This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:linux:linux_kernel:3.14.57
Detail
VendorLinuxFirst view 2014-06-23
ProductLinux KernelLast view2019-08-07
Version3.14.57TypeOs
Edition 
Language 
Update 
 
CPE Productcpe:/o:linux:linux_kernel

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
4.92019-08-07CVE-2019-14763LocalLowNone Requ...
102019-08-07CVE-2018-20961NetworkLowNone Requ...
52019-07-30CVE-2018-16871NetworkLowNone Requ...
7.52019-07-27CVE-2017-18379NetworkLowNone Requ...
7.52019-07-27CVE-2016-10764NetworkLowNone Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
7.52019-07-27CVE-2015-9289NetworkLowNone Requ...
2.12019-07-26CVE-2019-14284LocalLowNone Requ...
4.62019-07-26CVE-2019-14283LocalLowNone Requ...
4.62019-07-26CVE-2018-20856LocalLowNone Requ...
2.12019-07-26CVE-2018-20855LocalLowNone Requ...
4.62019-07-26CVE-2018-20854LocalLowNone Requ...
4.92019-07-19CVE-2019-13648LocalLowNone Requ...
4.62019-07-17CVE-2019-13631LocalLowNone Requ...
7.22019-07-17CVE-2019-13272LocalLowNone Requ...
4.32019-07-05CVE-2019-10638NetworkMediumNone Requ...
4.42019-07-04CVE-2019-13233LocalMediumNone Requ...
4.32019-06-26CVE-2019-12984NetworkMediumNone Requ...
6.92019-06-25CVE-2019-12817LocalMediumNone Requ...
52019-06-18CVE-2019-11479NetworkLowNone Requ...
52019-06-18CVE-2019-11478NetworkLowNone Requ...
7.82019-06-18CVE-2019-11477NetworkLowNone Requ...
2.12019-06-13CVE-2019-12819LocalLowNone Requ...
52019-06-13CVE-2019-12818NetworkLowNone Requ...
7.82019-06-03CVE-2019-12615NetworkLowNone Requ...

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
12% (84)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
10% (70)CWE-264Permissions, Privileges, and Access Controls
10% (70)CWE-200Information Exposure
9% (66)CWE-476NULL Pointer Dereference
9% (66)CWE-362Race Condition
Hide | Show 20 More...
%idName
8% (59)CWE-416Use After Free
7% (54)CWE-399Resource Management Errors
6% (44)CWE-20Improper Input Validation
4% (32)CWE-125Out-of-bounds Read
3% (21)CWE-190Integer Overflow or Wraparound
2% (17)CWE-284Access Control (Authorization) Issues
2% (15)CWE-787Out-of-bounds Write
2% (15)CWE-189Numeric Errors
1% (11)CWE-19Data Handling
1% (11)CWE-17Code
1% (9)CWE-415Double Free
1% (9)CWE-400Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (8)CWE-254Security Features
1% (7)CWE-369Divide By Zero
0% (6)CWE-388Error Handling
0% (2)CWE-310Cryptographic Issues
0% (2)CWE-129Improper Validation of Array Index
0% (1)CWE-754Improper Check for Unusual or Exceptional Conditions
0% (1)CWE-704Incorrect Type Conversion or Cast
0% (1)CWE-682Incorrect Calculation

Oval Markup Language : Definitions

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalIDName
oval:org.mitre.oval:def:27268ELSA-2014-1724 -- kernel security and bug fix update (important)
oval:org.mitre.oval:def:27992RHSA-2014:1843 -- kernel security and bug fix update (Important)
oval:org.mitre.oval:def:26751USN-2332-1 -- linux vulnerabilities
oval:org.mitre.oval:def:26732USN-2334-1 -- linux vulnerabilities
oval:org.mitre.oval:def:26346USN-2335-1 -- linux-ti-omap4 vulnerabilities
Hide | Show 20 More...
idName
oval:org.mitre.oval:def:26081USN-2333-1 -- linux-ec2 vulnerabilities
oval:org.mitre.oval:def:27086RHSA-2014:1392: kernel security, bug fix, and enhancement update (Important)
oval:org.mitre.oval:def:28090RHSA-2014:1724 -- kernel security and bug fix update (Important)
oval:org.mitre.oval:def:25244USN-2266-1 -- linux vulnerability
oval:org.mitre.oval:def:25225USN-2269-1 -- linux-lts-quantal vulnerability
oval:org.mitre.oval:def:25221USN-2274-1 -- linux vulnerability
oval:org.mitre.oval:def:25147USN-2270-1 -- linux-lts-raring vulnerability
oval:org.mitre.oval:def:25135USN-2271-1 -- linux-lts-saucy vulnerability
oval:org.mitre.oval:def:25087DSA-2972-1 -- linux - security update
oval:org.mitre.oval:def:25029USN-2267-1 -- linux-ec2 vulnerability
oval:org.mitre.oval:def:25022USN-2272-1 -- linux-lts-trusty vulnerability
oval:org.mitre.oval:def:24957USN-2268-1 -- linux vulnerability
oval:org.mitre.oval:def:26192SUSE-SU-2014:0910-1 -- Security update for Linux kernel
oval:org.mitre.oval:def:25414SUSE-SU-2014:0911-1 -- Security update for Linux kernel
oval:org.mitre.oval:def:25325SUSE-SU-2014:0912-1 -- Security update for Linux kernel
oval:org.mitre.oval:def:27072USN-2273-1 -- Linux kernel vulnerability
oval:org.mitre.oval:def:27341ELSA-2014-3048 -- unbreakable enterprise kernel security update (important)
oval:org.mitre.oval:def:27297ELSA-2014-0923 -- kernel security update (important)
oval:org.mitre.oval:def:27252ELSA-2014-0924 -- kernel security update (important)
oval:org.mitre.oval:def:26617ELSA-2014-3047 -- unbreakable enterprise kernel security update (important)

SAINT Exploits

DescriptionLink
Ubuntu overlayfs privilege elevationMore info here
Linux Dirty COW Local File OverwriteMore info here

ExploitDB Exploits

idDescription
34923Linux Kernel remount FUSE Exploit
34134Linux Kernel ptrace/sysret - Local Privilege Escalation

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2017-11-21Linux kernel nfsd nfsd4_layout_verify out of bounds read attempt
RuleID : 44638 - Type : PROTOCOL-RPC - Revision : 1
2017-11-21Linux kernel nfsd nfsd4_layout_verify out of bounds read attempt
RuleID : 44637 - Type : PROTOCOL-RPC - Revision : 1
2017-08-24Linux kernel SCTP invalid chunk length denial of service attempt
RuleID : 43692 - Type : OS-LINUX - Revision : 1
2017-07-18Linux kernel NFSv3 malformed WRITE arbitrary memory read attempt
RuleID : 43189 - Type : PROTOCOL-RPC - Revision : 2
2017-07-18Linux kernel NFSv2 malformed WRITE arbitrary memory read attempt
RuleID : 43188 - Type : PROTOCOL-RPC - Revision : 2
Hide | Show 21 More...
DateDescription
2017-01-18Linux net af_packet.c tpacket version race condition use after free attempt
RuleID : 41028 - Type : OS-LINUX - Revision : 2
2017-01-18Linux net af_packet.c tpacket version race condition use after free attempt
RuleID : 41027 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40566 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40565 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40564 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40563 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40562 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40561 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40560 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40543 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40542 - Type : OS-LINUX - Revision : 2
2018-05-23Linux Kernel Challenge ACK provocation attempt
RuleID : 40063-community - Type : OS-LINUX - Revision : 5
2016-10-11Linux Kernel Challenge ACK provocation attempt
RuleID : 40063 - Type : OS-LINUX - Revision : 5
2016-09-17Linux Kernel USBIP out of bounds write attempt
RuleID : 39894 - Type : OS-LINUX - Revision : 2
2016-09-17Linux Kernel USBIP out of bounds write attempt
RuleID : 39893 - Type : OS-LINUX - Revision : 2
2016-03-29Linux kernel SCTP INIT null pointer dereference attempt
RuleID : 38346 - Type : OS-LINUX - Revision : 1
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37438 - Type : OS-LINUX - Revision : 2
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37437 - Type : OS-LINUX - Revision : 2
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37436 - Type : OS-LINUX - Revision : 2
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37435 - Type : OS-LINUX - Revision : 2

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2019-01-17Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-509c133845.nasl - Type : ACT_GATHER_INFO
2019-01-17Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-f812c9fb22.nasl - Type : ACT_GATHER_INFO
2019-01-15Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-337484d88b.nasl - Type : ACT_GATHER_INFO
2019-01-15Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-b0f7a7b74b.nasl - Type : ACT_GATHER_INFO
2019-01-14Name : The remote Virtuozzo host is missing multiple security updates.
File : Virtuozzo_VZA-2016-104.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2019-01-14Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2019-1145.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-072.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing multiple security updates.
File : Virtuozzo_VZA-2018-075.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-077.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-085.nasl - Type : ACT_GATHER_INFO
2019-01-10Name : The remote Amazon Linux 2 host is missing a security update.
File : al2_ALAS-2019-1145.nasl - Type : ACT_GATHER_INFO
2019-01-10Name : The remote device is affected by multiple vulnerabilities.
File : juniper_space_jsa10917_183R1.nasl - Type : ACT_GATHER_INFO
2019-01-10Name : The remote device is affected by multiple vulnerabilities.
File : juniper_space_jsa10917_184R1.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-8d90571cdf.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-3857a8b41a.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-e820fccd83.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-93af520878.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-ec3bf1b228.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-f1b818a5c9.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-f392ab8c84.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-f55c305488.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-9f4381d8c4.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-a0914af224.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-50075276e8.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-ac3b4c7605.nasl - Type : ACT_GATHER_INFO