This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:linux:linux_kernel:3.14.79
Detail
VendorLinuxFirst view 2014-06-23
ProductLinux KernelLast view2019-09-19
Version3.14.79TypeOs
Edition 
Language 
Update 
 
CPE Productcpe:/o:linux:linux_kernel

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
7.22019-09-19CVE-2019-14821LocalLowNone Requ...
52019-09-18CVE-2019-16413NetworkLowNone Requ...
7.22019-09-17CVE-2019-14835LocalLowNone Requ...
3.62019-09-13CVE-2019-15031LocalLowNone Requ...
3.62019-09-13CVE-2019-15030LocalLowNone Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
7.52019-09-06CVE-2019-16089NetworkLowNone Requ...
7.22019-09-04CVE-2019-15927LocalLowNone Requ...
9.42019-09-04CVE-2019-15926NetworkLowNone Requ...
7.22019-09-04CVE-2019-15925LocalLowNone Requ...
4.92019-09-04CVE-2019-15924LocalLowNone Requ...
4.92019-09-04CVE-2019-15923LocalLowNone Requ...
4.92019-09-04CVE-2019-15922LocalLowNone Requ...
4.62019-09-04CVE-2019-15921LocalLowNone Requ...
7.22019-09-04CVE-2019-15920LocalLowNone Requ...
7.22019-09-04CVE-2019-15919LocalLowNone Requ...
7.22019-09-04CVE-2019-15918LocalLowNone Requ...
7.22019-09-04CVE-2019-15917LocalLowNone Requ...
7.82019-09-04CVE-2019-15916NetworkLowNone Requ...
4.92019-09-04CVE-2018-21008LocalLowNone Requ...
7.22019-09-04CVE-2017-18595LocalLowNone Requ...
7.82019-08-29CVE-2019-15807NetworkLowNone Requ...
7.82019-08-27CVE-2019-15666NetworkLowNone Requ...
7.82019-08-25CVE-2019-15538NetworkLowNone Requ...
102019-08-23CVE-2019-15505NetworkLowNone Requ...

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
10% (79)CWE-476NULL Pointer Dereference
10% (79)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
10% (72)CWE-200Information Exposure
9% (71)CWE-416Use After Free
9% (65)CWE-362Race Condition
Hide | Show 20 More...
%idName
8% (64)CWE-264Permissions, Privileges, and Access Controls
7% (56)CWE-399Resource Management Errors
5% (43)CWE-20Improper Input Validation
5% (38)CWE-125Out-of-bounds Read
2% (20)CWE-190Integer Overflow or Wraparound
2% (18)CWE-787Out-of-bounds Write
2% (16)CWE-284Access Control (Authorization) Issues
1% (14)CWE-189Numeric Errors
1% (12)CWE-415Double Free
1% (11)CWE-19Data Handling
1% (11)CWE-17Code
1% (10)CWE-400Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (8)CWE-254Security Features
0% (7)CWE-369Divide By Zero
0% (6)CWE-388Error Handling
0% (2)CWE-310Cryptographic Issues
0% (2)CWE-129Improper Validation of Array Index
0% (1)CWE-754Improper Check for Unusual or Exceptional Conditions
0% (1)CWE-704Incorrect Type Conversion or Cast
0% (1)CWE-682Incorrect Calculation

Oval Markup Language : Definitions

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalIDName
oval:org.mitre.oval:def:27268ELSA-2014-1724 -- kernel security and bug fix update (important)
oval:org.mitre.oval:def:27992RHSA-2014:1843 -- kernel security and bug fix update (Important)
oval:org.mitre.oval:def:26751USN-2332-1 -- linux vulnerabilities
oval:org.mitre.oval:def:26732USN-2334-1 -- linux vulnerabilities
oval:org.mitre.oval:def:26346USN-2335-1 -- linux-ti-omap4 vulnerabilities
Hide | Show 20 More...
idName
oval:org.mitre.oval:def:26081USN-2333-1 -- linux-ec2 vulnerabilities
oval:org.mitre.oval:def:27086RHSA-2014:1392: kernel security, bug fix, and enhancement update (Important)
oval:org.mitre.oval:def:28090RHSA-2014:1724 -- kernel security and bug fix update (Important)
oval:org.mitre.oval:def:25244USN-2266-1 -- linux vulnerability
oval:org.mitre.oval:def:25225USN-2269-1 -- linux-lts-quantal vulnerability
oval:org.mitre.oval:def:25221USN-2274-1 -- linux vulnerability
oval:org.mitre.oval:def:25147USN-2270-1 -- linux-lts-raring vulnerability
oval:org.mitre.oval:def:25135USN-2271-1 -- linux-lts-saucy vulnerability
oval:org.mitre.oval:def:25087DSA-2972-1 -- linux - security update
oval:org.mitre.oval:def:25029USN-2267-1 -- linux-ec2 vulnerability
oval:org.mitre.oval:def:25022USN-2272-1 -- linux-lts-trusty vulnerability
oval:org.mitre.oval:def:24957USN-2268-1 -- linux vulnerability
oval:org.mitre.oval:def:26192SUSE-SU-2014:0910-1 -- Security update for Linux kernel
oval:org.mitre.oval:def:25414SUSE-SU-2014:0911-1 -- Security update for Linux kernel
oval:org.mitre.oval:def:25325SUSE-SU-2014:0912-1 -- Security update for Linux kernel
oval:org.mitre.oval:def:27072USN-2273-1 -- Linux kernel vulnerability
oval:org.mitre.oval:def:27341ELSA-2014-3048 -- unbreakable enterprise kernel security update (important)
oval:org.mitre.oval:def:27297ELSA-2014-0923 -- kernel security update (important)
oval:org.mitre.oval:def:27252ELSA-2014-0924 -- kernel security update (important)
oval:org.mitre.oval:def:26617ELSA-2014-3047 -- unbreakable enterprise kernel security update (important)

SAINT Exploits

DescriptionLink
Ubuntu overlayfs privilege elevationMore info here
Linux Dirty COW Local File OverwriteMore info here

ExploitDB Exploits

idDescription
34923Linux Kernel remount FUSE Exploit
34134Linux Kernel ptrace/sysret - Local Privilege Escalation

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2017-11-21Linux kernel nfsd nfsd4_layout_verify out of bounds read attempt
RuleID : 44638 - Type : PROTOCOL-RPC - Revision : 1
2017-11-21Linux kernel nfsd nfsd4_layout_verify out of bounds read attempt
RuleID : 44637 - Type : PROTOCOL-RPC - Revision : 1
2017-08-24Linux kernel SCTP invalid chunk length denial of service attempt
RuleID : 43692 - Type : OS-LINUX - Revision : 1
2017-07-18Linux kernel NFSv3 malformed WRITE arbitrary memory read attempt
RuleID : 43189 - Type : PROTOCOL-RPC - Revision : 2
2017-07-18Linux kernel NFSv2 malformed WRITE arbitrary memory read attempt
RuleID : 43188 - Type : PROTOCOL-RPC - Revision : 2
Hide | Show 21 More...
DateDescription
2017-01-18Linux net af_packet.c tpacket version race condition use after free attempt
RuleID : 41028 - Type : OS-LINUX - Revision : 2
2017-01-18Linux net af_packet.c tpacket version race condition use after free attempt
RuleID : 41027 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40566 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40565 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40564 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40563 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40562 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40561 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40560 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40543 - Type : OS-LINUX - Revision : 2
2016-11-30Linux kernel madvise race condition attempt
RuleID : 40542 - Type : OS-LINUX - Revision : 2
2018-05-23Linux Kernel Challenge ACK provocation attempt
RuleID : 40063-community - Type : OS-LINUX - Revision : 5
2016-10-11Linux Kernel Challenge ACK provocation attempt
RuleID : 40063 - Type : OS-LINUX - Revision : 5
2016-09-17Linux Kernel USBIP out of bounds write attempt
RuleID : 39894 - Type : OS-LINUX - Revision : 2
2016-09-17Linux Kernel USBIP out of bounds write attempt
RuleID : 39893 - Type : OS-LINUX - Revision : 2
2016-03-29Linux kernel SCTP INIT null pointer dereference attempt
RuleID : 38346 - Type : OS-LINUX - Revision : 1
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37438 - Type : OS-LINUX - Revision : 2
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37437 - Type : OS-LINUX - Revision : 2
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37436 - Type : OS-LINUX - Revision : 2
2016-03-14Linux Kernel keyring object exploit download attempt
RuleID : 37435 - Type : OS-LINUX - Revision : 2

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2019-01-17Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-509c133845.nasl - Type : ACT_GATHER_INFO
2019-01-17Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-f812c9fb22.nasl - Type : ACT_GATHER_INFO
2019-01-15Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-337484d88b.nasl - Type : ACT_GATHER_INFO
2019-01-15Name : The remote Fedora host is missing one or more security updates.
File : fedora_2019-b0f7a7b74b.nasl - Type : ACT_GATHER_INFO
2019-01-14Name : The remote Virtuozzo host is missing multiple security updates.
File : Virtuozzo_VZA-2016-104.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2019-01-14Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2019-1145.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-072.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing multiple security updates.
File : Virtuozzo_VZA-2018-075.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-077.nasl - Type : ACT_GATHER_INFO
2019-01-11Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-085.nasl - Type : ACT_GATHER_INFO
2019-01-10Name : The remote Amazon Linux 2 host is missing a security update.
File : al2_ALAS-2019-1145.nasl - Type : ACT_GATHER_INFO
2019-01-10Name : The remote device is affected by multiple vulnerabilities.
File : juniper_space_jsa10917_183R1.nasl - Type : ACT_GATHER_INFO
2019-01-10Name : The remote device is affected by multiple vulnerabilities.
File : juniper_space_jsa10917_184R1.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-8d90571cdf.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-3857a8b41a.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-e820fccd83.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-93af520878.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-ec3bf1b228.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-f1b818a5c9.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-f392ab8c84.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-f55c305488.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-9f4381d8c4.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing one or more security updates.
File : fedora_2018-a0914af224.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-50075276e8.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-ac3b4c7605.nasl - Type : ACT_GATHER_INFO