This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Fedoraproject First view 2007-07-27
Product Fedora Last view 2021-10-20
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* 762
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* 562
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* 419
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* 376
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* 318
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* 212
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* 188
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* 175
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* 159
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:* 156
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* 107
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:* 105
cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:* 95
cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:* 67
cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:* 65
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:* 54
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:* 42
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* 35
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:* 29
cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:* 20
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:* 20
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:* 15
cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:* 15
cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:* 13
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:* 13
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:* 12
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* 12
cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:* 11
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:* 10
cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:* 10
cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:* 6
cpe:2.3:o:fedoraproject:fedora:3334:*:*:*:*:*:*:* 1

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.3 2021-10-20 CVE-2021-35565

Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

5.3 2021-10-20 CVE-2021-35564

Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Keytool). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

5.3 2021-10-20 CVE-2021-35561

Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

5.9 2021-10-20 CVE-2021-35550

Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

7.8 2021-10-19 CVE-2021-3872

vim is vulnerable to Heap-based Buffer Overflow

6.5 2021-10-19 CVE-2021-3746

A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6.

5.3 2021-10-11 CVE-2021-41800

MediaWiki before 1.36.2 allows a denial of service (resource consumption because of lengthy query processing time). Visiting Special:Contributions can sometimes result in a long running SQL query because PoolCounter protection is mishandled.

7.5 2021-10-11 CVE-2021-41799

MediaWiki before 1.36.2 allows a denial of service (resource consumption because of lengthy query processing time). ApiQueryBacklinks (action=query&list=backlinks) can cause a full table scan.

6.1 2021-10-11 CVE-2021-41798

MediaWiki before 1.36.2 allows XSS. Month related MediaWiki messages are not escaped before being used on the Special:Search results page.

7.8 2021-10-08 CVE-2021-41133

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.

9.6 2021-10-08 CVE-2021-37973

Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

8.8 2021-10-08 CVE-2021-37972

Out of bounds read in libjpeg-turbo in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

4.3 2021-10-08 CVE-2021-37971

Incorrect security UI in Web Browser UI in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.

8.8 2021-10-08 CVE-2021-37970

Use after free in File System API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

7.8 2021-10-08 CVE-2021-37969

Inappropriate implementation in Google Updater in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to perform local privilege escalation via a crafted file.

4.3 2021-10-08 CVE-2021-37968

Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

4.3 2021-10-08 CVE-2021-37967

Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.

4.3 2021-10-08 CVE-2021-37965

Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

4.3 2021-10-08 CVE-2021-37963

Side-channel information leakage in DevTools in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to bypass site isolation via a crafted HTML page.

8.8 2021-10-08 CVE-2021-37962

Use after free in Performance Manager in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.

8.8 2021-10-08 CVE-2021-37961

Use after free in Tab Strip in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8 2021-10-08 CVE-2021-37959

Use after free in Task Manager in Google Chrome prior to 94.0.4606.54 allowed an attacker who convinced a user to enage in a series of user gestures to potentially exploit heap corruption via a crafted HTML page.

5.4 2021-10-08 CVE-2021-37958

Inappropriate implementation in Navigation in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.

8.8 2021-10-08 CVE-2021-37957

Use after free in WebGPU in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8 2021-10-08 CVE-2021-37956

Use after free in Offline use in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
10% (194) CWE-787 Out-of-bounds Write
9% (190) CWE-416 Use After Free
6% (132) CWE-125 Out-of-bounds Read
6% (131) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
6% (117) CWE-20 Improper Input Validation
4% (85) CWE-476 NULL Pointer Dereference
4% (83) CWE-200 Information Exposure
3% (63) CWE-190 Integer Overflow or Wraparound
3% (63) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
2% (49) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
2% (48) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (39) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
1% (30) CWE-362 Race Condition
1% (30) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
1% (28) CWE-264 Permissions, Privileges, and Access Controls
1% (28) CWE-59 Improper Link Resolution Before File Access ('Link Following')
1% (27) CWE-189 Numeric Errors
1% (23) CWE-287 Improper Authentication
1% (22) CWE-770 Allocation of Resources Without Limits or Throttling
1% (22) CWE-617 Reachable Assertion
1% (22) CWE-284 Access Control (Authorization) Issues
1% (22) CWE-269 Improper Privilege Management
0% (17) CWE-295 Certificate Issues
0% (16) CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli...
0% (15) CWE-399 Resource Management Errors

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:9303 The CUPS service, as used in SUSE Linux before 20070720 and other Linux distr...
oval:org.mitre.oval:def:8090 DSA-1450 util-linux -- programming error
oval:org.mitre.oval:def:7851 DSA-1449 loop-aes-utils -- programming error
oval:org.mitre.oval:def:19981 DSA-1450-1 util-linux privilege escalation
oval:org.mitre.oval:def:18591 DSA-1449-1 loop-aes-utils privilege escalation
oval:org.mitre.oval:def:17642 USN-533-1 -- util-linux vulnerability
oval:org.mitre.oval:def:10101 mount and umount in util-linux and loop-aes-utils call the setuid and setgid ...
oval:org.mitre.oval:def:22114 ELSA-2007:0969: util-linux security update (Moderate)
oval:org.mitre.oval:def:20265 Multiple vulnerabilities in the X server
oval:org.mitre.oval:def:19689 HP-UX Running Xserver, Remote Execution of Arbitrary Code
oval:org.mitre.oval:def:10372 The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent a...
oval:org.mitre.oval:def:7816 DSA-1565 linux-2.6 -- several vulnerabilities
oval:org.mitre.oval:def:19757 DSA-1565-1 linux-2.6 - several vulnerabilities
oval:org.mitre.oval:def:11843 Race condition in the directory notification subsystem (dnotify) in Linux ker...
oval:org.mitre.oval:def:12918 USN-734-1 -- ffmpeg, ffmpeg-debian vulnerabilities
oval:org.mitre.oval:def:12473 HP-UX Apache-based Web Server, Local Information Disclosure, Increase of Priv...
oval:org.mitre.oval:def:10270 The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache AP...
oval:org.mitre.oval:def:9497 Mozilla Firefox before 3.0.12 does not always use XPCCrossOriginWrapper when ...
oval:org.mitre.oval:def:7832 DSA-1840 xulrunner -- several vulnerabilities
oval:org.mitre.oval:def:13773 DSA-1840-1 xulrunner -- several vulnerabilities
oval:org.mitre.oval:def:13485 USN-798-1 -- firefox-3.0, xulrunner-1.9 vulnerabilities
oval:org.mitre.oval:def:9356 XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environme...
oval:org.mitre.oval:def:8520 HP-UX Running Java, Remote Increase in Privilege, Denial of Service and Other...
oval:org.mitre.oval:def:8045 DSA-1921 expat -- denial of service
oval:org.mitre.oval:def:7306 DSA-1984 libxerces2-java -- denial of service

SAINT Exploits

Description Link
Red Hat DHCP client NetworkManager integration script command injection More info here
Apache HTTP Server path traversal More info here
Telnetd Encryption Key ID Code Execution More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
78020 FreeBSD telnetd Multiple telnet/libtelnet/encrypt.c encrypt_keyid() Function ...
77832 Parallels Plesk Panel Billing System TLS Renegotiation Handshakes MiTM Plaint...
77184 nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote...
75622 Blue Coat Director TLS Renegotiation Handshakes MiTM Plaintext Data Injection
74335 Hitachi Web Server TLS Renegotiation Handshakes MiTM Plaintext Data Injection
74150 Drupal Comment Attachment Access Restriction Bypass
73984 libpng png_rgb_to_gray Function PNG File Handling Overflow
73983 libpng pngerror.c png_err Function NULL Argument PNG File Handling DoS
73982 libpng pngrutil.c png_handle_sCAL Function PNG File Handling Memory Corruptio...
73748 udisks mount(8) Command Arbitrary Kernel Module Loading
73686 libcurl http_negotiate.c Curl_input_negotiate Function GSSAPI Credential Dele...
73617 Kerberos Applications GSS-API FTP Daemon EGID Privilege Matching Restriction ...
73493 libpng pngerror.c png_format_buffer() Off-by-one PNG Image Handling Remote DoS
73449 Linux Kernel net/dccp/options.c dccp_parse_options Function DCCP Packet Remot...
73340 vsftpd ls.c vsf_filename_passes_filter STAT Command glob Expression Remote DoS
73328 cURL GSSAPI Client Credential Remote Disclosure
73246 Apache Subversion mod_dav_svn Path-based Access Control Rule Handling Remote DoS
73245 Apache Subversion mod_dav_svn Baselined Resource Request Handling Remote DoS
72991 abcm2ps Multiple Unspecified Issues
72660 MySQL GUI Tools Administrator / Query Browser Command Line Credentials Local ...
71961 Oracle Fusion Middleware Oracle WebLogic Server TLS Renegotiation Handshakes ...
71951 Oracle Multiple Products Oracle Security Service TLS Renegotiation Handshakes...
70620 mGuard TLS Renegotiation Handshakes MiTM Plaintext Data Injection
70518 Asterisk main/utils.c ast_uri_encode() Function Caller ID Information Overflow
70265 Linux Kernel kernel/exit.c do_exit Function KERNEL_DS get_fs Value Handling L...

ExploitDB Exploits

id Description
32998 Heartbleed OpenSSL - Information Leak Exploit (2) - DTLS Support
32791 Heartbleed OpenSSL - Information Leak Exploit (1)
32764 OpenSSL 1.0.1f TLS Heartbeat Extension - Memory Disclosure (Multiple SSL/TLS ...
32745 OpenSSL TLS Heartbeat Extension - Memory Disclosure
32277 nginx 1.4.0 64-bit - Remote Exploit for Linux (Generic)
27778 Samba nttrans Reply - Integer Overflow Vulnerability
25499 nginx 1.3.9-1.4.0 DoS PoC
22406 Konqueror 4.7.3 Memory Corruption
16270 vsftpd 2.3.2 Denial of Service Vulnerability
15704 Linux Kernel <= 2.6.37 - Local Privilege Escalation
15344 Linux Kernel VIDIOCSMICROCODE IOCTL Local Memory Overwrite Vulnerability
14814 Linux Kernel < 2.6.36-rc1 CAN BCM Privilege Escalation Exploit
14422 libpng <= 1.4.2 Denial of Service Vulnerability
10579 TLS Renegotiation Vulnerability PoC Exploit

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2014-10-16 Name : POODLE SSLv3 Protocol CBC ciphers Information Disclosure Vulnerability
File : nvt/gb_poodel_sslv3_info_disc_vuln.nasl
2013-09-18 Name : Debian Security Advisory DSA 2439-1 (libpng - buffer overflow)
File : nvt/deb_2439_1.nasl
2012-12-26 Name : Mandriva Update for apache-mod_security MDVSA-2012:182 (apache-mod_security)
File : nvt/gb_mandriva_MDVSA_2012_182.nasl
2012-12-24 Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Mac OS X)
File : nvt/gb_libreoffice_graphic_object_bof_vuln_macosx.nasl
2012-12-24 Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Windows)
File : nvt/gb_libreoffice_graphic_object_bof_vuln_win.nasl
2012-12-24 Name : OpenOffice Multiple Buffer Overflow Vulnerabilities - Dec12 (Windows)
File : nvt/gb_openoffice_mult_bof_vuln_dec12_win.nasl
2012-12-18 Name : Fedora Update for kernel FEDORA-2012-20240
File : nvt/gb_fedora_2012_20240_kernel_fc16.nasl
2012-12-13 Name : SuSE Update for update openSUSE-SU-2012:0466-1 (update)
File : nvt/gb_suse_2012_0466_1.nasl
2012-12-10 Name : Fedora Update for gnome-system-log FEDORA-2012-18659
File : nvt/gb_fedora_2012_18659_gnome-system-log_fc17.nasl
2012-12-04 Name : Fedora Update for mod_security_crs FEDORA-2012-18315
File : nvt/gb_fedora_2012_18315_mod_security_crs_fc17.nasl
2012-12-04 Name : Fedora Update for mod_security FEDORA-2012-18315
File : nvt/gb_fedora_2012_18315_mod_security_fc17.nasl
2012-11-29 Name : Fedora Update for kernel FEDORA-2012-18691
File : nvt/gb_fedora_2012_18691_kernel_fc16.nasl
2012-11-09 Name : CentOS Update for kernel CESA-2012:1426 centos6
File : nvt/gb_CESA-2012_1426_kernel_centos6.nasl
2012-11-09 Name : RedHat Update for kernel RHSA-2012:1426-01
File : nvt/gb_RHSA-2012_1426-01_kernel.nasl
2012-11-06 Name : Fedora Update for xlockmore FEDORA-2012-16485
File : nvt/gb_fedora_2012_16485_xlockmore_fc17.nasl
2012-11-06 Name : Fedora Update for xlockmore FEDORA-2012-16490
File : nvt/gb_fedora_2012_16490_xlockmore_fc16.nasl
2012-11-06 Name : Fedora Update for kernel FEDORA-2012-17479
File : nvt/gb_fedora_2012_17479_kernel_fc16.nasl
2012-11-02 Name : Fedora Update for dokuwiki FEDORA-2012-16605
File : nvt/gb_fedora_2012_16605_dokuwiki_fc16.nasl
2012-11-02 Name : Fedora Update for dokuwiki FEDORA-2012-16614
File : nvt/gb_fedora_2012_16614_dokuwiki_fc17.nasl
2012-10-22 Name : FreeBSD Ports: xlockmore, ja-xlockmore
File : nvt/freebsd_xlockmore.nasl
2012-10-19 Name : Fedora Update for mom FEDORA-2012-15496
File : nvt/gb_fedora_2012_15496_mom_fc17.nasl
2012-10-16 Name : Fedora Update for dracut FEDORA-2012-14953
File : nvt/gb_fedora_2012_14953_dracut_fc17.nasl
2012-10-16 Name : Fedora Update for dracut FEDORA-2012-14959
File : nvt/gb_fedora_2012_14959_dracut_fc16.nasl
2012-10-09 Name : Fedora Update for phpldapadmin FEDORA-2012-14344
File : nvt/gb_fedora_2012_14344_phpldapadmin_fc17.nasl
2012-10-09 Name : Fedora Update for phpldapadmin FEDORA-2012-14363
File : nvt/gb_fedora_2012_14363_phpldapadmin_fc16.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0202 Citrix XenServer Information Disclosure Vulnerability
Severity: Category I - VMSKEY: V0061343
2015-A-0199 Multiple Vulnerabilities in Apple Mac OS X
Severity: Category I - VMSKEY: V0061337
2015-A-0154 Multiple Vulnerabilities in Oracle Fusion Middleware
Severity: Category I - VMSKEY: V0061081
2015-A-0113 Multiple Vulnerabilities in Juniper Networks CTPOS
Severity: Category I - VMSKEY: V0060737
2015-B-0012 Multiple Vulnerabilities in VMware ESXi 5.0
Severity: Category I - VMSKEY: V0058517
2015-B-0013 Multiple Vulnerabilities in VMware ESXi 5.1
Severity: Category I - VMSKEY: V0058515
2015-B-0014 Multiple Vulnerabilities in VMware ESXi 5.5
Severity: Category I - VMSKEY: V0058513
2014-A-0172 Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform
Severity: Category I - VMSKEY: V0057381
2014-B-0103 Multiple Vulnerabilities in VMware Horizon View Client
Severity: Category I - VMSKEY: V0053509
2014-B-0102 Multiple Vulnerabilities in VMware vCenter Converter Standalone 5.5
Severity: Category I - VMSKEY: V0053507
2014-B-0101 Multiple Vulnerabilities in VMware vCenter Converter Standalone 5.1
Severity: Category I - VMSKEY: V0053505
2014-A-0115 Multiple Vulnerabilities in VMware Horizon View
Severity: Category I - VMSKEY: V0053501
2014-B-0097 Multiple Vulnerabilities in VMware ESXi 5.0
Severity: Category I - VMSKEY: V0053319
2014-A-0109 Multiple Vulnerabilities in VMware Fusion
Severity: Category I - VMSKEY: V0053183
2014-B-0095 Multiple Vulnerabilities in Splunk
Severity: Category I - VMSKEY: V0053177
2014-A-0111 Multiple Vulnerabilities in VMware Workstation
Severity: Category I - VMSKEY: V0053179
2014-A-0110 Multiple Vulnerabilities in VMware Player
Severity: Category I - VMSKEY: V0053181
2014-A-0103 Multiple Vulnerabilities in Oracle E-Business
Severity: Category I - VMSKEY: V0053195
2014-A-0100 Multiple Vulnerabilities in McAfee VirusScan Enterprise for Linux
Severity: Category I - VMSKEY: V0053201
2014-A-0099 Multiple Vulnerabilities in McAfee Email Gateway
Severity: Category I - VMSKEY: V0053203
2014-B-0085 Multiple Vulnerabilities in HP System Management Homepage (SMH)
Severity: Category I - VMSKEY: V0052899
2014-B-0092 Multiple Vulnerabilities in VMware vSphere Client 5.5
Severity: Category I - VMSKEY: V0052893
2014-B-0084 HP Onboard Administrator Information Disclosure Vulnerability
Severity: Category I - VMSKEY: V0052901
2014-B-0091 Multiple Vulnerabilities in VMware vCenter Update Manager 5.5
Severity: Category I - VMSKEY: V0052907
2014-B-0089 Multiple Vulnerabilities in VMware ESXi 5.1
Severity: Category I - VMSKEY: V0052909

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2021-02-18 TRUFFLEHUNTER TALOS-2021-1238 attack attempt
RuleID : 57135 - Type : BROWSER-WEBKIT - Revision : 1
2021-02-18 TRUFFLEHUNTER TALOS-2021-1238 attack attempt
RuleID : 57134 - Type : BROWSER-WEBKIT - Revision : 1
2021-02-18 TRUFFLEHUNTER TALOS-2021-1229 attack attempt
RuleID : 57046 - Type : BROWSER-WEBKIT - Revision : 1
2021-02-18 TRUFFLEHUNTER TALOS-2021-1229 attack attempt
RuleID : 57045 - Type : BROWSER-WEBKIT - Revision : 1
2021-01-28 TRUFFLEHUNTER TALOS-2021-1226 attack attempt
RuleID : 56995 - Type : FILE-OTHER - Revision : 1
2021-01-28 TRUFFLEHUNTER TALOS-2021-1226 attack attempt
RuleID : 56994 - Type : FILE-OTHER - Revision : 1
2021-02-02 Grafana Labs Grafana denial of service attempt
RuleID : 56822 - Type : SERVER-WEBAPP - Revision : 3
2020-12-23 TRUFFLEHUNTER TALOS-2020-1215 attack attempt
RuleID : 56724 - Type : FILE-OTHER - Revision : 1
2020-12-23 TRUFFLEHUNTER TALOS-2020-1215 attack attempt
RuleID : 56723 - Type : FILE-OTHER - Revision : 1
2021-01-12 Apache Server mod_proxy Error Page cross site scripting attempt
RuleID : 56563 - Type : SERVER-WEBAPP - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1187 attack attempt
RuleID : 56510 - Type : SERVER-OTHER - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1187 attack attempt
RuleID : 56509 - Type : SERVER-WEBAPP - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1186 attack attempt
RuleID : 56508 - Type : SERVER-OTHER - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1186 attack attempt
RuleID : 56507 - Type : SERVER-WEBAPP - Revision : 1
2020-12-23 Google Chrome Blink Renderer MediaElementEventListener memory corruption attempt
RuleID : 56438 - Type : BROWSER-CHROME - Revision : 1
2020-12-23 Google Chrome Blink Renderer MediaElementEventListener memory corruption attempt
RuleID : 56437 - Type : BROWSER-CHROME - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1195 attack attempt
RuleID : 56382 - Type : BROWSER-WEBKIT - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1195 attack attempt
RuleID : 56381 - Type : BROWSER-WEBKIT - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1195 attack attempt
RuleID : 56380 - Type : BROWSER-WEBKIT - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1195 attack attempt
RuleID : 56379 - Type : BROWSER-WEBKIT - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1188 attack attempt
RuleID : 56308 - Type : SERVER-OTHER - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1188 attack attempt
RuleID : 56307 - Type : SERVER-WEBAPP - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1189 attack attempt
RuleID : 56298 - Type : SERVER-OTHER - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1189 attack attempt
RuleID : 56297 - Type : SERVER-WEBAPP - Revision : 1
2020-12-10 Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt
RuleID : 56290 - Type : OS-WINDOWS - Revision : 6

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-18 Name: The remote Debian host is missing a security update.
File: debian_DLA-1635.nasl - Type: ACT_GATHER_INFO
2019-01-16 Name: The remote Fedora host is missing a security update.
File: fedora_2019-e6ca5847c7.nasl - Type: ACT_GATHER_INFO
2019-01-16 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_383931ba181811e992ea448a5b29e8a9.nasl - Type: ACT_GATHER_INFO
2019-01-11 Name: The remote Fedora host is missing a security update.
File: fedora_2019-a7b53ed5a3.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2019-1140.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4363.nasl - Type: ACT_GATHER_INFO
2019-01-08 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2019-1005.nasl - Type: ACT_GATHER_INFO
2019-01-08 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2019-1006.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote Debian host is missing a security update.
File: debian_DLA-1629.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote Fedora host is missing a security update.
File: fedora_2018-166b220ff1.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5f91054677.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_3e41c1a610bc11e9bd85fcaa147e860e.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-060302dc83.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-0de3edbdea.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-0f5e6e9957.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-18f3eff32b.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-23ca7a6798.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-25674bb48e.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-2bf852f063.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-4544e8dbc8.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-49d6e4bc3f.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5ed8fb9efa.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-66547a8c14.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-6a378e32c3.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-6edf04d9d6.nasl - Type: ACT_GATHER_INFO