This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:redhat:enterprise_linux_desktop:6.0
Detail
VendorRedhatFirst view 2012-05-03
ProductEnterprise Linux DesktopLast view2019-08-02
Version6.0TypeOs
Edition 
Language 
Update 
 
CPE Productcpe:/o:redhat:enterprise_linux_desktop

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
4.62019-08-02CVE-2019-10168LocalLowNone Requ...
4.62019-08-02CVE-2019-10167LocalLowNone Requ...
4.62019-08-02CVE-2019-10166LocalLowNone Requ...
7.22019-06-18CVE-2019-3896LocalLowNone Requ...
9.32019-05-22CVE-2019-7837NetworkMediumNone Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
7.52019-02-28CVE-2018-18498NetworkLowNone Requ...
4.32019-02-28CVE-2018-18494NetworkMediumNone Requ...
7.52019-02-28CVE-2018-18493NetworkLowNone Requ...
7.52019-02-28CVE-2018-18492NetworkLowNone Requ...
7.52019-02-28CVE-2018-12405NetworkLowNone Requ...
3.62019-02-28CVE-2018-12397LocalLowNone Requ...
4.32019-02-28CVE-2018-12396NetworkMediumNone Requ...
52019-02-28CVE-2018-12395NetworkLowNone Requ...
52019-02-28CVE-2018-12393NetworkLowNone Requ...
7.52019-02-28CVE-2018-12392NetworkLowNone Requ...
7.52019-02-28CVE-2018-12390NetworkLowNone Requ...
6.82019-02-28CVE-2018-12389NetworkMediumNone Requ...
6.82019-02-19CVE-2019-5782NetworkMediumNone Requ...
4.32019-02-19CVE-2019-5781NetworkMediumNone Requ...
4.62019-02-19CVE-2019-5780LocalLowNone Requ...
4.32019-02-19CVE-2019-5779NetworkMediumNone Requ...
4.32019-02-19CVE-2019-5778NetworkMediumNone Requ...
4.32019-02-19CVE-2019-5777NetworkMediumNone Requ...
4.32019-02-19CVE-2019-5776NetworkMediumNone Requ...

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
16% (108)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
14% (96)CWE-416Use After Free
14% (93)CWE-20Improper Input Validation
9% (60)CWE-200Information Exposure
8% (57)CWE-284Access Control (Authorization) Issues
Hide | Show 20 More...
%idName
6% (41)CWE-125Out-of-bounds Read
3% (23)CWE-264Permissions, Privileges, and Access Controls
3% (20)CWE-787Out-of-bounds Write
3% (20)CWE-254Security Features
2% (16)CWE-190Integer Overflow or Wraparound
2% (16)CWE-19Data Handling
2% (14)CWE-704Incorrect Type Conversion or Cast
1% (8)CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting')
1% (7)CWE-399Resource Management Errors
0% (6)CWE-362Race Condition
0% (6)CWE-189Numeric Errors
0% (4)CWE-310Cryptographic Issues
0% (4)CWE-94Failure to Control Generation of Code ('Code Injection')
0% (3)CWE-502Deserialization of Untrusted Data
0% (3)CWE-476NULL Pointer Dereference
0% (3)CWE-369Divide By Zero
0% (3)CWE-346Origin Validation Error
0% (3)CWE-255Credentials Management
0% (3)CWE-77Improper Sanitization of Special Elements used in a Command ('Comma...
0% (2)CWE-415Double Free

Oval Markup Language : Definitions

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalIDName
oval:org.mitre.oval:def:20722RHSA-2013:0218: xorg-x11-drv-qxl security update (Moderate)
oval:org.mitre.oval:def:18258USN-1714-1 -- xserver-xorg-video-qxl vulnerability
oval:org.mitre.oval:def:23075ELSA-2013:0218: xorg-x11-drv-qxl security update (Moderate)
oval:org.mitre.oval:def:27519DEPRECATED: ELSA-2013-0218 -- xorg-x11-drv-qxl security update (moderate)
oval:org.mitre.oval:def:27057ELSA-2014-1653 -- openssl security update
Hide | Show 20 More...
idName
oval:org.mitre.oval:def:27014RHSA-2014:1653: openssl security update (Moderate)
oval:org.mitre.oval:def:27138HP-UX Running OpenSSL, Remote Denial of Service (DoS), Unauthorized Access, M...
oval:org.mitre.oval:def:27104AIX OpenSSL Patch to mitigate CVE-2014-3566
oval:org.mitre.oval:def:28154IBM SDK Java Technology Edition vulnerability
oval:org.mitre.oval:def:28488SUSE-SU-2014:1519-1 -- Security update for evolution-data-server (moderate)
oval:org.mitre.oval:def:28481SUSE-SU-2014:1512-1 -- Security update for compat-openssl098 (moderate)
oval:org.mitre.oval:def:28273SUSE-SU-2014:1524-1 -- Security update for openssl (moderate)
oval:org.mitre.oval:def:28230SUSE-SU-2014:1447-1 -- Security update for openwsman (moderate)
oval:org.mitre.oval:def:28678SUSE-SU-2014:1558-1 -- Security update for pure-ftpd (moderate)
oval:org.mitre.oval:def:28595Potential security vulnerabilities have been identified in the Java Runtime ...
oval:org.mitre.oval:def:28398Potential security vulnerabilities have been identified in the Java Runtime ...
oval:org.mitre.oval:def:28500JRE and JDK Vulnerability on HPUX
oval:org.mitre.oval:def:29152Vulnerability in SSLv3 affects ftpd, sendmaild, imapd, and popd on AIX
oval:org.mitre.oval:def:29233SUSE-SU-2015:0108-1 -- Security update for evolution-data-server (moderate)
oval:org.mitre.oval:def:20929RHSA-2013:0516: evolution security and bug fix update (Low)
oval:org.mitre.oval:def:23461ELSA-2013:0516: evolution security and bug fix update (Low)
oval:org.mitre.oval:def:26981DEPRECATED: ELSA-2013-0516 -- evolution security and bug fix update (low)
oval:org.mitre.oval:def:21086RHSA-2013:0550: bind security and enhancement update (Moderate)
oval:org.mitre.oval:def:23576ELSA-2013:0550: bind security and enhancement update (Moderate)
oval:org.mitre.oval:def:27480DEPRECATED: ELSA-2013-0550 -- bind security and enhancement update (moderate)

SAINT Exploits

DescriptionLink
Red Hat DHCP client NetworkManager integration script command injectionMore info here

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2014-10-16Name : POODLE SSLv3 Protocol CBC ciphers Information Disclosure Vulnerability
File : nvt/gb_poodel_sslv3_info_disc_vuln.nasl
2012-12-24Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Mac OS X)
File : nvt/gb_libreoffice_graphic_object_bof_vuln_macosx.nasl
2012-12-24Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Windows)
File : nvt/gb_libreoffice_graphic_object_bof_vuln_win.nasl
2012-12-24Name : OpenOffice Multiple Buffer Overflow Vulnerabilities - Dec12 (Windows)
File : nvt/gb_openoffice_mult_bof_vuln_dec12_win.nasl
2012-11-15Name : RedHat Update for mysql RHSA-2012:1462-01
File : nvt/gb_RHSA-2012_1462-01_mysql.nasl
Hide | Show 20 More...
idDescription
2012-11-15Name : CentOS Update for mysql CESA-2012:1462 centos6
File : nvt/gb_CESA-2012_1462_mysql_centos6.nasl
2012-10-03Name : Gentoo Security Advisory GLSA 201209-24 (PostgreSQL)
File : nvt/glsa_201209_24.nasl
2012-09-26Name : Gentoo Security Advisory GLSA 201209-05 (libreoffice)
File : nvt/glsa_201209_05.nasl
2012-08-30Name : Debian Security Advisory DSA 2487-1 (openoffice.org)
File : nvt/deb_2487_1.nasl
2012-08-30Name : Fedora Update for postgresql FEDORA-2012-2508
File : nvt/gb_fedora_2012_2508_postgresql_fc17.nasl
2012-08-30Name : Fedora Update for postgresql FEDORA-2012-12156
File : nvt/gb_fedora_2012_12156_postgresql_fc16.nasl
2012-08-14Name : Fedora Update for libreoffice FEDORA-2012-11402
File : nvt/gb_fedora_2012_11402_libreoffice_fc16.nasl
2012-08-10Name : Debian Security Advisory DSA 2496-1 (mysql-5.1)
File : nvt/deb_2496_1.nasl
2012-08-03Name : Mandriva Update for libreoffice MDVSA-2012:091 (libreoffice)
File : nvt/gb_mandriva_MDVSA_2012_091.nasl
2012-07-30Name : CentOS Update for postgresql84 CESA-2012:0678 centos5
File : nvt/gb_CESA-2012_0678_postgresql84_centos5.nasl
2012-07-30Name : CentOS Update for postgresql CESA-2012:0678 centos6
File : nvt/gb_CESA-2012_0678_postgresql_centos6.nasl
2012-07-30Name : CentOS Update for autocorr-af CESA-2012:0705 centos6
File : nvt/gb_CESA-2012_0705_autocorr-af_centos6.nasl
2012-07-30Name : CentOS Update for openoffice.org-base CESA-2012:0705 centos5
File : nvt/gb_CESA-2012_0705_openoffice.org-base_centos5.nasl
2012-07-03Name : Ubuntu Update for libreoffice USN-1495-1
File : nvt/gb_ubuntu_USN_1495_1.nasl
2012-07-03Name : Ubuntu Update for openoffice.org USN-1496-1
File : nvt/gb_ubuntu_USN_1496_1.nasl
2012-06-19Name : Fedora Update for postgresql FEDORA-2012-8893
File : nvt/gb_fedora_2012_8893_postgresql_fc16.nasl
2012-06-19Name : Fedora Update for postgresql FEDORA-2012-8915
File : nvt/gb_fedora_2012_8915_postgresql_fc15.nasl
2012-06-15Name : Fedora Update for libreoffice FEDORA-2012-8114
File : nvt/gb_fedora_2012_8114_libreoffice_fc15.nasl
2012-06-08Name : RedHat Update for openoffice.org RHSA-2012:0705-01
File : nvt/gb_RHSA-2012_0705-01_openoffice.org.nasl
2012-05-31Name : Debian Security Advisory DSA 2473-1 (openoffice.org)
File : nvt/deb_2473_1.nasl

Information Assurance Vulnerability Management (IAVM)

idDescription
2015-A-0154Multiple Vulnerabilities in Oracle Fusion Middleware
Severity : Category I - VMSKEY : V0061081
2015-B-0014Multiple Vulnerabilities in VMware ESXi 5.5
Severity : Category I - VMSKEY : V0058513
2015-B-0013Multiple Vulnerabilities in VMware ESXi 5.1
Severity : Category I - VMSKEY : V0058515
2015-B-0012Multiple Vulnerabilities in VMware ESXi 5.0
Severity : Category I - VMSKEY : V0058517

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2019-08-01Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 50537 - Type : FILE-FLASH - Revision : 1
2019-08-01Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 50536 - Type : FILE-FLASH - Revision : 1
2019-08-01Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 50535 - Type : FILE-FLASH - Revision : 1
2019-08-01Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 50534 - Type : FILE-FLASH - Revision : 1
2019-07-02Adobe Flash Player use after free attempt
RuleID : 50268 - Type : FILE-FLASH - Revision : 1
Hide | Show 20 More...
DateDescription
2019-07-02Adobe Flash Player use after free attempt
RuleID : 50267 - Type : FILE-FLASH - Revision : 1
2019-02-21Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48906 - Type : FILE-FLASH - Revision : 1
2019-02-21Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48905 - Type : FILE-FLASH - Revision : 1
2019-01-17Mozilla Firefox method array.prototype.push remote code execution attempt
RuleID : 48626 - Type : BROWSER-FIREFOX - Revision : 2
2019-01-17Mozilla Firefox method array.prototype.push remote code execution attempt
RuleID : 48625 - Type : BROWSER-FIREFOX - Revision : 2
2019-01-10Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48567 - Type : FILE-FLASH - Revision : 1
2019-01-10Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48566 - Type : FILE-FLASH - Revision : 1
2019-01-10Mozilla Firefox javascript type confusion code execution attempt
RuleID : 48565 - Type : BROWSER-FIREFOX - Revision : 1
2019-01-10Mozilla Firefox javascript type confusion code execution attempt
RuleID : 48564 - Type : BROWSER-FIREFOX - Revision : 1
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48496 - Type : FILE-FLASH - Revision : 1
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48495 - Type : FILE-FLASH - Revision : 1
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48494 - Type : FILE-FLASH - Revision : 1
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48493 - Type : FILE-FLASH - Revision : 1
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48492 - Type : FILE-FLASH - Revision : 1
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48491 - Type : FILE-FLASH - Revision : 1
2018-12-18Adobe Flash Player AVM type confusion attempt
RuleID : 48426 - Type : FILE-FLASH - Revision : 2
2018-12-18Adobe Flash Player AVM type confusion attempt
RuleID : 48425 - Type : FILE-FLASH - Revision : 2
2018-12-14Adobe Flash Player out of bounds read attempt
RuleID : 48401 - Type : FILE-FLASH - Revision : 2
2018-12-14Adobe Flash Player out of bounds read attempt
RuleID : 48400 - Type : FILE-FLASH - Revision : 2
2018-12-07out-of-bounds write attempt with malicious MAR file detected
RuleID : 48296 - Type : FILE-OTHER - Revision : 2

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2019-01-16Name : The remote Fedora host is missing a security update.
File : fedora_2019-348547a32d.nasl - Type : ACT_GATHER_INFO
2019-01-14Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2019-013-01.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-072.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing multiple security updates.
File : Virtuozzo_VZA-2018-075.nasl - Type : ACT_GATHER_INFO
2019-01-10Name : The remote device is affected by multiple vulnerabilities.
File : juniper_space_jsa10917_183R1.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2019-01-10Name : The remote device is affected by multiple vulnerabilities.
File : juniper_space_jsa10917_184R1.nasl - Type : ACT_GATHER_INFO
2019-01-08Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2019-1007.nasl - Type : ACT_GATHER_INFO
2019-01-08Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2019-1008.nasl - Type : ACT_GATHER_INFO
2019-01-08Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2019-1012.nasl - Type : ACT_GATHER_INFO
2019-01-08Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2019-1013.nasl - Type : ACT_GATHER_INFO
2019-01-07Name : The remote Fedora host is missing a security update.
File : fedora_2019-859384e002.nasl - Type : ACT_GATHER_INFO
2019-01-07Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_546d4dd410ea11e9b407080027ef1a23.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-357e8e07ce.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-8f9d81a3fb.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-39be36e9fc.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-3dc16842e2.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-ea6b328afd.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-ed8d7c62c9.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-94e1bc8c23.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-3ff1cb628b.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-f1438c5833.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-44f8a7454d.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-499f2dbc96.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-f6a5b71464.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-4e660226e7.nasl - Type : ACT_GATHER_INFO