This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Fedoraproject First view 2008-09-10
Product Fedora Last view 2020-07-30
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* 242
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* 180
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* 170
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* 168
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* 158
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* 155
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:* 151
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:* 103
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* 99
cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:* 85
cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:* 66
cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:* 58
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* 48
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:* 47
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:* 36
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:* 21
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* 14
cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:* 14
cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:* 12
cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:* 11
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:* 10
cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:* 10
cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:* 9
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:* 7
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:* 4
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:* 1
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:* 1

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
3.7 2020-07-30 CVE-2020-16166

The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.

10 2020-07-14 CVE-2020-13753

The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.

4.4 2020-07-09 CVE-2020-12402

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

7.5 2020-07-07 CVE-2020-10745

A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.

6.5 2020-07-07 CVE-2020-10730

A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.

7.5 2020-07-06 CVE-2020-14303

A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash.

6.5 2020-07-06 CVE-2020-10760

A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba.

7.5 2020-07-02 CVE-2020-15503

LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.

8.8 2020-06-30 CVE-2020-15049

An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.

9.8 2020-06-30 CVE-2017-18922

It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.

6.5 2020-06-26 CVE-2020-10753

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.

8.1 2020-06-25 CVE-2020-11538

In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exist in the parsing of SGI image files, a different issue than CVE-2020-5311.

3.1 2020-06-24 CVE-2020-15005

In MediaWiki before 1.31.8, 1.32.x and 1.33.x before 1.33.4, and 1.34.x before 1.34.2, private wikis behind a caching server using the img_auth.php image authorization security feature may have had their files cached publicly, so any unauthorized user could view them. This occurs because Cache-Control and Vary headers were mishandled.

4.3 2020-06-22 CVE-2020-4032

In FreeRDP before version 2.1.2, there is an integer casting vulnerability in update_recv_secondary_order. All clients with +glyph-cache /relax-order-checks are affected. This is fixed in version 2.1.2.

5.9 2020-06-18 CVE-2020-14422

Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created.

4.9 2020-06-17 CVE-2020-8619

In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk ("*") character, this defect cannot be encountered. A would-be attacker who is allowed to change zone content could theoretically introduce such a record in order to exploit this condition to cause denial of service, though we consider the use of this vector unlikely because any such attack would require a significant privilege level and be easily traceable.

7.5 2020-06-17 CVE-2019-20839

libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.

7.5 2020-06-17 CVE-2018-21247

An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.

5.5 2020-06-15 CVE-2020-0543

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

3.1 2020-06-12 CVE-2020-4050

In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).

6.1 2020-06-09 CVE-2020-13965

An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. There is XSS via a malicious XML attachment because text/xml is among the allowed types for a preview.

7.8 2020-06-09 CVE-2020-10757

A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.

4.3 2020-06-08 CVE-2020-10754

It was found that nmcli, a command line interface to NetworkManager did not honour 802-1x.ca-path and 802-1x.phase2-ca-path settings, when creating a new profile. When a user connects to a network using this profile, the authentication does not happen and the connection is made insecurely.

8.6 2020-06-05 CVE-2020-10878

Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.

8.2 2020-06-05 CVE-2020-10543

Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
12% (125) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
12% (120) CWE-20 Improper Input Validation
7% (73) CWE-200 Information Exposure
6% (58) CWE-125 Out-of-bounds Read
4% (48) CWE-416 Use After Free
4% (45) CWE-264 Permissions, Privileges, and Access Controls
4% (40) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
3% (34) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
3% (33) CWE-476 NULL Pointer Dereference
3% (29) CWE-399 Resource Management Errors
3% (29) CWE-284 Access Control (Authorization) Issues
2% (28) CWE-189 Numeric Errors
2% (25) CWE-190 Integer Overflow or Wraparound
2% (22) CWE-787 Out-of-bounds Write
1% (15) CWE-59 Improper Link Resolution Before File Access ('Link Following')
1% (14) CWE-362 Race Condition
1% (14) CWE-287 Improper Authentication
1% (14) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
1% (11) CWE-310 Cryptographic Issues
1% (11) CWE-269 Improper Privilege Management
0% (9) CWE-415 Double Free
0% (9) CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('...
0% (9) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (8) CWE-254 Security Features
0% (7) CWE-369 Divide By Zero

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:13793 USN-835-1 -- neon, neon27 vulnerabilities
oval:org.mitre.oval:def:11721 neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle ...
oval:org.mitre.oval:def:22944 ELSA-2009:1452: neon security update (Moderate)
oval:org.mitre.oval:def:29270 RHSA-2009:1452 -- neon security update (Moderate)
oval:org.mitre.oval:def:7359 Linux Kernel 64-bit Kernel Register Memory Leak Local Information Disclosure ...
oval:org.mitre.oval:def:10823 arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 p...
oval:org.mitre.oval:def:9921 net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local user...
oval:org.mitre.oval:def:7937 DSA-1928 linux-2.6.24 -- privilege escalation/denial of service/sensitive mem...
oval:org.mitre.oval:def:6895 Linux Kernel 'unix_stream_connect()' Local Denial of Service Vulnerability
oval:org.mitre.oval:def:13735 DSA-1929-1 linux-2.6 -- privilege escalation/denial of service/sensitive memo...
oval:org.mitre.oval:def:13351 DSA-1928-1 linux-2.6.24 -- privilege escalation/denial of service/sensitive m...
oval:org.mitre.oval:def:9327 Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 a...
oval:org.mitre.oval:def:7608 Linux Kernel 'pipe.c' Local Privilege Escalation Vulnerability
oval:org.mitre.oval:def:11513 Service Console update for COS kernel
oval:org.mitre.oval:def:8535 HP-UX Running OpenSSL, Remote Unauthorized Data Injection, Denial of Service ...
oval:org.mitre.oval:def:8366 HP-UX Running Apache, Remote Unauthorized Data Injection, Denial of Service (...
oval:org.mitre.oval:def:8201 DSA-1934 apache2 -- multiple issues
oval:org.mitre.oval:def:7973 Security Vulnerability in the Transport Layer Security (TLS) and Secure Socke...
oval:org.mitre.oval:def:7478 VMware ESX, Service Console update for OpenSSL, GnuTLS, NSS and NSPR.
oval:org.mitre.oval:def:7315 TLS/SSL Renegotiation Vulnerability
oval:org.mitre.oval:def:21877 RHSA-2010:0164: openssl097a security update (Moderate)
oval:org.mitre.oval:def:21828 RHSA-2010:0166: gnutls security update (Moderate)
oval:org.mitre.oval:def:21587 RHSA-2010:0165: nss security update (Moderate)
oval:org.mitre.oval:def:21255 RHSA-2010:0155: java-1.4.2-ibm security and bug fix update (Moderate)
oval:org.mitre.oval:def:20357 Third party component updates for VMware vCenter Server, vCenter Update Manag...

SAINT Exploits

Description Link
Red Hat DHCP client NetworkManager integration script command injection More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
77832 Parallels Plesk Panel Billing System TLS Renegotiation Handshakes MiTM Plaint...
75622 Blue Coat Director TLS Renegotiation Handshakes MiTM Plaintext Data Injection
74335 Hitachi Web Server TLS Renegotiation Handshakes MiTM Plaintext Data Injection
74150 Drupal Comment Attachment Access Restriction Bypass
73984 libpng png_rgb_to_gray Function PNG File Handling Overflow
73983 libpng pngerror.c png_err Function NULL Argument PNG File Handling DoS
73982 libpng pngrutil.c png_handle_sCAL Function PNG File Handling Memory Corruptio...
73748 udisks mount(8) Command Arbitrary Kernel Module Loading
73686 libcurl http_negotiate.c Curl_input_negotiate Function GSSAPI Credential Dele...
73493 libpng pngerror.c png_format_buffer() Off-by-one PNG Image Handling Remote DoS
73449 Linux Kernel net/dccp/options.c dccp_parse_options Function DCCP Packet Remot...
73328 cURL GSSAPI Client Credential Remote Disclosure
72660 MySQL GUI Tools Administrator / Query Browser Command Line Credentials Local ...
71961 Oracle Fusion Middleware Oracle WebLogic Server TLS Renegotiation Handshakes ...
71951 Oracle Multiple Products Oracle Security Service TLS Renegotiation Handshakes...
70620 mGuard TLS Renegotiation Handshakes MiTM Plaintext Data Injection
70518 Asterisk main/utils.c ast_uri_encode() Function Caller ID Information Overflow
70105 Google Chrome CSS Token Sequence Out-of-bounds Read Remote DoS
70055 Oracle Supply Chain Transportation Management TLS Renegotiation Handshakes Mi...
69673 Google Chrome XPath Handling Double-free Remote DoS
69561 IBM WebSphere MQ Internet Pass-Thru TLS Renegotiation Handshake MiTM Plaintex...
69515 Linux Kernel net/sctp/auth.c sctp_auth_asoc_get_hmac Function SCTP Peer hmac_...
69172 Google Chrome SVG Document Out-of-bounds Array Index Memory Access DoS
69170 Google Chrome Destroyed Frame Object Access Remote DoS
69164 Google Chrome Crafted HTML Document Text Area Handling Memory Corruption

ExploitDB Exploits

id Description
32998 Heartbleed OpenSSL - Information Leak Exploit (2) - DTLS Support
32791 Heartbleed OpenSSL - Information Leak Exploit (1)
32764 OpenSSL 1.0.1f TLS Heartbeat Extension - Memory Disclosure (Multiple SSL/TLS ...
32745 OpenSSL TLS Heartbeat Extension - Memory Disclosure
27778 Samba nttrans Reply - Integer Overflow Vulnerability
22406 Konqueror 4.7.3 Memory Corruption
10579 TLS Renegotiation Vulnerability PoC Exploit

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2014-10-16 Name : POODLE SSLv3 Protocol CBC ciphers Information Disclosure Vulnerability
File : nvt/gb_poodel_sslv3_info_disc_vuln.nasl
2013-09-18 Name : Debian Security Advisory DSA 2439-1 (libpng - buffer overflow)
File : nvt/deb_2439_1.nasl
2012-12-24 Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Mac OS X)
File : nvt/gb_libreoffice_graphic_object_bof_vuln_macosx.nasl
2012-12-24 Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Windows)
File : nvt/gb_libreoffice_graphic_object_bof_vuln_win.nasl
2012-12-24 Name : OpenOffice Multiple Buffer Overflow Vulnerabilities - Dec12 (Windows)
File : nvt/gb_openoffice_mult_bof_vuln_dec12_win.nasl
2012-12-18 Name : Fedora Update for kernel FEDORA-2012-20240
File : nvt/gb_fedora_2012_20240_kernel_fc16.nasl
2012-12-13 Name : SuSE Update for update openSUSE-SU-2012:0466-1 (update)
File : nvt/gb_suse_2012_0466_1.nasl
2012-12-10 Name : Fedora Update for gnome-system-log FEDORA-2012-18659
File : nvt/gb_fedora_2012_18659_gnome-system-log_fc17.nasl
2012-11-29 Name : Fedora Update for kernel FEDORA-2012-18691
File : nvt/gb_fedora_2012_18691_kernel_fc16.nasl
2012-11-09 Name : CentOS Update for kernel CESA-2012:1426 centos6
File : nvt/gb_CESA-2012_1426_kernel_centos6.nasl
2012-11-09 Name : RedHat Update for kernel RHSA-2012:1426-01
File : nvt/gb_RHSA-2012_1426-01_kernel.nasl
2012-11-06 Name : Fedora Update for xlockmore FEDORA-2012-16485
File : nvt/gb_fedora_2012_16485_xlockmore_fc17.nasl
2012-11-06 Name : Fedora Update for xlockmore FEDORA-2012-16490
File : nvt/gb_fedora_2012_16490_xlockmore_fc16.nasl
2012-11-06 Name : Fedora Update for kernel FEDORA-2012-17479
File : nvt/gb_fedora_2012_17479_kernel_fc16.nasl
2012-11-02 Name : Fedora Update for dokuwiki FEDORA-2012-16605
File : nvt/gb_fedora_2012_16605_dokuwiki_fc16.nasl
2012-11-02 Name : Fedora Update for dokuwiki FEDORA-2012-16614
File : nvt/gb_fedora_2012_16614_dokuwiki_fc17.nasl
2012-10-22 Name : FreeBSD Ports: xlockmore, ja-xlockmore
File : nvt/freebsd_xlockmore.nasl
2012-10-19 Name : Fedora Update for mom FEDORA-2012-15496
File : nvt/gb_fedora_2012_15496_mom_fc17.nasl
2012-10-16 Name : Fedora Update for dracut FEDORA-2012-14953
File : nvt/gb_fedora_2012_14953_dracut_fc17.nasl
2012-10-16 Name : Fedora Update for dracut FEDORA-2012-14959
File : nvt/gb_fedora_2012_14959_dracut_fc16.nasl
2012-10-09 Name : Fedora Update for phpldapadmin FEDORA-2012-14344
File : nvt/gb_fedora_2012_14344_phpldapadmin_fc17.nasl
2012-10-09 Name : Fedora Update for phpldapadmin FEDORA-2012-14363
File : nvt/gb_fedora_2012_14363_phpldapadmin_fc16.nasl
2012-09-27 Name : Fedora Update for guacamole-common-js FEDORA-2012-14097
File : nvt/gb_fedora_2012_14097_guacamole-common-js_fc16.nasl
2012-09-27 Name : Fedora Update for guacamole-common FEDORA-2012-14097
File : nvt/gb_fedora_2012_14097_guacamole-common_fc16.nasl
2012-09-27 Name : Fedora Update for guacamole-ext FEDORA-2012-14097
File : nvt/gb_fedora_2012_14097_guacamole-ext_fc16.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0202 Citrix XenServer Information Disclosure Vulnerability
Severity: Category I - VMSKEY: V0061343
2015-A-0199 Multiple Vulnerabilities in Apple Mac OS X
Severity: Category I - VMSKEY: V0061337
2015-A-0154 Multiple Vulnerabilities in Oracle Fusion Middleware
Severity: Category I - VMSKEY: V0061081
2015-A-0113 Multiple Vulnerabilities in Juniper Networks CTPOS
Severity: Category I - VMSKEY: V0060737
2015-B-0012 Multiple Vulnerabilities in VMware ESXi 5.0
Severity: Category I - VMSKEY: V0058517
2015-B-0013 Multiple Vulnerabilities in VMware ESXi 5.1
Severity: Category I - VMSKEY: V0058515
2015-B-0014 Multiple Vulnerabilities in VMware ESXi 5.5
Severity: Category I - VMSKEY: V0058513
2014-A-0172 Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform
Severity: Category I - VMSKEY: V0057381
2014-B-0103 Multiple Vulnerabilities in VMware Horizon View Client
Severity: Category I - VMSKEY: V0053509
2014-B-0102 Multiple Vulnerabilities in VMware vCenter Converter Standalone 5.5
Severity: Category I - VMSKEY: V0053507
2014-B-0101 Multiple Vulnerabilities in VMware vCenter Converter Standalone 5.1
Severity: Category I - VMSKEY: V0053505
2014-A-0115 Multiple Vulnerabilities in VMware Horizon View
Severity: Category I - VMSKEY: V0053501
2014-B-0097 Multiple Vulnerabilities in VMware ESXi 5.0
Severity: Category I - VMSKEY: V0053319
2014-A-0103 Multiple Vulnerabilities in Oracle E-Business
Severity: Category I - VMSKEY: V0053195
2014-B-0095 Multiple Vulnerabilities in Splunk
Severity: Category I - VMSKEY: V0053177
2014-A-0111 Multiple Vulnerabilities in VMware Workstation
Severity: Category I - VMSKEY: V0053179
2014-A-0110 Multiple Vulnerabilities in VMware Player
Severity: Category I - VMSKEY: V0053181
2014-A-0109 Multiple Vulnerabilities in VMware Fusion
Severity: Category I - VMSKEY: V0053183
2014-A-0100 Multiple Vulnerabilities in McAfee VirusScan Enterprise for Linux
Severity: Category I - VMSKEY: V0053201
2014-A-0099 Multiple Vulnerabilities in McAfee Email Gateway
Severity: Category I - VMSKEY: V0053203
2014-B-0088 Multiple Vulnerabilities in VMware ESXi 5.5
Severity: Category I - VMSKEY: V0052911
2014-B-0089 Multiple Vulnerabilities in VMware ESXi 5.1
Severity: Category I - VMSKEY: V0052909
2014-B-0091 Multiple Vulnerabilities in VMware vCenter Update Manager 5.5
Severity: Category I - VMSKEY: V0052907
2014-B-0084 HP Onboard Administrator Information Disclosure Vulnerability
Severity: Category I - VMSKEY: V0052901
2014-B-0085 Multiple Vulnerabilities in HP System Management Homepage (SMH)
Severity: Category I - VMSKEY: V0052899

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-05-05 Google Chrome desktopMediaPickerController use after free attempt
RuleID : 53534 - Type : BROWSER-CHROME - Revision : 1
2020-05-05 Google Chrome desktopMediaPickerController use after free attempt
RuleID : 53533 - Type : BROWSER-CHROME - Revision : 1
2020-04-25 Horde Groupware Webmail data import PHP code injection attempt
RuleID : 53506 - Type : SERVER-WEBAPP - Revision : 1
2020-04-25 Horde Groupware Webmail data import PHP code injection attempt
RuleID : 53505 - Type : SERVER-WEBAPP - Revision : 3
2020-02-25 OpenSSL anonymous ECDH denial of service attempt
RuleID : 52626 - Type : SERVER-OTHER - Revision : 1
2020-02-25 OpenSSL anonymous ECDH denial of service attempt
RuleID : 52625 - Type : SERVER-OTHER - Revision : 1
2020-02-04 dnsmasq crafted OPT record denial of service attempt
RuleID : 52524 - Type : PROTOCOL-DNS - Revision : 1
2020-01-21 OpenSSL SSL ChangeCipherSpec man-in-the-middle attempt
RuleID : 52487 - Type : SERVER-OTHER - Revision : 1
2019-10-25 Red Hat NetworkManager DHCP client command injection attempt
RuleID : 52022-community - Type : OS-LINUX - Revision : 1
2019-11-26 Red Hat NetworkManager DHCP client command injection attempt
RuleID : 52022 - Type : OS-LINUX - Revision : 1
2019-11-26 LibreOffice office document arbitrary script execution attempt
RuleID : 52000 - Type : FILE-OTHER - Revision : 1
2019-11-26 LibreOffice office document arbitrary script execution attempt
RuleID : 51999 - Type : FILE-OTHER - Revision : 1
2019-11-21 Jenkins CLI arbitrary Java object deserialization attempt
RuleID : 51961 - Type : SERVER-WEBAPP - Revision : 2
2019-07-25 Ruby on Rails Active Storage deserialization remote code execution attempt
RuleID : 50504 - Type : SERVER-WEBAPP - Revision : 1
2019-03-19 Multiple products runc arbitrary code execution attempt
RuleID : 49195 - Type : SERVER-OTHER - Revision : 2
2019-03-05 Ghostscript PostScript remote code execution attempt
RuleID : 49086 - Type : FILE-OTHER - Revision : 1
2019-03-05 Ghostscript PostScript remote code execution attempt
RuleID : 49085 - Type : FILE-OTHER - Revision : 1
2018-05-30 Red Hat NetworkManager DHCP client command injection attempt
RuleID : 46847-community - Type : OS-LINUX - Revision : 1
2018-07-03 Red Hat NetworkManager DHCP client command injection attempt
RuleID : 46847 - Type : OS-LINUX - Revision : 1
2018-05-15 Apache ActiveMQ JMS ObjectMessage deserialization attempt
RuleID : 46304 - Type : SERVER-OTHER - Revision : 2
2017-12-19 ISC BIND 9 DNS rdata length handling remote denial of service attempt
RuleID : 44879 - Type : SERVER-OTHER - Revision : 1
2017-11-07 Supervisord remote code execution attempt
RuleID : 44483 - Type : SERVER-OTHER - Revision : 2
2017-11-07 dnsmasq overly large DNS query denial of service attempt
RuleID : 44479 - Type : PROTOCOL-DNS - Revision : 3
2017-04-12 PowerDNS name compression pointer loop denial of service attempt
RuleID : 41905 - Type : PROTOCOL-DNS - Revision : 1
2017-04-12 PowerDNS name compression pointer loop denial of service attempt
RuleID : 41904 - Type : PROTOCOL-DNS - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-18 Name: The remote Debian host is missing a security update.
File: debian_DLA-1635.nasl - Type: ACT_GATHER_INFO
2019-01-16 Name: The remote Fedora host is missing a security update.
File: fedora_2019-e6ca5847c7.nasl - Type: ACT_GATHER_INFO
2019-01-16 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_383931ba181811e992ea448a5b29e8a9.nasl - Type: ACT_GATHER_INFO
2019-01-11 Name: The remote Fedora host is missing a security update.
File: fedora_2019-a7b53ed5a3.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2019-1140.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4363.nasl - Type: ACT_GATHER_INFO
2019-01-08 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2019-1006.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote Debian host is missing a security update.
File: debian_DLA-1629.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote Fedora host is missing a security update.
File: fedora_2018-166b220ff1.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5f91054677.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_3e41c1a610bc11e9bd85fcaa147e860e.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-060302dc83.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-23ca7a6798.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-25674bb48e.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-2bf852f063.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-4544e8dbc8.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-49d6e4bc3f.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5ed8fb9efa.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-66547a8c14.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-6edf04d9d6.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-71fd5db181.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-7689556ab2.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-7eae87ec86.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-84a1f77d89.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-87f2ace20d.nasl - Type: ACT_GATHER_INFO