This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Fedoraproject First view 2007-07-27
Product Fedora Last view 2021-04-23
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* 482
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* 429
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* 352
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* 297
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* 199
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* 188
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* 175
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* 159
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:* 156
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* 108
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* 106
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:* 105
cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:* 93
cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:* 67
cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:* 65
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:* 54
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:* 42
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* 35
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:* 29
cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:* 20
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:* 20
cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:* 15
cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:* 13
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:* 13
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:* 12
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:* 12
cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:* 11
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:* 10
cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:* 10
cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:* 6

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.5 2021-04-23 CVE-2021-29470

Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4.

7 2021-04-22 CVE-2021-23133

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.

5.3 2021-04-22 CVE-2021-2163

Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).

5.9 2021-04-22 CVE-2021-2161

Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).

7.5 2021-04-21 CVE-2021-28965

The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.

5.5 2021-04-20 CVE-2021-29155

An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.

6.5 2021-04-15 CVE-2021-3487

There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.

7.2 2021-04-15 CVE-2021-20288

An authentication flaw was found in ceph in versions before 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a global_id previously associated with another user, as ceph does not force the reuse of old keys to generate new ones. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

9.8 2021-04-14 CVE-2021-31162

In the standard library in Rust before 1.53.0, a double free can occur in the Vec::from_iter function if freeing the element panics.

8.2 2021-04-14 CVE-2020-36323

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

9.8 2021-04-11 CVE-2021-28879

In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.

7.5 2021-04-11 CVE-2021-28878

In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.

7.5 2021-04-11 CVE-2021-28876

In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.

4.3 2021-04-09 CVE-2021-30159

An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Users can bypass intended restrictions on deleting pages in certain "fast double move" situations. MovePage::isValidMoveTarget() uses FOR UPDATE, but it's only called if Title::getArticleID() returns non-zero with no special flags. Next, MovePage::moveToInternal() will delete the page if getArticleID(READ_LATEST) is non-zero. Therefore, if the page is missing in the replica DB, isValidMove() will return true, and then moveToInternal() will unconditionally delete the page if it can be found in the master.

4.3 2021-04-09 CVE-2021-30156

An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Special:Contributions can leak that a "hidden" user exists.

4.3 2021-04-09 CVE-2021-30155

An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. ContentModelChange does not check if a user has correct permissions to create and set the content model of a nonexistent page.

4.3 2021-04-09 CVE-2021-30152

An issue was discovered in MediaWiki before 1.31.13 and 1.32.x through 1.35.x before 1.35.2. When using the MediaWiki API to "protect" a page, a user is currently able to protect to a higher level than they currently have permissions for.

4 2021-04-08 CVE-2021-3448

A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.

7.8 2021-04-08 CVE-2021-29154

BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.

7.8 2021-04-07 CVE-2021-30184

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

5.5 2021-04-07 CVE-2021-30178

An issue was discovered in the Linux kernel through 5.11.11. synic_get in arch/x86/kvm/hyperv.c has a NULL pointer dereference for certain accesses to the SynIC Hyper-V context, aka CID-919f4ebc5987.

5.3 2021-04-06 CVE-2021-30158

An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Blocked users are unable to use Special:ResetTokens. This has security relevance because a blocked user might have accidentally shared a token, or might know that a token has been compromised, and yet is not able to block any potential future use of the token by an unauthorized party.

6.1 2021-04-06 CVE-2021-30157

An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On ChangesList special pages such as Special:RecentChanges and Special:Watchlist, some of the rcfilters-filter-* label messages are output in HTML unescaped, leading to XSS.

6.1 2021-04-06 CVE-2021-30154

An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On Special:NewFiles, all the mediastatistics-header-* messages are output in HTML unescaped, leading to XSS.

7.5 2021-04-06 CVE-2021-29424

The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
8% (130) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
7% (117) CWE-20 Improper Input Validation
7% (116) CWE-787 Out-of-bounds Write
7% (112) CWE-416 Use After Free
6% (100) CWE-125 Out-of-bounds Read
5% (88) CWE-200 Information Exposure
4% (65) CWE-476 NULL Pointer Dereference
3% (55) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
2% (46) CWE-190 Integer Overflow or Wraparound
2% (42) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (39) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
2% (32) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
1% (29) CWE-264 Permissions, Privileges, and Access Controls
1% (27) CWE-189 Numeric Errors
1% (25) CWE-59 Improper Link Resolution Before File Access ('Link Following')
1% (24) CWE-362 Race Condition
1% (23) CWE-287 Improper Authentication
1% (22) CWE-284 Access Control (Authorization) Issues
1% (21) CWE-269 Improper Privilege Management
1% (20) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
1% (16) CWE-617 Reachable Assertion
0% (15) CWE-770 Allocation of Resources Without Limits or Throttling
0% (15) CWE-399 Resource Management Errors
0% (15) CWE-276 Incorrect Default Permissions
0% (13) CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli...

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:9303 The CUPS service, as used in SUSE Linux before 20070720 and other Linux distr...
oval:org.mitre.oval:def:8090 DSA-1450 util-linux -- programming error
oval:org.mitre.oval:def:7851 DSA-1449 loop-aes-utils -- programming error
oval:org.mitre.oval:def:19981 DSA-1450-1 util-linux privilege escalation
oval:org.mitre.oval:def:18591 DSA-1449-1 loop-aes-utils privilege escalation
oval:org.mitre.oval:def:17642 USN-533-1 -- util-linux vulnerability
oval:org.mitre.oval:def:10101 mount and umount in util-linux and loop-aes-utils call the setuid and setgid ...
oval:org.mitre.oval:def:22114 ELSA-2007:0969: util-linux security update (Moderate)
oval:org.mitre.oval:def:20265 Multiple vulnerabilities in the X server
oval:org.mitre.oval:def:19689 HP-UX Running Xserver, Remote Execution of Arbitrary Code
oval:org.mitre.oval:def:10372 The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent a...
oval:org.mitre.oval:def:7816 DSA-1565 linux-2.6 -- several vulnerabilities
oval:org.mitre.oval:def:19757 DSA-1565-1 linux-2.6 - several vulnerabilities
oval:org.mitre.oval:def:11843 Race condition in the directory notification subsystem (dnotify) in Linux ker...
oval:org.mitre.oval:def:12918 USN-734-1 -- ffmpeg, ffmpeg-debian vulnerabilities
oval:org.mitre.oval:def:12473 HP-UX Apache-based Web Server, Local Information Disclosure, Increase of Priv...
oval:org.mitre.oval:def:10270 The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache AP...
oval:org.mitre.oval:def:9766 The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, doe...
oval:org.mitre.oval:def:8598 VMware kernel execve function vulnerability
oval:org.mitre.oval:def:11412 Service Console update for COS kernel
oval:org.mitre.oval:def:21973 ELSA-2009:1243: Oracle Linux 5.x.4 kernel security and bug fix update (Import...
oval:org.mitre.oval:def:29153 RHSA-2009:1243 -- Red Hat Enterprise Linux 5.4 kernel security and bug fix up...
oval:org.mitre.oval:def:13793 USN-835-1 -- neon, neon27 vulnerabilities
oval:org.mitre.oval:def:11721 neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle ...
oval:org.mitre.oval:def:22944 ELSA-2009:1452: neon security update (Moderate)

SAINT Exploits

Description Link
Red Hat DHCP client NetworkManager integration script command injection More info here
Telnetd Encryption Key ID Code Execution More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
78020 FreeBSD telnetd Multiple telnet/libtelnet/encrypt.c encrypt_keyid() Function ...
77832 Parallels Plesk Panel Billing System TLS Renegotiation Handshakes MiTM Plaint...
77184 nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote...
75622 Blue Coat Director TLS Renegotiation Handshakes MiTM Plaintext Data Injection
74335 Hitachi Web Server TLS Renegotiation Handshakes MiTM Plaintext Data Injection
74150 Drupal Comment Attachment Access Restriction Bypass
73984 libpng png_rgb_to_gray Function PNG File Handling Overflow
73983 libpng pngerror.c png_err Function NULL Argument PNG File Handling DoS
73982 libpng pngrutil.c png_handle_sCAL Function PNG File Handling Memory Corruptio...
73748 udisks mount(8) Command Arbitrary Kernel Module Loading
73686 libcurl http_negotiate.c Curl_input_negotiate Function GSSAPI Credential Dele...
73617 Kerberos Applications GSS-API FTP Daemon EGID Privilege Matching Restriction ...
73493 libpng pngerror.c png_format_buffer() Off-by-one PNG Image Handling Remote DoS
73449 Linux Kernel net/dccp/options.c dccp_parse_options Function DCCP Packet Remot...
73340 vsftpd ls.c vsf_filename_passes_filter STAT Command glob Expression Remote DoS
73328 cURL GSSAPI Client Credential Remote Disclosure
73246 Apache Subversion mod_dav_svn Path-based Access Control Rule Handling Remote DoS
73245 Apache Subversion mod_dav_svn Baselined Resource Request Handling Remote DoS
72991 abcm2ps Multiple Unspecified Issues
72660 MySQL GUI Tools Administrator / Query Browser Command Line Credentials Local ...
71961 Oracle Fusion Middleware Oracle WebLogic Server TLS Renegotiation Handshakes ...
71951 Oracle Multiple Products Oracle Security Service TLS Renegotiation Handshakes...
70620 mGuard TLS Renegotiation Handshakes MiTM Plaintext Data Injection
70518 Asterisk main/utils.c ast_uri_encode() Function Caller ID Information Overflow
70265 Linux Kernel kernel/exit.c do_exit Function KERNEL_DS get_fs Value Handling L...

ExploitDB Exploits

id Description
32998 Heartbleed OpenSSL - Information Leak Exploit (2) - DTLS Support
32791 Heartbleed OpenSSL - Information Leak Exploit (1)
32764 OpenSSL 1.0.1f TLS Heartbeat Extension - Memory Disclosure (Multiple SSL/TLS ...
32745 OpenSSL TLS Heartbeat Extension - Memory Disclosure
32277 nginx 1.4.0 64-bit - Remote Exploit for Linux (Generic)
27778 Samba nttrans Reply - Integer Overflow Vulnerability
25499 nginx 1.3.9-1.4.0 DoS PoC
22406 Konqueror 4.7.3 Memory Corruption
16270 vsftpd 2.3.2 Denial of Service Vulnerability
15704 Linux Kernel <= 2.6.37 - Local Privilege Escalation
15344 Linux Kernel VIDIOCSMICROCODE IOCTL Local Memory Overwrite Vulnerability
14814 Linux Kernel < 2.6.36-rc1 CAN BCM Privilege Escalation Exploit
14422 libpng <= 1.4.2 Denial of Service Vulnerability
10579 TLS Renegotiation Vulnerability PoC Exploit

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2014-10-16 Name : POODLE SSLv3 Protocol CBC ciphers Information Disclosure Vulnerability
File : nvt/gb_poodel_sslv3_info_disc_vuln.nasl
2013-09-18 Name : Debian Security Advisory DSA 2439-1 (libpng - buffer overflow)
File : nvt/deb_2439_1.nasl
2012-12-26 Name : Mandriva Update for apache-mod_security MDVSA-2012:182 (apache-mod_security)
File : nvt/gb_mandriva_MDVSA_2012_182.nasl
2012-12-24 Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Mac OS X)
File : nvt/gb_libreoffice_graphic_object_bof_vuln_macosx.nasl
2012-12-24 Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Windows)
File : nvt/gb_libreoffice_graphic_object_bof_vuln_win.nasl
2012-12-24 Name : OpenOffice Multiple Buffer Overflow Vulnerabilities - Dec12 (Windows)
File : nvt/gb_openoffice_mult_bof_vuln_dec12_win.nasl
2012-12-18 Name : Fedora Update for kernel FEDORA-2012-20240
File : nvt/gb_fedora_2012_20240_kernel_fc16.nasl
2012-12-13 Name : SuSE Update for update openSUSE-SU-2012:0466-1 (update)
File : nvt/gb_suse_2012_0466_1.nasl
2012-12-10 Name : Fedora Update for gnome-system-log FEDORA-2012-18659
File : nvt/gb_fedora_2012_18659_gnome-system-log_fc17.nasl
2012-12-04 Name : Fedora Update for mod_security_crs FEDORA-2012-18315
File : nvt/gb_fedora_2012_18315_mod_security_crs_fc17.nasl
2012-12-04 Name : Fedora Update for mod_security FEDORA-2012-18315
File : nvt/gb_fedora_2012_18315_mod_security_fc17.nasl
2012-11-29 Name : Fedora Update for kernel FEDORA-2012-18691
File : nvt/gb_fedora_2012_18691_kernel_fc16.nasl
2012-11-09 Name : CentOS Update for kernel CESA-2012:1426 centos6
File : nvt/gb_CESA-2012_1426_kernel_centos6.nasl
2012-11-09 Name : RedHat Update for kernel RHSA-2012:1426-01
File : nvt/gb_RHSA-2012_1426-01_kernel.nasl
2012-11-06 Name : Fedora Update for xlockmore FEDORA-2012-16485
File : nvt/gb_fedora_2012_16485_xlockmore_fc17.nasl
2012-11-06 Name : Fedora Update for xlockmore FEDORA-2012-16490
File : nvt/gb_fedora_2012_16490_xlockmore_fc16.nasl
2012-11-06 Name : Fedora Update for kernel FEDORA-2012-17479
File : nvt/gb_fedora_2012_17479_kernel_fc16.nasl
2012-11-02 Name : Fedora Update for dokuwiki FEDORA-2012-16605
File : nvt/gb_fedora_2012_16605_dokuwiki_fc16.nasl
2012-11-02 Name : Fedora Update for dokuwiki FEDORA-2012-16614
File : nvt/gb_fedora_2012_16614_dokuwiki_fc17.nasl
2012-10-22 Name : FreeBSD Ports: xlockmore, ja-xlockmore
File : nvt/freebsd_xlockmore.nasl
2012-10-19 Name : Fedora Update for mom FEDORA-2012-15496
File : nvt/gb_fedora_2012_15496_mom_fc17.nasl
2012-10-16 Name : Fedora Update for dracut FEDORA-2012-14953
File : nvt/gb_fedora_2012_14953_dracut_fc17.nasl
2012-10-16 Name : Fedora Update for dracut FEDORA-2012-14959
File : nvt/gb_fedora_2012_14959_dracut_fc16.nasl
2012-10-09 Name : Fedora Update for phpldapadmin FEDORA-2012-14344
File : nvt/gb_fedora_2012_14344_phpldapadmin_fc17.nasl
2012-10-09 Name : Fedora Update for phpldapadmin FEDORA-2012-14363
File : nvt/gb_fedora_2012_14363_phpldapadmin_fc16.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0202 Citrix XenServer Information Disclosure Vulnerability
Severity: Category I - VMSKEY: V0061343
2015-A-0199 Multiple Vulnerabilities in Apple Mac OS X
Severity: Category I - VMSKEY: V0061337
2015-A-0154 Multiple Vulnerabilities in Oracle Fusion Middleware
Severity: Category I - VMSKEY: V0061081
2015-A-0113 Multiple Vulnerabilities in Juniper Networks CTPOS
Severity: Category I - VMSKEY: V0060737
2015-B-0012 Multiple Vulnerabilities in VMware ESXi 5.0
Severity: Category I - VMSKEY: V0058517
2015-B-0013 Multiple Vulnerabilities in VMware ESXi 5.1
Severity: Category I - VMSKEY: V0058515
2015-B-0014 Multiple Vulnerabilities in VMware ESXi 5.5
Severity: Category I - VMSKEY: V0058513
2014-A-0172 Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform
Severity: Category I - VMSKEY: V0057381
2014-B-0103 Multiple Vulnerabilities in VMware Horizon View Client
Severity: Category I - VMSKEY: V0053509
2014-B-0102 Multiple Vulnerabilities in VMware vCenter Converter Standalone 5.5
Severity: Category I - VMSKEY: V0053507
2014-B-0101 Multiple Vulnerabilities in VMware vCenter Converter Standalone 5.1
Severity: Category I - VMSKEY: V0053505
2014-A-0115 Multiple Vulnerabilities in VMware Horizon View
Severity: Category I - VMSKEY: V0053501
2014-B-0097 Multiple Vulnerabilities in VMware ESXi 5.0
Severity: Category I - VMSKEY: V0053319
2014-A-0109 Multiple Vulnerabilities in VMware Fusion
Severity: Category I - VMSKEY: V0053183
2014-B-0095 Multiple Vulnerabilities in Splunk
Severity: Category I - VMSKEY: V0053177
2014-A-0111 Multiple Vulnerabilities in VMware Workstation
Severity: Category I - VMSKEY: V0053179
2014-A-0110 Multiple Vulnerabilities in VMware Player
Severity: Category I - VMSKEY: V0053181
2014-A-0103 Multiple Vulnerabilities in Oracle E-Business
Severity: Category I - VMSKEY: V0053195
2014-A-0100 Multiple Vulnerabilities in McAfee VirusScan Enterprise for Linux
Severity: Category I - VMSKEY: V0053201
2014-A-0099 Multiple Vulnerabilities in McAfee Email Gateway
Severity: Category I - VMSKEY: V0053203
2014-B-0085 Multiple Vulnerabilities in HP System Management Homepage (SMH)
Severity: Category I - VMSKEY: V0052899
2014-B-0092 Multiple Vulnerabilities in VMware vSphere Client 5.5
Severity: Category I - VMSKEY: V0052893
2014-B-0084 HP Onboard Administrator Information Disclosure Vulnerability
Severity: Category I - VMSKEY: V0052901
2014-B-0091 Multiple Vulnerabilities in VMware vCenter Update Manager 5.5
Severity: Category I - VMSKEY: V0052907
2014-B-0089 Multiple Vulnerabilities in VMware ESXi 5.1
Severity: Category I - VMSKEY: V0052909

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2021-01-28 TRUFFLEHUNTER TALOS-2021-1226 attack attempt
RuleID : 56995 - Type : FILE-OTHER - Revision : 1
2021-01-28 TRUFFLEHUNTER TALOS-2021-1226 attack attempt
RuleID : 56994 - Type : FILE-OTHER - Revision : 1
2021-02-02 Grafana Labs Grafana denial of service attempt
RuleID : 56822 - Type : SERVER-WEBAPP - Revision : 3
2020-12-23 TRUFFLEHUNTER TALOS-2020-1215 attack attempt
RuleID : 56724 - Type : FILE-OTHER - Revision : 1
2020-12-23 TRUFFLEHUNTER TALOS-2020-1215 attack attempt
RuleID : 56723 - Type : FILE-OTHER - Revision : 1
2021-01-12 Apache Server mod_proxy Error Page cross site scripting attempt
RuleID : 56563 - Type : SERVER-WEBAPP - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1187 attack attempt
RuleID : 56510 - Type : SERVER-OTHER - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1187 attack attempt
RuleID : 56509 - Type : SERVER-WEBAPP - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1186 attack attempt
RuleID : 56508 - Type : SERVER-OTHER - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1186 attack attempt
RuleID : 56507 - Type : SERVER-WEBAPP - Revision : 1
2020-12-23 Google Chrome Blink Renderer MediaElementEventListener memory corruption attempt
RuleID : 56438 - Type : BROWSER-CHROME - Revision : 1
2020-12-23 Google Chrome Blink Renderer MediaElementEventListener memory corruption attempt
RuleID : 56437 - Type : BROWSER-CHROME - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1195 attack attempt
RuleID : 56382 - Type : BROWSER-WEBKIT - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1195 attack attempt
RuleID : 56381 - Type : BROWSER-WEBKIT - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1195 attack attempt
RuleID : 56380 - Type : BROWSER-WEBKIT - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1195 attack attempt
RuleID : 56379 - Type : BROWSER-WEBKIT - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1188 attack attempt
RuleID : 56308 - Type : SERVER-OTHER - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1188 attack attempt
RuleID : 56307 - Type : SERVER-WEBAPP - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1189 attack attempt
RuleID : 56298 - Type : SERVER-OTHER - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1189 attack attempt
RuleID : 56297 - Type : SERVER-WEBAPP - Revision : 1
2020-12-10 Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt
RuleID : 56290 - Type : OS-WINDOWS - Revision : 6
2020-12-08 TRUFFLEHUNTER TALOS-2020-1185 attack attempt
RuleID : 56275 - Type : SERVER-OTHER - Revision : 1
2020-12-08 PyYAML Python object serialization attempt
RuleID : 56224 - Type : POLICY-OTHER - Revision : 1
2020-12-08 PyYAML Python object serialization attempt
RuleID : 56223 - Type : POLICY-OTHER - Revision : 1
2020-12-08 TRUFFLEHUNTER TALOS-2020-1185 attack attempt
RuleID : 56211 - Type : SERVER-WEBAPP - Revision : 2

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-18 Name: The remote Debian host is missing a security update.
File: debian_DLA-1635.nasl - Type: ACT_GATHER_INFO
2019-01-16 Name: The remote Fedora host is missing a security update.
File: fedora_2019-e6ca5847c7.nasl - Type: ACT_GATHER_INFO
2019-01-16 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_383931ba181811e992ea448a5b29e8a9.nasl - Type: ACT_GATHER_INFO
2019-01-11 Name: The remote Fedora host is missing a security update.
File: fedora_2019-a7b53ed5a3.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2019-1140.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4363.nasl - Type: ACT_GATHER_INFO
2019-01-08 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2019-1005.nasl - Type: ACT_GATHER_INFO
2019-01-08 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2019-1006.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote Debian host is missing a security update.
File: debian_DLA-1629.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote Fedora host is missing a security update.
File: fedora_2018-166b220ff1.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5f91054677.nasl - Type: ACT_GATHER_INFO
2019-01-07 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_3e41c1a610bc11e9bd85fcaa147e860e.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-060302dc83.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-23ca7a6798.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-25674bb48e.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-2bf852f063.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-4544e8dbc8.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-49d6e4bc3f.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5ed8fb9efa.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-66547a8c14.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-6a378e32c3.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-6edf04d9d6.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-71fd5db181.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-7689556ab2.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-7eae87ec86.nasl - Type: ACT_GATHER_INFO