This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Suse First view 2006-12-20
Product Linux Enterprise Desktop Last view 2020-05-04
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* 84
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:* 74
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* 65
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:* 40
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* 34
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:* 30
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:* 24
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:* 21
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:* 19
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:* 14
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:* 11
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:* 9
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp4:*:*:*:*:*:* 7
cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:* 5
cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:* 4
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp1:*:*:*:*:*:* 3
cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:* 2
cpe:2.3:o:suse:linux_enterprise_desktop:10:*:*:*:*:*:*:* 1
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:lts:*:*:* 1
cpe:2.3:o:suse:linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:* 1
cpe:2.3:o:suse:linux_enterprise_desktop:10.0:sp4:*:*:lts:*:*:* 1
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp1:*:*:*:*:*:* 1
cpe:2.3:o:suse:linux_enterprise_desktop:9:*:*:*:*:*:*:* 1
cpe:2.3:o:suse:linux_enterprise_desktop:10:-:*:*:*:*:*:* 1

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.8 2020-05-04 CVE-2020-8018

A Incorrect Default Permissions vulnerability in the SLES15-SP1-CHOST-BYOS and SLES15-SP1-CAP-Deployment-BYOS images of SUSE Linux Enterprise Server 15 SP1 allows local attackers with the UID 1000 to escalate to root due to a /etc directory owned by the user This issue affects: SUSE Linux Enterprise Server 15 SP1 SLES15-SP1-CAP-Deployment-BYOS version 1.0.1 and prior versions; SLES15-SP1-CHOST-BYOS versions prior to 1.0.3 and prior versions;

7.8 2020-02-17 CVE-2014-1947

Stack-based buffer overflow in the WritePSDImage function in coders/psd.c in ImageMagick 6.5.4 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of layers in a PSD image, involving the L%02ld string, a different vulnerability than CVE-2014-2030.

6.8 2020-01-27 CVE-2006-7246

NetworkManager 0.9.x does not pin a certificate's subject to an ESSID when 802.11X authentication is used.

6.5 2020-01-23 CVE-2015-5239

Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.

5.3 2019-06-18 CVE-2019-11038

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

7.5 2019-03-21 CVE-2017-16232

** DISPUTED ** LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue.

7.8 2018-11-25 CVE-2018-19543

An issue was discovered in JasPer 2.0.14. There is a heap-based buffer over-read of size 8 in the function jp2_decode in libjasper/jp2/jp2_dec.c.

6.5 2018-11-25 CVE-2018-19542

An issue was discovered in JasPer 2.0.14. There is a NULL pointer dereference in the function jp2_decode in libjasper/jp2/jp2_dec.c, leading to a denial of service.

8.8 2018-11-25 CVE-2018-19541

An issue was discovered in JasPer 2.0.14. There is a heap-based buffer over-read of size 8 in the function jas_image_depalettize in libjasper/base/jas_image.c.

8.8 2018-11-25 CVE-2018-19540

An issue was discovered in JasPer 2.0.14. There is a heap-based buffer overflow of size 1 in the function jas_icctxtdesc_input in libjasper/base/jas_icc.c.

6.5 2018-11-25 CVE-2018-19539

An issue was discovered in JasPer 2.0.14. There is an access violation in the function jas_image_readcmpt in libjasper/base/jas_image.c, leading to a denial of service.

5.5 2018-10-31 CVE-2018-18873

An issue was discovered in JasPer 2.0.14. There is a NULL pointer dereference in the function ras_putdatastd in ras/ras_enc.c.

7.8 2017-12-20 CVE-2017-17806

The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.

7.8 2017-12-20 CVE-2017-17805

The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.

5.3 2017-10-17 CVE-2017-13088

Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.

5.3 2017-10-17 CVE-2017-13087

Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.

6.8 2017-10-17 CVE-2017-13086

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

6.8 2017-10-17 CVE-2017-13084

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

8.1 2017-10-17 CVE-2017-13082

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

5.3 2017-10-17 CVE-2017-13081

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

5.3 2017-10-17 CVE-2017-13080

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

5.3 2017-10-17 CVE-2017-13079

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

5.3 2017-10-17 CVE-2017-13078

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

6.8 2017-10-16 CVE-2017-13077

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

7.5 2017-07-21 CVE-2015-5300

The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
15% (37) CWE-416 Use After Free
11% (28) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
10% (25) CWE-200 Information Exposure
6% (16) CWE-20 Improper Input Validation
6% (15) CWE-787 Out-of-bounds Write
5% (14) CWE-476 NULL Pointer Dereference
5% (13) CWE-190 Integer Overflow or Wraparound
4% (11) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
4% (10) CWE-330 Use of Insufficiently Random Values
3% (9) CWE-125 Out-of-bounds Read
2% (7) CWE-264 Permissions, Privileges, and Access Controls
1% (4) CWE-362 Race Condition
1% (4) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (3) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (3) CWE-269 Improper Privilege Management
1% (3) CWE-17 Code
0% (2) CWE-772 Missing Release of Resource after Effective Lifetime
0% (2) CWE-369 Divide By Zero
0% (2) CWE-346 Origin Validation Error
0% (2) CWE-326 Inadequate Encryption Strength
0% (2) CWE-310 Cryptographic Issues
0% (2) CWE-287 Improper Authentication
0% (2) CWE-189 Numeric Errors
0% (2) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
0% (1) CWE-754 Improper Check for Unusual or Exceptional Conditions

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:10719 The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2...
oval:org.mitre.oval:def:20265 Multiple vulnerabilities in the X server
oval:org.mitre.oval:def:19689 HP-UX Running Xserver, Remote Execution of Arbitrary Code
oval:org.mitre.oval:def:10372 The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent a...
oval:org.mitre.oval:def:7816 DSA-1565 linux-2.6 -- several vulnerabilities
oval:org.mitre.oval:def:19757 DSA-1565-1 linux-2.6 - several vulnerabilities
oval:org.mitre.oval:def:11843 Race condition in the directory notification subsystem (dnotify) in Linux ker...
oval:org.mitre.oval:def:9600 The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on ...
oval:org.mitre.oval:def:8508 VMware kernel audit_syscall_entry function vulnerability
oval:org.mitre.oval:def:8382 VMware kernel nfsd vulnerability
oval:org.mitre.oval:def:10314 nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capabili...
oval:org.mitre.oval:def:9766 The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, doe...
oval:org.mitre.oval:def:8598 VMware kernel execve function vulnerability
oval:org.mitre.oval:def:11412 Service Console update for COS kernel
oval:org.mitre.oval:def:21973 ELSA-2009:1243: Oracle Linux 5.x.4 kernel security and bug fix update (Import...
oval:org.mitre.oval:def:29153 RHSA-2009:1243 -- Red Hat Enterprise Linux 5.4 kernel security and bug fix up...
oval:org.mitre.oval:def:9142 The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and ...
oval:org.mitre.oval:def:8557 VMware kernel udp_sendmsg function vulnerability
oval:org.mitre.oval:def:11514 Service Console update for COS kernel
oval:org.mitre.oval:def:22460 ELSA-2009:1222: kernel security and bug fix update (Important)
oval:org.mitre.oval:def:28627 RHSA-2009:1222 -- kernel security and bug fix update (Important)
oval:org.mitre.oval:def:9363 The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to...
oval:org.mitre.oval:def:8662 Apache mod_proxy_ftp Module Insufficient Input Validation Access Restriction ...
oval:org.mitre.oval:def:13296 USN-860-1 -- apache2 vulnerabilities
oval:org.mitre.oval:def:7557 Linux Kernel 2.4 and 2.6 Local Information Disclosure Vulnerability

SAINT Exploits

Description Link
Firefox AttributeChildRemoved Use After Free More info here
Mozilla Firefox XMLSerializer serializeToStream Use-after-free Vulnerability More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
77301 NetworkManager ESSID PEAP / EAP-TTLS 802.11x Authentication MitM Weakness
75290 vpnc for SUSE Linux Enterprise Desktop modify_resolvconf_suse Remote Command ...
74637 Linux Kernel Yamaha YM3812 / OPL-3 Chip Driver /dev/sequencer Crafted Ioctl L...
71265 Linux Kernel epoll Nested Structures Local DoS
70336 Linux Kernel net/l2tp/l2tp_ip.c l2tp_ip_sendmsg Function Crafted sendto Call ...
70335 Linux Kernel net/l2tp/l2tp_ppp.c pppol2tp_sendmsg Function Crafted sendto Cal...
70291 Linux Kernel net/x25/x25_facilities.c x25_parse_facilities Function Facility ...
70265 Linux Kernel kernel/exit.c do_exit Function KERNEL_DS get_fs Value Handling L...
70262 Linux Kernel net/econet/af_econet.c ec_dev_ioctl Function SIOCSIFADDR IOCTL e...
70261 Linux Kernel net/econet/af_econet.c econet_sendmsg Function sendmsg Call Loca...
70260 Linux Kernel net/econet/af_econet.c econet_sendmsg Function iovec Structure L...
70227 Linux Kernel on 64-bit Controller Area Network net/can/bcm.c bcm_connect Func...
69787 Linux Kernel net/core/ethtool.c ethtool_get_rxnfc Function ETHTOOL_GRXCLSRLAL...
69577 Linux Kernel ipc/sem.c copy_semid_to_user Function semctl Call Local Memory D...
69554 Linux Kernel drivers/video/via/ioctl.c viafb_ioctl_get_viafb_info VIAFB_GET_I...
69553 Linux Kernel sound/pci/rme9652/hdspm.c snd_hdspm_hwdep_ioctl Function SNDRV_H...
69552 Linux Kernel sound/pci/rme9652/hdsp.c snd_hdsp_hwdep_ioctl Function SNDRV_HDS...
69531 Linux Kernel ipc Subsystem ipc/compat_mq.c Multiple Function Local Memory Dis...
69530 Linux Kernel ipc Subsystem ipc/compat.c Multiple Function Local Memory Disclo...
69525 Linux Kernel drivers/video/sis/sis_main.c sisfb_ioctl Function FBIOGET_VBLANK...
69521 Linux Kernel ipc/shm.c copy_shmid_to_user Function shmctl System Call Local M...
69453 Linux Kernel block/blk-map.c blk_rq_map_user_iov() Function Zero-length I/O R...
69452 Linux Kernel fs/bio.c Multiple Function Page Allocation Crafted IOCTL Local O...
69425 Linux Kernel mm/mprotect.c mprotect System Call Use-after-free Local DoS
69241 Linux Kernel TCP MSS Divide-by-zero DoS

ExploitDB Exploits

id Description
31688 ImageMagick 6.8.8-4 - Local Buffer Overflow (SEH)
17787 Linux Kernel < 2.6.36.2 Econet Privilege Escalation Exploit
16952 Linux Kernel < 2.6.37-rc2 TCP_MAXSEG Kernel Panic DoS
16263 Linux Kernel <= 2.6.37 Local Kernel Denial of Service
15704 Linux Kernel <= 2.6.37 - Local Privilege Escalation
15344 Linux Kernel VIDIOCSMICROCODE IOCTL Local Memory Overwrite Vulnerability
15285 Linux RDS Protocol Local Privilege Escalation
15150 Linux Kernel < 2.6.36-rc6 pktcdvd Kernel Memory Disclosure
14814 Linux Kernel < 2.6.36-rc1 CAN BCM Privilege Escalation Exploit
9575 Linux Kernel < 2.6.19 - udp_sendmsg Local Root Exploit
9574 Linux Kernel < 2.6.19 udp_sendmsg Local Root Exploit (x86/x64)
9542 Linux Kernel 2.6 < 2.6.19 (32bit) ip_append_data() ring0 Root Exploit

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2013-09-18 Name : Debian Security Advisory DSA 2406-1 (icedove - several vulnerabilities)
File : nvt/deb_2406_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2443-1 (linux-2.6 - privilege escalation/denial ...
File : nvt/deb_2443_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2469-1 (linux-2.6 - privilege escalation/denial ...
File : nvt/deb_2469_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2553-1 (iceweasel - several vulnerabilities)
File : nvt/deb_2553_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2583-1 (iceweasel - several vulnerabilities)
File : nvt/deb_2583_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2584-1 (iceape - several vulnerabilities)
File : nvt/deb_2584_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2588-1 (icedove - several vulnerabilities)
File : nvt/deb_2588_1.nasl
2012-12-18 Name : Fedora Update for xen FEDORA-2012-19828
File : nvt/gb_fedora_2012_19828_xen_fc16.nasl
2012-12-18 Name : Fedora Update for kernel FEDORA-2012-20240
File : nvt/gb_fedora_2012_20240_kernel_fc16.nasl
2012-12-14 Name : Fedora Update for xen FEDORA-2012-19717
File : nvt/gb_fedora_2012_19717_xen_fc17.nasl
2012-12-13 Name : SuSE Update for MozillaFirefox, openSUSE-SU-2012:0760-1 (MozillaFirefox,)
File : nvt/gb_suse_2012_0760_1.nasl
2012-12-13 Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1064-1 (MozillaFirefox)
File : nvt/gb_suse_2012_1064_1.nasl
2012-12-13 Name : SuSE Update for qemu openSUSE-SU-2012:1170-1 (qemu)
File : nvt/gb_suse_2012_1170_1.nasl
2012-12-13 Name : SuSE Update for Security openSUSE-SU-2012:1172-1 (Security)
File : nvt/gb_suse_2012_1172_1.nasl
2012-12-13 Name : SuSE Update for Security openSUSE-SU-2012:1174-1 (Security)
File : nvt/gb_suse_2012_1174_1.nasl
2012-12-13 Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1345-1 (MozillaFirefox)
File : nvt/gb_suse_2012_1345_1.nasl
2012-12-13 Name : SuSE Update for Mozilla Suite openSUSE-SU-2012:1412-1 (Mozilla Suite)
File : nvt/gb_suse_2012_1412_1.nasl
2012-12-13 Name : SuSE Update for XEN openSUSE-SU-2012:1572-1 (XEN)
File : nvt/gb_suse_2012_1572_1.nasl
2012-12-06 Name : Fedora Update for seamonkey FEDORA-2012-18931
File : nvt/gb_fedora_2012_18931_seamonkey_fc16.nasl
2012-12-06 Name : Fedora Update for seamonkey FEDORA-2012-18952
File : nvt/gb_fedora_2012_18952_seamonkey_fc17.nasl
2012-12-04 Name : Ubuntu Update for firefox USN-1638-3
File : nvt/gb_ubuntu_USN_1638_3.nasl
2012-11-29 Name : Fedora Update for kernel FEDORA-2012-18691
File : nvt/gb_fedora_2012_18691_kernel_fc16.nasl
2012-11-26 Name : FreeBSD Ports: firefox
File : nvt/freebsd_firefox72.nasl
2012-11-26 Name : Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Windows)
File : nvt/gb_mozilla_firefox_esr_mult_vuln01_nov12_win.nasl
2012-11-26 Name : Mozilla Firefox Multiple Vulnerabilities-01 November12 (Mac OS X)
File : nvt/gb_mozilla_prdts_mult_vuln01_nov12_macosx.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0158 Multiple Vulnerabilities in Oracle Java SE
Severity: Category I - VMSKEY: V0061089
2014-A-0106 Multiple Vulnerabilities in Oracle MySQL Product Suite
Severity: Category I - VMSKEY: V0053189
2014-A-0043 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0046769
2014-A-0021 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0043921
2013-A-0233 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0042596
2013-A-0031 Multiple Security Vulnerabilities in VMware ESX 4.1 and ESXi 4.1
Severity: Category I - VMSKEY: V0036787
2011-A-0147 Multiple Vulnerabilities in VMware ESX and ESXi
Severity: Category I - VMSKEY: V0030545
2011-A-0075 Multiple Vulnerabilities in VMware Products
Severity: Category I - VMSKEY: V0028311
2011-A-0066 Multiple Vulnerabilities in VMware Products
Severity: Category I - VMSKEY: V0027158
2010-A-0015 Multiple Vulnerabilities in Red Hat Linux Kernel
Severity: Category I - VMSKEY: V0022631
2010-A-0001 Multiple Vulnerabilities in Linux Kernel
Severity: Category I - VMSKEY: V0022180

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2018-03-23 NTP crypto-NAK denial of service attempt
RuleID : 45693 - Type : SERVER-OTHER - Revision : 3
2017-12-13 NTP crypto-NAK denial of service attempt
RuleID : 44756 - Type : SERVER-OTHER - Revision : 3
2017-11-28 WPA2 key reuse tool attempt
RuleID : 44640 - Type : POLICY-OTHER - Revision : 2
2017-04-12 SSL/TLS weak RC4 cipher suite use attempt
RuleID : 41907 - Type : POLICY-OTHER - Revision : 3
2016-04-05 SSL/TLS weak RC4 cipher suite use attempt
RuleID : 37916 - Type : POLICY-OTHER - Revision : 3
2016-04-05 SSL/TLS weak RC4 cipher suite use attempt
RuleID : 37915 - Type : POLICY-OTHER - Revision : 3
2016-04-05 SSL/TLS weak RC4 cipher suite use attempt
RuleID : 37914 - Type : POLICY-OTHER - Revision : 3
2016-04-05 SSL/TLS weak RC4 cipher suite use attempt
RuleID : 37913 - Type : POLICY-OTHER - Revision : 3
2016-04-05 SSL/TLS weak RC4 cipher suite use attempt
RuleID : 37912 - Type : POLICY-OTHER - Revision : 3
2016-03-14 glibc getaddrinfo AAAA record stack buffer overflow attempt
RuleID : 37731-community - Type : PROTOCOL-DNS - Revision : 5
2016-03-22 glibc getaddrinfo AAAA record stack buffer overflow attempt
RuleID : 37731 - Type : PROTOCOL-DNS - Revision : 5
2016-03-14 glibc getaddrinfo A record stack buffer overflow attempt
RuleID : 37730-community - Type : PROTOCOL-DNS - Revision : 5
2016-03-22 glibc getaddrinfo A record stack buffer overflow attempt
RuleID : 37730 - Type : PROTOCOL-DNS - Revision : 5
2016-03-14 SSL/TLS weak RC4 cipher suite use attempt
RuleID : 37026 - Type : POLICY-OTHER - Revision : 4
2016-03-14 SSL/TLS weak RC4 cipher suite use attempt
RuleID : 37025 - Type : POLICY-OTHER - Revision : 4
2015-10-01 QEMU VNC set-pixel-format memory corruption attempt
RuleID : 35851 - Type : SERVER-OTHER - Revision : 2
2015-09-08 Adobe flash player BitmapData.paletteMap use after free attempt
RuleID : 35466 - Type : FILE-FLASH - Revision : 3
2015-09-08 Adobe flash player BitmapData.paletteMap use after free attempt
RuleID : 35465 - Type : FILE-FLASH - Revision : 3
2015-09-08 Adobe flash player BitmapData.paletteMap use after free attempt
RuleID : 35464 - Type : FILE-FLASH - Revision : 2
2015-09-08 Adobe flash player BitmapData.paletteMap use after free attempt
RuleID : 35463 - Type : FILE-FLASH - Revision : 2
2015-08-14 Adobe Flash Player BitmapData use-after-free attempt
RuleID : 35220 - Type : FILE-FLASH - Revision : 3
2015-08-14 Adobe Flash Player BitmapData use-after-free attempt
RuleID : 35219 - Type : FILE-FLASH - Revision : 3
2015-08-14 Adobe Flash Player BitmapData use-after-free attempt
RuleID : 35218 - Type : FILE-FLASH - Revision : 2
2015-08-14 Adobe Flash Player BitmapData use-after-free attempt
RuleID : 35217 - Type : FILE-FLASH - Revision : 2
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33806 - Type : SERVER-OTHER - Revision : 5

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-07 Name: The remote Debian host is missing a security update.
File: debian_DLA-1628.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-2911.nasl - Type: ACT_GATHER_INFO
2018-11-16 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-3083.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote Debian host is missing a security update.
File: debian_DLA-1573.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1232.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2017-0010.nasl - Type: ACT_GATHER_INFO
2018-05-07 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2018-124-01.nasl - Type: ACT_GATHER_INFO
2018-05-07 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_8719b9358bae41ad92ba3c826f651219.nasl - Type: ACT_GATHER_INFO
2018-02-28 Name: The version of Arista Networks EOS running on the remote device is affected b...
File: arista_eos_sa0017.nasl - Type: ACT_GATHER_INFO
2018-01-29 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1031.nasl - Type: ACT_GATHER_INFO
2018-01-19 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1026.nasl - Type: ACT_GATHER_INFO
2018-01-15 Name: The remote Fedora host is missing a security update.
File: fedora_2017-f45e844a85.nasl - Type: ACT_GATHER_INFO
2018-01-15 Name: The remote Fedora host is missing a security update.
File: fedora_2017-fc21e3856b.nasl - Type: ACT_GATHER_INFO
2018-01-10 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4082.nasl - Type: ACT_GATHER_INFO
2018-01-08 Name: The remote Debian host is missing a security update.
File: debian_DLA-1232.nasl - Type: ACT_GATHER_INFO
2018-01-08 Name: The device is vulnerable to key reinstallation attacks (KRACK).
File: juniper_jsa10827_krack.nasl - Type: ACT_GATHER_INFO
2017-12-26 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4073.nasl - Type: ACT_GATHER_INFO
2017-12-26 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL31211252.nasl - Type: ACT_GATHER_INFO
2017-12-14 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-1317.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-3265-1.nasl - Type: ACT_GATHER_INFO
2017-12-11 Name: The remote Debian host is missing a security update.
File: debian_DLA-1200.nasl - Type: ACT_GATHER_INFO
2017-12-06 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3505-1.nasl - Type: ACT_GATHER_INFO
2017-12-04 Name: The remote host is missing a vendor-supplied security patch.
File: check_point_gaia_sk106499.nasl - Type: ACT_GATHER_INFO
2017-12-01 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-3145-1.nasl - Type: ACT_GATHER_INFO
2017-12-01 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-3146-1.nasl - Type: ACT_GATHER_INFO