Summary
Detail | |||
---|---|---|---|
Vendor | Canonical | First view | 2005-01-10 |
Product | Ubuntu Linux | Last view | 2021-02-10 |
Version | Type | Os | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.4 | 2021-02-10 | CVE-2020-16120 | Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef ("ovl: stack file ops"). This was fixed in kernel version 5.8 by commits 56230d9 ("ovl: verify permissions in ovl_path_open()"), 48bd024 ("ovl: switch to mounter creds in readdir") and 05acefb ("ovl: check permission to open real file"). Additionally, commits 130fdbc ("ovl: pass correct flags for opening real directory") and 292f902 ("ovl: call secutiry hook in ovl_real_ioctl()") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da ("ovl: do not fail because of O_NOATIMEi") in kernel 5.11. |
7.8 | 2021-01-14 | CVE-2020-16119 | Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196. |
5.5 | 2020-12-26 | CVE-2020-29385 | GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self->code_table[11].extends to c, which will give the value of 10. This will make the loop run infinitely. This bug can, for example, be triggered by calling this function with a GIF image with LZW compression that is crafted in a special way. |
5.5 | 2020-12-09 | CVE-2020-27349 | Aptdaemon performed policykit checks after interacting with potentially untrusted files with elevated privileges. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5. |
3.8 | 2020-12-09 | CVE-2020-16128 | The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5. |
6.8 | 2020-12-04 | CVE-2020-27348 | In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1. |
4.7 | 2020-12-04 | CVE-2020-16123 | An Ubuntu-specific patch in PulseAudio created a race condition where the snap policy module would fail to identify a client connection from a snap as coming from a snap if SCM_CREDENTIALS were missing, allowing the snap to connect to PulseAudio without proper confinement. This could be exploited by an attacker to expose sensitive information. Fixed in 1:13.99.3-1ubuntu2, 1:13.99.2-1ubuntu2.1, 1:13.99.1-1ubuntu3.8, 1:11.1-1ubuntu7.11, and 1:8.0-0ubuntu3.15. |
7.8 | 2020-11-07 | CVE-2020-16122 | PackageKit's apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages. |
3.3 | 2020-11-07 | CVE-2020-16121 | PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own. |
7.8 | 2020-11-06 | CVE-2020-15708 | Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code. |
6.1 | 2020-10-16 | CVE-2020-15157 | In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer†), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached to the cloud virtual instance which can grant access to other cloud resources in the account. The default containerd resolver is used by the cri-containerd plugin (which can be used by Kubernetes), the ctr development tool, and other client programs that have explicitly linked against it. This vulnerability has been fixed in containerd 1.2.14. containerd 1.3 and later are not affected. If you are using containerd 1.3 or later, you are not affected. If you are using cri-containerd in the 1.2 series or prior, you should ensure you only pull images from trusted sources. Other container runtimes built on top of containerd but not using the default resolver (such as Docker) are not affected. |
7.5 | 2020-10-13 | CVE-2020-25645 | A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality. |
6.6 | 2020-10-07 | CVE-2020-14355 | Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution. |
5.3 | 2020-10-02 | CVE-2020-7070 | In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information. |
6.5 | 2020-10-02 | CVE-2020-7069 | In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data. |
3.3 | 2020-09-30 | CVE-2020-14378 | An integer underflow in dpdk versions before 18.11.10 and before 19.11.5 in the `move_desc` function can lead to large amounts of CPU cycles being eaten up in a long running loop. An attacker could cause `move_desc` to get stuck in a 4,294,967,295-count iteration loop. Depending on how `vhost_crypto` is being used this could prevent other VMs or network tasks from being serviced by the busy DPDK lcore for an extended period. |
7.1 | 2020-09-30 | CVE-2020-14377 | A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attacker in a virtual machine to read significant amounts of host memory. The highest threat from this vulnerability is to data confidentiality and system availability. |
7.8 | 2020-09-30 | CVE-2020-14376 | A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A lack of bounds checking when copying iv_data from the VM guest memory into host memory can lead to a large buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
7.8 | 2020-09-30 | CVE-2020-14375 | A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. Virtio ring descriptors, and the data they describe are in a region of memory accessible by from both the virtual machine and the host. An attacker in a VM can change the contents of the memory after vhost_crypto has validated it. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
8.8 | 2020-09-30 | CVE-2020-14374 | A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A flawed bounds checking in the copy_data function leads to a buffer overflow allowing an attacker in a virtual machine to write arbitrary data to any address in the vhost_crypto application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
5.5 | 2020-09-16 | CVE-2020-14392 | An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability. |
7.8 | 2020-09-16 | CVE-2020-14382 | A vulnerability was found in upstream release cryptsetup-2.2.0 where, there's a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container. The bug is in segments validation code in file 'lib/luks2/luks2_json_metadata.c' in function hdr_validate_segments(struct crypt_device *cd, json_object *hdr_jobj) where the code does not check for possible overflow on memory allocation used for intervals array (see statement "intervals = malloc(first_backup * sizeof(*intervals));"). Due to the bug, library can be *tricked* to expect such allocation was successful but for far less memory then originally expected. Later it may read data FROM image crafted by an attacker and actually write such data BEYOND allocated memory. |
7.8 | 2020-09-15 | CVE-2020-14345 | A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
3.7 | 2020-09-09 | CVE-2020-1968 | The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v). |
3.3 | 2020-09-02 | CVE-2020-24654 | In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
15% (361) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
7% (187) | CWE-125 | Out-of-bounds Read |
7% (186) | CWE-20 | Improper Input Validation |
6% (159) | CWE-787 | Out-of-bounds Write |
6% (151) | CWE-416 | Use After Free |
5% (142) | CWE-200 | Information Exposure |
5% (127) | CWE-476 | NULL Pointer Dereference |
4% (100) | CWE-190 | Integer Overflow or Wraparound |
4% (99) | CWE-264 | Permissions, Privileges, and Access Controls |
2% (61) | CWE-399 | Resource Management Errors |
2% (53) | CWE-772 | Missing Release of Resource after Effective Lifetime |
2% (53) | CWE-189 | Numeric Errors |
2% (49) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
1% (43) | CWE-362 | Race Condition |
1% (42) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
1% (36) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
1% (30) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
1% (29) | CWE-269 | Improper Privilege Management |
1% (25) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
1% (25) | CWE-284 | Access Control (Authorization) Issues |
1% (25) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
0% (20) | CWE-310 | Cryptographic Issues |
0% (20) | CWE-287 | Improper Authentication |
0% (19) | CWE-17 | Code |
0% (18) | CWE-254 | Security Features |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-7 | Blind SQL Injection |
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-22 | Exploiting Trust in Client (aka Make the Client Invisible) |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-26 | Leveraging Race Conditions |
CAPEC-28 | Fuzzing |
CAPEC-29 | Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-32 | Embedding Scripts in HTTP Query Strings |
CAPEC-42 | MIME Conversion |
CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-52 | Embedding NULL Bytes |
CAPEC-53 | Postfix, Null Terminate, and Backslash |
CAPEC-63 | Simple Script Injection |
CAPEC-64 | Using Slashes and URL Encoding Combined to Bypass Validation Logic |
CAPEC-66 | SQL Injection |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:10949 | Multiple integer handling errors in PHP before 4.3.10 allow attackers to bypa... |
oval:org.mitre.oval:def:9797 | zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows... |
oval:org.mitre.oval:def:1107 | gzip zgrep Sanitation Vulnerability |
oval:org.mitre.oval:def:1081 | gzip Argument Sanitation Vulnerability |
oval:org.mitre.oval:def:749 | bzip2 Decompression Bomb |
oval:org.mitre.oval:def:10700 | bzip2 allows remote attackers to cause a denial of service (hard drive consum... |
oval:org.mitre.oval:def:11031 | The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local... |
oval:org.mitre.oval:def:1649 | Mozilla Privilege Escalation through Print Preview |
oval:org.mitre.oval:def:10364 | Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0... |
oval:org.mitre.oval:def:1698 | Mozilla Privilege Escalation Using crypto.generateCRMFRequest |
oval:org.mitre.oval:def:10508 | Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0... |
oval:org.mitre.oval:def:1929 | Mozilla File Stealing by Changing Input Type |
oval:org.mitre.oval:def:10922 | Mozilla Firefox 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite befo... |
oval:org.mitre.oval:def:9167 | Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1... |
oval:org.mitre.oval:def:1855 | Mozilla Cross-site JavaScript Injection Using Event Handlers |
oval:org.mitre.oval:def:11692 | ftutil.c in Freetype before 2.2 allows remote attackers to cause a denial of ... |
oval:org.mitre.oval:def:10886 | The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c i... |
oval:org.mitre.oval:def:10666 | Linux kernel 2.x.6 before 2.6.17.9 and 2.4.x before 2.4.33.1 on PowerPC PPC97... |
oval:org.mitre.oval:def:4356 | Security Vulnerabilities in OpenSSL May Lead to a Denial of Service (DoS) to ... |
oval:org.mitre.oval:def:10207 | The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 befor... |
oval:org.mitre.oval:def:10612 | Multiple buffer overflows in Imagemagick 6.0 before 6.0.6.2, and 6.2 before 6... |
oval:org.mitre.oval:def:9746 | Unspecified vulnerability in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before... |
oval:org.mitre.oval:def:10895 | Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before ... |
oval:org.mitre.oval:def:11077 | Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, and SeaMonkey befor... |
oval:org.mitre.oval:def:11185 | The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 b... |
SAINT Exploits
Description | Link |
---|---|
Exim SMTP listener base64d function one-character buffer overflow | More info here |
Ubuntu overlayfs privilege elevation | More info here |
libssh authentication bypass | More info here |
MySQL yaSSL SSL Hello message buffer overflow | More info here |
Linux Dirty COW Local File Overwrite | More info here |
Mozilla Firefox XMLSerializer serializeToStream Use-after-free Vulnerability | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
78232 | libvirt bridge Forward Mode Firewall Port Access Restriction Weakness |
77832 | Parallels Plesk Panel Billing System TLS Renegotiation Handshakes MiTM Plaint... |
77642 | Update Manager Tar File Handling MitM Remote Arbitrary File Overwrite |
77641 | Update Manager Insecure Temporary File Creation Local .XAUTHORITY File Discl... |
77584 | ISC DHCP Regular Expressions dhcpd.conf DHCP Request Packet Parsing Remote DoS |
77451 | apt Verify-Host Option SSL Certificate Validation MitM Remote Repository Cred... |
77430 | Ubuntu Software Center SSL Certificate Verification MitM Package Installation... |
77214 | system-config-printer cupshelper OpenPrinting Database Query MitM Package Ins... |
77176 | LightDM ~/.dmrc File Handling Local Symlink Arbitrary File Access |
76940 | icedtea-web Web Browser Plugin Applet Handling Same Origin Policy Bypass |
76805 | Linux Kernel net/core/net_namespace.c Network Namespace Cleanup Weakness Remo... |
75652 | Qt src/3rdparty/harfbuzz/src/harfbuzz-gpos.c Font Handling Overflow |
75622 | Blue Coat Director TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
74675 | Linux Kernel OOM Score Calculation PTE Page Handling DoS |
74630 | tex-common conf/texmf.d/95NonPath.cnf shell_escape_commands Directive Crafted... |
74557 | ISC DHCP Crafted BOOTP Packet Remote DoS |
74556 | ISC DHCP Crafted DHCP Packet Remote DoS |
74335 | Hitachi Web Server TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
74263 | APT Inline GPG Signatures Verification Weakness |
74180 | KDE kdeutils Ark Traversal Arbitrary File Deletion |
73984 | libpng png_rgb_to_gray Function PNG File Handling Overflow |
73982 | libpng pngrutil.c png_handle_sCAL Function PNG File Handling Memory Corruptio... |
73686 | libcurl http_negotiate.c Curl_input_negotiate Function GSSAPI Credential Dele... |
73493 | libpng pngerror.c png_format_buffer() Off-by-one PNG Image Handling Remote DoS |
73340 | vsftpd ls.c vsf_filename_passes_filter STAT Command glob Expression Remote DoS |
ExploitDB Exploits
id | Description |
---|---|
35359 | tcpdump 4.6.2 Geonet Decoder Denial of Service |
34923 | Linux Kernel remount FUSE Exploit |
34134 | Linux Kernel ptrace/sysret - Local Privilege Escalation |
33516 | Linux kernel 3.14-rc1 <= 3.15-rc4 - Raw Mode PTY Local Echo Race Condition... |
32998 | Heartbleed OpenSSL - Information Leak Exploit (2) - DTLS Support |
32791 | Heartbleed OpenSSL - Information Leak Exploit (1) |
32764 | OpenSSL 1.0.1f TLS Heartbeat Extension - Memory Disclosure (Multiple SSL/TLS ... |
32745 | OpenSSL TLS Heartbeat Extension - Memory Disclosure |
28726 | OpenSSL SSLv2 Null Pointer Dereference Client Denial of Service Vulnerability |
28338 | Vino VNC Server 3.7.3 - Persistent Denial of Service |
27778 | Samba nttrans Reply - Integer Overflow Vulnerability |
24487 | cURL Buffer Overflow Vulnerability |
18040 | Xorg 1.4 to 1.11.2 File Permission Change PoC |
17787 | Linux Kernel < 2.6.36.2 Econet Privilege Escalation Exploit |
16270 | vsftpd 2.3.2 Denial of Service Vulnerability |
15704 | Linux Kernel <= 2.6.37 - Local Privilege Escalation |
15344 | Linux Kernel VIDIOCSMICROCODE IOCTL Local Memory Overwrite Vulnerability |
15285 | Linux RDS Protocol Local Privilege Escalation |
15150 | Linux Kernel < 2.6.36-rc6 pktcdvd Kernel Memory Disclosure |
14422 | libpng <= 1.4.2 Denial of Service Vulnerability |
14339 | Ubuntu PAM MOTD Local Root Exploit |
14273 | Ubuntu PAM MOTD File Tampering (Privilege Escalation) |
10579 | TLS Renegotiation Vulnerability PoC Exploit |
9575 | Linux Kernel < 2.6.19 - udp_sendmsg Local Root Exploit |
9574 | Linux Kernel < 2.6.19 udp_sendmsg Local Root Exploit (x86/x64) |
OpenVAS Exploits
id | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2406-1 (icedove - several vulnerabilities) File : nvt/deb_2406_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2427-1 (imagemagick - several vulnerabilities) File : nvt/deb_2427_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2462-2 (imagemagick - several vulnerabilities) File : nvt/deb_2462_2.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2469-1 (linux-2.6 - privilege escalation/denial ... File : nvt/deb_2469_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2553-1 (iceweasel - several vulnerabilities) File : nvt/deb_2553_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2581-1 (mysql-5.1 - several vulnerabilities) File : nvt/deb_2581_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2583-1 (iceweasel - several vulnerabilities) File : nvt/deb_2583_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2584-1 (iceape - several vulnerabilities) File : nvt/deb_2584_1.nasl |
2013-09-18 | Name : Debian Security Advisory DSA 2588-1 (icedove - several vulnerabilities) File : nvt/deb_2588_1.nasl |
2012-12-31 | Name : Fedora Update for bind FEDORA-2012-19822 File : nvt/gb_fedora_2012_19822_bind_fc16.nasl |
2012-12-31 | Name : Fedora Update for libtiff FEDORA-2012-20404 File : nvt/gb_fedora_2012_20404_libtiff_fc16.nasl |
2012-12-31 | Name : Fedora Update for libtiff FEDORA-2012-20446 File : nvt/gb_fedora_2012_20446_libtiff_fc17.nasl |
2012-12-27 | Name : VMSA-2012-0018: VMware security updates for vCSA and ESXi File : nvt/gb_VMSA-2012-0018.nasl |
2012-12-26 | Name : CentOS Update for libtiff CESA-2012:1590 centos5 File : nvt/gb_CESA-2012_1590_libtiff_centos5.nasl |
2012-12-26 | Name : CentOS Update for libtiff CESA-2012:1590 centos6 File : nvt/gb_CESA-2012_1590_libtiff_centos6.nasl |
2012-12-26 | Name : RedHat Update for libtiff RHSA-2012:1590-01 File : nvt/gb_RHSA-2012_1590-01_libtiff.nasl |
2012-12-26 | Name : Fedora Update for qt FEDORA-2012-19715 File : nvt/gb_fedora_2012_19715_qt_fc16.nasl |
2012-12-18 | Name : Fedora Update for xen FEDORA-2012-19828 File : nvt/gb_fedora_2012_19828_xen_fc16.nasl |
2012-12-18 | Name : Ubuntu Update for glibc USN-1589-2 File : nvt/gb_ubuntu_USN_1589_2.nasl |
2012-12-18 | Name : Ubuntu Update for aptdaemon USN-1666-1 File : nvt/gb_ubuntu_USN_1666_1.nasl |
2012-12-14 | Name : Fedora Update for xen FEDORA-2012-19717 File : nvt/gb_fedora_2012_19717_xen_fc17.nasl |
2012-12-14 | Name : Fedora Update for qt FEDORA-2012-19759 File : nvt/gb_fedora_2012_19759_qt_fc17.nasl |
2012-12-14 | Name : Fedora Update for bind FEDORA-2012-19830 File : nvt/gb_fedora_2012_19830_bind_fc17.nasl |
2012-12-14 | Name : Google Chrome Multiple Vulnerabilities-03 Dec2012 (Linux) File : nvt/gb_google_chrome_mult_vuln03_dec12_lin.nasl |
2012-12-14 | Name : Google Chrome Multiple Vulnerabilities-03 Dec2012 (Mac OS X) File : nvt/gb_google_chrome_mult_vuln03_dec12_macosx.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0222 | Multiple Security Vulnerabilities in Apple iOS Severity: Category I - VMSKEY: V0061471 |
2015-A-0199 | Multiple Vulnerabilities in Apple Mac OS X Severity: Category I - VMSKEY: V0061337 |
2015-A-0174 | Multiple Vulnerabilities in Apache HTTP Server Severity: Category I - VMSKEY: V0061135 |
2015-A-0160 | Multiple Vulnerabilities in Oracle Linux and Virtualization Severity: Category I - VMSKEY: V0061123 |
2015-A-0158 | Multiple Vulnerabilities in Oracle Java SE Severity: Category I - VMSKEY: V0061089 |
2015-A-0155 | Multiple Vulnerabilities in Oracle MySQL Product Suite Severity: Category I - VMSKEY: V0061083 |
2015-A-0141 | Multiple Security Vulnerabilities in IBM WebSphere Application Server Severity: Category I - VMSKEY: V0061061 |
2015-B-0087 | Multiple Vulnerabilities in IBM WebSphere Portal Severity: Category I - VMSKEY: V0061053 |
2015-B-0068 | Multiple Vulnerabilities in PostgreSQL Severity: Category I - VMSKEY: V0060809 |
2015-A-0042 | Samba Remote Code Execution Vulnerability Severity: Category I - VMSKEY: V0058919 |
2015-A-0038 | Multiple Vulnerabilities in GNU C Library (glibc) Severity: Category I - VMSKEY: V0058753 |
2015-B-0013 | Multiple Vulnerabilities in VMware ESXi 5.1 Severity: Category I - VMSKEY: V0058515 |
2015-B-0014 | Multiple Vulnerabilities in VMware ESXi 5.5 Severity: Category I - VMSKEY: V0058513 |
2015-B-0007 | Multiple Vulnerabilities in Juniper Secure Analytics (JSA) and Security Threa... Severity: Category I - VMSKEY: V0058213 |
2014-B-0161 | Multiple Vulnerabilities in VMware ESXi 5.1 Severity: Category I - VMSKEY: V0057717 |
2014-B-0105 | Samba Remote Code Execution Severity: Category I - VMSKEY: V0053637 |
2014-A-0064 | Multiple Vulnerabilities in Mozilla Products Severity: Category I - VMSKEY: V0050011 |
2014-A-0063 | Multiple Vulnerabilities in McAfee VirusScan Enterprise for Linux Severity: Category I - VMSKEY: V0050009 |
2014-A-0062 | Multiple Vulnerabilities In McAfee Email Gateway Severity: Category I - VMSKEY: V0050005 |
2014-B-0050 | McAfee Web Gateway Information Disclosure Vulnerability Severity: Category I - VMSKEY: V0050003 |
2014-B-0046 | Multiple Vulnerabilities in HP System Management Homepage (SMH) Severity: Category I - VMSKEY: V0049737 |
2014-A-0057 | Multiple Vulnerabilities in Oracle MySQL Products Severity: Category I - VMSKEY: V0049591 |
2014-A-0053 | Multiple Vulnerabilities in Juniper Network JUNOS Severity: Category I - VMSKEY: V0049589 |
2014-A-0054 | Multiple Vulnerabilities in Oracle Database Severity: Category I - VMSKEY: V0049587 |
2014-A-0055 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0049585 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | IPv6 packets encapsulated in IPv4 RuleID : 8446 - Type : POLICY-OTHER - Revision : 8 |
2021-01-12 | Apache Server mod_proxy Error Page cross site scripting attempt RuleID : 56563 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-10 | Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt RuleID : 56290 - Type : OS-WINDOWS - Revision : 6 |
2020-10-22 | Microsoft Windows NetrServerReqChallenge RPC transport sign and seal disablin... RuleID : 55802 - Type : OS-WINDOWS - Revision : 1 |
2020-10-20 | Microsoft Windows Netlogon crafted NetrServerAuthenticate elevation of privil... RuleID : 55704 - Type : OS-WINDOWS - Revision : 2 |
2020-10-20 | Microsoft Windows Netlogon crafted NetrServerReqChallenge elevation of privil... RuleID : 55703 - Type : OS-WINDOWS - Revision : 2 |
2020-07-07 | Apache Tomcat FileStore directory traversal attempt RuleID : 54162 - Type : SERVER-WEBAPP - Revision : 1 |
2020-04-21 | Apache Log4j SocketServer insecure deserialization remote code execution attempt RuleID : 53475 - Type : SERVER-OTHER - Revision : 1 |
2020-03-17 | Apple Safari Webkit WebCore memory corruption attempt RuleID : 53101 - Type : BROWSER-WEBKIT - Revision : 1 |
2020-03-17 | Apple Safari Webkit WebCore memory corruption attempt RuleID : 53100 - Type : BROWSER-WEBKIT - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2019-0973 attack attempt RuleID : 52571 - Type : FILE-OTHER - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2019-0973 attack attempt RuleID : 52570 - Type : FILE-OTHER - Revision : 1 |
2020-02-04 | dnsmasq crafted OPT record denial of service attempt RuleID : 52524 - Type : PROTOCOL-DNS - Revision : 1 |
2020-01-16 | Memcached lru mode NULL dereference attempt RuleID : 52477 - Type : SERVER-OTHER - Revision : 1 |
2020-01-16 | Memcached lru temp_ttl NULL dereference attempt RuleID : 52476 - Type : SERVER-OTHER - Revision : 1 |
2020-01-07 | LibVNCServer file transfer extension heap buffer overflow attempt RuleID : 52397 - Type : SERVER-OTHER - Revision : 1 |
2020-01-07 | LibVNCServer file transfer extension heap buffer overflow attempt RuleID : 52396 - Type : SERVER-OTHER - Revision : 1 |
2020-01-07 | LibVNCServer file transfer extension heap buffer overflow attempt RuleID : 52395 - Type : SERVER-OTHER - Revision : 1 |
2020-01-07 | LibVNCServer file transfer extension heap buffer overflow attempt RuleID : 52394 - Type : SERVER-OTHER - Revision : 1 |
2020-01-07 | LibVNCServer file transfer extension heap buffer overflow attempt RuleID : 52393 - Type : SERVER-OTHER - Revision : 1 |
2020-01-07 | yaSSL SSL Hello Message buffer overflow attempt RuleID : 52366 - Type : SERVER-MYSQL - Revision : 1 |
2020-01-03 | ISC BIND deny-answer-aliases denial of service attempt RuleID : 52344 - Type : SERVER-OTHER - Revision : 1 |
2020-01-03 | ISC BIND deny-answer-aliases denial of service attempt RuleID : 52343 - Type : SERVER-OTHER - Revision : 1 |
2020-01-03 | Imagemagick XBM tranformation information leak attempt RuleID : 52312 - Type : FILE-IMAGE - Revision : 1 |
2019-12-24 | Mutiple products libpng extra row heap overflow attempt RuleID : 52307 - Type : FILE-IMAGE - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-18 | Name: The remote Fedora host is missing a security update. File: fedora_2019-a8ffcff7ee.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2019-0059.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2019-509c133845.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2019-f812c9fb22.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote database server is affected by multiple vulnerabilities. File: mysql_5_6_43.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote database server is affected by multiple vulnerabilities. File: mysql_5_7_25.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote database server is affected by multiple vulnerabilities. File: mysql_8_0_14.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2019-0049.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: A PHP application running on the remote web server is affected by multiple vu... File: drupal_8_6_6.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: The remote Fedora host is missing a security update. File: fedora_2019-348547a32d.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: The remote Fedora host is missing a security update. File: fedora_2019-e6ca5847c7.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: The remote Fedora host is missing a security update. File: fedora_2019-f6ff819834.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: The remote database server is affected by multiple vulnerabilities File: mariadb_10_0_37.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: The remote database server is affected by multiple vulnerabilities File: mariadb_5_5_42.nasl - Type: ACT_GATHER_INFO |
2019-01-15 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2019-337484d88b.nasl - Type: ACT_GATHER_INFO |
2019-01-15 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2019-b0f7a7b74b.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2019-011-01.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2019-013-01.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Virtuozzo host is missing multiple security updates. File: Virtuozzo_VZA-2016-104.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2019-1145.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2019-1146.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4367.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Fedora host is missing a security update. File: fedora_2019-18b3a10c7f.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Fedora host is missing a security update. File: fedora_2019-75a8da28f0.nasl - Type: ACT_GATHER_INFO |
2019-01-11 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZA-2018-072.nasl - Type: ACT_GATHER_INFO |