This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:linux:linux_kernel:3.14.19
Detail
VendorLinuxFirst view 2014-06-23
ProductLinux KernelLast view2019-10-07
Version3.14.19TypeOs
Edition 
Language 
Update 
 
CPE Productcpe:/o:linux:linux_kernel

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
4.92019-10-07CVE-2019-17351LocalLowNone Requ...
7.52019-10-04CVE-2019-17133NetworkLowNone Requ...
7.12019-10-01CVE-2019-17075NetworkMediumNone Requ...
2.12019-10-01CVE-2019-17056LocalLowNone Requ...
2.12019-10-01CVE-2019-17055LocalLowNone Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
2.12019-10-01CVE-2019-17054LocalLowNone Requ...
2.12019-10-01CVE-2019-17053LocalLowNone Requ...
2.12019-10-01CVE-2019-17052LocalLowNone Requ...
7.82019-09-30CVE-2019-16995NetworkLowNone Requ...
7.82019-09-30CVE-2019-16994NetworkLowNone Requ...
52019-09-27CVE-2019-16921NetworkLowNone Requ...
7.52019-09-24CVE-2019-16746NetworkLowNone Requ...
52019-09-23CVE-2019-16714NetworkLowNone Requ...
7.22019-09-20CVE-2019-14816LocalLowNone Requ...
7.22019-09-20CVE-2019-14814LocalLowNone Requ...
7.22019-09-19CVE-2019-14821LocalLowNone Requ...
52019-09-18CVE-2019-16413NetworkLowNone Requ...
7.22019-09-17CVE-2019-14835LocalLowNone Requ...
3.62019-09-13CVE-2019-15031LocalLowNone Requ...
3.62019-09-13CVE-2019-15030LocalLowNone Requ...
7.52019-09-06CVE-2019-16089NetworkLowNone Requ...
7.22019-09-04CVE-2019-15927LocalLowNone Requ...
9.42019-09-04CVE-2019-15926NetworkLowNone Requ...
7.22019-09-04CVE-2019-15925LocalLowNone Requ...

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
11% (86)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
11% (81)CWE-476NULL Pointer Dereference
10% (74)CWE-200Information Exposure
9% (73)CWE-416Use After Free
9% (67)CWE-362Race Condition
Hide | Show 20 More...
%idName
7% (52)CWE-264Permissions, Privileges, and Access Controls
6% (48)CWE-20Improper Input Validation
5% (42)CWE-399Resource Management Errors
5% (39)CWE-125Out-of-bounds Read
2% (21)CWE-787Out-of-bounds Write
2% (21)CWE-190Integer Overflow or Wraparound
1% (14)CWE-189Numeric Errors
1% (12)CWE-415Double Free
1% (11)CWE-400Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (11)CWE-17Code
1% (9)CWE-284Access Control (Authorization) Issues
1% (8)CWE-772Missing Release of Resource after Effective Lifetime
0% (7)CWE-369Divide By Zero
0% (6)CWE-19Data Handling
0% (5)CWE-388Error Handling
0% (5)CWE-120Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
0% (4)CWE-276Incorrect Default Permissions
0% (4)CWE-254Security Features
0% (3)CWE-617Reachable Assertion
0% (3)CWE-404Improper Resource Shutdown or Release

Oval Markup Language : Definitions

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalIDName
oval:org.mitre.oval:def:27268ELSA-2014-1724 -- kernel security and bug fix update (important)
oval:org.mitre.oval:def:27992RHSA-2014:1843 -- kernel security and bug fix update (Important)
oval:org.mitre.oval:def:26751USN-2332-1 -- linux vulnerabilities
oval:org.mitre.oval:def:26732USN-2334-1 -- linux vulnerabilities
oval:org.mitre.oval:def:26346USN-2335-1 -- linux-ti-omap4 vulnerabilities
Hide | Show 20 More...
idName
oval:org.mitre.oval:def:26081USN-2333-1 -- linux-ec2 vulnerabilities
oval:org.mitre.oval:def:27086RHSA-2014:1392: kernel security, bug fix, and enhancement update (Important)
oval:org.mitre.oval:def:28090RHSA-2014:1724 -- kernel security and bug fix update (Important)
oval:org.mitre.oval:def:25244USN-2266-1 -- linux vulnerability
oval:org.mitre.oval:def:25225USN-2269-1 -- linux-lts-quantal vulnerability
oval:org.mitre.oval:def:25221USN-2274-1 -- linux vulnerability
oval:org.mitre.oval:def:25147USN-2270-1 -- linux-lts-raring vulnerability
oval:org.mitre.oval:def:25135USN-2271-1 -- linux-lts-saucy vulnerability
oval:org.mitre.oval:def:25087DSA-2972-1 -- linux - security update
oval:org.mitre.oval:def:25029USN-2267-1 -- linux-ec2 vulnerability
oval:org.mitre.oval:def:25022USN-2272-1 -- linux-lts-trusty vulnerability
oval:org.mitre.oval:def:24957USN-2268-1 -- linux vulnerability
oval:org.mitre.oval:def:26192SUSE-SU-2014:0910-1 -- Security update for Linux kernel
oval:org.mitre.oval:def:25414SUSE-SU-2014:0911-1 -- Security update for Linux kernel
oval:org.mitre.oval:def:25325SUSE-SU-2014:0912-1 -- Security update for Linux kernel
oval:org.mitre.oval:def:27072USN-2273-1 -- Linux kernel vulnerability
oval:org.mitre.oval:def:27341ELSA-2014-3048 -- unbreakable enterprise kernel security update (important)
oval:org.mitre.oval:def:27297ELSA-2014-0923 -- kernel security update (important)
oval:org.mitre.oval:def:27252ELSA-2014-0924 -- kernel security update (important)
oval:org.mitre.oval:def:26617ELSA-2014-3047 -- unbreakable enterprise kernel security update (important)

SAINT Exploits

DescriptionLink
Ubuntu overlayfs privilege elevationMore info here
Linux Dirty COW Local File OverwriteMore info here

ExploitDB Exploits

idDescription
34923Linux Kernel remount FUSE Exploit
34134Linux Kernel ptrace/sysret - Local Privilege Escalation

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2017-11-21Linux kernel nfsd nfsd4_layout_verify out of bounds read attempt
RuleID : 44638 - Type : PROTOCOL-RPC - Revision : 1
2017-11-21Linux kernel nfsd nfsd4_layout_verify out of bounds read attempt
RuleID : 44637 - Type : PROTOCOL-RPC - Revision : 1
2017-08-24Linux kernel SCTP invalid chunk length denial of service attempt
RuleID : 43692 - Type : OS-LINUX - Revision : 1
2017-07-18Linux kernel NFSv3 malformed WRITE arbitrary memory read attempt
RuleID : 43189 - Type : PROTOCOL-RPC - Revision : 2
2017-07-18Linux kernel NFSv2 malformed WRITE arbitrary memory read attempt
RuleID : 43188 - Type : PROTOCOL-RPC - Revision : 2
Hide | Show 21 More...
DateDescription
2017-01-18Linux net af_packet.c tpacket version race condition use after free attempt
RuleID : 41028 - Type : OS-LINUX - Revision : 2
2017-01-18Linux net af_packet.c tpacket version race condition use after free attempt
RuleID : 41027 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40566 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40565 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40564 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40563 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40562 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40561 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40560 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40543 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40542 - Type : OS-LINUX - Revision : 2
2018-05-23Linux Kernel Challenge ACK provocation attempt
RuleID : 40063-community - Type : OS-LINUX - Revision : 5
2016-10-11Linux Kernel Challenge ACK provocation attempt
RuleID : 40063 - Type : OS-LINUX - Revision : 5
2016-09-17Linux Kernel USBIP out of bounds write attempt
RuleID : 39894 - Type : OS-LINUX - Revision : 2
2016-09-17Linux Kernel USBIP out of bounds write attempt
RuleID : 39893 - Type : OS-LINUX - Revision : 2
2016-03-29Linux kernel SCTP INIT null pointer dereference attempt
RuleID : 38346 - Type : OS-LINUX - Revision : 1
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37438 - Type : OS-LINUX - Revision : 2
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37437 - Type : OS-LINUX - Revision : 2
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37436 - Type : OS-LINUX - Revision : 2
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37435 - Type : OS-LINUX - Revision : 2

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2019-01-17Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-509c133845.nasl - Type : ACT_GATHER_INFO
2019-01-17Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-f812c9fb22.nasl - Type : ACT_GATHER_INFO
2019-01-15Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-337484d88b.nasl - Type : ACT_GATHER_INFO
2019-01-15Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-b0f7a7b74b.nasl - Type : ACT_GATHER_INFO
2019-01-14Name : The remote Virtuozzo host is missing multiple security updates.
File : Virtuozzo_VZA-2016-104.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2019-01-14Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2019-1145.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-072.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing multiple security updates.
File : Virtuozzo_VZA-2018-075.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-077.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-085.nasl - Type : ACT_GATHER_INFO
2019-01-10Name : The remote Amazon Linux 2 host is missing a security update.
File : al2_ALAS-2019-1145.nasl - Type : ACT_GATHER_INFO
2019-01-10Name : The remote device is affected by multiple vulnerabilities.
File : juniper_space_jsa10917_183R1.nasl - Type : ACT_GATHER_INFO
2019-01-10Name : The remote device is affected by multiple vulnerabilities.
File : juniper_space_jsa10917_184R1.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-8d90571cdf.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-3857a8b41a.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-e820fccd83.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-93af520878.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-ec3bf1b228.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-f1b818a5c9.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-f392ab8c84.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-f55c305488.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-9f4381d8c4.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-a0914af224.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-50075276e8.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-ac3b4c7605.nasl - Type : ACT_GATHER_INFO