-5611 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.1 MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16451 | |||
Oval ID: | oval:org.mitre.oval:def:16451 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability, related to MyISAM. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0371 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16500 | |||
Oval ID: | oval:org.mitre.oval:def:16500 | ||
Title: | Oracle Outside In Contains Multiple Exploitable Vulnerability - CVE-2012-3214 (MS13-013) | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7.0 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3214 | Version: | 3 |
Platform(s): | Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft FAST Search Server 2010 for SharePoint |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16502 | |||
Oval ID: | oval:org.mitre.oval:def:16502 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE (subcomponent: 2D) 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1713 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment JavaFX |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16508 | |||
Oval ID: | oval:org.mitre.oval:def:16508 | ||
Title: | DEPRECATED: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE (subcomponent: Java Runtime Environment) 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1717 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16544 | |||
Oval ID: | oval:org.mitre.oval:def:16544 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-5083 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment JavaFX |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16546 | |||
Oval ID: | oval:org.mitre.oval:def:16546 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1531 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment JavaFX |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16578 | |||
Oval ID: | oval:org.mitre.oval:def:16578 | ||
Title: | Vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and before, 6 Update 43 and before, 5.0 Update 41 and before. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform "dynamic class downloading" and execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-1537 | Version: | 9 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16581 | |||
Oval ID: | oval:org.mitre.oval:def:16581 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE (subcomponent: Networking) 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier, when running on Solaris, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier, when running on Solaris, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1720 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16632 | |||
Oval ID: | oval:org.mitre.oval:def:16632 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Information Schema). Supported versions that are affected are 5.1.66 and earlier and 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS) | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Information Schema. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0384 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.1 MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16654 | |||
Oval ID: | oval:org.mitre.oval:def:16654 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote authenticated users to have an unspecified impact via unknown vectors related to Networking. NOTE: the Oracle CPU states that this issue has a 0.0 CVSS score. If so, then this is not a vulnerability and this issue should not be included in CVE. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote authenticated users to have an unspecified impact via unknown vectors related to Networking. NOTE: the Oracle CPU states that this issue has a 0.0 CVSS score. If so, then this is not a vulnerability and this issue should not be included in CVE. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-5085 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16659 | |||
Oval ID: | oval:org.mitre.oval:def:16659 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE (subcomponent: JAXP) 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1724 | Version: | 4 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16681 | |||
Oval ID: | oval:org.mitre.oval:def:16681 | ||
Title: | Unspecified vulnerability in the Oracle VM Virtual Box component in Oracle Virtualization 3.2, 4.0, and 4.1 | ||
Description: | Unspecified vulnerability in the Oracle VM Virtual Box component in Oracle Virtualization 3.2, 4.0, and 4.1 allows local users to affect availability via unknown vectors related to VirtualBox Core. NOTE: The previous information was obtained from the October 2012 CPU. Oracle has not commented on claims from another vendor that this issue is related to "incorrect interrupt handling." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3221 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows XP | Product(s): | VirtualBox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16707 | |||
Oval ID: | oval:org.mitre.oval:def:16707 | ||
Title: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE (subcomponent: Deployment) 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment. | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0551 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Java Runtime Environment |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16758 | |||
Oval ID: | oval:org.mitre.oval:def:16758 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Locking). Supported versions that are affected are 5.1.66 and earlier and 5.5.28 and earlier. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote attackers to affect availability via unknown vectors related to Server Locking. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0383 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.1 MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16792 | |||
Oval ID: | oval:org.mitre.oval:def:16792 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.1.66 and earlier and 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0572 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.1 MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16825 | |||
Oval ID: | oval:org.mitre.oval:def:16825 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Optimizer). Supported versions that are affected are 5.1.66 and earlier and 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS) | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0389 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.1 MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16835 | |||
Oval ID: | oval:org.mitre.oval:def:16835 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Stored Procedure). Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS) | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0386 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16877 | |||
Oval ID: | oval:org.mitre.oval:def:16877 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Privileges). Supported versions that are affected are 5.5.28 and earlier. Difficult to exploit vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users with Server Privileges to affect availability via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-5096 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16908 | |||
Oval ID: | oval:org.mitre.oval:def:16908 | ||
Title: | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Container). Supported versions that are affected are 9.2.4, 10.0.2, 10.3.5, 10.3.6 and 12.1.1. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP. Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server | ||
Description: | Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-5035 | Version: | 4 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Oracle WebLogic Server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16925 | |||
Oval ID: | oval:org.mitre.oval:def:16925 | ||
Title: | Vulnerability in the Management Pack for Oracle GoldenGate Server. Supported versions that are affected are 11.1.1.1.0. Vulnerability in the Oracle GoldenGate Veridata component of Oracle Fusion Middleware (subcomponent: Server). The supported version that is affected is 3.0.0.11.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP. Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GoldenGate Veridata | ||
Description: | Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0022 | Version: | 4 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Oracle GoldenGate Director Oracle GoldenGate Veridata |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16947 | |||
Oval ID: | oval:org.mitre.oval:def:16947 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Optimizer). Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0578 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16960 | |||
Oval ID: | oval:org.mitre.oval:def:16960 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Parser). Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution | ||
Description: | Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-5612 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17022 | |||
Oval ID: | oval:org.mitre.oval:def:17022 | ||
Title: | Unspecified vulnerability in the Spatial component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote authenticated users with Create Table privileges to affect confidentiality, integrity, and availability via unknown vectors | ||
Description: | Unspecified vulnerability in the Spatial component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote authenticated users with Create Table privileges to affect confidentiality, integrity, and availability via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3220 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Oracle Database Server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17077 | |||
Oval ID: | oval:org.mitre.oval:def:17077 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Partition). Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Partition. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0367 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17129 | |||
Oval ID: | oval:org.mitre.oval:def:17129 | ||
Title: | USN-1807-1 -- MySQL vulnerabilities | ||
Description: | Multiple security issues were discovered in MySQL. | ||
Family: | unix | Class: | patch |
Reference(s): | usn-1807-1 CVE-2012-0553 CVE-2013-1492 CVE-2013-1502 CVE-2013-1506 CVE-2013-1511 CVE-2013-1512 CVE-2013-1521 CVE-2013-1523 CVE-2013-1526 CVE-2013-1532 CVE-2013-1544 CVE-2013-1552 CVE-2013-1555 CVE-2013-1623 CVE-2013-2375 CVE-2013-2376 CVE-2013-2378 CVE-2013-2389 CVE-2013-2391 CVE-2013-2392 | Version: | 7 |
Platform(s): | Ubuntu 11.10 Ubuntu 12.04 Ubuntu 10.04 Ubuntu 12.10 | Product(s): | mysql-5.1 mysql-5.5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17175 | |||
Oval ID: | oval:org.mitre.oval:def:17175 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Replication). Supported versions that are affected are 5.1.66 and earlier and 5.1.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized update, insert or delete access to all MySQL Server accessible data as well as read access to all MySQL Server accessible data | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.1.28 and earlier, allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Server Replication. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0375 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.1 MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17186 | |||
Oval ID: | oval:org.mitre.oval:def:17186 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server). Supported versions that are affected are 5.1.66 and earlier and 5.5.28 and earlier. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote attackers to affect availability via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1702 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.1 MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17255 | |||
Oval ID: | oval:org.mitre.oval:def:17255 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-0368 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17266 | |||
Oval ID: | oval:org.mitre.oval:def:17266 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server). Supported versions that are affected are 5.1.66 and earlier and 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0574 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.1 MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17268 | |||
Oval ID: | oval:org.mitre.oval:def:17268 | ||
Title: | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Optimizer). Supported versions that are affected are 5.1.66 and earlier and 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1705 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | MySQL Server 5.1 MySQL Server 5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17289 | |||
Oval ID: | oval:org.mitre.oval:def:17289 | ||
Title: | USN-1658-1 -- mysql-5.1, mysql-5.5, mysql-dfsg-5.1 vulnerability | ||
Description: | MySQL could be made to run programs if it received specially crafted network traffic from an authenticated user. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1658-1 CVE-2012-5611 | Version: | 7 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 Ubuntu 11.10 Ubuntu 10.04 | Product(s): | mysql-5.5 mysql-5.1 mysql-dfsg-5.1 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17565 | |||
Oval ID: | oval:org.mitre.oval:def:17565 | ||
Title: | USN-1505-2 -- icedtea-web regression | ||
Description: | USN 1505-1 introduced a regression in the IcedTea-Web Java web browser plugin that prevented it from working with the Chromium web browser. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1505-2 CVE-2012-1711 CVE-2012-1719 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1723 CVE-2012-1725 CVE-2012-1724 | Version: | 7 |
Platform(s): | Ubuntu 11.10 Ubuntu 11.04 | Product(s): | icedtea-web |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17879 | |||
Oval ID: | oval:org.mitre.oval:def:17879 | ||
Title: | USN-1505-1 -- icedtea-web, openjdk-6 vulnerabilities | ||
Description: | Several security issues were fixed in OpenJDK 6. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1505-1 CVE-2012-1711 CVE-2012-1719 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1723 CVE-2012-1725 CVE-2012-1724 | Version: | 7 |
Platform(s): | Ubuntu 12.04 Ubuntu 11.10 Ubuntu 11.04 Ubuntu 10.04 | Product(s): | openjdk-6 icedtea-web |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17999 | |||
Oval ID: | oval:org.mitre.oval:def:17999 | ||
Title: | USN-1621-1 -- mysql-5.1, mysql-5.5, mysql-dfsg-5.1 vulnerabilities | ||
Description: | Several security issues were fixed in MySQL. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1621-1 CVE-2012-3144 CVE-2012-3147 CVE-2012-3149 CVE-2012-3150 CVE-2012-3156 CVE-2012-3158 CVE-2012-3160 CVE-2012-3163 CVE-2012-3166 CVE-2012-3167 CVE-2012-3173 CVE-2012-3177 CVE-2012-3180 CVE-2012-3197 | Version: | 7 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 Ubuntu 11.10 Ubuntu 10.04 | Product(s): | mysql-5.5 mysql-5.1 mysql-dfsg-5.1 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18161 | |||
Oval ID: | oval:org.mitre.oval:def:18161 | ||
Title: | USN-1703-1 -- mysql-5.1, mysql-5.5, mysql-dfsg-5.1 vulnerabilities | ||
Description: | Several security issues were fixed in MySQL. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1703-1 CVE-2012-0572 CVE-2012-0574 CVE-2012-0578 CVE-2012-1702 CVE-2012-1705 CVE-2012-5060 CVE-2012-5096 CVE-2012-5611 CVE-2012-5612 CVE-2013-0367 CVE-2013-0368 CVE-2013-0371 CVE-2013-0375 CVE-2013-0383 CVE-2013-0384 CVE-2013-0385 CVE-2013-0386 CVE-2013-0389 | Version: | 7 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 Ubuntu 11.10 Ubuntu 10.04 | Product(s): | mysql-5.5 mysql-5.1 mysql-dfsg-5.1 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18376 | |||
Oval ID: | oval:org.mitre.oval:def:18376 | ||
Title: | Oracle Outside In Contains Multiple Exploitable Vulnerabilities - CVE-2013-2393 (MS13-061) | ||
Description: | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7 and 8.4.0 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-2393 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft Exchange Server 2013 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18379 | |||
Oval ID: | oval:org.mitre.oval:def:18379 | ||
Title: | USN-1807-2 -- mysql-5.5 vulnerabilities | ||
Description: | Several security issues were fixed in MySQL. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1807-2 CVE-2012-0553 CVE-2013-1492 CVE-2013-1502 CVE-2013-1506 CVE-2013-1511 CVE-2013-1512 CVE-2013-1521 CVE-2013-1523 CVE-2013-1526 CVE-2013-1532 CVE-2013-1544 CVE-2013-1552 CVE-2013-1555 CVE-2013-1623 CVE-2013-2375 CVE-2013-2376 CVE-2013-2378 CVE-2013-2389 CVE-2013-2391 CVE-2013-2392 | Version: | 7 |
Platform(s): | Ubuntu 13.04 | Product(s): | mysql-5.5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18423 | |||
Oval ID: | oval:org.mitre.oval:def:18423 | ||
Title: | DSA-2581-1 mysql-5.1 - several | ||
Description: | Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to a new upstream version, 5.1.66, which includes additional changes, such as performance improvements and corrections for data loss defects. These changes are described in the <a href="http://dev.mysql.com/doc/refman/5.1/en/news-5-1-66.html">MySQL release notes</a>. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2581-1 CVE-2012-3150 CVE-2012-3158 CVE-2012-3160 CVE-2012-3163 CVE-2012-3166 CVE-2012-3167 CVE-2012-3173 CVE-2012-3177 CVE-2012-3180 CVE-2012-3197 CVE-2012-5611 | Version: | 7 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | mysql-5.1 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18467 | |||
Oval ID: | oval:org.mitre.oval:def:18467 | ||
Title: | DSA-2667-1 mysql-5.5 - several | ||
Description: | Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to a new upstream version, 5.5.31, which includes additional changes, such as performance improvements and corrections for data loss defects. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2667-1 CVE-2013-1502 CVE-2013-1511 CVE-2013-1532 CVE-2013-1544 CVE-2013-2375 CVE-2013-2376 CVE-2013-2389 CVE-2013-2391 CVE-2013-2392 | Version: | 8 |
Platform(s): | Debian GNU/Linux 7 Debian GNU/kFreeBSD 7 | Product(s): | mysql-5.5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18529 | |||
Oval ID: | oval:org.mitre.oval:def:18529 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, and 10 allows local users to affect confidentiality, integrity, and availability via vectors related to RBAC Configuration. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0411 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18780 | |||
Oval ID: | oval:org.mitre.oval:def:18780 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to mailx. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-1750 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18802 | |||
Oval ID: | oval:org.mitre.oval:def:18802 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect availability, related to SCTP. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3127 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18818 | |||
Oval ID: | oval:org.mitre.oval:def:18818 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect integrity and availability via unknown vectors related to Utility/pax. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0412 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18827 | |||
Oval ID: | oval:org.mitre.oval:def:18827 | ||
Title: | Apache HTTP vulnerability 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 in VisualSVN Server (CVE-2011-3192) | ||
Description: | The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-3192 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | VisualSVN Server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18829 | |||
Oval ID: | oval:org.mitre.oval:def:18829 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Gnome Trusted Extension. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3199 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18890 | |||
Oval ID: | oval:org.mitre.oval:def:18890 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-4609 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18934 | |||
Oval ID: | oval:org.mitre.oval:def:18934 | ||
Title: | HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Access Restriction Bypass, Unauthorized Modification and Other Vulnerabilities | ||
Description: | Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0022 | Version: | 11 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19124 | |||
Oval ID: | oval:org.mitre.oval:def:19124 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect availability via vectors related to CPU performance counters drivers. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0408 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19142 | |||
Oval ID: | oval:org.mitre.oval:def:19142 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect availability via unknown vectors related to Kernel/System Call. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3211 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19164 | |||
Oval ID: | oval:org.mitre.oval:def:19164 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect availability via unknown vectors related to Kernel/IO, a different vulnerability than CVE-2013-1498. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-1496 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19192 | |||
Oval ID: | oval:org.mitre.oval:def:19192 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect availability via unknown vectors related to Kernel. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-1530 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19194 | |||
Oval ID: | oval:org.mitre.oval:def:19194 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Kernel/Boot. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0404 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19196 | |||
Oval ID: | oval:org.mitre.oval:def:19196 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect availability via unknown vectors related to Utility. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0403 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19224 | |||
Oval ID: | oval:org.mitre.oval:def:19224 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect integrity via unknown vectors via vectors related to Kernel/IPsec. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0406 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19228 | |||
Oval ID: | oval:org.mitre.oval:def:19228 | ||
Title: | CRITICAL PATCH UPDATE JANUARY 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 9 and 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Utility/Umount. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0399 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19281 | |||
Oval ID: | oval:org.mitre.oval:def:19281 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0217 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19303 | |||
Oval ID: | oval:org.mitre.oval:def:19303 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Kernel. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3187 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19308 | |||
Oval ID: | oval:org.mitre.oval:def:19308 | ||
Title: | CRITICAL PATCH UPDATE JANUARY 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 9 and 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Filesystem/cachefs. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0400 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19309 | |||
Oval ID: | oval:org.mitre.oval:def:19309 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-2699 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19326 | |||
Oval ID: | oval:org.mitre.oval:def:19326 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect availability via unknown vectors related to Libraries/Libc. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0570 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19333 | |||
Oval ID: | oval:org.mitre.oval:def:19333 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Solaris 9, 10, and 11 allows local users to affect availability via unknown vectors related to Kerberos/klist. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0563 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19352 | |||
Oval ID: | oval:org.mitre.oval:def:19352 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows remote attackers to affect confidentiality and integrity via vectors related to NFS client mounts and IPv6. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0405 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19359 | |||
Oval ID: | oval:org.mitre.oval:def:19359 | ||
Title: | CRITICAL PATCH UPDATE JANUARY 2013 | ||
Description: | Unspecified vulnerability Oracle Sun Solaris 10 allows local users to affect confidentiality and integrity via unknown vectors related to Install/smpatch. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0569 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19370 | |||
Oval ID: | oval:org.mitre.oval:def:19370 | ||
Title: | CRITICAL PATCH UPDATE JANUARY 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the Bind/Postinstall script for Bind package. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0415 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19399 | |||
Oval ID: | oval:org.mitre.oval:def:19399 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, and 10 allows local users to affect confidentiality via unknown vectors related to Utility/fdformat. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0568 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19400 | |||
Oval ID: | oval:org.mitre.oval:def:19400 | ||
Title: | CRITICAL PATCH UPDATE JANUARY 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect availability via unknown vectors related to Kernel/DTrace Framework. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0407 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19408 | |||
Oval ID: | oval:org.mitre.oval:def:19408 | ||
Title: | HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities | ||
Description: | Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-5035 | Version: | 10 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19409 | |||
Oval ID: | oval:org.mitre.oval:def:19409 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Remote Execution Service. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-0413 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19416 | |||
Oval ID: | oval:org.mitre.oval:def:19416 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10, when running on SPARC T4 servers, allows local users to affect availability via unknown vectors related to Kernel. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-1494 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19438 | |||
Oval ID: | oval:org.mitre.oval:def:19438 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect availability via unknown vectors related to Filesystem. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-1507 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19443 | |||
Oval ID: | oval:org.mitre.oval:def:19443 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect availability via unknown vectors related to Kernel/sockfs. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-1681 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19498 | |||
Oval ID: | oval:org.mitre.oval:def:19498 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2013 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect availability via unknown vectors related to Kernel/IO, a different vulnerability than CVE-2013-1496. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-1498 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19542 | |||
Oval ID: | oval:org.mitre.oval:def:19542 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 9, 10, and 11 allows remote attackers to affect confidentiality, related to Network/NFS. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3131 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19546 | |||
Oval ID: | oval:org.mitre.oval:def:19546 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to gssd. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-1683 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19550 | |||
Oval ID: | oval:org.mitre.oval:def:19550 | ||
Title: | HP-UX Running Java5 Runtime Environment (JRE) and Java Developer Kit (JDK), Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform "dynamic class downloading" and execute arbitrary code. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-1537 | Version: | 12 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19557 | |||
Oval ID: | oval:org.mitre.oval:def:19557 | ||
Title: | HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0497 | Version: | 10 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19581 | |||
Oval ID: | oval:org.mitre.oval:def:19581 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect availability, related to Kernel/RCTL. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3208 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19585 | |||
Oval ID: | oval:org.mitre.oval:def:19585 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect integrity via unknown vectors related to Solaris Management Console. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3112 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19597 | |||
Oval ID: | oval:org.mitre.oval:def:19597 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 and 11, when running on SPARC, allows local users to affect confidentiality via unknown vectors related to Kernel. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3215 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19598 | |||
Oval ID: | oval:org.mitre.oval:def:19598 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Solaris 10 and 11 allows local users to affect integrity and availability, related to Logical Domains (LDOM). | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-1687 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19599 | |||
Oval ID: | oval:org.mitre.oval:def:19599 | ||
Title: | HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0501 | Version: | 10 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19612 | |||
Oval ID: | oval:org.mitre.oval:def:19612 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect confidentiality, related to Apache HTTP Server. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3123 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19621 | |||
Oval ID: | oval:org.mitre.oval:def:19621 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect confidentiality and integrity, related to libsasl. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-1694 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19625 | |||
Oval ID: | oval:org.mitre.oval:def:19625 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, and 10 allows remote attackers to affect availability, related to TCP/IP. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3125 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19630 | |||
Oval ID: | oval:org.mitre.oval:def:19630 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect confidentiality, integrity, and availability, related to Gnome PDF viewer. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3129 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19635 | |||
Oval ID: | oval:org.mitre.oval:def:19635 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect integrity via unknown vectors related to Branded Zone. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-1765 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19650 | |||
Oval ID: | oval:org.mitre.oval:def:19650 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | The ICMP path MTU (PMTU) discovery feature in various UNIX systems allows remote attackers to cause a denial of service by spoofing "ICMP Fragmentation needed but Don't Fragment (DF) set" packets between two target hosts, which could cause one host to lower its MTU when transmitting to the other host. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2001-0323 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19659 | |||
Oval ID: | oval:org.mitre.oval:def:19659 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, and 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to (1) bsmconv and (2) bsmunconv. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0539 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19675 | |||
Oval ID: | oval:org.mitre.oval:def:19675 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Password Policy. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-1684 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19681 | |||
Oval ID: | oval:org.mitre.oval:def:19681 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 and 11, when running on SPARC T4 servers, allows local users to affect availability via unknown vectors related to Kernel. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3212 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19707 | |||
Oval ID: | oval:org.mitre.oval:def:19707 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect confidentiality and integrity via unknown vectors related to mailx. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3165 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19716 | |||
Oval ID: | oval:org.mitre.oval:def:19716 | ||
Title: | CRITICAL PATCH UPDATE APRIL 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect availability, related to SCTP. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-1692 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19763 | |||
Oval ID: | oval:org.mitre.oval:def:19763 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 9 and 10 allows remote attackers to affect availability via unknown vectors related to in.tnamed and NameServer. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3121 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19765 | |||
Oval ID: | oval:org.mitre.oval:def:19765 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 9, 10, and 11 allows local users to affect availability via unknown vectors related to Kernel. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3207 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19767 | |||
Oval ID: | oval:org.mitre.oval:def:19767 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-0419 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19773 | |||
Oval ID: | oval:org.mitre.oval:def:19773 | ||
Title: | CRITICAL PATCH UPDATE JULY 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect availability, related to Kernel/KSSL. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3124 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19777 | |||
Oval ID: | oval:org.mitre.oval:def:19777 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 and 11, when running on SPARC, allows local users to affect integrity and availability via unknown vectors related to Logical Domain (LDOM). | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-3209 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19788 | |||
Oval ID: | oval:org.mitre.oval:def:19788 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to inetd. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-5095 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19800 | |||
Oval ID: | oval:org.mitre.oval:def:19800 | ||
Title: | HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0499 | Version: | 10 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19808 | |||
Oval ID: | oval:org.mitre.oval:def:19808 | ||
Title: | HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0498 | Version: | 10 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19813 | |||
Oval ID: | oval:org.mitre.oval:def:19813 | ||
Title: | HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities | ||
Description: | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-3563 | Version: | 10 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19860 | |||
Oval ID: | oval:org.mitre.oval:def:19860 | ||
Title: | DSA-2496-1 mysql-5.1 - several | ||
Description: | Due to the non-disclosure of security patch information from Oracle, we are forced to ship an upstream version update of MySQL 5.1. There are several known incompatible changes, which are listed in /usr/share/doc/mysql-server/NEWS.Debian.gz. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2496-1 CVE-2012-0540 CVE-2012-0583 CVE-2012-1688 CVE-2012-1689 CVE-2012-1690 CVE-2012-1703 CVE-2012-1734 CVE-2012-2102 CVE-2012-2122 CVE-2012-2749 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | mysql-5.1 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19861 | |||
Oval ID: | oval:org.mitre.oval:def:19861 | ||
Title: | DSA-2508-1 kfreebsd-8 - privilege escalation | ||
Description: | Rafal Wojtczuk from Bromium discovered that FreeBSD wasn't handling correctly uncanonical return addresses on Intel amd64 CPUs, allowing privilege escalation to kernel for local users. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2508-1 CVE-2012-0217 | Version: | 5 |
Platform(s): | Debian GNU/kFreeBSD 6.0 | Product(s): | kfreebsd-8 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19942 | |||
Oval ID: | oval:org.mitre.oval:def:19942 | ||
Title: | DSA-2594-1 virtualbox-ose - programming error | ||
Description: | <q>halfdog</q> discovered that incorrect interrupt handling in VirtualBox, a x86 virtualization solution, can lead to denial of service. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2594-1 CVE-2012-3221 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | virtualbox-ose |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20023 | |||
Oval ID: | oval:org.mitre.oval:def:20023 | ||
Title: | DSA-2506-1 libapache-mod-security - modsecurity bypass | ||
Description: | Qualys Vulnerability & Malware Research Labs discovered a vulnerability in ModSecurity, a security module for the Apache webserver. In situations where both <q>Content:Disposition: attachment</q> and <q>Content-Type: multipart</q> were present in HTTP headers, the vulnerability could allow an attacker to bypass policy and execute cross-site script (XSS) attacks through properly crafted HTML documents. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2506-1 CVE-2012-2751 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | libapache-mod-security |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20110 | |||
Oval ID: | oval:org.mitre.oval:def:20110 | ||
Title: | VMware vSphere and vCOps updates to third party libraries | ||
Description: | libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0841 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20142 | |||
Oval ID: | oval:org.mitre.oval:def:20142 | ||
Title: | DSA-2472-1 gridengine - privilege escalation | ||
Description: | Dave Love discovered that users who are allowed to submit jobs to a Grid Engine installation can escalate their privileges to root because the environment is not properly sanitised before creating processes. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2472-1 CVE-2012-0208 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | gridengine |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20494 | |||
Oval ID: | oval:org.mitre.oval:def:20494 | ||
Title: | VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, Workstation, Player, ESXi and ESX address several security issues | ||
Description: | Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0022 | Version: | 5 |
Platform(s): | VMWare ESX Server 4.0 VMWare ESX Server 4.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20720 | |||
Oval ID: | oval:org.mitre.oval:def:20720 | ||
Title: | VMware vSphere and vCOps updates to third party libraries | ||
Description: | The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-2699 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20843 | |||
Oval ID: | oval:org.mitre.oval:def:20843 | ||
Title: | RHSA-2012:0128: httpd security update (Moderate) | ||
Description: | protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2012:0128-01 CESA-2012:0128 CVE-2011-3607 CVE-2011-3639 CVE-2011-4317 CVE-2012-0031 CVE-2012-0053 | Version: | 68 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20976 | |||
Oval ID: | oval:org.mitre.oval:def:20976 | ||
Title: | RHSA-2012:0324: libxml2 security update (Moderate) | ||
Description: | libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2012:0324-01 CESA-2012:0324 CVE-2012-0841 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 CentOS Linux 5 CentOS Linux 6 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21000 | |||
Oval ID: | oval:org.mitre.oval:def:21000 | ||
Title: | RHSA-2013:0219: mysql security update (Moderate) | ||
Description: | Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0219-02 CESA-2013:0219 CVE-2012-0572 CVE-2012-0574 CVE-2012-1702 CVE-2012-1705 CVE-2013-0375 CVE-2013-0383 CVE-2013-0384 CVE-2013-0385 CVE-2013-0389 | Version: | 129 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | mysql |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21022 | |||
Oval ID: | oval:org.mitre.oval:def:21022 | ||
Title: | RHSA-2013:0180: mysql security update (Important) | ||
Description: | Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0180-00 CESA-2013:0180 CVE-2012-2749 CVE-2012-5611 | Version: | 31 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | mysql |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21189 | |||
Oval ID: | oval:org.mitre.oval:def:21189 | ||
Title: | RHSA-2012:0323: httpd security update (Moderate) | ||
Description: | protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2012:0323-01 CVE-2011-3607 CVE-2011-3639 CVE-2012-0031 CVE-2012-0053 | Version: | 55 |
Platform(s): | Red Hat Enterprise Linux 5 | Product(s): | httpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21312 | |||
Oval ID: | oval:org.mitre.oval:def:21312 | ||
Title: | RHSA-2012:0475: tomcat6 security update (Moderate) | ||
Description: | Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2012:0475-03 CESA-2012:0475 CVE-2011-4858 CVE-2012-0022 | Version: | 29 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21452 | |||
Oval ID: | oval:org.mitre.oval:def:21452 | ||
Title: | RHSA-2011:1391: httpd security and bug fix update (Moderate) | ||
Description: | The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:1391-01 CVE-2011-3348 CVE-2011-3368 | Version: | 29 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21500 | |||
Oval ID: | oval:org.mitre.oval:def:21500 | ||
Title: | RHSA-2011:0507: apr security update (Moderate) | ||
Description: | Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0507-01 CESA-2011:0507 CVE-2011-0419 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 CentOS Linux 5 CentOS Linux 6 | Product(s): | apr |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21528 | |||
Oval ID: | oval:org.mitre.oval:def:21528 | ||
Title: | RHSA-2012:1551: mysql security update (Important) | ||
Description: | Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2012:1551-01 CESA-2012:1551 CVE-2012-5611 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | mysql |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22002 | |||
Oval ID: | oval:org.mitre.oval:def:22002 | ||
Title: | RHSA-2011:1245: httpd security update (Important) | ||
Description: | The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:1245-01 CVE-2011-3192 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22047 | |||
Oval ID: | oval:org.mitre.oval:def:22047 | ||
Title: | The authentication protocol in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to conduct brute force password guessing attacks, aka "stealth password cracking vulnerability." | ||
Description: | The authentication protocol in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to conduct brute force password guessing attacks, aka "stealth password cracking vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-3137 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Oracle Database Server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22123 | |||
Oval ID: | oval:org.mitre.oval:def:22123 | ||
Title: | RHSA-2011:1392: httpd security and bug fix update (Moderate) | ||
Description: | The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:1392-01 CESA-2011:1392 CVE-2011-3368 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22131 | |||
Oval ID: | oval:org.mitre.oval:def:22131 | ||
Title: | RHSA-2010:0659: httpd security and bug fix update (Moderate) | ||
Description: | mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0659-01 CESA-2010:0659 CVE-2010-1452 CVE-2010-2791 | Version: | 29 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22615 | |||
Oval ID: | oval:org.mitre.oval:def:22615 | ||
Title: | Unspecified vulnerability in the Workload Manager component in Oracle Database Server 11.2.0.2 and 11.2.0.3, when used in RAC configurations, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | ||
Description: | Unspecified vulnerability in the Workload Manager component in Oracle Database Server 11.2.0.2 and 11.2.0.3, when used in RAC configurations, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-1534 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Oracle Database Server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22627 | |||
Oval ID: | oval:org.mitre.oval:def:22627 | ||
Title: | Unspecified vulnerability in the Network Layer component in Oracle Database Server 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to affect availability via unknown vectors. | ||
Description: | Unspecified vulnerability in the Network Layer component in Oracle Database Server 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to affect availability via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-1554 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Oracle Database Server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22649 | |||
Oval ID: | oval:org.mitre.oval:def:22649 | ||
Title: | Unspecified vulnerability in the Network Layer component in Oracle Database Server 11.2.0.2 and 11.2.0.3 allows remote attackers to affect availability via unknown vectors. | ||
Description: | Unspecified vulnerability in the Network Layer component in Oracle Database Server 11.2.0.2 and 11.2.0.3 allows remote attackers to affect availability via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-1538 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Oracle Database Server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22801 | |||
Oval ID: | oval:org.mitre.oval:def:22801 | ||
Title: | ELSA-2009:1107: apr-util security update (Moderate) | ||
Description: | Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2009:1107-01 CVE-2009-0023 CVE-2009-1955 CVE-2009-1956 | Version: | 17 |
Platform(s): | Oracle Linux 5 | Product(s): | apr-util |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22855 | |||
Oval ID: | oval:org.mitre.oval:def:22855 | ||
Title: | DEPRECATED: ELSA-2011:1245: httpd security update (Important) | ||
Description: | The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:1245-01 CVE-2011-3192 | Version: | 7 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22935 | |||
Oval ID: | oval:org.mitre.oval:def:22935 | ||
Title: | ELSA-2010:0659: httpd security and bug fix update (Moderate) | ||
Description: | mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0659-01 CVE-2010-1452 CVE-2010-2791 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | httpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22998 | |||
Oval ID: | oval:org.mitre.oval:def:22998 | ||
Title: | ELSA-2012:0323: httpd security update (Moderate) | ||
Description: | protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:0323-01 CVE-2011-3607 CVE-2011-3639 CVE-2012-0031 CVE-2012-0053 | Version: | 21 |
Platform(s): | Oracle Linux 5 | Product(s): | httpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23087 | |||
Oval ID: | oval:org.mitre.oval:def:23087 | ||
Title: | DEPRECATED: ELSA-2012:0324: libxml2 security update (Moderate) | ||
Description: | libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:0324-01 CVE-2012-0841 | Version: | 7 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23204 | |||
Oval ID: | oval:org.mitre.oval:def:23204 | ||
Title: | DEPRECATED: ELSA-2011:0507: apr security update (Moderate) | ||
Description: | Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0507-01 CVE-2011-0419 | Version: | 7 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | apr |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23276 | |||
Oval ID: | oval:org.mitre.oval:def:23276 | ||
Title: | ELSA-2011:1392: httpd security and bug fix update (Moderate) | ||
Description: | The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:1392-01 CVE-2011-3368 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | httpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23326 | |||
Oval ID: | oval:org.mitre.oval:def:23326 | ||
Title: | ELSA-2013:0180: mysql security update (Important) | ||
Description: | Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0180-00 CVE-2012-2749 CVE-2012-5611 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | mysql |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23476 | |||
Oval ID: | oval:org.mitre.oval:def:23476 | ||
Title: | ELSA-2011:1245: httpd security update (Important) | ||
Description: | The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:1245-01 CVE-2011-3192 | Version: | 6 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23571 | |||
Oval ID: | oval:org.mitre.oval:def:23571 | ||
Title: | ELSA-2011:0507: apr security update (Moderate) | ||
Description: | Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0507-01 CVE-2011-0419 | Version: | 6 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | apr |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23733 | |||
Oval ID: | oval:org.mitre.oval:def:23733 | ||
Title: | ELSA-2012:0324: libxml2 security update (Moderate) | ||
Description: | libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:0324-01 CVE-2012-0841 | Version: | 6 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23745 | |||
Oval ID: | oval:org.mitre.oval:def:23745 | ||
Title: | ELSA-2012:0475: tomcat6 security update (Moderate) | ||
Description: | Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:0475-03 CVE-2011-4858 CVE-2012-0022 | Version: | 13 |
Platform(s): | Oracle Linux 6 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23761 | |||
Oval ID: | oval:org.mitre.oval:def:23761 | ||
Title: | ELSA-2011:1391: httpd security and bug fix update (Moderate) | ||
Description: | The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:1391-01 CVE-2011-3348 CVE-2011-3368 | Version: | 13 |
Platform(s): | Oracle Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23836 | |||
Oval ID: | oval:org.mitre.oval:def:23836 | ||
Title: | ELSA-2012:0128: httpd security update (Moderate) | ||
Description: | protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:0128-01 CVE-2011-3607 CVE-2011-3639 CVE-2011-4317 CVE-2012-0031 CVE-2012-0053 | Version: | 25 |
Platform(s): | Oracle Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23921 | |||
Oval ID: | oval:org.mitre.oval:def:23921 | ||
Title: | ELSA-2012:1551: mysql security update (Important) | ||
Description: | Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:1551-01 CVE-2012-5611 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | mysql |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25484 | |||
Oval ID: | oval:org.mitre.oval:def:25484 | ||
Title: | SUSE-SU-2013:0830-1 -- Security update for Apache | ||
Description: | Apache2 has been updated to fix multiple security issues. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:0830-1 CVE-2012-4557 CVE-2012-0883 CVE-2012-2687 CVE-2012-4558 CVE-2012-3499 CVE-2011-3368 CVE-2011-4317 CVE-2012-0021 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | Apache |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25561 | |||
Oval ID: | oval:org.mitre.oval:def:25561 | ||
Title: | SUSE-SU-2013:0389-1 -- Security update for Apache | ||
Description: | This update fixes the following issues: * CVE-2012-4557: Denial of Service via special requests in mod_proxy_ajp * CVE-2012-0883: improper LD_LIBRARY_PATH handling * CVE-2012-2687: filename escaping problem | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:0389-1 CVE-2012-4557 CVE-2012-0883 CVE-2012-2687 CVE-2011-3368 CVE-2011-4317 CVE-2012-0021 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | Apache |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25819 | |||
Oval ID: | oval:org.mitre.oval:def:25819 | ||
Title: | SUSE-SU-2013:1374-1 -- Security update for tomcat6 | ||
Description: | This update of tomcat6 fixes: * apache-tomcat-CVE-2012-3544.patch (bnc#831119) * use chown --no-dereference to prevent symlink attacks on log (bnc#822177#c7/prevents CVE-2013-1976) * Fix tomcat init scripts generating malformed classpath ( http://youtrack.jetbrains.com/issue/JT-18545 <http://youtrack.jetbrains.com/issue/JT-18545> ) bnc#804992 (patch from m407) * fix a typo in initscript (bnc#768772 ) * copy all shell scripts (bnc#818948) | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:1374-1 CVE-2012-3544 CVE-2013-1976 CVE-2012-0022 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25951 | |||
Oval ID: | oval:org.mitre.oval:def:25951 | ||
Title: | SUSE-SU-2013:0262-1 -- Security update for MySQL | ||
Description: | A stack-based buffer overflow in MySQL has been fixed that could have caused a Denial of Service or potentially allowed the execution of arbitrary code (CVE-2012-5611). | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:0262-1 CVE-2012-5611 CVE-2012-5615 CVE-2012-5613 CVE-2012-5612 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | MySQL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26047 | |||
Oval ID: | oval:org.mitre.oval:def:26047 | ||
Title: | SUSE-SU-2013:0469-1 -- Security update for apache2 | ||
Description: | This Apache2 LTSS roll-up update for SUSE Linux Enterprise 10 SP3 LTSS fixes some security issues and bugs. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:0469-1 CVE-2012-4557 CVE-2012-0883 CVE-2012-2687 CVE-2012-0031 CVE-2012-0053 CVE-2007-6750 CVE-2011-3639 CVE-2011-3368 CVE-2011-4317 CVE-2011-1473 CVE-2011-3607 CVE-2012-0021 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 10 | Product(s): | apache2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26706 | |||
Oval ID: | oval:org.mitre.oval:def:26706 | ||
Title: | DEPRECATED: ELSA-2012-1551 -- mysql security update (important) | ||
Description: | [5.1.66-2] - Add backported patch for CVE-2012-5611 Resolves: CVE-2012-5611 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012-1551 CVE-2012-5611 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | mysql |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27320 | |||
Oval ID: | oval:org.mitre.oval:def:27320 | ||
Title: | DEPRECATED: ELSA-2012-0323 -- httpd security update (moderate) | ||
Description: | [2.2.3-63.0.1.el5_8.1] - Fix mod_ssl always performing full renegotiation (orabug 12423387) - replace index.html with Oracle's index page oracle_index.html - update vstring and distro in specfile [2.2.3-63.1] - add security fixes for CVE-2012-0053, CVE-2012-0031, CVE-2011-3607 (#787596) - remove patch for CVE-2011-3638, obviated by fix for CVE-2011-3639 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012-0323 CVE-2011-3607 CVE-2011-3639 CVE-2012-0031 CVE-2012-0053 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | httpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27353 | |||
Oval ID: | oval:org.mitre.oval:def:27353 | ||
Title: | DEPRECATED: ELSA-2013-0770 -- java-1.6.0-openjdk security update (important) | ||
Description: | [1:1.6.0.0-1.61.1.11.11] - added and applied (temporally) patch10 fixToFontSecurityFix.patch. - fixing regression in fonts introduced by one security patch. - Resolves: rhbz#950386 [1:1.6.0.0-1.60.1.11.11] - added and applied (temporally) one more patch to xalan/xerces privileges - patch9 jaxp-backport-factoryfinder.patch - will be upstreamed - Resolves: rhbz#950386 [1:1.6.0.0-1.59.1.11.11] - Updated to icedtea6 1.11.11 - fixed xalan/xerxes privledges - removed patch 8 - removingOfAarch64.patch.patch - fixed upstream - Resolves: rhbz#950386 [1:1.6.0.0-1.58.1.11.10] - Updated to icedtea6 1.11.10 - rewritten java-1.6.0-openjdk-java-access-bridge-security.patch - excluded aarch64.patch - by patch 8 - removingOfAarch64.patch.patch - Resolves: rhbz#950386 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0770 CVE-2013-2420 CVE-2013-2422 CVE-2013-2429 CVE-2013-2431 CVE-2013-1537 CVE-2013-2419 CVE-2013-2421 CVE-2013-2424 CVE-2013-2426 CVE-2013-2430 CVE-2013-0401 CVE-2013-1518 CVE-2013-2383 CVE-2013-1488 CVE-2013-1558 CVE-2013-1569 CVE-2013-2417 CVE-2013-1557 CVE-2013-2384 CVE-2013-2415 | Version: | 4 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | java-1.6.0-openjdk |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27374 | |||
Oval ID: | oval:org.mitre.oval:def:27374 | ||
Title: | DEPRECATED: ELSA-2012-0475 -- tomcat6 security update (moderate) | ||
Description: | [0:6.0.24-36] - Resolves: CVE-2012-0022 regression. Changes made to patch file. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012-0475 CVE-2011-4858 CVE-2012-0022 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27382 | |||
Oval ID: | oval:org.mitre.oval:def:27382 | ||
Title: | DEPRECATED: ELSA-2013-0219 -- mysql security update (moderate) | ||
Description: | [5.1.67-1] - Update to 5.1.67, for assorted upstream bugfixes including CVEs announced in January 2013 Resolves: #901380 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0219 CVE-2012-0572 CVE-2012-0574 CVE-2012-1702 CVE-2012-1705 CVE-2013-0375 CVE-2013-0383 CVE-2013-0384 CVE-2013-0385 CVE-2013-0389 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | mysql |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27670 | |||
Oval ID: | oval:org.mitre.oval:def:27670 | ||
Title: | DEPRECATED: ELSA-2013-0180 -- mysql security update (important) | ||
Description: | [5.0.95-5] - Rebuild to fix wrong package tag Related: #892679 [5.0.95-4] - Add patches for CVE-2012-2122, CVE-2012-2749, CVE-2012-5611 Resolves: #892679 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0180 CVE-2012-2749 CVE-2012-5611 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | mysql |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27873 | |||
Oval ID: | oval:org.mitre.oval:def:27873 | ||
Title: | DEPRECATED: ELSA-2012-0324 -- libxml2 security update (moderate) | ||
Description: | [2.7.6-4.0.1.el6_2.4] - Update doc/redhat.gif in tarball - Add libxml2-oracle-enterprise.patch and update logos in tarball [2.7.6-4.el6_2.4] - remove chunk in patch related to configure.in as it breaks rebuild - Resolves: rhbz#788845 [2.7.6-4.el6_2.3] - fix previous build to force compilation of randomization code - Resolves: rhbz#788845 [2.7.6-4.el6_2.2] - adds randomization to hash and dict structures CVE-2012-0841 - Resolves: rhbz#788845 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012-0324 CVE-2012-0841 | Version: | 4 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | libxml2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27894 | |||
Oval ID: | oval:org.mitre.oval:def:27894 | ||
Title: | DEPRECATED: ELSA-2012-0128 -- httpd security update (moderate) | ||
Description: | [2.2.15-15.0.1.el6_2.1] - replace index.html with Oracle's index page oracle_index.html update vstring in specfile [2.2.15-15.1] - add security fixes for CVE-2011-4317, CVE-2012-0053, CVE-2012-0031, CVE-2011-3607 (#787598) - obviates fix for CVE-2011-3638, patch removed | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012-0128 CVE-2011-3607 CVE-2011-3639 CVE-2011-4317 CVE-2012-0031 CVE-2012-0053 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27980 | |||
Oval ID: | oval:org.mitre.oval:def:27980 | ||
Title: | DEPRECATED: ELSA-2010-0659 -- httpd security and bug fix update (moderate) | ||
Description: | [2.2.3-43.0.1.el5_5.3 ] - replace index.html with Oracle's index page oracle_index.html - update vstring and distro in specfile [2.2.3-43.3] - mod_ssl: improved fix for SSLRequire's OID() function (#625452) [2.2.3-43.2] - add security fixes for CVE-2010-1452, CVE-2010-2791 (#623210) - mod_deflate: rebase to 2.2.15 (#625435) - stop multiple invocations of filter init functions (#625451) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010-0659 CVE-2010-1452 CVE-2010-2791 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | httpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28122 | |||
Oval ID: | oval:org.mitre.oval:def:28122 | ||
Title: | DEPRECATED: ELSA-2011-1391 -- httpd security and bug fix update (moderate) | ||
Description: | [2.2.15-9.0.1.el6_1.3] - replace index.html with Oracle's index page - update vstring in specfile [2.2.15-9.3] - add security fixes for CVE-2011-3347, CVE-2011-3368 (#743901) - fix regressions in CVE-2011-3192 patch (#736592) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-1391 CVE-2011-3348 CVE-2011-3368 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:29299 | |||
Oval ID: | oval:org.mitre.oval:def:29299 | ||
Title: | RHSA-2009:1107 -- apr-util security update (Moderate) | ||
Description: | Updated apr-util packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. apr-util is a utility library used with the Apache Portable Runtime (APR). It aims to provide a free library of C data structures and routines. This library contains additional utility interfaces for APR; including support for XML, LDAP, database interfaces, URI parsing, and more. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2009:1107 CESA-2009:1107-CentOS 5 CVE-2009-0023 CVE-2009-1955 CVE-2009-1956 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 4 CentOS Linux 5 | Product(s): | apr-util |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6931 | |||
Oval ID: | oval:org.mitre.oval:def:6931 | ||
Title: | Apache 'mod_proxy_http' Timeout Detection Vulnerability | ||
Description: | mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2068 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows 7 | Product(s): | Apache |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:8194 | |||
Oval ID: | oval:org.mitre.oval:def:8194 | ||
Title: | DSA-1812 apr-util -- denial of service | ||
Description: | Apr-util, the Apache Portable Runtime Utility library, is used by Apache 2.x, Subversion, and other applications. Two denial of service vulnerabilities have been found in apr-util: "kcope" discovered a flaw in the handling of internal XML entities in the apr_xml_* interface that can be exploited to use all available memory. This denial of service can be triggered remotely in the Apache mod_dav and mod_dav_svn modules. (No CVE id yet) Matthew Palmer discovered an underflow flaw in the apr_strmatch_precompile function that can be exploited to cause a daemon crash. The vulnerability can be triggered (1) remotely in mod_dav_svn for Apache if the "SVNMasterURI" directive is in use, (2) remotely in mod_apreq2 for Apache or other applications using libapreq2, or (3) locally in Apache by a crafted ".htaccess" file. Other exploit paths in other applications using apr-util may exist. If you use Apache, or if you use svnserver in standalone mode, you need to restart the services after you upgraded the libaprutil1 package. The oldstable distribution (etch), these problems have been fixed in version 1.2.7+dfsg-2+etch2. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1812 CVE-2009-0023 | Version: | 3 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 4.0 | Product(s): | apr-util |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:8261 | |||
Oval ID: | oval:org.mitre.oval:def:8261 | ||
Title: | Apache 'mod_proxy_ajp' Information Disclosure Vulnerability | ||
Description: | mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-1191 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows 7 | Product(s): | Apache |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:8616 | |||
Oval ID: | oval:org.mitre.oval:def:8616 | ||
Title: | Apache 'mod_proxy' Remote Denial Of Service Vulnerability | ||
Description: | The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-1890 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows 7 | Product(s): | Apache |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:8619 | |||
Oval ID: | oval:org.mitre.oval:def:8619 | ||
Title: | Apache mod_proxy_ajp Module Incoming Request Body Denial Of Service Vulnerability | ||
Description: | The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0408 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows 7 | Product(s): | Apache |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:9403 | |||
Oval ID: | oval:org.mitre.oval:def:9403 | ||
Title: | The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests. | ||
Description: | The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1890 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:9935 | |||
Oval ID: | oval:org.mitre.oval:def:9935 | ||
Title: | The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code. | ||
Description: | The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0408 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Oracle WebCenter Capture ActiveX SetAnnotationFont buffer overflow | More info here |
Oracle AutoVue SetMarkupMode ActiveX Overflow | More info here |
Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Control Vulnerability | More info here |
Oracle WebCenter Forms Recognition SSSplitter ActiveX Overwrite | More info here |
ExploitDB Exploits
id | Description |
---|---|
2014-02-18 | Oracle Forms and Reports Remote Code Execution |
2014-01-29 | Oracle Forms and Reports 11.1 - Remote Exploit |
2013-04-18 | Oracle WebCenter Sites Satellite Server - HTTP Header Injection |
2013-01-16 | Oracle Application Framework Diagnostic Mode Bypass Vulnerability |
2012-10-17 | Oracle WebCenter Sites (FatWire Content Server) Multiple Vulnerabilities |
2012-01-03 | PHP Hash Table Collision Proof Of Concept |
2012-01-01 | PHP Hashtables Denial of Service |
2011-12-09 | Apache HTTP Server Denial of Service |
2011-10-11 | Apache mod_proxy Reverse Proxy Exposure Vulnerability PoC |
OpenVAS Exploits
Date | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2581-1 (mysql-5.1 - several vulnerabilities) File : nvt/deb_2581_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2594-1 (virtualbox-ose - programming error) File : nvt/deb_2594_1.nasl |
2012-12-26 | Name : Fedora Update for mysql FEDORA-2012-19823 File : nvt/gb_fedora_2012_19823_mysql_fc16.nasl |
2012-12-26 | Name : Mandriva Update for apache-mod_security MDVSA-2012:182 (apache-mod_security) File : nvt/gb_mandriva_MDVSA_2012_182.nasl |
2012-12-18 | Name : Fedora Update for xen FEDORA-2012-19828 File : nvt/gb_fedora_2012_19828_xen_fc16.nasl |
2012-12-18 | Name : Fedora Update for mysql FEDORA-2012-19833 File : nvt/gb_fedora_2012_19833_mysql_fc17.nasl |
2012-12-14 | Name : Fedora Update for xen FEDORA-2012-19717 File : nvt/gb_fedora_2012_19717_xen_fc17.nasl |
2012-12-13 | Name : SuSE Update for update openSUSE-SU-2012:0426-1 (update) File : nvt/gb_suse_2012_0426_1.nasl |
2012-12-13 | Name : SuSE Update for java-1_6_0-openjdk openSUSE-SU-2012:0828-1 (java-1_6_0-openjdk) File : nvt/gb_suse_2012_0828_1.nasl |
2012-12-13 | Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen) File : nvt/gb_suse_2012_0886_1.nasl |
2012-12-13 | Name : SuSE Update for java-1_6_0-openjdk openSUSE-SU-2012:1423-1 (java-1_6_0-openjdk) File : nvt/gb_suse_2012_1423_1.nasl |
2012-12-13 | Name : SuSE Update for java-1_6_0-openjdk openSUSE-SU-2012:1424-1 (java-1_6_0-openjdk) File : nvt/gb_suse_2012_1424_1.nasl |
2012-12-12 | Name : MS Exchange Server Remote Code Execution Vulnerabilities (2784126) File : nvt/secpod_ms12-080.nasl |
2012-12-11 | Name : Ubuntu Update for mysql-5.5 USN-1658-1 File : nvt/gb_ubuntu_USN_1658_1.nasl |
2012-12-10 | Name : CentOS Update for mysql CESA-2012:1551 centos6 File : nvt/gb_CESA-2012_1551_mysql_centos6.nasl |
2012-12-10 | Name : RedHat Update for mysql RHSA-2012:1551-01 File : nvt/gb_RHSA-2012_1551-01_mysql.nasl |
2012-12-10 | Name : Mandriva Update for mysql MDVSA-2012:178 (mysql) File : nvt/gb_mandriva_MDVSA_2012_178.nasl |
2012-11-26 | Name : Oracle MySQL Server Multiple Vulnerabilities-01 Nov12 (Windows) File : nvt/gb_oracle_mysql_multiple_vuln01_nov12_win.nasl |
2012-11-26 | Name : Oracle MySQL Server Multiple Vulnerabilities-02 Nov12 (Windows) File : nvt/gb_oracle_mysql_multiple_vuln02_nov12_win.nasl |
2012-11-26 | Name : Oracle MySQL Server Multiple Vulnerabilities-03 Nov12 (Windows) File : nvt/gb_oracle_mysql_multiple_vuln03_nov12_win.nasl |
2012-11-26 | Name : Oracle MySQL Server Multiple Vulnerabilities-04 Nov12 (Windows) File : nvt/gb_oracle_mysql_multiple_vuln04_nov12_win.nasl |
2012-11-26 | Name : Oracle MySQL Server Multiple Vulnerability-05 Nov12 (Windows) File : nvt/gb_oracle_mysql_multiple_vuln05_nov12_win.nasl |
2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18242 File : nvt/gb_fedora_2012_18242_xen_fc17.nasl |
2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18249 File : nvt/gb_fedora_2012_18249_xen_fc16.nasl |
2012-11-15 | Name : CentOS Update for mysql CESA-2012:1462 centos6 File : nvt/gb_CESA-2012_1462_mysql_centos6.nasl |
2012-11-15 | Name : RedHat Update for mysql RHSA-2012:1462-01 File : nvt/gb_RHSA-2012_1462-01_mysql.nasl |
2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17204 File : nvt/gb_fedora_2012_17204_xen_fc17.nasl |
2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17408 File : nvt/gb_fedora_2012_17408_xen_fc16.nasl |
2012-11-06 | Name : Ubuntu Update for mysql-5.5 USN-1621-1 File : nvt/gb_ubuntu_USN_1621_1.nasl |
2012-11-02 | Name : Mandriva Update for java-1.6.0-openjdk MDVSA-2012:169 (java-1.6.0-openjdk) File : nvt/gb_mandriva_MDVSA_2012_169.nasl |
2012-10-29 | Name : Ubuntu Update for openjdk-7 USN-1619-1 File : nvt/gb_ubuntu_USN_1619_1.nasl |
2012-10-25 | Name : Oracle GlassFish/Java System Application Server CORBA ORB Subcomponent DoS Vu... File : nvt/secpod_oracle_glassfish_n_sjas_corba_orb_comp_dos_vuln.nasl |
2012-10-19 | Name : CentOS Update for java CESA-2012:1384 centos6 File : nvt/gb_CESA-2012_1384_java_centos6.nasl |
2012-10-19 | Name : CentOS Update for java CESA-2012:1385 centos5 File : nvt/gb_CESA-2012_1385_java_centos5.nasl |
2012-10-19 | Name : CentOS Update for java CESA-2012:1386 centos6 File : nvt/gb_CESA-2012_1386_java_centos6.nasl |
2012-10-19 | Name : RedHat Update for java-1.6.0-openjdk RHSA-2012:1384-01 File : nvt/gb_RHSA-2012_1384-01_java-1.6.0-openjdk.nasl |
2012-10-19 | Name : RedHat Update for java-1.6.0-openjdk RHSA-2012:1385-01 File : nvt/gb_RHSA-2012_1385-01_java-1.6.0-openjdk.nasl |
2012-10-19 | Name : RedHat Update for java-1.7.0-openjdk RHSA-2012:1386-01 File : nvt/gb_RHSA-2012_1386-01_java-1.7.0-openjdk.nasl |
2012-10-19 | Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-16351 File : nvt/gb_fedora_2012_16351_java-1.6.0-openjdk_fc16.nasl |
2012-10-19 | Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-16351 File : nvt/gb_fedora_2012_16351_java-1.7.0-openjdk_fc16.nasl |
2012-10-19 | Name : Oracle Java SE JRE Multiple Unspecified Vulnerabilities-02 oct12 (Windows) File : nvt/gb_oracle_java_se_mult_vuln02_oct12_win.nasl |
2012-10-19 | Name : Oracle VM VirtualBox Unspecified Denial of Service Vulnerability (Mac OS X) File : nvt/gb_oracle_virtualbox_unspecified_dos_vuln_macosx.nasl |
2012-10-19 | Name : Oracle VM VirtualBox Unspecified Denial of Service Vulnerability (Windows) File : nvt/gb_oracle_virtualbox_unspecified_dos_vuln_win.nasl |
2012-10-10 | Name : Microsoft FAST Search Server 2010 for SharePoint RCE Vulnerabilities (2742321) File : nvt/secpod_ms12-067.nasl |
2012-10-03 | Name : Fedora Update for libxml2 FEDORA-2012-13824 File : nvt/gb_fedora_2012_13824_libxml2_fc16.nasl |
2012-09-27 | Name : Fedora Update for libxml2 FEDORA-2012-13820 File : nvt/gb_fedora_2012_13820_libxml2_fc17.nasl |
2012-09-26 | Name : Gentoo Security Advisory GLSA 201209-03 (php) File : nvt/glsa_201209_03.nasl |
2012-09-25 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004) File : nvt/gb_macosx_su12-004.nasl |
2012-09-22 | Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-13127 File : nvt/gb_fedora_2012_13127_java-1.6.0-openjdk_fc16.nasl |
2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13434 File : nvt/gb_fedora_2012_13434_xen_fc17.nasl |
2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13443 File : nvt/gb_fedora_2012_13443_xen_fc16.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2011-133-01 apr/apr-util File : nvt/esoft_slk_ssa_2011_133_01.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2011-252-01 httpd File : nvt/esoft_slk_ssa_2011_252_01.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2011-284-01 httpd File : nvt/esoft_slk_ssa_2011_284_01.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2012-041-01 httpd File : nvt/esoft_slk_ssa_2012_041_01.nasl |
2012-09-06 | Name : Ubuntu Update for icedtea-web USN-1505-2 File : nvt/gb_ubuntu_USN_1505_2.nasl |
2012-09-04 | Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-13138 File : nvt/gb_fedora_2012_13138_java-1.7.0-openjdk_fc16.nasl |
2012-08-31 | Name : VMSA-2012-0013 VMware vSphere and vCOps updates to third party libraries. File : nvt/gb_VMSA-2012-0013.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11182 File : nvt/gb_fedora_2012_11182_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11755 File : nvt/gb_fedora_2012_11755_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-2595 File : nvt/gb_fedora_2012_2595_java-1.7.0-openjdk_fc17.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-9386 File : nvt/gb_fedora_2012_9386_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-9590 File : nvt/gb_fedora_2012_9590_java-1.7.0-openjdk_fc17.nasl |
2012-08-24 | Name : Fedora Update for xen FEDORA-2012-11785 File : nvt/gb_fedora_2012_11785_xen_fc16.nasl |
2012-08-23 | Name : Oracle Java SE Java Runtime Environment Multiple Unspecified Vulnerabilities(... File : nvt/gb_oracle_java_se_mult_unspecified_vuln02_aug12_win.nasl |
2012-08-22 | Name : Oracle Java SE Java Runtime Environment Multiple Unspecified Vulnerabilities ... File : nvt/gb_oracle_java_se_mult_unspecified_vuln_aug12_win.nasl |
2012-08-15 | Name : MS Exchange Server WebReady Document Viewing Remote Code Execution Vulnerabil... File : nvt/secpod_ms12-058.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2496-1 (mysql-5.1) File : nvt/deb_2496_1.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2501-1 (xen) File : nvt/deb_2501_1.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2506-1 (libapache-mod-security) File : nvt/deb_2506_1.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2507-1 (openjdk-6) File : nvt/deb_2507_1.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2508-1 (kfreebsd-8) File : nvt/deb_2508_1.nasl |
2012-08-10 | Name : FreeBSD Ports: FreeBSD File : nvt/freebsd_FreeBSD16.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-24 (apache tomcat) File : nvt/glsa_201206_24.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-25 (apache) File : nvt/glsa_201206_25.nasl |
2012-08-07 | Name : Oracle GlassFish Server Expression Evaluation Security Bypass Vulnerability File : nvt/gb_oracle_glassfish_exprn_eval_sec_bypass_vuln.nasl |
2012-08-06 | Name : Fedora Update for xen FEDORA-2012-11190 File : nvt/gb_fedora_2012_11190_xen_fc16.nasl |
2012-08-03 | Name : Mandriva Update for php MDVSA-2012:065 (php) File : nvt/gb_mandriva_MDVSA_2012_065.nasl |
2012-08-03 | Name : Mandriva Update for tomcat5 MDVSA-2012:085 (tomcat5) File : nvt/gb_mandriva_MDVSA_2012_085.nasl |
2012-08-03 | Name : Mandriva Update for java-1.6.0-openjdk MDVSA-2012:095 (java-1.6.0-openjdk) File : nvt/gb_mandriva_MDVSA_2012_095.nasl |
2012-08-02 | Name : SuSE Update for kernel openSUSE-SU-2012:0206-1 (kernel) File : nvt/gb_suse_2012_0206_1.nasl |
2012-08-02 | Name : SuSE Update for kernel openSUSE-SU-2012:0236-1 (kernel) File : nvt/gb_suse_2012_0236_1.nasl |
2012-08-02 | Name : SuSE Update for java-1_6_0-openjdk openSUSE-SU-2012:0309-1 (java-1_6_0-openjdk) File : nvt/gb_suse_2012_0309_1.nasl |
2012-08-02 | Name : SuSE Update for apache2 openSUSE-SU-2012:0314-1 (apache2) File : nvt/gb_suse_2012_0314_1.nasl |
2012-07-30 | Name : CentOS Update for apr CESA-2011:0507 centos4 x86_64 File : nvt/gb_CESA-2011_0507_apr_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for apr CESA-2011:0507 centos5 x86_64 File : nvt/gb_CESA-2011_0507_apr_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for apr CESA-2011:0844 centos4 x86_64 File : nvt/gb_CESA-2011_0844_apr_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for apr CESA-2011:0844 centos5 x86_64 File : nvt/gb_CESA-2011_0844_apr_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for httpd CESA-2011:1245 centos4 x86_64 File : nvt/gb_CESA-2011_1245_httpd_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for kernel CESA-2011:1386 centos5 x86_64 File : nvt/gb_CESA-2011_1386_kernel_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for httpd CESA-2011:1392 centos4 x86_64 File : nvt/gb_CESA-2011_1392_httpd_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for httpd CESA-2011:1392 centos5 x86_64 File : nvt/gb_CESA-2011_1392_httpd_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for php53 CESA-2012:0019 centos5 File : nvt/gb_CESA-2012_0019_php53_centos5.nasl |
2012-07-30 | Name : CentOS Update for php CESA-2012:0019 centos6 File : nvt/gb_CESA-2012_0019_php_centos6.nasl |
2012-07-30 | Name : CentOS Update for php CESA-2012:0033 centos5 File : nvt/gb_CESA-2012_0033_php_centos5.nasl |
2012-07-30 | Name : CentOS Update for php CESA-2012:0071 centos4 File : nvt/gb_CESA-2012_0071_php_centos4.nasl |
2012-07-30 | Name : CentOS Update for php53 CESA-2012:0092 centos5 File : nvt/gb_CESA-2012_0092_php53_centos5.nasl |
2012-07-30 | Name : CentOS Update for php CESA-2012:0093 centos4 File : nvt/gb_CESA-2012_0093_php_centos4.nasl |
2012-07-30 | Name : CentOS Update for php CESA-2012:0093 centos5 File : nvt/gb_CESA-2012_0093_php_centos5.nasl |
2012-07-30 | Name : CentOS Update for php CESA-2012:0093 centos6 File : nvt/gb_CESA-2012_0093_php_centos6.nasl |
2012-07-30 | Name : CentOS Update for httpd CESA-2012:0128 centos6 File : nvt/gb_CESA-2012_0128_httpd_centos6.nasl |
2012-07-30 | Name : CentOS Update for java CESA-2012:0135 centos6 File : nvt/gb_CESA-2012_0135_java_centos6.nasl |
2012-07-30 | Name : CentOS Update for libxml2 CESA-2012:0324 centos6 File : nvt/gb_CESA-2012_0324_libxml2_centos6.nasl |
2012-07-30 | Name : CentOS Update for tomcat5 CESA-2012:0474 centos5 File : nvt/gb_CESA-2012_0474_tomcat5_centos5.nasl |
2012-07-30 | Name : CentOS Update for tomcat6 CESA-2012:0475 centos6 File : nvt/gb_CESA-2012_0475_tomcat6_centos6.nasl |
2012-07-30 | Name : CentOS Update for kernel CESA-2012:0721 centos5 File : nvt/gb_CESA-2012_0721_kernel_centos5.nasl |
2012-07-30 | Name : CentOS Update for java CESA-2012:0729 centos6 File : nvt/gb_CESA-2012_0729_java_centos6.nasl |
2012-07-30 | Name : CentOS Update for java CESA-2012:0730 centos5 File : nvt/gb_CESA-2012_0730_java_centos5.nasl |
2012-07-30 | Name : CentOS Update for java CESA-2012:1009 centos6 File : nvt/gb_CESA-2012_1009_java_centos6.nasl |
2012-07-16 | Name : Ubuntu Update for openjdk-6 USN-1505-1 File : nvt/gb_ubuntu_USN_1505_1.nasl |
2012-07-13 | Name : VMSA-2012-0012 VMware ESXi update addresses several security issues. File : nvt/gb_VMSA-2012-0012.nasl |
2012-07-09 | Name : RedHat Update for httpd RHSA-2011:1391-01 File : nvt/gb_RHSA-2011_1391-01_httpd.nasl |
2012-07-09 | Name : RedHat Update for kernel RHSA-2011:1465-01 File : nvt/gb_RHSA-2011_1465-01_kernel.nasl |
2012-07-09 | Name : RedHat Update for httpd RHSA-2012:0128-01 File : nvt/gb_RHSA-2012_0128-01_httpd.nasl |
2012-07-09 | Name : RedHat Update for java-1.6.0-openjdk RHSA-2012:0135-01 File : nvt/gb_RHSA-2012_0135-01_java-1.6.0-openjdk.nasl |
2012-07-09 | Name : RedHat Update for tomcat6 RHSA-2012:0475-01 File : nvt/gb_RHSA-2012_0475-01_tomcat6.nasl |
2012-06-29 | Name : Oracle iPlanet Web Server Multiple Cross Site Scripting Vulnerabilities File : nvt/secpod_oracle_iplanet_web_server_xss_vuln.nasl |
2012-06-28 | Name : Fedora Update for xen FEDORA-2012-9399 File : nvt/gb_fedora_2012_9399_xen_fc16.nasl |
2012-06-28 | Name : Fedora Update for xen FEDORA-2012-9430 File : nvt/gb_fedora_2012_9430_xen_fc15.nasl |
2012-06-22 | Name : RedHat Update for java-1.7.0-openjdk RHSA-2012:1009-01 File : nvt/gb_RHSA-2012_1009-01_java-1.7.0-openjdk.nasl |
2012-06-19 | Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-9541 File : nvt/gb_fedora_2012_9541_java-1.6.0-openjdk_fc15.nasl |
2012-06-19 | Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-9545 File : nvt/gb_fedora_2012_9545_java-1.6.0-openjdk_fc16.nasl |
2012-06-19 | Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-9593 File : nvt/gb_fedora_2012_9593_java-1.7.0-openjdk_fc16.nasl |
2012-06-15 | Name : RedHat Update for kernel RHSA-2012:0721-01 File : nvt/gb_RHSA-2012_0721-01_kernel.nasl |
2012-06-15 | Name : RedHat Update for java-1.6.0-openjdk RHSA-2012:0729-01 File : nvt/gb_RHSA-2012_0729-01_java-1.6.0-openjdk.nasl |
2012-06-15 | Name : RedHat Update for java-1.6.0-openjdk RHSA-2012:0730-01 File : nvt/gb_RHSA-2012_0730-01_java-1.6.0-openjdk.nasl |
2012-06-14 | Name : PHP versoin < 5.3.9 File : nvt/nopsec_php_5_3_9.nasl |
2012-06-13 | Name : Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167) File : nvt/secpod_ms12-042.nasl |
2012-05-31 | Name : Debian Security Advisory DSA 2472-1 (gridengine) File : nvt/deb_2472_1.nasl |
2012-05-18 | Name : Mac OS X Multiple Vulnerabilities (2012-002) File : nvt/gb_macosx_su12-002.nasl |
2012-05-07 | Name : Oracle GlassFish Server Multiple XSS and CSRF Vulnerabilities File : nvt/gb_oracle_glassfish_server_mult_vuln.nasl |
2012-04-26 | Name : Apache HTTP Server 'httpOnly' Cookie Information Disclosure Vulnerability File : nvt/secpod_apache_http_srv_cookie_info_disc_vuln.nasl |
2012-04-13 | Name : RedHat Update for tomcat5 RHSA-2012:0474-01 File : nvt/gb_RHSA-2012_0474-01_tomcat5.nasl |
2012-04-09 | Name : Java Runtime Environment Multiple Vulnerabilities (MAC OS X) File : nvt/gb_jre_mult_vuln_macosx.nasl |
2012-04-02 | Name : Fedora Update for httpd FEDORA-2011-12667 File : nvt/gb_fedora_2011_12667_httpd_fc16.nasl |
2012-04-02 | Name : Fedora Update for opensaml FEDORA-2011-12815 File : nvt/gb_fedora_2011_12815_opensaml_fc16.nasl |
2012-04-02 | Name : Fedora Update for maniadrive FEDORA-2012-0504 File : nvt/gb_fedora_2012_0504_maniadrive_fc16.nasl |
2012-04-02 | Name : Fedora Update for php FEDORA-2012-0504 File : nvt/gb_fedora_2012_0504_php_fc16.nasl |
2012-04-02 | Name : Fedora Update for maniadrive FEDORA-2012-1262 File : nvt/gb_fedora_2012_1262_maniadrive_fc16.nasl |
2012-04-02 | Name : Fedora Update for php FEDORA-2012-1262 File : nvt/gb_fedora_2012_1262_php_fc16.nasl |
2012-04-02 | Name : Fedora Update for httpd FEDORA-2012-1598 File : nvt/gb_fedora_2012_1598_httpd_fc16.nasl |
2012-04-02 | Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-1690 File : nvt/gb_fedora_2012_1690_java-1.7.0-openjdk_fc16.nasl |
2012-04-02 | Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-1711 File : nvt/gb_fedora_2012_1711_java-1.6.0-openjdk_fc16.nasl |
2012-03-19 | Name : Fedora Update for php-eaccelerator FEDORA-2012-0504 File : nvt/gb_fedora_2012_0504_php-eaccelerator_fc16.nasl |
2012-03-19 | Name : Fedora Update for php-eaccelerator FEDORA-2012-1262 File : nvt/gb_fedora_2012_1262_php-eaccelerator_fc16.nasl |
2012-03-16 | Name : VMSA-2012-0005 VMware vCenter Server, Orchestrator, Update Manager, vShield, ... File : nvt/gb_VMSA-2012-0005.nasl |
2012-03-12 | Name : Debian Security Advisory DSA 2417-1 (libxml2) File : nvt/deb_2417_1.nasl |
2012-03-12 | Name : Debian Security Advisory DSA 2420-1 (openjdk-6) File : nvt/deb_2420_1.nasl |
2012-03-12 | Name : Gentoo Security Advisory GLSA 201203-04 (libxml2) File : nvt/glsa_201203_04.nasl |
2012-03-09 | Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-1721 File : nvt/gb_fedora_2012_1721_java-1.6.0-openjdk_fc15.nasl |
2012-03-09 | Name : Ubuntu Update for openjdk-6 USN-1373-1 File : nvt/gb_ubuntu_USN_1373_1.nasl |
2012-03-07 | Name : Fedora Update for httpd FEDORA-2012-1642 File : nvt/gb_fedora_2012_1642_httpd_fc15.nasl |
2012-03-07 | Name : Fedora Update for apr FEDORA-2012-1656 File : nvt/gb_fedora_2012_1656_apr_fc15.nasl |
2012-03-07 | Name : Ubuntu Update for openjdk-6b18 USN-1373-2 File : nvt/gb_ubuntu_USN_1373_2.nasl |
2012-03-07 | Name : Ubuntu Update for libxml2 USN-1376-1 File : nvt/gb_ubuntu_USN_1376_1.nasl |
2012-02-27 | Name : RedHat Update for java-1.6.0-openjdk RHSA-2012:0322-01 File : nvt/gb_RHSA-2012_0322-01_java-1.6.0-openjdk.nasl |
2012-02-27 | Name : RedHat Update for httpd RHSA-2012:0323-01 File : nvt/gb_RHSA-2012_0323-01_httpd.nasl |
2012-02-27 | Name : RedHat Update for libxml2 RHSA-2012:0324-01 File : nvt/gb_RHSA-2012_0324-01_libxml2.nasl |
2012-02-21 | Name : Fedora Update for maniadrive FEDORA-2012-1301 File : nvt/gb_fedora_2012_1301_maniadrive_fc15.nasl |
2012-02-21 | Name : Fedora Update for php-eaccelerator FEDORA-2012-1301 File : nvt/gb_fedora_2012_1301_php-eaccelerator_fc15.nasl |
2012-02-21 | Name : Fedora Update for php FEDORA-2012-1301 File : nvt/gb_fedora_2012_1301_php_fc15.nasl |
2012-02-21 | Name : Mandriva Update for java-1.6.0-openjdk MDVSA-2012:021 (java-1.6.0-openjdk) File : nvt/gb_mandriva_MDVSA_2012_021.nasl |
2012-02-21 | Name : Oracle Java SE JDK Multiple Vulnerabilities - February 2012 (Windows - 01) File : nvt/gb_oracle_java_se_jdk_mult_vuln_feb12_win_01.nasl |
2012-02-21 | Name : Oracle Java SE JDK Multiple Vulnerabilities - February 2012 (Windows - 02) File : nvt/gb_oracle_java_se_jdk_mult_vuln_feb12_win_02.nasl |
2012-02-21 | Name : Oracle Java SE JDK Multiple Vulnerabilities - February 2012 (Windows - 03) File : nvt/gb_oracle_java_se_jdk_mult_vuln_feb12_win_03.nasl |
2012-02-21 | Name : Oracle Java SE JRE Multiple Vulnerabilities - February 2012 (Windows - 01) File : nvt/gb_oracle_java_se_mult_vuln_feb12_win_01.nasl |
2012-02-21 | Name : Oracle Java SE JRE Multiple Vulnerabilities - February 2012 (Windows - 02) File : nvt/gb_oracle_java_se_mult_vuln_feb12_win_02.nasl |
2012-02-21 | Name : Oracle Java SE JRE Multiple Vulnerabilities - February 2012 (Windows - 03) File : nvt/gb_oracle_java_se_mult_vuln_feb12_win_03.nasl |
2012-02-21 | Name : Ubuntu Update for php5 USN-1358-2 File : nvt/gb_ubuntu_USN_1358_2.nasl |
2012-02-21 | Name : Ubuntu Update for tomcat6 USN-1359-1 File : nvt/gb_ubuntu_USN_1359_1.nasl |
2012-02-21 | Name : Ubuntu Update for apache2 USN-1368-1 File : nvt/gb_ubuntu_USN_1368_1.nasl |
2012-02-13 | Name : Debian Security Advisory DSA 2405-1 (apache2) File : nvt/deb_2405_1.nasl |
2012-02-13 | Name : Ubuntu Update for php5 USN-1358-1 File : nvt/gb_ubuntu_USN_1358_1.nasl |
2012-02-12 | Name : Debian Security Advisory DSA 2399-1 (php5) File : nvt/deb_2399_1.nasl |
2012-02-12 | Name : Debian Security Advisory DSA 2399-2 (php5) File : nvt/deb_2399_2.nasl |
2012-02-12 | Name : Debian Security Advisory DSA 2401-1 (tomcat6) File : nvt/deb_2401_1.nasl |
2012-02-12 | Name : FreeBSD Ports: apache File : nvt/freebsd_apache20.nasl |
2012-02-12 | Name : FreeBSD Ports: php5 File : nvt/freebsd_php514.nasl |
2012-02-12 | Name : FreeBSD Ports: php5, php5-exif File : nvt/freebsd_php515.nasl |
2012-02-12 | Name : FreeBSD Ports: tomcat File : nvt/freebsd_tomcat0.nasl |
2012-02-11 | Name : Debian Security Advisory DSA 2359-1 (mojarra) File : nvt/deb_2359_1.nasl |
2012-02-03 | Name : RedHat Update for php53 RHSA-2012:0092-01 File : nvt/gb_RHSA-2012_0092-01_php53.nasl |
2012-02-03 | Name : RedHat Update for php RHSA-2012:0093-01 File : nvt/gb_RHSA-2012_0093-01_php.nasl |
2012-02-03 | Name : Mandriva Update for apache MDVSA-2012:012 (apache) File : nvt/gb_mandriva_MDVSA_2012_012.nasl |
2012-02-01 | Name : RedHat Update for php RHSA-2012:0071-01 File : nvt/gb_RHSA-2012_0071-01_php.nasl |
2012-02-01 | Name : Fedora Update for maniadrive FEDORA-2012-0420 File : nvt/gb_fedora_2012_0420_maniadrive_fc15.nasl |
2012-02-01 | Name : Fedora Update for php-eaccelerator FEDORA-2012-0420 File : nvt/gb_fedora_2012_0420_php-eaccelerator_fc15.nasl |
2012-02-01 | Name : Fedora Update for php FEDORA-2012-0420 File : nvt/gb_fedora_2012_0420_php_fc15.nasl |
2012-01-20 | Name : RedHat Update for php RHSA-2012:0033-01 File : nvt/gb_RHSA-2012_0033-01_php.nasl |
2012-01-20 | Name : Apache Tomcat Parameter Handling Denial of Service Vulnerability (Win) File : nvt/gb_apache_tomcat_parameter_handling_dos_vuln_win.nasl |
2012-01-13 | Name : RedHat Update for php53 and php RHSA-2012:0019-01 File : nvt/gb_RHSA-2012_0019-01_php53_and_php.nasl |
2012-01-13 | Name : Mandriva Update for apache MDVSA-2012:003 (apache) File : nvt/gb_mandriva_MDVSA_2012_003.nasl |
2012-01-05 | Name : Oracle GlassFish Server Hash Collision Denial of Service Vulnerability File : nvt/gb_glassfish_hash_collision_dos_vuln.nasl |
2012-01-03 | Name : PHP Web Form Hash Collision Denial of Service Vulnerability (Win) File : nvt/gb_php_web_form_hash_collision_dos_vuln_win.nasl |
2012-01-02 | Name : Mandriva Update for php MDVSA-2011:197 (php) File : nvt/gb_mandriva_MDVSA_2011_197.nasl |
2011-12-02 | Name : Fedora Update for kernel FEDORA-2011-16346 File : nvt/gb_fedora_2011_16346_kernel_fc14.nasl |
2011-11-15 | Name : CA Gateway Security Remote Code Execution Vulnerability File : nvt/gb_ca_gateway_security_remote_code_execution_vuln.nasl |
2011-11-11 | Name : CentOS Update for httpd CESA-2011:1392 centos4 i386 File : nvt/gb_CESA-2011_1392_httpd_centos4_i386.nasl |
2011-11-11 | Name : Mandriva Update for apache MDVSA-2011:168 (apache) File : nvt/gb_mandriva_MDVSA_2011_168.nasl |
2011-11-11 | Name : Ubuntu Update for linux USN-1253-1 File : nvt/gb_ubuntu_USN_1253_1.nasl |
2011-11-11 | Name : Ubuntu Update for linux-lts-backport-natty USN-1256-1 File : nvt/gb_ubuntu_USN_1256_1.nasl |
2011-11-11 | Name : Ubuntu Update for apache2 USN-1259-1 File : nvt/gb_ubuntu_USN_1259_1.nasl |
2011-11-08 | Name : Fedora Update for kernel FEDORA-2011-15241 File : nvt/gb_fedora_2011_15241_kernel_fc14.nasl |
2011-10-31 | Name : Fedora Update for kernel FEDORA-2011-14747 File : nvt/gb_fedora_2011_14747_kernel_fc14.nasl |
2011-10-31 | Name : Ubuntu Update for linux-ec2 USN-1239-1 File : nvt/gb_ubuntu_USN_1239_1.nasl |
2011-10-31 | Name : Ubuntu Update for linux-mvl-dove USN-1240-1 File : nvt/gb_ubuntu_USN_1240_1.nasl |
2011-10-31 | Name : Ubuntu Update for linux-mvl-dove USN-1245-1 File : nvt/gb_ubuntu_USN_1245_1.nasl |
2011-10-21 | Name : CentOS Update for kernel CESA-2011:1386 centos5 i386 File : nvt/gb_CESA-2011_1386_kernel_centos5_i386.nasl |
2011-10-21 | Name : CentOS Update for httpd CESA-2011:1392 centos5 i386 File : nvt/gb_CESA-2011_1392_httpd_centos5_i386.nasl |
2011-10-21 | Name : RedHat Update for kernel RHSA-2011:1386-01 File : nvt/gb_RHSA-2011_1386-01_kernel.nasl |
2011-10-21 | Name : RedHat Update for httpd RHSA-2011:1392-01 File : nvt/gb_RHSA-2011_1392-01_httpd.nasl |
2011-10-20 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2011-006) File : nvt/gb_macosx_su11-006.nasl |
2011-10-14 | Name : Ubuntu Update for linux USN-1227-1 File : nvt/gb_ubuntu_USN_1227_1.nasl |
2011-10-10 | Name : Fedora Update for kernel FEDORA-2011-12874 File : nvt/gb_fedora_2011_12874_kernel_fc14.nasl |
2011-10-10 | Name : Mandriva Update for apache MDVSA-2011:144 (apache) File : nvt/gb_mandriva_MDVSA_2011_144.nasl |
2011-10-10 | Name : Ubuntu Update for linux USN-1225-1 File : nvt/gb_ubuntu_USN_1225_1.nasl |
2011-09-30 | Name : Fedora Update for opensaml FEDORA-2011-12890 File : nvt/gb_fedora_2011_12890_opensaml_fc15.nasl |
2011-09-30 | Name : Ubuntu Update for linux-lts-backport-maverick USN-1219-1 File : nvt/gb_ubuntu_USN_1219_1.nasl |
2011-09-28 | Name : OpenSAML XML Signature Wrapping Security Vulnerability File : nvt/gb_ibm_websphere_48890.nasl |
2011-09-23 | Name : Ubuntu Update for linux USN-1211-1 File : nvt/gb_ubuntu_USN_1211_1.nasl |
2011-09-23 | Name : Ubuntu Update for linux-ti-omap4 USN-1212-1 File : nvt/gb_ubuntu_USN_1212_1.nasl |
2011-09-21 | Name : Debian Security Advisory DSA 2298-1 (apache2) File : nvt/deb_2298_1.nasl |
2011-09-21 | Name : Debian Security Advisory DSA 2298-2 (apache2) File : nvt/deb_2298_2.nasl |
2011-09-21 | Name : FreeBSD Ports: apache, apache-event, apache-itk, apache-peruser, apache-worker File : nvt/freebsd_apache18.nasl |
2011-09-16 | Name : RedHat Update for httpd RHSA-2011:1294-01 File : nvt/gb_RHSA-2011_1294-01_httpd.nasl |
2011-09-16 | Name : Fedora Update for httpd FEDORA-2011-12715 File : nvt/gb_fedora_2011_12715_httpd_fc15.nasl |
2011-09-16 | Name : Ubuntu Update for linux-ti-omap4 USN-1202-1 File : nvt/gb_ubuntu_USN_1202_1.nasl |
2011-09-16 | Name : Ubuntu Update for linux-fsl-imx51 USN-1204-1 File : nvt/gb_ubuntu_USN_1204_1.nasl |
2011-09-07 | Name : CentOS Update for httpd CESA-2011:1245 centos4 i386 File : nvt/gb_CESA-2011_1245_httpd_centos4_i386.nasl |
2011-09-07 | Name : RedHat Update for httpd RHSA-2011:1245-01 File : nvt/gb_RHSA-2011_1245-01_httpd.nasl |
2011-09-07 | Name : Mac OS X v10.6.4 Multiple Vulnerabilities (2010-007) File : nvt/gb_macosx_su10-007.nasl |
2011-09-07 | Name : Mandriva Update for apache MDVSA-2011:130 (apache) File : nvt/gb_mandriva_MDVSA_2011_130.nasl |
2011-09-07 | Name : Ubuntu Update for apache2 USN-1199-1 File : nvt/gb_ubuntu_USN_1199_1.nasl |
2011-08-27 | Name : Fedora Update for kernel FEDORA-2011-11103 File : nvt/gb_fedora_2011_11103_kernel_fc14.nasl |
2011-08-26 | Name : Apache httpd Web Server Range Header Denial of Service Vulnerability File : nvt/secpod_apache_http_srv_range_header_dos_vuln.nasl |
2011-08-26 | Name : Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001) File : nvt/secpod_macosx_su11-001.nasl |
2011-08-09 | Name : CentOS Update for apr-util CESA-2009:1107 centos5 i386 File : nvt/gb_CESA-2009_1107_apr-util_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for httpd CESA-2009:1108 centos3 i386 File : nvt/gb_CESA-2009_1108_httpd_centos3_i386.nasl |
2011-08-09 | Name : CentOS Update for httpd CESA-2009:1148 centos5 i386 File : nvt/gb_CESA-2009_1148_httpd_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for httpd CESA-2010:0168 centos5 i386 File : nvt/gb_CESA-2010_0168_httpd_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for apr CESA-2011:0507 centos4 i386 File : nvt/gb_CESA-2011_0507_apr_centos4_i386.nasl |
2011-08-09 | Name : CentOS Update for apr CESA-2011:0507 centos5 i386 File : nvt/gb_CESA-2011_0507_apr_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for apr CESA-2011:0844 centos5 i386 File : nvt/gb_CESA-2011_0844_apr_centos5_i386.nasl |
2011-08-07 | Name : Debian Security Advisory DSA 2284-1 (opensaml2) File : nvt/deb_2284_1.nasl |
2011-08-07 | Name : FreeBSD Ports: opensaml2 File : nvt/freebsd_opensaml2.nasl |
2011-08-03 | Name : Debian Security Advisory DSA 2237-1 (apr) File : nvt/deb_2237_1.nasl |
2011-08-03 | Name : Debian Security Advisory DSA 2237-2 (apr) File : nvt/deb_2237_2.nasl |
2011-08-03 | Name : FreeBSD Ports: apr1 File : nvt/freebsd_apr1.nasl |
2011-08-03 | Name : FreeBSD Ports: apr1 File : nvt/freebsd_apr10.nasl |
2011-07-12 | Name : Fedora Update for apr FEDORA-2011-6750 File : nvt/gb_fedora_2011_6750_apr_fc15.nasl |
2011-06-06 | Name : CentOS Update for apr CESA-2011:0844 centos4 i386 File : nvt/gb_CESA-2011_0844_apr_centos4_i386.nasl |
2011-06-06 | Name : RedHat Update for apr RHSA-2011:0844-01 File : nvt/gb_RHSA-2011_0844-01_apr.nasl |
2011-06-06 | Name : Fedora Update for apr FEDORA-2011-6918 File : nvt/gb_fedora_2011_6918_apr_fc14.nasl |
2011-06-06 | Name : Fedora Update for apr FEDORA-2011-7340 File : nvt/gb_fedora_2011_7340_apr_fc13.nasl |
2011-06-03 | Name : Mandriva Update for apr MDVSA-2011:095-1 (apr) File : nvt/gb_mandriva_MDVSA_2011_095_1.nasl |
2011-06-03 | Name : Ubuntu Update for apr USN-1134-1 File : nvt/gb_ubuntu_USN_1134_1.nasl |
2011-05-23 | Name : Mandriva Update for apr MDVSA-2011:095 (apr) File : nvt/gb_mandriva_MDVSA_2011_095.nasl |
2011-05-17 | Name : RedHat Update for apr RHSA-2011:0507-01 File : nvt/gb_RHSA-2011_0507-01_apr.nasl |
2011-05-17 | Name : Mandriva Update for apr MDVSA-2011:084 (apr) File : nvt/gb_mandriva_MDVSA_2011_084.nasl |
2011-01-04 | Name : HP-UX Update for Apache-based Web Server HPSBUX02612 File : nvt/gb_hp_ux_HPSBUX02612.nasl |
2010-10-19 | Name : Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosur... File : nvt/gb_apache_42102.nasl |
2010-09-07 | Name : RedHat Update for httpd RHSA-2010:0659-01 File : nvt/gb_RHSA-2010_0659-01_httpd.nasl |
2010-08-20 | Name : Mandriva Update for apache MDVSA-2010:153 (apache) File : nvt/gb_mandriva_MDVSA_2010_153.nasl |
2010-06-07 | Name : Fedora Update for httpd FEDORA-2010-6055 File : nvt/gb_fedora_2010_6055_httpd_fc12.nasl |
2010-06-07 | Name : HP-UX Update for Apache-based Web Server HPSBUX02531 File : nvt/gb_hp_ux_HPSBUX02531.nasl |
2010-05-12 | Name : Mac OS X 10.6.2 Update / Mac OS X Security Update 2009-006 File : nvt/macosx_upd_10_6_2_secupd_2009-006.nasl |
2010-05-07 | Name : Fedora Update for httpd FEDORA-2010-6131 File : nvt/gb_fedora_2010_6131_httpd_fc11.nasl |
2010-03-31 | Name : RedHat Update for httpd RHSA-2010:0168-01 File : nvt/gb_RHSA-2010_0168-01_httpd.nasl |
2010-03-12 | Name : Mandriva Update for apache MDVSA-2010:053 (apache) File : nvt/gb_mandriva_MDVSA_2010_053.nasl |
2010-03-12 | Name : Ubuntu Update for apache2 vulnerabilities USN-908-1 File : nvt/gb_ubuntu_USN_908_1.nasl |
2010-03-04 | Name : Apache Multiple Security Vulnerabilities File : nvt/gb_apache_38494.nasl |
2010-02-15 | Name : Mandriva Update for mmc-wizard MDVA-2010:053 (mmc-wizard) File : nvt/gb_mandriva_MDVA_2010_053.nasl |
2009-12-10 | Name : Mandriva Security Advisory MDVSA-2009:314 (apr) File : nvt/mdksa_2009_314.nasl |
2009-12-10 | Name : Mandriva Security Advisory MDVSA-2009:323 (apache) File : nvt/mdksa_2009_323.nasl |
2009-10-27 | Name : SLES10: Security update for Apache 2 File : nvt/sles10_apache21.nasl |
2009-10-27 | Name : SLES11: Security update for Apache 2 File : nvt/sles11_apache2.nasl |
2009-10-27 | Name : SLES9: Security update for Apache 2 File : nvt/sles9p5060942.nasl |
2009-10-27 | Name : SuSE Security Advisory SUSE-SA:2009:050 (apache2,libapr1) File : nvt/suse_sa_2009_050.nasl |
2009-10-13 | Name : SLES10: Security update for libapr-util1 File : nvt/sles10_libapr-util1.nasl |
2009-10-11 | Name : SLES11: Security update for libapr-util1 File : nvt/sles11_libapr-util1.nasl |
2009-09-10 | Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723) File : nvt/secpod_ms09-048.nasl |
2009-09-02 | Name : Fedora Core 11 FEDORA-2009-8812 (httpd) File : nvt/fcore_2009_8812.nasl |
2009-09-02 | Name : FreeBSD Ports: apache File : nvt/freebsd_apache15.nasl |
2009-09-02 | Name : Ubuntu USN-802-2 (apache2) File : nvt/ubuntu_802_2.nasl |
2009-08-17 | Name : Debian Security Advisory DSA 1834-2 (apache2) File : nvt/deb_1834_2.nasl |
2009-08-17 | Name : Fedora Core 10 FEDORA-2009-8318 (apr-util) File : nvt/fcore_2009_8318.nasl |
2009-08-17 | Name : Fedora Core 11 FEDORA-2009-8349 (apr-util) File : nvt/fcore_2009_8349.nasl |
2009-08-17 | Name : Mandrake Security Advisory MDVSA-2009:168 (apache) File : nvt/mdksa_2009_168.nasl |
2009-08-17 | Name : SuSE Security Summary SUSE-SR:2009:013 File : nvt/suse_sr_2009_013.nasl |
2009-07-29 | Name : RedHat Security Advisory RHSA-2009:1148 File : nvt/RHSA_2009_1148.nasl |
2009-07-29 | Name : RedHat Security Advisory RHSA-2009:1156 File : nvt/RHSA_2009_1156.nasl |
2009-07-29 | Name : Debian Security Advisory DSA 1834-1 (apache2) File : nvt/deb_1834_1.nasl |
2009-07-29 | Name : Gentoo Security Advisory GLSA 200907-04 (apache) File : nvt/glsa_200907_04.nasl |
2009-07-29 | Name : Mandrake Security Advisory MDVSA-2009:149 (apache) File : nvt/mdksa_2009_149.nasl |
2009-07-29 | Name : CentOS Security Advisory CESA-2009:1148 (httpd) File : nvt/ovcesa2009_1148.nasl |
2009-07-29 | Name : Ubuntu USN-799-1 (dbus) File : nvt/ubuntu_799_1.nasl |
2009-07-29 | Name : Ubuntu USN-801-1 (tiff) File : nvt/ubuntu_801_1.nasl |
2009-07-29 | Name : Ubuntu USN-802-1 (apache2) File : nvt/ubuntu_802_1.nasl |
2009-07-07 | Name : Apache 'mod_proxy_http.c' Denial Of Service Vulnerability File : nvt/gb_apache_mod_proxy_dos_vuln.nasl |
2009-07-06 | Name : Gentoo Security Advisory GLSA 200907-03 (apr-util) File : nvt/glsa_200907_03.nasl |
2009-06-30 | Name : Fedora Core 10 FEDORA-2009-5969 (apr-util) File : nvt/fcore_2009_5969.nasl |
2009-06-30 | Name : Fedora Core 9 FEDORA-2009-6014 (apr-util) File : nvt/fcore_2009_6014.nasl |
2009-06-30 | Name : Fedora Core 11 FEDORA-2009-6261 (apr-util) File : nvt/fcore_2009_6261.nasl |
2009-06-24 | Name : Apache APR-Utils Multiple Denial of Service Vulnerabilities File : nvt/secpod_apache_apr-utils_mult_dos_vuln_jun09.nasl |
2009-06-24 | Name : Apache APR-Utils XML Parser Denial of Service Vulnerability File : nvt/secpod_apache_apr-utils_xml_dos_vuln.nasl |
2009-06-23 | Name : RedHat Security Advisory RHSA-2009:1107 File : nvt/RHSA_2009_1107.nasl |
2009-06-23 | Name : RedHat Security Advisory RHSA-2009:1108 File : nvt/RHSA_2009_1108.nasl |
2009-06-23 | Name : CentOS Security Advisory CESA-2009:1107 (apr-util) File : nvt/ovcesa2009_1107.nasl |
2009-06-23 | Name : CentOS Security Advisory CESA-2009:1108 (httpd) File : nvt/ovcesa2009_1108.nasl |
2009-06-15 | Name : Ubuntu USN-786-1 (apr-util) File : nvt/ubuntu_786_1.nasl |
2009-06-15 | Name : Ubuntu USN-787-1 (apache2) File : nvt/ubuntu_787_1.nasl |
2009-06-09 | Name : Debian Security Advisory DSA 1812-1 (apr-util) File : nvt/deb_1812_1.nasl |
2009-06-09 | Name : FreeBSD Ports: apr File : nvt/freebsd_apr.nasl |
2009-06-09 | Name : Mandrake Security Advisory MDVSA-2009:131 (apr-util) File : nvt/mdksa_2009_131.nasl |
2009-06-09 | Name : Mandrake Security Advisory MDVSA-2009:131-1 (apr-util) File : nvt/mdksa_2009_131_1.nasl |
2009-06-05 | Name : Mandrake Security Advisory MDVSA-2009:102 (apache) File : nvt/mdksa_2009_102.nasl |
2009-04-30 | Name : Apache mod_proxy_ajp Information Disclosure Vulnerability File : nvt/secpod_apache_mod_proxy_ajp_info_disc_vuln.nasl |
2009-04-09 | Name : Mandriva Update for apache MDKSA-2007:127 (apache) File : nvt/gb_mandriva_MDKSA_2007_127.nasl |
2009-02-27 | Name : Fedora Update for httpd FEDORA-2007-0704 File : nvt/gb_fedora_2007_0704_httpd_fc7.nasl |
2009-02-27 | Name : Fedora Update for httpd FEDORA-2007-2214 File : nvt/gb_fedora_2007_2214_httpd_fc7.nasl |
2009-02-27 | Name : Fedora Update for httpd FEDORA-2007-615 File : nvt/gb_fedora_2007_615_httpd_fc6.nasl |
2009-02-16 | Name : Fedora Update for httpd FEDORA-2008-1711 File : nvt/gb_fedora_2008_1711_httpd_fc7.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200711-06 (apache) File : nvt/glsa_200711_06.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2009-167-02 apr-util File : nvt/esoft_slk_ssa_2009_167_02.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2009-214-01 httpd File : nvt/esoft_slk_ssa_2009_214_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2010-067-01 httpd File : nvt/esoft_slk_ssa_2010_067_01.nasl |
0000-00-00 | Name : FreeBSD Ports: apache File : nvt/freebsd_apache19.nasl |
0000-00-00 | Name : FreeBSD Ports: apr0 File : nvt/freebsd_apr00.nasl |
0000-00-00 | Name : Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerabi... File : nvt/gb_apache_49957.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
78573 | Apache Tomcat CPU Consumption Parameter Saturation Remote DoS |
78556 | Apache HTTP Server Status Code 400 Default Error Response httpOnly Cookie Dis... |
78555 | Apache HTTP Server Threaded MPM %{cookiename}C Log Format String Cookie Handl... |
78293 | Apache HTTP Server Scoreboard Invalid Free Operation Local Security Bypass |
78115 | PHP Hash Collission Form Parameter Parsing Remote DoS PHP contains a flaw that may allow a remote denial of service. The issue is triggered when an attacker sends multiple crafted parameters which trigger hash collisions, and will result in loss of availability for the program via CPU consumption. |
78114 | Oracle GlassFish Server Hash Collission Form Parameter Parsing Remote DoS Oracle GlassFish Server contains a flaw that may allow a remote denial of service. The issue is triggered when an attacker sends multiple crafted parameters which trigger hash collisions, and will result in loss of availability for the program via CPU consumption. |
77373 | Oracle Mojarra Java Bean includeViewParameters Parsing EL Expression Security... |
77310 | Apache HTTP Server mod_proxy Reverse Proxy Mode Security Bypass Weakness (201... |
76744 | Apache HTTP Server server/utils.c ap_pregsub() Function htaccess File Handlin... |
76079 | Apache HTTP Server mod_proxy Mdule Web Request URL Parsing Proxy Remote Secur... |
74721 | Apache HTTP Server ByteRange Filter Memory Exhaustion Remote DoS A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by the Apache HTTPD server prior to version 2.2.20: http://seclists.org/fulldisclosure/2011/Aug/175 An attack tool is circulating in the wild. Active use of this tool has been observed. The attack can be done remotely and with a modest number of requests can cause very significant memory and CPU usage on the server. The default Apache httpd installations version 2.0 prior to 2.0.65 and version 2.2 prior to 2.2.20 are vulnerable. Apache 2.2.20 does fix this issue; however with a number of side effects (see release notes). Version 2.2.21 corrects a protocol defect in 2.2.20, and also introduces the MaxRanges directive. Version 2.0.65 includes fix for this vulnerability. Apache 1.3 is NOT vulnerable. However as explained in the background section in more detail - this attack does cause a significant and possibly unexpected load. You are advised to review your configuration in that light. |
74678 | Linux Kernel IPv6 Fragment Identification Prediction Weakness |
74167 | OpenSAML XML Signature Wrapping Access Restriction Bypass |
73388 | Multiple Vendor libc Implentation fnmatch.c Memory Consumption DoS |
73383 | Apache HTTP Server Portable Runtime (APR) Library apr_fnmatch() Infinite Loop... |
65654 | Apache HTTP Server mod_proxy_http mod_proxy_http.c Timeout Detection Weakness... |
62676 | Apache HTTP Server mod_proxy_ajp Module Crafted Request Remote DoS |
62144 | F5 Multiple Products TCP/IP Implementation Queue Connection Saturation TCP St... |
61133 | Citrix Multiple Products TCP/IP Implementation Queue Connection Saturation TC... |
59482 | Blue Coat Multiple Products TCP/IP Implementation Queue Connection Saturation... |
58879 | Apache Portable Runtime (APR-util) poll/unix/port.c Event Port Backend Pollse... |
58614 | McAfee Email and Web Security Appliance TCP/IP Implementation Queue Connectio... |
58321 | Check Point Multiple Products TCP/IP Implementation Queue Connection Saturati... |
58189 | Yamaha RT Series Routers TCP/IP Implementation Queue Connection Saturation TC... |
57993 | Solaris TCP/IP Implementation Queue Connection Saturation TCP State Table Rem... |
57795 | Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State... |
57794 | Multiple BSD TCP/IP Implementation Queue Connection Saturation TCP State Tabl... |
57793 | Multiple Linux TCP/IP Implementation Queue Connection Saturation TCP State Ta... |
55553 | Apache HTTP Server mod_proxy Module mod_proxy_http.c stream_reqbody_cl Functi... |
55059 | Apache APR-util strmatch/apr_strmatch.c apr_strmatch_precompile Function Craf... |
55058 | Apache APR-util apr_brigade_vprintf Function Crafted Input Off-by-one Remote DoS |
55057 | Apache APR-util xml/apr_xml.c apr_xml_* Interface Expat XML Parser Crafted XM... |
53921 | Apache HTTP Server mod_proxy_ajp Cross Thread/Session Information Disclosure |
50286 | Cisco TCP/IP Implementation Queue Connection Saturation TCP State Table Remot... |
38641 | Apache HTTP Server mod_mem_cache recall_headers Function Information Disclosure |
8816 | Multiple Vendor ICMP Path MTU Discovery Spoofing DoS Linux, some variants of BSD, and possibly other operating systems contain a flaw in their TCP/IP stacks that may allow a remote denial of service. The issue is triggered when spoofed "fragmentation required but DF set" ICMP packets (ICMP type 3, code 4) are sent to the machine. This will cause the machine to lower the MTU for connections to the spoofed address, significantly slowing throughput and efficiency, and will result in loss of availability for the platform. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-11-21 | IAVM : 2013-A-0219 - Multiple Vulnerabilities in Juniper Networks and Security Manager Severity : Category I - VMSKEY : V0042384 |
2013-08-15 | IAVM : 2013-A-0160 - Multiple Vulnerabilities in Microsoft Exchange Server Severity : Category I - VMSKEY : V0040036 |
2013-02-14 | IAVM : 2013-A-0044 - Multiple Vulnerabilities in FAST Search Server 2010 for Microsoft SharePoint Severity : Category II - VMSKEY : V0036831 |
2012-09-27 | IAVM : 2012-A-0153 - Multiple Vulnerabilities in VMware ESX 4.0 and ESXi 4.0 Severity : Category I - VMSKEY : V0033884 |
2012-09-13 | IAVM : 2012-A-0146 - Multiple Vulnerabilities in VMware vCenter Update Manager 4.1 Severity : Category I - VMSKEY : V0033792 |
2012-09-13 | IAVM : 2012-A-0147 - Multiple Vulnerabilities in VMware vCenter Server 4.1 Severity : Category I - VMSKEY : V0033793 |
2012-09-13 | IAVM : 2012-A-0148 - Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1 Severity : Category I - VMSKEY : V0033794 |
Snort® IPS/IDS
Date | Description |
---|---|
2018-04-05 | limited RSA ciphersuite list - possible Bleichenbacher SSL attack attempt RuleID : 45830 - Revision : 1 - Type : SERVER-OTHER |
2018-01-17 | limited RSA ciphersuite list - possible Bleichenbacher SSL attack attempt RuleID : 45201 - Revision : 2 - Type : SERVER-OTHER |
2018-01-17 | limited RSA ciphersuite list - possible Bleichenbacher SSL attack attempt RuleID : 45200 - Revision : 2 - Type : SERVER-OTHER |
2018-01-17 | limited RSA ciphersuite list - possible Bleichenbacher SSL attack attempt RuleID : 45199 - Revision : 2 - Type : SERVER-OTHER |
2017-08-23 | Oracle Reports Servlet information disclosure attempt RuleID : 43662 - Revision : 2 - Type : SERVER-ORACLE |
2017-08-23 | Oracle Reports Servlet information disclosure attempt RuleID : 43661 - Revision : 2 - Type : SERVER-ORACLE |
2017-08-23 | Oracle Reports Server information disclosure attempt RuleID : 43660 - Revision : 2 - Type : SERVER-ORACLE |
2017-08-15 | Oracle Application Framework diagnostic information disclosure attempt RuleID : 43568 - Revision : 2 - Type : SERVER-WEBAPP |
2017-08-15 | Oracle Application Framework diagnostic information disclosure attempt RuleID : 43567 - Revision : 2 - Type : SERVER-WEBAPP |
2017-08-15 | Oracle Outside-In JPEG2000 QCD segment processing heap buffer overflow attempt RuleID : 43560 - Revision : 1 - Type : FILE-OTHER |
2016-04-05 | Apache HTTP server potential cookie disclosure attempt RuleID : 37968 - Revision : 1 - Type : SERVER-WEBAPP |
2015-05-21 | Oracle Outside In Paradox database denial of service attempt RuleID : 34160 - Revision : 3 - Type : SERVER-OTHER |
2015-05-21 | Oracle CorelDRAW file parser heap buffer overflow attempt RuleID : 34142 - Revision : 3 - Type : SERVER-OTHER |
2015-05-21 | Oracle CorelDRAW file parser heap buffer overflow attempt RuleID : 34141 - Revision : 3 - Type : SERVER-OTHER |
2015-05-12 | Apache mod_log_config cookie handling denial of service attempt RuleID : 34048 - Revision : 2 - Type : SERVER-APACHE |
2015-02-11 | Oracle WebCenter BlackIceDevMode ActiveX clsid access attempt RuleID : 33021 - Revision : 6 - Type : BROWSER-IE |
2015-02-11 | Oracle WebCenter BlackIceDevMode ActiveX clsid access attempt RuleID : 33020 - Revision : 6 - Type : BROWSER-IE |
2015-02-11 | Oracle WebCenter BlackIceDevMode ActiveX clsid access attempt RuleID : 33019 - Revision : 6 - Type : BROWSER-IE |
2015-02-11 | Oracle WebCenter BlackIceDevMode ActiveX clsid access attempt RuleID : 33018 - Revision : 6 - Type : BROWSER-IE |
2015-01-06 | Oracle MySQL Server InnoDB Memcached plugin resource exhaustion attempt RuleID : 32651 - Revision : 3 - Type : SERVER-MYSQL |
2015-01-06 | Oracle MySQL Server InnoDB Memcached plugin resource exhaustion attempt RuleID : 32650 - Revision : 3 - Type : SERVER-MYSQL |
2015-01-06 | Oracle MySQL Server InnoDB Memcached plugin resource exhaustion attempt RuleID : 32649 - Revision : 3 - Type : SERVER-MYSQL |
2015-01-06 | Oracle MySQL Server InnoDB Memcached plugin resource exhaustion attempt RuleID : 32648 - Revision : 3 - Type : SERVER-MYSQL |
2015-01-06 | Oracle MySQL Server InnoDB Memcached plugin resource exhaustion attempt RuleID : 32647 - Revision : 3 - Type : SERVER-MYSQL |
2014-11-16 | Oracle WebCenter Content CheckOutAndOpen.dll ActiveX control code execution A... RuleID : 32105 - Revision : 8 - Type : BROWSER-PLUGINS |
2014-11-16 | Oracle WebCenter Content CheckOutAndOpen.dll ActiveX control code execution A... RuleID : 32104 - Revision : 8 - Type : BROWSER-PLUGINS |
2014-11-16 | Oracle WebCenter Content CheckOutAndOpen.dll ActiveX control code execution A... RuleID : 32103 - Revision : 8 - Type : BROWSER-PLUGINS |
2014-11-16 | Oracle WebCenter Content CheckOutAndOpen.dll ActiveX control code execution A... RuleID : 32102 - Revision : 8 - Type : BROWSER-PLUGINS |
2014-03-22 | Oracle Reports server remote code execution attempt RuleID : 29871 - Revision : 5 - Type : SERVER-ORACLE |
2014-01-10 | Oracle Outside In FlashPix image processing overflow attempt RuleID : 26979 - Revision : 6 - Type : FILE-IMAGE |
2014-01-10 | Oracle Outside In FlashPix image processing overflow attempt RuleID : 26978 - Revision : 3 - Type : FILE-IMAGE |
2014-01-10 | Oracle Outside In FlashPix image processing overflow attempt RuleID : 26977 - Revision : 7 - Type : FILE-IMAGE |
2014-01-10 | Oracle Outside In FlashPix image processing overflow attempt RuleID : 26976 - Revision : 7 - Type : FILE-IMAGE |
2014-01-10 | Oracle WebCenter FatWire Satellite Server header injection on blobheadername2... RuleID : 26469-community - Revision : 5 - Type : SERVER-ORACLE |
2014-01-10 | Oracle WebCenter FatWire Satellite Server header injection on blobheadername2... RuleID : 26469 - Revision : 5 - Type : SERVER-ORACLE |
2014-01-10 | Oracle WebCenter FatWire Satellite Server header injection on blobheadername2... RuleID : 26468-community - Revision : 5 - Type : SERVER-ORACLE |
2014-01-10 | Oracle WebCenter FatWire Satellite Server header injection on blobheadername2... RuleID : 26468 - Revision : 5 - Type : SERVER-ORACLE |
2014-01-10 | Oracle TNS listener service registration RuleID : 25315 - Revision : 6 - Type : SERVER-ORACLE |
2014-01-10 | Oracle SetMarkupMode buffer overflow ActiveX function call access attempt RuleID : 25118 - Revision : 7 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle SetMarkupMode buffer overflow ActiveX function call access attempt RuleID : 25117 - Revision : 6 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle SetMarkupMode buffer overflow ActiveX function call access attempt RuleID : 25116 - Revision : 7 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle SetMarkupMode buffer overflow ActiveX clsid access attempt RuleID : 25115 - Revision : 6 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle SetMarkupMode buffer overflow ActiveX function call access attempt RuleID : 25114 - Revision : 7 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle SetMarkupMode buffer overflow ActiveX function call access attempt RuleID : 25113 - Revision : 6 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle SetMarkupMode buffer overflow ActiveX function call access attempt RuleID : 25112 - Revision : 7 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle SetMarkupMode buffer overflow ActiveX clsid access attempt RuleID : 25111 - Revision : 6 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle Java Runtime true type font idef opcode heap buffer overflow attempt RuleID : 24915 - Revision : 8 - Type : FILE-JAVA |
2014-01-10 | Oracle MySQL MDL free corrupted pointer heap overflow attempt RuleID : 24910 - Revision : 4 - Type : SERVER-MYSQL |
2014-01-10 | Oracle MySQL select UpdateXML nested xml elements denial of service attempt RuleID : 24909 - Revision : 3 - Type : SERVER-MYSQL |
2014-01-10 | Oracle MySQL grant file long database name stack overflow attempt RuleID : 24897 - Revision : 5 - Type : SERVER-MYSQL |
2014-01-10 | Oracle GlassFish cross site scripting attempt RuleID : 24737 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle GlassFish cross site scripting attempt RuleID : 24736 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle GlassFish cross site scripting attempt RuleID : 24735 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle GlassFish cross site scripting attempt RuleID : 24734 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle GlassFish cross site scripting attempt RuleID : 24733 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle GlassFish cross site scripting attempt RuleID : 24732 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle GlassFish cross site scripting attempt RuleID : 24731 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle GlassFish cross site scripting attempt RuleID : 24730 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle GlassFish cross site scripting attempt RuleID : 24729 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle GlassFish cross site scripting attempt RuleID : 24728 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle Java Runtime true type font idef opcode heap buffer overflow attempt RuleID : 24701 - Revision : 12 - Type : FILE-JAVA |
2014-01-10 | Apache mod_log_config cookie handling denial of service attempt RuleID : 24698 - Revision : 6 - Type : SERVER-APACHE |
2014-01-10 | Apache mod_log_config cookie handling denial of service attempt RuleID : 24697 - Revision : 7 - Type : SERVER-APACHE |
2014-01-10 | Oracle Fusion Middleware WebCenter selectedLocale parameter sql injection att... RuleID : 24629 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle Reports Servlet information disclosure attempt RuleID : 24597 - Revision : 2 - Type : SERVER-ORACLE |
2014-01-10 | Oracle Reports Servlet information disclosure attempt RuleID : 24596 - Revision : 2 - Type : SERVER-ORACLE |
2014-01-10 | Oracle Reports Server information disclosure attempt RuleID : 24595 - Revision : 2 - Type : SERVER-ORACLE |
2014-01-10 | Oracle Outside-In JPEG2000 QCD segment processing heap buffer overflow attempt RuleID : 23806 - Revision : 10 - Type : FILE-OTHER |
2014-01-10 | Apache WebDAV mod_dav nested entity reference DoS attempt RuleID : 23779 - Revision : 4 - Type : SERVER-APACHE |
2014-01-10 | Oracle Java Zip file directory record overflow attempt RuleID : 23560 - Revision : 8 - Type : FILE-JAVA |
2014-01-10 | Oracle GlassFish server REST interface cross site request forgery attempt RuleID : 23401 - Revision : 9 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle WebCenter Forms Recognition ActiveX clsid access attempt RuleID : 23284 - Revision : 12 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle WebCenter Forms Recognition ActiveX clsid access attempt RuleID : 23283 - Revision : 8 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle Java Zip file directory record overflow attempt RuleID : 23243 - Revision : 13 - Type : FILE-JAVA |
2014-01-10 | Oracle Webcenter ActiveX function call access RuleID : 23229 - Revision : 9 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle Webcenter ActiveX clsid access RuleID : 23228 - Revision : 6 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle GlassFish Enterprise server cross site scripting attempt RuleID : 23047 - Revision : 11 - Type : SERVER-WEBAPP |
2014-01-10 | Oracle GlassFish Enterprise server cross site scripting attempt RuleID : 23046 - Revision : 11 - Type : SERVER-WEBAPP |
2014-01-10 | Apache server mod_proxy reverse proxy bypass attempt RuleID : 21214 - Revision : 11 - Type : SERVER-APACHE |
2014-01-10 | Apache server mod_proxy reverse proxy exposure attempt RuleID : 20580 - Revision : 2 - Type : WEB-MISC |
2014-01-10 | Apache mod_proxy reverse proxy information disclosure attempt RuleID : 20528 - Revision : 13 - Type : SERVER-APACHE |
2014-01-10 | Oracle GlassFish Server default credentials login attempt RuleID : 20158 - Revision : 15 - Type : SERVER-WEBAPP |
2014-01-10 | Apache Killer denial of service tool exploit attempt RuleID : 19825 - Revision : 13 - Type : SERVER-APACHE |
2014-01-10 | Apache APR apr_fn match infinite loop denial of service attempt RuleID : 19709 - Revision : 4 - Type : SERVER-APACHE |
2014-01-10 | Microsoft Windows TCP stack zero window size exploit attempt RuleID : 16294 - Revision : 15 - Type : OS-WINDOWS |
2014-01-10 | TCP window closed before receiving data RuleID : 15912 - Revision : 10 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-10-31 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-2907-1.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_esx_VMSA-2013-0003_remote.nasl - Type : ACT_GATHER_INFO |
2016-03-03 | Name : The remote VMware ESXi / ESX host is missing a security-related patch. File : vmware_VMSA-2012-0005_remote.nasl - Type : ACT_GATHER_INFO |
2016-02-29 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2012-0012_remote.nasl - Type : ACT_GATHER_INFO |
2016-02-29 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2012-0013_remote.nasl - Type : ACT_GATHER_INFO |
2015-12-30 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL23332326.nasl - Type : ACT_GATHER_INFO |
2015-07-24 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL16907.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2012-1489-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2012-1489-2.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2012-1490-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-0469-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-1627-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-1832-1.nasl - Type : ACT_GATHER_INFO |
2015-01-27 | Name : The remote web server is affected by multiple vulnerabilities. File : oracle_http_server_cpu_jan_2015.nasl - Type : ACT_GATHER_INFO |
2015-01-23 | Name : The remote device is missing a vendor-supplied security patch. File : juniper_jsa10669.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_apache_20120417.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_apache_20120420.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_libxml2_20121120.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_modsecurity_20140731.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_tomcat_20120405.nasl - Type : ACT_GATHER_INFO |
2014-12-22 | Name : The remote device is affected by multiple vulnerabilities. File : juniper_space_jsa10585.nasl - Type : ACT_GATHER_INFO |
2014-12-22 | Name : The remote device is affected by multiple vulnerabilities. File : juniper_space_jsa10601.nasl - Type : ACT_GATHER_INFO |
2014-12-22 | Name : The remote device is affected by multiple vulnerabilities. File : juniper_space_jsa10627.nasl - Type : ACT_GATHER_INFO |
2014-12-19 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15920.nasl - Type : ACT_GATHER_INFO |
2014-12-16 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-770.nasl - Type : ACT_GATHER_INFO |
2014-12-05 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15889.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2012-0020.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2012-0021.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2012-0022.nasl - Type : ACT_GATHER_INFO |
2014-11-17 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2011-1408.nasl - Type : ACT_GATHER_INFO |
2014-11-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0422.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0542.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0680.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0682.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1080.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1324.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1332.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1455.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1456.nasl - Type : ACT_GATHER_INFO |
2014-10-15 | Name : The remote Solaris system is missing a security patch from CPU jan2013. File : solaris_jan2013_SRU11_1_2_5_0.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-1.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-9.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL10509.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL13114.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL13519.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL13588.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL14907.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15273.nasl - Type : ACT_GATHER_INFO |
2014-10-08 | Name : The remote web server is affected by an unspecified vulnerability. File : oracle_http_server_cpu_jul_2012.nasl - Type : ACT_GATHER_INFO |
2014-10-08 | Name : The remote Windows host contains a programming platform that is affected by a... File : oracle_jrockit_cpu_jul_2012.nasl - Type : ACT_GATHER_INFO |
2014-10-08 | Name : The remote web server contains a web application that is affected by multiple... File : oracle_map_viewer_cpu_jul_2012.nasl - Type : ACT_GATHER_INFO |
2014-10-07 | Name : The remote host is affected by an information disclosure vulnerability. File : oracle_apex_listener_july_2012_cpu.nasl - Type : ACT_GATHER_INFO |
2014-09-05 | Name : The remote host has a web server installed that is affected by a vulnerabilit... File : glassfish_cve-2012-3155.nasl - Type : ACT_GATHER_INFO |
2014-09-05 | Name : The remote host has an application server installed that is affected by a vul... File : sun_java_app_server_cve-2012-3155.nasl - Type : ACT_GATHER_INFO |
2014-08-22 | Name : The remote host is affected by multiple vulnerabilities. File : juniper_nsm_jsa10642.nasl - Type : ACT_GATHER_INFO |
2014-08-15 | Name : The remote Oracle Business Intelligence Publisher install is missing the Apri... File : oracle_bi_publisher_cpu_apr_2012.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU apr2012. File : solaris_apr2012_SRU3.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU apr2012. File : solaris_apr2012_SRU4.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU apr2013. File : solaris_apr2013_SRU0.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU apr2013. File : solaris_apr2013_SRU3.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU apr2013. File : solaris_apr2013_SRU4_5.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU apr2013. File : solaris_apr2013_SRU4a.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU apr2013. File : solaris_apr2013_SRU5.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU apr2013. File : solaris_apr2013_SRU5_5.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU jan2013. File : solaris_jan2013_SRU12_4.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU jan2013. File : solaris_jan2013_SRU13_4.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU jan2013. File : solaris_jan2013_SRU2_5.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU jul2012. File : solaris_jul2012_SRU7_5.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU jul2012. File : solaris_jul2012_SRU8_5.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU jul2012. File : solaris_jul2012_SRU9_5.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU oct2012. File : solaris_oct2012_SRU10_5.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU oct2012. File : solaris_oct2012_SRU11_4.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU oct2012. File : solaris_oct2012_SRU12_4.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU oct2012. File : solaris_oct2012_SRU8_5.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU oct2012. File : solaris_oct2012_SRU9_5.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Windows host contains a programming platform that is affected by m... File : oracle_jrockit_cpu_apr_2012.nasl - Type : ACT_GATHER_INFO |
2014-07-18 | Name : The remote Windows host contains a programming platform that is potentially a... File : oracle_jrockit_cpu_oct_2012.nasl - Type : ACT_GATHER_INFO |
2014-06-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201406-32.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-132.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-136.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-179.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-182.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-273.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-274.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-276.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-368.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-403.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-404.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-749.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-754.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-755.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-4.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-402.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-410.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-426.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-5.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-6.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-640.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-641.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-686.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-73.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-80.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_apache2-110726.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_apache2-110831.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_apache2-111026.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_apache2-111205.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_kernel-120104.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_apache2-110726.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_apache2-110831.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_apache2-111026.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_apache2-111205.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_apache2-201202-120216.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_java-1_6_0-openjdk-120222.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_kernel-120104.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_libxml2-120224.nasl - Type : ACT_GATHER_INFO |
2014-05-19 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201405-24.nasl - Type : ACT_GATHER_INFO |
2014-05-12 | Name : The remote server is affected by multiple vulnerabilities. File : domino_9_0_1_fp1.nasl - Type : ACT_GATHER_INFO |
2014-05-12 | Name : The remote host has software installed that is affected by multiple vulnerabi... File : lotus_domino_9_0_1_fp1.nasl - Type : ACT_GATHER_INFO |
2014-05-12 | Name : The remote host has software installed that is affected by multiple vulnerabi... File : lotus_notes_9_0_1_fp1.nasl - Type : ACT_GATHER_INFO |
2014-03-20 | Name : The remote Oracle Business Intelligence Publisher install is missing the Orac... File : oracle_bi_publisher_oct_2012_cpu.nasl - Type : ACT_GATHER_INFO |
2014-03-20 | Name : The remote web server hosts a web application that has a file access vulnerab... File : oracle_reports_file_access.nasl - Type : ACT_ATTACK |
2014-03-20 | Name : The remote host is running a web application that exposes database credentials. File : oracle_reports_password_disclosure.nasl - Type : ACT_ATTACK |
2014-03-03 | Name : The remote host has software installed that is affected by multiple vulnerabi... File : oracle_webcenter_sites_oct_2012_cpu.nasl - Type : ACT_GATHER_INFO |
2014-02-10 | Name : The remote host has an identity management application installed that is affe... File : oracle_identity_manager_cpu_apr_2012.nasl - Type : ACT_GATHER_INFO |
2014-01-27 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201401-30.nasl - Type : ACT_GATHER_INFO |
2014-01-23 | Name : The remote host contains an application that has multiple vulnerabilities. File : itunes_11_1_4.nasl - Type : ACT_GATHER_INFO |
2014-01-23 | Name : The remote host contains a multimedia application that has multiple vulnerabi... File : itunes_11_1_4_banner.nasl - Type : ACT_GATHER_INFO |
2014-01-21 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201401-13.nasl - Type : ACT_GATHER_INFO |
2014-01-08 | Name : The remote server is affected by multiple vulnerabilities. File : domino_9_0_1.nasl - Type : ACT_GATHER_INFO |
2014-01-08 | Name : The remote host has software installed that is affected by multiple vulnerabi... File : lotus_domino_9_0_1.nasl - Type : ACT_GATHER_INFO |
2013-12-28 | Name : The remote host is missing Sun Security Patch number 147416-02 File : solaris10_147416.nasl - Type : ACT_GATHER_INFO |
2013-12-28 | Name : The remote host is missing Sun Security Patch number 147416-02 File : solaris9_147416.nasl - Type : ACT_GATHER_INFO |
2013-11-21 | Name : The remote host is affected by multiple vulnerabilities. File : juniper_nsm_2012_2_r5.nasl - Type : ACT_GATHER_INFO |
2013-11-13 | Name : The remote VMware ESXi 5.0 host is affected by multiple security vulnerabilit... File : vmware_esxi_5_0_build_764879_remote.nasl - Type : ACT_GATHER_INFO |
2013-11-04 | Name : The remote server is affected by multiple vulnerabilities. File : domino_8_5_3fp5.nasl - Type : ACT_GATHER_INFO |
2013-11-04 | Name : The remote host has software installed that is affected by multiple vulnerabi... File : lotus_domino_8_5_3_fp5.nasl - Type : ACT_GATHER_INFO |
2013-11-04 | Name : The remote host has software installed that is affected by multiple vulnerabi... File : lotus_notes_8_5_3_fp5.nasl - Type : ACT_GATHER_INFO |
2013-10-24 | Name : The remote host contains an application that has multiple vulnerabilities. File : itunes_11_1_2.nasl - Type : ACT_GATHER_INFO |
2013-10-24 | Name : The remote host contains a multimedia application that has multiple vulnerabi... File : itunes_11_1_2_banner.nasl - Type : ACT_GATHER_INFO |
2013-10-01 | Name : The remote device is affected by multiple vulnerabilities. File : appletv_6_0.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201309-24.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-01.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-09.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-26.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-136.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-137.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-141.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-144.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-145.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-37.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-41.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-43.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-46.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-52.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-88.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-152.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-183.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-185.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-186.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-187.nasl - Type : ACT_GATHER_INFO |
2013-08-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201308-06.nasl - Type : ACT_GATHER_INFO |
2013-08-23 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_tomcat6-130802.nasl - Type : ACT_GATHER_INFO |
2013-08-20 | Name : The remote host is affected by multiple vulnerabilities. File : oracle_webcenter_content_apr_2013_cpu.nasl - Type : ACT_GATHER_INFO |
2013-08-14 | Name : The remote mail server has multiple vulnerabilities. File : smb_nt_ms13-061.nasl - Type : ACT_GATHER_INFO |
2013-08-11 | Name : The remote web server may be affected by multiple vulnerabilities. File : oracle_http_server_cpu_jul_2013.nasl - Type : ACT_GATHER_INFO |
2013-07-16 | Name : The remote web server is affected by several vulnerabilities. File : apache_2_0_65.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-1107.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-1108.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-1148.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0168.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0659.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0507.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0844.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1245.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1386.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1391.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1392.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1465.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-2033.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0019.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0033.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0071.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0092.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0093.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0105.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0128.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0135.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0322.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0323.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0324.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0474.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0475.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0721-1.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0721.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0729.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0730.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-1009.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-1384.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-1385.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-1386.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-1462.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-1551.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0180.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0217.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0219.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0751.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0752.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0770.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0772.nasl - Type : ACT_GATHER_INFO |
2013-06-29 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0659.nasl - Type : ACT_GATHER_INFO |
2013-06-29 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0071.nasl - Type : ACT_GATHER_INFO |
2013-06-17 | Name : The remote host has an update manager installed that is affected by multiple ... File : vmware_vcenter_update_mgr_vmsa-2012-0013.nasl - Type : ACT_GATHER_INFO |
2013-06-11 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_4_2-ibm-130529.nasl - Type : ACT_GATHER_INFO |
2013-06-11 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_7_0-ibm-130529.nasl - Type : ACT_GATHER_INFO |
2013-06-05 | Name : The remote web server is affected by multiple vulnerabilities. File : glassfish_cpu_apr_2013.nasl - Type : ACT_GATHER_INFO |
2013-06-05 | Name : The remote host has a virtualization management application installed that is... File : vmware_vcenter_vmsa-2012-0005.nasl - Type : ACT_GATHER_INFO |
2013-06-05 | Name : The remote host has a virtualization management application installed that is... File : vmware_vcenter_vmsa-2012-0013.nasl - Type : ACT_GATHER_INFO |
2013-05-28 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_6_0-ibm-130517.nasl - Type : ACT_GATHER_INFO |
2013-05-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0855.nasl - Type : ACT_GATHER_INFO |
2013-05-22 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_6_0-openjdk-130512.nasl - Type : ACT_GATHER_INFO |
2013-05-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0822.nasl - Type : ACT_GATHER_INFO |
2013-05-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0823.nasl - Type : ACT_GATHER_INFO |
2013-05-13 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2667.nasl - Type : ACT_GATHER_INFO |
2013-05-08 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1819-1.nasl - Type : ACT_GATHER_INFO |
2013-05-07 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-161.nasl - Type : ACT_GATHER_INFO |
2013-04-30 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0772.nasl - Type : ACT_GATHER_INFO |
2013-04-26 | Name : The remote Fedora host is missing a security update. File : fedora_2013-6368.nasl - Type : ACT_GATHER_INFO |
2013-04-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0772.nasl - Type : ACT_GATHER_INFO |
2013-04-26 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130424_java_1_6_0_openjdk_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-04-26 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130425_mysql_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-04-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1807-2.nasl - Type : ACT_GATHER_INFO |
2013-04-25 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0770.nasl - Type : ACT_GATHER_INFO |
2013-04-25 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0770.nasl - Type : ACT_GATHER_INFO |
2013-04-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1807-1.nasl - Type : ACT_GATHER_INFO |
2013-04-24 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1806-1.nasl - Type : ACT_GATHER_INFO |
2013-04-22 | Name : The remote database server may be affected by multiple vulnerabilities. File : mysql_5_1_69.nasl - Type : ACT_GATHER_INFO |
2013-04-22 | Name : The remote database server may be affected by multiple vulnerabilities. File : mysql_5_5_31.nasl - Type : ACT_GATHER_INFO |
2013-04-22 | Name : The remote database server may be affected by multiple vulnerabilities. File : mysql_5_6_11.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Fedora host is missing a security update. File : fedora_2013-5922.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-102.nasl - Type : ACT_GATHER_INFO |
2013-04-19 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0751.nasl - Type : ACT_GATHER_INFO |
2013-04-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0757.nasl - Type : ACT_GATHER_INFO |
2013-04-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0758.nasl - Type : ACT_GATHER_INFO |
2013-04-18 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0752.nasl - Type : ACT_GATHER_INFO |
2013-04-18 | Name : The remote Fedora host is missing a security update. File : fedora_2013-5958.nasl - Type : ACT_GATHER_INFO |
2013-04-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0751.nasl - Type : ACT_GATHER_INFO |
2013-04-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0752.nasl - Type : ACT_GATHER_INFO |
2013-04-18 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130417_java_1_7_0_openjdk_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-04-18 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130417_java_1_7_0_openjdk_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-04-17 | Name : The remote host has a version of Java that is affected by multiple vulnerabil... File : macosx_java_10_6_update15.nasl - Type : ACT_GATHER_INFO |
2013-04-17 | Name : The remote host has a version of Java that is affected by multiple vulnerabil... File : macosx_java_2013-003.nasl - Type : ACT_GATHER_INFO |
2013-04-17 | Name : The remote Windows host contains a programming platform that is potentially a... File : oracle_java_cpu_apr_2013.nasl - Type : ACT_GATHER_INFO |
2013-04-17 | Name : The remote Unix host contains a programming platform that is potentially affe... File : oracle_java_cpu_apr_2013_unix.nasl - Type : ACT_GATHER_INFO |
2013-04-17 | Name : The remote database server is affected by multiple vulnerabilities. File : oracle_rdbms_cpu_apr_2013.nasl - Type : ACT_GATHER_INFO |
2013-03-29 | Name : The remote database server is affected by multiple vulnerabilities. File : mariadb_5_5_28.nasl - Type : ACT_GATHER_INFO |
2013-03-21 | Name : The remote host is missing Sun Security Patch number 150123-01 File : solaris10_150123.nasl - Type : ACT_GATHER_INFO |
2013-03-21 | Name : The remote host is missing Sun Security Patch number 150124-01 File : solaris10_x86_150124.nasl - Type : ACT_GATHER_INFO |
2013-03-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0624.nasl - Type : ACT_GATHER_INFO |
2013-03-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0625.nasl - Type : ACT_GATHER_INFO |
2013-03-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0626.nasl - Type : ACT_GATHER_INFO |
2013-03-05 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-130225.nasl - Type : ACT_GATHER_INFO |
2013-02-28 | Name : The remote database server is affected by multiple vulnerabilities. File : mariadb_5_1_67.nasl - Type : ACT_GATHER_INFO |
2013-02-28 | Name : The remote database server is affected by multiple vulnerabilities. File : mariadb_5_2_14.nasl - Type : ACT_GATHER_INFO |
2013-02-28 | Name : The remote database server is affected by multiple vulnerabilities. File : mariadb_5_3_12.nasl - Type : ACT_GATHER_INFO |
2013-02-28 | Name : The remote database server is affected by multiple vulnerabilities. File : mariadb_5_5_29.nasl - Type : ACT_GATHER_INFO |
2013-02-22 | Name : The remote Unix host contains a programming platform that is affected by mult... File : oracle_java_cpu_feb_2012_unix.nasl - Type : ACT_GATHER_INFO |
2013-02-22 | Name : The remote Unix host contains a programming platform that is affected by mult... File : oracle_java_cpu_jun_2012_unix.nasl - Type : ACT_GATHER_INFO |
2013-02-22 | Name : The remote Unix host contains a programming platform that is affected by mult... File : oracle_java_cpu_oct_2012_unix.nasl - Type : ACT_GATHER_INFO |
2013-02-20 | Name : The remote host is running a vulnerable version of Oracle Apex. File : oracle_apex_CVE-2012-1708.nasl - Type : ACT_GATHER_INFO |
2013-02-18 | Name : The remote host is missing Sun Security Patch number 147147-26 File : solaris10_147147.nasl - Type : ACT_GATHER_INFO |
2013-02-18 | Name : The remote host is missing Sun Security Patch number 148027-03 File : solaris10_148027.nasl - Type : ACT_GATHER_INFO |
2013-02-18 | Name : The remote host is missing Sun Security Patch number 148112-02 File : solaris10_148112.nasl - Type : ACT_GATHER_INFO |
2013-02-18 | Name : The remote host is missing Sun Security Patch number 147148-26 File : solaris10_x86_147148.nasl - Type : ACT_GATHER_INFO |
2013-02-18 | Name : The remote host is missing Sun Security Patch number 148028-03 File : solaris10_x86_148028.nasl - Type : ACT_GATHER_INFO |
2013-02-18 | Name : The remote host is missing Sun Security Patch number 148113-02 File : solaris10_x86_148113.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote host is missing Sun Security Patch number 148383-01 File : solaris10_148383.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote host is missing Sun Security Patch number 148565-01 File : solaris10_148565.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote host is missing Sun Security Patch number 148768-02 File : solaris10_148768.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote host is missing Sun Security Patch number 149163-01 File : solaris10_149163.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote host is missing Sun Security Patch number 149165-01 File : solaris10_149165.nasl - Type : ACT_GATHER_INFO |
2013-02-12 | Name : The remote mail server has multiple vulnerabilities. File : smb_nt_ms13-012.nasl - Type : ACT_GATHER_INFO |
2013-02-12 | Name : The remote Windows host is affected by multiple code execution vulnerabilities. File : smb_nt_ms13-013.nasl - Type : ACT_GATHER_INFO |
2013-02-10 | Name : The remote host is missing Sun Security Patch number 148384-01 File : solaris10_x86_148384.nasl - Type : ACT_GATHER_INFO |
2013-02-10 | Name : The remote host is missing Sun Security Patch number 148566-01 File : solaris10_x86_148566.nasl - Type : ACT_GATHER_INFO |
2013-02-10 | Name : The remote host is missing Sun Security Patch number 148769-02 File : solaris10_x86_148769.nasl - Type : ACT_GATHER_INFO |
2013-02-10 | Name : The remote host is missing Sun Security Patch number 149164-01 File : solaris10_x86_149164.nasl - Type : ACT_GATHER_INFO |
2013-02-10 | Name : The remote host is missing Sun Security Patch number 149166-01 File : solaris10_x86_149166.nasl - Type : ACT_GATHER_INFO |
2013-02-10 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libmysqlclient-devel-121227.nasl - Type : ACT_GATHER_INFO |
2013-02-09 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-007.nasl - Type : ACT_GATHER_INFO |
2013-02-08 | Name : The database server running on the remote host is affected by multiple SQL in... File : mariadb_binary_log_sqli.nasl - Type : ACT_GATHER_INFO |
2013-02-08 | Name : The database server running on the remote host has multiple SQL injection vul... File : mysql_binary_log_sqli.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_8c773d7f6cbb11e2b242c8600054b392.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130131_mingw32_libxml2_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130131_mysql_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-02-01 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0217.nasl - Type : ACT_GATHER_INFO |
2013-02-01 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0219.nasl - Type : ACT_GATHER_INFO |
2013-02-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0217.nasl - Type : ACT_GATHER_INFO |
2013-02-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0219.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_4_2-ibm-120529.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_4_2-ibm-120907.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_4_2-ibm-121113.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_6_0-ibm-120427.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_6_0-ibm-120907.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_6_0-ibm-121126.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_6_0-openjdk-120615.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_6_0-openjdk-121023.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_7_0-ibm-120919.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_7_0-ibm-121113.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libxml2-120223.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_xen-201206-120606.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0180.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1294.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0074.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0358.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0702.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0720.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1243.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1485.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130122_mysql_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-01-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0180.nasl - Type : ACT_GATHER_INFO |
2013-01-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1703-1.nasl - Type : ACT_GATHER_INFO |
2013-01-22 | Name : The remote Windows host has an application that is affected by a local vulner... File : virtualbox_core_subcomponent_local_issue.nasl - Type : ACT_GATHER_INFO |
2013-01-18 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_1_67.nasl - Type : ACT_GATHER_INFO |
2013-01-18 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_5_29.nasl - Type : ACT_GATHER_INFO |
2013-01-18 | Name : The remote database server is affected by multiple vulnerabilities. File : oracle_rdbms_cpu_jan_2013.nasl - Type : ACT_GATHER_INFO |
2013-01-14 | Name : The remote Fedora host is missing a security update. File : fedora_2012-19868.nasl - Type : ACT_GATHER_INFO |
2012-12-31 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2594.nasl - Type : ACT_GATHER_INFO |
2012-12-24 | Name : The remote Fedora host is missing a security update. File : fedora_2012-19823.nasl - Type : ACT_GATHER_INFO |
2012-12-24 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-182.nasl - Type : ACT_GATHER_INFO |
2012-12-17 | Name : The remote Fedora host is missing a security update. File : fedora_2012-19833.nasl - Type : ACT_GATHER_INFO |
2012-12-11 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-1551.nasl - Type : ACT_GATHER_INFO |
2012-12-11 | Name : The remote mail server has multiple vulnerabilities. File : smb_nt_ms12-080.nasl - Type : ACT_GATHER_INFO |
2012-12-11 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1658-1.nasl - Type : ACT_GATHER_INFO |
2012-12-10 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-178.nasl - Type : ACT_GATHER_INFO |
2012-12-09 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1551.nasl - Type : ACT_GATHER_INFO |
2012-12-08 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20121207_mysql_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-12-05 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2581.nasl - Type : ACT_GATHER_INFO |
2012-12-04 | Name : The remote database server is affected by a buffer overflow vulnerability. File : mariadb_5_1_66.nasl - Type : ACT_GATHER_INFO |
2012-12-04 | Name : The remote database server is affected by a buffer overflow vulnerability. File : mariadb_5_2_13.nasl - Type : ACT_GATHER_INFO |
2012-12-04 | Name : The remote database server is affected by a buffer overflow vulnerability. File : mariadb_5_3_11.nasl - Type : ACT_GATHER_INFO |
2012-12-04 | Name : The remote database server is affected by a buffer overflow vulnerability. File : mariadb_5_5_28a.nasl - Type : ACT_GATHER_INFO |
2012-11-29 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_java-1_6_0-ibm-8383.nasl - Type : ACT_GATHER_INFO |
2012-11-19 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_java-1_4_2-ibm-8366.nasl - Type : ACT_GATHER_INFO |
2012-11-19 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_java-1_5_0-ibm-8362.nasl - Type : ACT_GATHER_INFO |
2012-11-16 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1465.nasl - Type : ACT_GATHER_INFO |
2012-11-16 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1466.nasl - Type : ACT_GATHER_INFO |
2012-11-16 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1467.nasl - Type : ACT_GATHER_INFO |
2012-11-16 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20121114_mysql_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-11-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-1462.nasl - Type : ACT_GATHER_INFO |
2012-11-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1462.nasl - Type : ACT_GATHER_INFO |
2012-11-06 | Name : The remote host is affected by multiple file overwrite vulnerabilities. File : oracle_forms_recognition_activex.nasl - Type : ACT_GATHER_INFO |
2012-11-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1621-1.nasl - Type : ACT_GATHER_INFO |
2012-11-02 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-169.nasl - Type : ACT_GATHER_INFO |
2012-10-31 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20121018_java_1_6_0_sun_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-10-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1619-1.nasl - Type : ACT_GATHER_INFO |
2012-10-23 | Name : The remote database server is affected by multiple vulnerabilities. File : oracle_rdbms_cpu_oct_2012.nasl - Type : ACT_GATHER_INFO |
2012-10-22 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20121017_java_1_7_0_openjdk_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-10-19 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-1385.nasl - Type : ACT_GATHER_INFO |
2012-10-19 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_1_64.nasl - Type : ACT_GATHER_INFO |
2012-10-19 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_1_65.nasl - Type : ACT_GATHER_INFO |
2012-10-19 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_1_66.nasl - Type : ACT_GATHER_INFO |
2012-10-19 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_5_26.nasl - Type : ACT_GATHER_INFO |
2012-10-19 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_5_27.nasl - Type : ACT_GATHER_INFO |
2012-10-19 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_5_28.nasl - Type : ACT_GATHER_INFO |
2012-10-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1391.nasl - Type : ACT_GATHER_INFO |
2012-10-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1392.nasl - Type : ACT_GATHER_INFO |
2012-10-18 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-1384.nasl - Type : ACT_GATHER_INFO |
2012-10-18 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-1386.nasl - Type : ACT_GATHER_INFO |
2012-10-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1384.nasl - Type : ACT_GATHER_INFO |
2012-10-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1385.nasl - Type : ACT_GATHER_INFO |
2012-10-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1386.nasl - Type : ACT_GATHER_INFO |
2012-10-18 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20121017_java_1_6_0_openjdk_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-10-18 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20121017_java_1_6_0_openjdk_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-10-17 | Name : The remote host has a version of Java that is affected by multiple vulnerabil... File : macosx_java_10_6_update11.nasl - Type : ACT_GATHER_INFO |
2012-10-17 | Name : The remote host has a version of Java that is affected by multiple vulnerabil... File : macosx_java_2012-006.nasl - Type : ACT_GATHER_INFO |
2012-10-17 | Name : The remote Windows host contains a programming platform that is affected by m... File : oracle_java_cpu_oct_2012.nasl - Type : ACT_GATHER_INFO |
2012-10-12 | Name : The remote host is missing Sun Security Patch number 127872-02 File : solaris10_127872.nasl - Type : ACT_GATHER_INFO |
2012-10-12 | Name : The remote host is missing Sun Security Patch number 137097-02 File : solaris10_137097.nasl - Type : ACT_GATHER_INFO |
2012-10-12 | Name : The remote host is missing Sun Security Patch number 127873-02 File : solaris10_x86_127873.nasl - Type : ACT_GATHER_INFO |
2012-10-12 | Name : The remote host is missing Sun Security Patch number 137098-02 File : solaris10_x86_137098.nasl - Type : ACT_GATHER_INFO |
2012-10-10 | Name : The remote Windows host is affected by multiple code execution vulnerabilities. File : smb_nt_ms12-067.nasl - Type : ACT_GATHER_INFO |
2012-10-09 | Name : An archiving application installed on the remote host has multiple vulnerabil... File : symantec_enterprise_vault_sym12-015.nasl - Type : ACT_GATHER_INFO |
2012-10-05 | Name : The remote host is missing Sun Security Patch number 149453-02 File : solaris10_149453.nasl - Type : ACT_GATHER_INFO |
2012-10-04 | Name : The remote host is missing Sun Security Patch number 149454-02 File : solaris10_x86_149454.nasl - Type : ACT_GATHER_INFO |
2012-09-27 | Name : The remote Fedora host is missing a security update. File : fedora_2012-13820.nasl - Type : ACT_GATHER_INFO |
2012-09-27 | Name : The remote Fedora host is missing a security update. File : fedora_2012-13824.nasl - Type : ACT_GATHER_INFO |
2012-09-24 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201209-03.nasl - Type : ACT_GATHER_INFO |
2012-09-24 | Name : The remote Windows host has an application that is affected by a buffer overf... File : groupwise_ia_803_hp1.nasl - Type : ACT_GATHER_INFO |
2012-09-20 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_10_7_5.nasl - Type : ACT_GATHER_INFO |
2012-09-20 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_SecUpd2012-004.nasl - Type : ACT_GATHER_INFO |
2012-09-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1289.nasl - Type : ACT_GATHER_INFO |
2012-09-14 | Name : The remote Windows host has an application that is affected by local denial o... File : virtualbox_4_1_22.nasl - Type : ACT_GATHER_INFO |
2012-09-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1245.nasl - Type : ACT_GATHER_INFO |
2012-09-07 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1238.nasl - Type : ACT_GATHER_INFO |
2012-08-31 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2012-0013.nasl - Type : ACT_GATHER_INFO |
2012-08-30 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1505-2.nasl - Type : ACT_GATHER_INFO |
2012-08-15 | Name : The remote mail server has multiple code execution vulnerabilities. File : smb_nt_ms12-058.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20090616_apr_util_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20090616_httpd_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20090709_httpd_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100325_httpd_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100830_httpd_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110511_apr_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110531_apr_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110531_apr_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110831_httpd_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111020_httpd_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111020_httpd_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111020_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111122_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120111_php53_and_php_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120118_php_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120130_php_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120202_php53_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120202_php_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120213_httpd_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120214_java_1_6_0_openjdk_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120216_java_1_6_0_sun_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120221_httpd_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120221_java_1_6_0_openjdk_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120221_libxml2_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120411_tomcat5_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120411_tomcat6_on_SL6.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120612_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120613_java_1_6_0_openjdk_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120613_java_1_6_0_openjdk_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120613_java_1_6_0_sun_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-07-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2508.nasl - Type : ACT_GATHER_INFO |
2012-07-19 | Name : The remote database server is affected by multiple vulnerabilities. File : oracle_rdbms_cpu_jul_2012.nasl - Type : ACT_GATHER_INFO |
2012-07-13 | Name : The remote database server is affected by multiple unspecified vulnerabilities. File : mysql_5_5_23.nasl - Type : ACT_GATHER_INFO |
2012-07-13 | Name : The remote host is missing Sun Security Patch number 148870-01 File : solaris10_148870.nasl - Type : ACT_GATHER_INFO |
2012-07-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1505-1.nasl - Type : ACT_GATHER_INFO |
2012-07-13 | Name : The remote VMware ESXi host is missing a security-related patch. File : vmware_VMSA-2012-0012.nasl - Type : ACT_GATHER_INFO |
2012-07-12 | Name : The remote host is missing Sun Security Patch number 148871-01 File : solaris10_x86_148871.nasl - Type : ACT_GATHER_INFO |
2012-07-11 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-1009.nasl - Type : ACT_GATHER_INFO |
2012-07-05 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2507.nasl - Type : ACT_GATHER_INFO |
2012-07-05 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_1_1_1.nasl - Type : ACT_GATHER_INFO |
2012-07-03 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2506.nasl - Type : ACT_GATHER_INFO |
2012-06-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2496.nasl - Type : ACT_GATHER_INFO |
2012-06-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2501.nasl - Type : ACT_GATHER_INFO |
2012-06-28 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_aed44c4ec06711e1b5e0000c299b62e1.nasl - Type : ACT_GATHER_INFO |
2012-06-27 | Name : The remote web server is affected by multiple vulnerabilities. File : sun_java_web_server_7_0_15.nasl - Type : ACT_GATHER_INFO |
2012-06-26 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9386.nasl - Type : ACT_GATHER_INFO |
2012-06-26 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9399.nasl - Type : ACT_GATHER_INFO |
2012-06-26 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9430.nasl - Type : ACT_GATHER_INFO |
2012-06-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201206-24.nasl - Type : ACT_GATHER_INFO |
2012-06-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201206-25.nasl - Type : ACT_GATHER_INFO |
2012-06-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1009.nasl - Type : ACT_GATHER_INFO |
2012-06-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1019.nasl - Type : ACT_GATHER_INFO |
2012-06-19 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-095.nasl - Type : ACT_GATHER_INFO |
2012-06-18 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9541.nasl - Type : ACT_GATHER_INFO |
2012-06-18 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9545.nasl - Type : ACT_GATHER_INFO |
2012-06-18 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9590.nasl - Type : ACT_GATHER_INFO |
2012-06-18 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9593.nasl - Type : ACT_GATHER_INFO |
2012-06-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0721.nasl - Type : ACT_GATHER_INFO |
2012-06-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0729.nasl - Type : ACT_GATHER_INFO |
2012-06-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0730.nasl - Type : ACT_GATHER_INFO |
2012-06-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0729.nasl - Type : ACT_GATHER_INFO |
2012-06-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0730.nasl - Type : ACT_GATHER_INFO |
2012-06-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0734.nasl - Type : ACT_GATHER_INFO |
2012-06-14 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_java-1_4_2-ibm-8151.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The remote host has a version of Java that is affected by multiple vulnerabil... File : macosx_java_10_6_update9.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The remote host has a version of Java that is affected by multiple vulnerabil... File : macosx_java_10_7_2012-004.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The remote Windows host contains a programming platform that is affected by m... File : oracle_java_cpu_jun_2012.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0721.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The Windows kernel is affected by multiple elevation of privilege vulnerabili... File : smb_nt_ms12-042.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_xen-201206-8180.nasl - Type : ACT_GATHER_INFO |
2012-06-11 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_1_63.nasl - Type : ACT_GATHER_INFO |
2012-06-11 | Name : The remote database server is affected by a security bypass vulnerability. File : mysql_5_5_24.nasl - Type : ACT_GATHER_INFO |
2012-06-11 | Name : The remote host is missing Sun Security Patch number 146834-02 File : solaris10_146834.nasl - Type : ACT_GATHER_INFO |
2012-06-11 | Name : The remote host is missing Sun Security Patch number 146835-02 File : solaris10_x86_146835.nasl - Type : ACT_GATHER_INFO |
2012-05-31 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-085.nasl - Type : ACT_GATHER_INFO |
2012-05-29 | Name : The remote host is missing Sun Security Patch number 141104-04 File : solaris10_141104.nasl - Type : ACT_GATHER_INFO |
2012-05-29 | Name : The remote host is missing Sun Security Patch number 148407-01 File : solaris10_148407.nasl - Type : ACT_GATHER_INFO |
2012-05-23 | Name : The remote host is missing Sun Security Patch number 141105-04 File : solaris10_x86_141105.nasl - Type : ACT_GATHER_INFO |
2012-05-23 | Name : The remote host is missing Sun Security Patch number 148408-01 File : solaris10_x86_148408.nasl - Type : ACT_GATHER_INFO |
2012-05-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2472.nasl - Type : ACT_GATHER_INFO |
2012-05-17 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-7915.nasl - Type : ACT_GATHER_INFO |
2012-05-17 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libxml2-7997.nasl - Type : ACT_GATHER_INFO |
2012-05-10 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_10_7_4.nasl - Type : ACT_GATHER_INFO |
2012-04-27 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-065.nasl - Type : ACT_GATHER_INFO |
2012-04-25 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0514.nasl - Type : ACT_GATHER_INFO |
2012-04-24 | Name : The remote web server is affected by multiple vulnerabilities. File : glassfish_cpu_apr_2012.nasl - Type : ACT_GATHER_INFO |
2012-04-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0508.nasl - Type : ACT_GATHER_INFO |
2012-04-20 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_0_0_24.nasl - Type : ACT_GATHER_INFO |
2012-04-19 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_1_62.nasl - Type : ACT_GATHER_INFO |
2012-04-19 | Name : The remote database server is affected by multiple vulnerabilities. File : oracle_rdbms_cpu_apr_2012.nasl - Type : ACT_GATHER_INFO |
2012-04-16 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0475.nasl - Type : ACT_GATHER_INFO |
2012-04-16 | Name : The remote host is missing Sun Security Patch number 148955-01 File : solaris10_x86_148955.nasl - Type : ACT_GATHER_INFO |
2012-04-13 | Name : The remote host is missing Sun Security Patch number 148948-01 File : solaris10_148948.nasl - Type : ACT_GATHER_INFO |
2012-04-13 | Name : The remote host is missing Sun Security Patch number 148949-01 File : solaris10_x86_148949.nasl - Type : ACT_GATHER_INFO |
2012-04-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php5-120309.nasl - Type : ACT_GATHER_INFO |
2012-04-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0474.nasl - Type : ACT_GATHER_INFO |
2012-04-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0474.nasl - Type : ACT_GATHER_INFO |
2012-04-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0475.nasl - Type : ACT_GATHER_INFO |
2012-04-11 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_5_22.nasl - Type : ACT_GATHER_INFO |
2012-04-05 | Name : The remote host has a version of Java that is affected by multiple vulnerabil... File : macosx_java_10_6_update7.nasl - Type : ACT_GATHER_INFO |
2012-04-05 | Name : The remote host has a version of Java that is affected by multiple vulnerabil... File : macosx_java_10_7_2012-001.nasl - Type : ACT_GATHER_INFO |
2012-04-04 | Name : The remote host is missing Sun Security Patch number 148626-01 File : solaris10_x86_148626.nasl - Type : ACT_GATHER_INFO |
2012-04-02 | Name : The remote host is missing Sun Security Patch number 148625-01 File : solaris10_148625.nasl - Type : ACT_GATHER_INFO |
2012-03-26 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-mod_php5-8009.nasl - Type : ACT_GATHER_INFO |
2012-03-16 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2012-0005.nasl - Type : ACT_GATHER_INFO |
2012-03-07 | Name : The remote Fedora host is missing a security update. File : fedora_2012-1642.nasl - Type : ACT_GATHER_INFO |
2012-03-06 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201203-04.nasl - Type : ACT_GATHER_INFO |
2012-03-01 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1373-2.nasl - Type : ACT_GATHER_INFO |
2012-02-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2420.nasl - Type : ACT_GATHER_INFO |
2012-02-29 | Name : The remote Fedora host is missing a security update. File : fedora_2012-2595.nasl - Type : ACT_GATHER_INFO |
2012-02-29 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-201202-7972.nasl - Type : ACT_GATHER_INFO |
2012-02-28 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_6_0-openjdk-120220.nasl - Type : ACT_GATHER_INFO |
2012-02-28 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1376-1.nasl - Type : ACT_GATHER_INFO |
2012-02-27 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1373-1.nasl - Type : ACT_GATHER_INFO |
2012-02-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0324.nasl - Type : ACT_GATHER_INFO |
2012-02-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2417.nasl - Type : ACT_GATHER_INFO |
2012-02-22 | Name : The remote Fedora host is missing a security update. File : fedora_2012-1721.nasl - Type : ACT_GATHER_INFO |
2012-02-22 | Name : The remote web server is affected by a denial of service vulnerability. File : glassfish_cve-2011-5035.nasl - Type : ACT_GATHER_INFO |
2012-02-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0322.nasl - Type : ACT_GATHER_INFO |
2012-02-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0323.nasl - Type : ACT_GATHER_INFO |
2012-02-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0324.nasl - Type : ACT_GATHER_INFO |
2012-02-21 | Name : The remote Fedora host is missing a security update. File : fedora_2012-1598.nasl - Type : ACT_GATHER_INFO |
2012-02-20 | Name : The remote Fedora host is missing a security update. File : fedora_2012-1711.nasl - Type : ACT_GATHER_INFO |
2012-02-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-021.nasl - Type : ACT_GATHER_INFO |
2012-02-20 | Name : The remote web server uses a version of PHP that is affected by a code execut... File : php_5_3_9_ace.nasl - Type : ACT_ATTACK |
2012-02-20 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-201202-120203.nasl - Type : ACT_GATHER_INFO |
2012-02-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0139.nasl - Type : ACT_GATHER_INFO |
2012-02-17 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1368-1.nasl - Type : ACT_GATHER_INFO |
2012-02-16 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0128.nasl - Type : ACT_GATHER_INFO |
2012-02-16 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0135.nasl - Type : ACT_GATHER_INFO |
2012-02-16 | Name : The remote Fedora host is missing a security update. File : fedora_2012-1690.nasl - Type : ACT_GATHER_INFO |
2012-02-15 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-1301.nasl - Type : ACT_GATHER_INFO |
2012-02-15 | Name : The remote Windows host contains a programming platform that is affected by m... File : oracle_java_cpu_feb_2012.nasl - Type : ACT_GATHER_INFO |
2012-02-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0135.nasl - Type : ACT_GATHER_INFO |
2012-02-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0128.nasl - Type : ACT_GATHER_INFO |
2012-02-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1358-2.nasl - Type : ACT_GATHER_INFO |
2012-02-14 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1359-1.nasl - Type : ACT_GATHER_INFO |
2012-02-13 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2012-041-01.nasl - Type : ACT_GATHER_INFO |
2012-02-10 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0105.nasl - Type : ACT_GATHER_INFO |
2012-02-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1358-1.nasl - Type : ACT_GATHER_INFO |
2012-02-09 | Name : The web server running on the remote host has an information disclosure vulne... File : apache_mod_proxy_info_leak2.nasl - Type : ACT_ATTACK |
2012-02-09 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-1262.nasl - Type : ACT_GATHER_INFO |
2012-02-09 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0105.nasl - Type : ACT_GATHER_INFO |
2012-02-07 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2405.nasl - Type : ACT_GATHER_INFO |
2012-02-07 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-120129.nasl - Type : ACT_GATHER_INFO |
2012-02-07 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-120130.nasl - Type : ACT_GATHER_INFO |
2012-02-03 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0092.nasl - Type : ACT_GATHER_INFO |
2012-02-03 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0093.nasl - Type : ACT_GATHER_INFO |
2012-02-03 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2401.nasl - Type : ACT_GATHER_INFO |
2012-02-03 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-012.nasl - Type : ACT_GATHER_INFO |
2012-02-03 | Name : The remote web server uses a version of PHP that is affected by a code execut... File : php_5_3_10.nasl - Type : ACT_GATHER_INFO |
2012-02-03 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0092.nasl - Type : ACT_GATHER_INFO |
2012-02-03 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0093.nasl - Type : ACT_GATHER_INFO |
2012-02-02 | Name : The remote web server is affected by multiple vulnerabilities. File : apache_2_2_22.nasl - Type : ACT_GATHER_INFO |
2012-02-02 | Name : The web server running on the remote host is affected by an information discl... File : apache_httponly_info_leak.nasl - Type : ACT_ATTACK |
2012-02-02 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_4b7dbfab4c6b11e1bc160023ae8e59f0.nasl - Type : ACT_GATHER_INFO |
2012-02-01 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2399.nasl - Type : ACT_GATHER_INFO |
2012-01-31 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0071.nasl - Type : ACT_GATHER_INFO |
2012-01-27 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-0420.nasl - Type : ACT_GATHER_INFO |
2012-01-25 | Name : The remote host is missing Sun Security Patch number 148165-02 File : solaris10_148165.nasl - Type : ACT_GATHER_INFO |
2012-01-25 | Name : The remote host is missing Sun Security Patch number 148166-02 File : solaris10_x86_148166.nasl - Type : ACT_GATHER_INFO |
2012-01-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0033.nasl - Type : ACT_GATHER_INFO |
2012-01-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-7918.nasl - Type : ACT_GATHER_INFO |
2012-01-23 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_7f5ccb1d439b11e1bc160023ae8e59f0.nasl - Type : ACT_GATHER_INFO |
2012-01-20 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-0504.nasl - Type : ACT_GATHER_INFO |
2012-01-19 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_1_61.nasl - Type : ACT_GATHER_INFO |
2012-01-19 | Name : The remote database server is affected by multiple vulnerabilities. File : mysql_5_5_20.nasl - Type : ACT_GATHER_INFO |
2012-01-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0033.nasl - Type : ACT_GATHER_INFO |
2012-01-19 | Name : The remote application server is affected by multiple vulnerabilities. File : websphere_6_1_0_41.nasl - Type : ACT_GATHER_INFO |
2012-01-13 | Name : The remote web server uses a version of PHP that is affected by multiple flaws. File : php_5_3_9.nasl - Type : ACT_GATHER_INFO |
2012-01-13 | Name : The remote web server is affected by a denial of service vulnerability File : tomcat_5_5_35.nasl - Type : ACT_GATHER_INFO |
2012-01-13 | Name : The remote web server is affected by a denial of service vulnerability. File : tomcat_7_0_23.nasl - Type : ACT_GATHER_INFO |
2012-01-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0019.nasl - Type : ACT_GATHER_INFO |
2012-01-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2359.nasl - Type : ACT_GATHER_INFO |
2012-01-12 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_d39218103c8011e197e800215c6a37bb.nasl - Type : ACT_GATHER_INFO |
2012-01-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0019.nasl - Type : ACT_GATHER_INFO |
2012-01-11 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-003.nasl - Type : ACT_GATHER_INFO |
2012-01-03 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-197.nasl - Type : ACT_GATHER_INFO |
2011-12-14 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-111202.nasl - Type : ACT_GATHER_INFO |
2011-12-14 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-7882.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-110831.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-111026.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-111130.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-7722.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libapr1-7610.nasl - Type : ACT_GATHER_INFO |
2011-12-12 | Name : The remote web server is affected by multiple vulnerabilities. File : tomcat_6_0_35.nasl - Type : ACT_GATHER_INFO |
2011-11-29 | Name : The web server running on the remote host has an information disclosure vulne... File : apache_mod_proxy_info_leak.nasl - Type : ACT_ATTACK |
2011-11-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1465.nasl - Type : ACT_GATHER_INFO |
2011-11-15 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_d8c901ff0f0f11e1902b20cf30e32f6d.nasl - Type : ACT_GATHER_INFO |
2011-11-14 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_38560d790e4211e1902b20cf30e32f6d.nasl - Type : ACT_GATHER_INFO |
2011-11-11 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1259-1.nasl - Type : ACT_GATHER_INFO |
2011-11-10 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-168.nasl - Type : ACT_GATHER_INFO |
2011-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1256-1.nasl - Type : ACT_GATHER_INFO |
2011-11-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1253-1.nasl - Type : ACT_GATHER_INFO |
2011-11-02 | Name : The remote host is missing Sun Security Patch number 115336-06 File : solaris9_115336.nasl - Type : ACT_GATHER_INFO |
2011-10-31 | Name : The remote host is missing Sun Security Patch number 115337-05 File : solaris9_x86_115337.nasl - Type : ACT_GATHER_INFO |
2011-10-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1239-1.nasl - Type : ACT_GATHER_INFO |
2011-10-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1240-1.nasl - Type : ACT_GATHER_INFO |
2011-10-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1245-1.nasl - Type : ACT_GATHER_INFO |
2011-10-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-7721.nasl - Type : ACT_GATHER_INFO |
2011-10-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-1386.nasl - Type : ACT_GATHER_INFO |
2011-10-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-1392.nasl - Type : ACT_GATHER_INFO |
2011-10-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1386.nasl - Type : ACT_GATHER_INFO |
2011-10-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1391.nasl - Type : ACT_GATHER_INFO |
2011-10-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1392.nasl - Type : ACT_GATHER_INFO |
2011-10-13 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_10_7_2.nasl - Type : ACT_GATHER_INFO |
2011-10-13 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2011-006.nasl - Type : ACT_GATHER_INFO |
2011-10-12 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1227-1.nasl - Type : ACT_GATHER_INFO |
2011-10-10 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-144.nasl - Type : ACT_GATHER_INFO |
2011-10-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1225-1.nasl - Type : ACT_GATHER_INFO |
2011-10-03 | Name : The remote Fedora host is missing a security update. File : fedora_2011-12667.nasl - Type : ACT_GATHER_INFO |
2011-10-03 | Name : The remote Fedora host is missing a security update. File : fedora_2011-12815.nasl - Type : ACT_GATHER_INFO |
2011-09-30 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1219-1.nasl - Type : ACT_GATHER_INFO |
2011-09-30 | Name : The remote application server may be affected by multiple vulnerabilities. File : websphere_8_0_0_1.nasl - Type : ACT_GATHER_INFO |
2011-09-27 | Name : The remote Fedora host is missing a security update. File : fedora_2011-12890.nasl - Type : ACT_GATHER_INFO |
2011-09-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1211-1.nasl - Type : ACT_GATHER_INFO |
2011-09-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1212-1.nasl - Type : ACT_GATHER_INFO |
2011-09-19 | Name : The remote application server may be affected by multiple vulnerabilities. File : websphere_7_0_0_19.nasl - Type : ACT_GATHER_INFO |
2011-09-16 | Name : The remote Fedora host is missing a security update. File : fedora_2011-12715.nasl - Type : ACT_GATHER_INFO |
2011-09-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1202-1.nasl - Type : ACT_GATHER_INFO |
2011-09-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1204-1.nasl - Type : ACT_GATHER_INFO |
2011-09-12 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2011-252-01.nasl - Type : ACT_GATHER_INFO |
2011-09-06 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-130.nasl - Type : ACT_GATHER_INFO |
2011-09-02 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-1245.nasl - Type : ACT_GATHER_INFO |
2011-09-02 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1199-1.nasl - Type : ACT_GATHER_INFO |
2011-09-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1245.nasl - Type : ACT_GATHER_INFO |
2011-08-31 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_7f6108d2cea811e09d580800279895ea.nasl - Type : ACT_GATHER_INFO |
2011-08-30 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2298.nasl - Type : ACT_GATHER_INFO |
2011-08-25 | Name : The web server running on the remote host is affected by a denial of service ... File : apache_range_dos.nasl - Type : ACT_ATTACK |
2011-08-23 | Name : The remote Fedora host is missing a security update. File : fedora_2011-11103.nasl - Type : ACT_GATHER_INFO |
2011-07-26 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2284.nasl - Type : ACT_GATHER_INFO |
2011-07-26 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_9f14cb36b6fc11e0a044445c73746d79.nasl - Type : ACT_GATHER_INFO |
2011-07-12 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libapr-util1-110701.nasl - Type : ACT_GATHER_INFO |
2011-07-12 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libapr-util1-110706.nasl - Type : ACT_GATHER_INFO |
2011-07-12 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libapr-util1-7611.nasl - Type : ACT_GATHER_INFO |
2011-06-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1134-1.nasl - Type : ACT_GATHER_INFO |
2011-06-06 | Name : The remote Fedora host is missing a security update. File : fedora_2011-6918.nasl - Type : ACT_GATHER_INFO |
2011-06-06 | Name : The remote Fedora host is missing a security update. File : fedora_2011-7340.nasl - Type : ACT_GATHER_INFO |
2011-06-03 | Name : The remote Fedora host is missing a security update. File : fedora_2011-6750.nasl - Type : ACT_GATHER_INFO |
2011-06-02 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-0844.nasl - Type : ACT_GATHER_INFO |
2011-06-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0844.nasl - Type : ACT_GATHER_INFO |
2011-05-24 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_99a5590c857e11e096b700300582f9fc.nasl - Type : ACT_GATHER_INFO |
2011-05-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-095.nasl - Type : ACT_GATHER_INFO |
2011-05-16 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2011-133-01.nasl - Type : ACT_GATHER_INFO |
2011-05-16 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2237.nasl - Type : ACT_GATHER_INFO |
2011-05-16 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_00b296b67db111e096b700300582f9fc.nasl - Type : ACT_GATHER_INFO |
2011-05-16 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-084.nasl - Type : ACT_GATHER_INFO |
2011-05-13 | Name : The remote web server may be affected by a denial of service vulnerability. File : apache_2_2_18.nasl - Type : ACT_GATHER_INFO |
2011-05-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-0507.nasl - Type : ACT_GATHER_INFO |
2011-05-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0507.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_10_6_7.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2011-001.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-100413.nasl - Type : ACT_GATHER_INFO |
2010-11-10 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_6_5.nasl - Type : ACT_GATHER_INFO |
2010-10-20 | Name : The remote web server is affected by multiple vulnerabilities File : apache_2_2_15.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-6572.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-6987.nasl - Type : ACT_GATHER_INFO |
2010-09-17 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_6_2_0_12.nasl - Type : ACT_GATHER_INFO |
2010-09-01 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20090908-tcp24http.nasl - Type : ACT_GATHER_INFO |
2010-08-31 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0659.nasl - Type : ACT_GATHER_INFO |
2010-08-17 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-153.nasl - Type : ACT_GATHER_INFO |
2010-07-30 | Name : The remote web server is affected by multiple vulnerabilities. File : apache_2_2_16.nasl - Type : ACT_GATHER_INFO |
2010-07-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-102.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-5942.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-6055.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-6131.nasl - Type : ACT_GATHER_INFO |
2010-05-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0168.nasl - Type : ACT_GATHER_INFO |
2010-05-04 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12613.nasl - Type : ACT_GATHER_INFO |
2010-04-27 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_apache2-100413.nasl - Type : ACT_GATHER_INFO |
2010-04-27 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_apache2-100413.nasl - Type : ACT_GATHER_INFO |
2010-04-27 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_apache2-100413.nasl - Type : ACT_GATHER_INFO |
2010-04-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-6984.nasl - Type : ACT_GATHER_INFO |
2010-04-19 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2035.nasl - Type : ACT_GATHER_INFO |
2010-03-29 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0168.nasl - Type : ACT_GATHER_INFO |
2010-03-11 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-908-1.nasl - Type : ACT_GATHER_INFO |
2010-03-09 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2010-067-01.nasl - Type : ACT_GATHER_INFO |
2010-03-03 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-053.nasl - Type : ACT_GATHER_INFO |
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1834.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-1107.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-1148.nasl - Type : ACT_GATHER_INFO |
2009-12-08 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-323.nasl - Type : ACT_GATHER_INFO |
2009-12-04 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-314.nasl - Type : ACT_GATHER_INFO |
2009-11-09 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_6_2.nasl - Type : ACT_GATHER_INFO |
2009-11-09 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2009-006.nasl - Type : ACT_GATHER_INFO |
2009-10-30 | Name : The remote openSUSE host is missing a security update. File : suse_apache2-6576.nasl - Type : ACT_GATHER_INFO |
2009-10-26 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12526.nasl - Type : ACT_GATHER_INFO |
2009-10-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_apache2-091020.nasl - Type : ACT_GATHER_INFO |
2009-10-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_apache2-091020.nasl - Type : ACT_GATHER_INFO |
2009-10-26 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-091020.nasl - Type : ACT_GATHER_INFO |
2009-10-26 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-6571.nasl - Type : ACT_GATHER_INFO |
2009-10-07 | Name : The remote web server is affected by multiple vulnerabilities. File : apache_2_2_14.nasl - Type : ACT_GATHER_INFO |
2009-10-06 | Name : The remote openSUSE host is missing a security update. File : suse_libapr-util1-6288.nasl - Type : ACT_GATHER_INFO |
2009-09-30 | Name : The remote host is missing Sun Security Patch number 125533-19 File : solaris10_125533.nasl - Type : ACT_GATHER_INFO |
2009-09-30 | Name : The remote host is missing Sun Security Patch number 125534-19 File : solaris10_x86_125534.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_libapr-util1-090608.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libapr-util1-6289.nasl - Type : ACT_GATHER_INFO |
2009-09-23 | Name : The remote application server is affected by multiple vulnerabilities. File : websphere_6_1_0_27.nasl - Type : ACT_GATHER_INFO |
2009-09-08 | Name : Multiple vulnerabilities in the Windows TCP/IP implementation could lead to d... File : smb_nt_ms09-048.nasl - Type : ACT_GATHER_INFO |
2009-09-02 | Name : The remote Fedora host is missing a security update. File : fedora_2009-8812.nasl - Type : ACT_GATHER_INFO |
2009-08-25 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_e15f2356913911de8f42001aa0166822.nasl - Type : ACT_GATHER_INFO |
2009-08-20 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-802-2.nasl - Type : ACT_GATHER_INFO |
2009-08-10 | Name : The remote Fedora host is missing a security update. File : fedora_2009-8349.nasl - Type : ACT_GATHER_INFO |
2009-08-07 | Name : The remote Fedora host is missing a security update. File : fedora_2009-8318.nasl - Type : ACT_GATHER_INFO |
2009-08-03 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2009-214-01.nasl - Type : ACT_GATHER_INFO |
2009-08-02 | Name : The remote web server may be affected by several issues. File : apache_2_2_12.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_libapr-util1-090608.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_libapr-util1-090608.nasl - Type : ACT_GATHER_INFO |
2009-07-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-802-1.nasl - Type : ACT_GATHER_INFO |
2009-07-13 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200907-04.nasl - Type : ACT_GATHER_INFO |
2009-07-10 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-149.nasl - Type : ACT_GATHER_INFO |
2009-07-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-1148.nasl - Type : ACT_GATHER_INFO |
2009-07-06 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200907-03.nasl - Type : ACT_GATHER_INFO |
2009-06-25 | Name : The remote Fedora host is missing a security update. File : fedora_2009-5969.nasl - Type : ACT_GATHER_INFO |
2009-06-25 | Name : The remote Fedora host is missing a security update. File : fedora_2009-6014.nasl - Type : ACT_GATHER_INFO |
2009-06-25 | Name : The remote Fedora host is missing a security update. File : fedora_2009-6261.nasl - Type : ACT_GATHER_INFO |
2009-06-18 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-1108.nasl - Type : ACT_GATHER_INFO |
2009-06-17 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2009-167-02.nasl - Type : ACT_GATHER_INFO |
2009-06-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-1107.nasl - Type : ACT_GATHER_INFO |
2009-06-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-1108.nasl - Type : ACT_GATHER_INFO |
2009-06-12 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-787-1.nasl - Type : ACT_GATHER_INFO |
2009-06-11 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-786-1.nasl - Type : ACT_GATHER_INFO |
2009-06-08 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1812.nasl - Type : ACT_GATHER_INFO |
2009-06-08 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_eb9212f7526b11debbf2001b77d09812.nasl - Type : ACT_GATHER_INFO |
2009-06-08 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-131.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-127.nasl - Type : ACT_GATHER_INFO |
2009-01-19 | Name : The remote host is missing Sun Security Patch number 128640-30 File : solaris10_128640.nasl - Type : ACT_GATHER_INFO |
2009-01-19 | Name : The remote host is missing Sun Security Patch number 128641-30 File : solaris10_x86_128641.nasl - Type : ACT_GATHER_INFO |
2009-01-19 | Name : The remote host is missing Sun Security Patch number 128640-30 File : solaris9_128640.nasl - Type : ACT_GATHER_INFO |
2009-01-19 | Name : The remote host is missing Sun Security Patch number 128641-30 File : solaris9_x86_128641.nasl - Type : ACT_GATHER_INFO |
2007-11-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200711-06.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2007-0704.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2007-2214.nasl - Type : ACT_GATHER_INFO |
2007-10-18 | Name : The remote host is missing Sun Security Patch number 124672-20 File : solaris8_124672.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote host is missing Sun Security Patch number 124672-20 File : solaris10_124672.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote host is missing Sun Security Patch number 124673-20 File : solaris10_x86_124673.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote host is missing Sun Security Patch number 127548-01 File : solaris8_127548.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote host is missing Sun Security Patch number 127549-01 File : solaris8_x86_127549.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote host is missing Sun Security Patch number 123396-01 File : solaris9_123396.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote host is missing Sun Security Patch number 124672-20 File : solaris9_124672.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote host is missing Sun Security Patch number 123397-01 File : solaris9_x86_123397.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote host is missing Sun Security Patch number 124673-20 File : solaris9_x86_124673.nasl - Type : ACT_GATHER_INFO |
2007-10-12 | Name : The remote host is missing Sun Security Patch number 120739-08 File : solaris10_120739.nasl - Type : ACT_GATHER_INFO |
2007-10-12 | Name : The remote host is missing Sun Security Patch number 120740-08 File : solaris10_x86_120740.nasl - Type : ACT_GATHER_INFO |
2007-09-14 | Name : The remote web server is affected by multiple vulnerabilities. File : apache_2_2_6.nasl - Type : ACT_GATHER_INFO |
2007-07-18 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-615.nasl - Type : ACT_GATHER_INFO |
2007-06-18 | Name : The remote host is missing Sun Security Patch number 119783-40 File : solaris10_119783.nasl - Type : ACT_GATHER_INFO |
2007-06-18 | Name : The remote host is missing Sun Security Patch number 119784-40 File : solaris10_x86_119784.nasl - Type : ACT_GATHER_INFO |
2007-03-18 | Name : The remote host is missing Sun Security Patch number 122301-61 File : solaris9_x86_122301.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote host is missing Sun Security Patch number 120543-36 File : solaris10_120543.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote host is missing Sun Security Patch number 120544-36 File : solaris10_x86_120544.nasl - Type : ACT_GATHER_INFO |
2004-07-12 | Name : The remote host is missing Sun Security Patch number 112874-47 File : solaris9_112874.nasl - Type : ACT_GATHER_INFO |
2004-07-12 | Name : The remote host is missing Sun Security Patch number 112908-38 File : solaris9_112908.nasl - Type : ACT_GATHER_INFO |
2004-07-12 | Name : The remote host is missing Sun Security Patch number 115168-24 File : solaris9_x86_115168.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-11-25 21:25:36 |
|
2016-11-25 17:25:14 |
|
2016-11-23 21:23:55 |
|
2016-11-23 00:26:09 |
|
2016-11-04 00:24:40 |
|
2016-11-03 01:01:52 |
|
2016-05-18 21:39:00 |
|
2013-10-11 13:30:43 |
|
2013-04-22 21:18:31 |
|