This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Suse First view 1997-07-17
Product Suse Linux Last view 2018-07-24
Version 11 Type
Update  
Edition desktop  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:* 84
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:* 74
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:* 72
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:* 70
cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:* 66
cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:* 64
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:* 49
cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:* 40
cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:* 40
cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:* 38
cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:* 38
cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:* 36
cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:* 36
cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:* 34
cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:* 31
cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:* 29
cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:* 25
cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:* 22
cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:* 21
cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:* 20
cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:* 19
cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:* 18
cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:* 16
cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:* 16
cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:* 16
cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:* 16
cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:* 15
cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:* 15
cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:* 14
cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:* 14
cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:* 14
cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:* 14
cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:* 14
cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:* 14
cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:* 14
cpe:2.3:o:suse:suse_linux:*:*:*:*:*:*:*:* 13
cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:* 13
cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:* 13
cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:* 13
cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:* 13
cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:* 13
cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:* 13
cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:* 13
cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:* 13
cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:* 13
cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:* 13
cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:* 12
cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:* 12
cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:* 12
cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:* 12

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
8.2 2018-07-24 CVE-2017-3224

Open Shortest Path First (OSPF) protocol implementations may improperly determine Link State Advertisement (LSA) recency for LSAs with MaxSequenceNumber. According to RFC 2328 section 13.1, for two instances of the same LSA, recency is determined by first comparing sequence numbers, then checksums, and finally MaxAge. In a case where the sequence numbers are the same, the LSA with the larger checksum is considered more recent, and will not be flushed from the Link State Database (LSDB). Since the RFC does not explicitly state that the values of links carried by a LSA must be the same when prematurely aging a self-originating LSA with MaxSequenceNumber, it is possible in vulnerable OSPF implementations for an attacker to craft a LSA with MaxSequenceNumber and invalid links that will result in a larger checksum and thus a 'newer' LSA that will not be flushed from the LSDB. Propagation of the crafted LSA can result in the erasure or alteration of the routing tables of routers within the routing domain, creating a denial of service condition or the re-routing of traffic on the network. CVE-2017-3224 has been reserved for Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages).

7.5 2010-01-22 CVE-2010-0230

SUSE Linux Enterprise 10 SP3 (SLE10-SP3) and openSUSE 11.2 configures postfix to listen on all network interfaces, which might allow remote attackers to bypass intended access restrictions.

7.5 2009-07-05 CVE-2009-1648

The YaST2 LDAP module in yast2-ldap-server on SUSE Linux Enterprise Server 11 (aka SLE11) does not enable the firewall in certain circumstances involving reboots during online updates, which makes it easier for remote attackers to access network services.

7.2 2008-09-22 CVE-2008-3949

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

7.2 2007-11-28 CVE-2007-6167

Untrusted search path vulnerability in yast2-core in SUSE Linux might allow local users to execute arbitrary code by creating a malicious yast2 module in the current working directory.

7.8 2007-10-15 CVE-2007-5471

libgssapi before 0.6-13.7, as used by the ISC BIND named daemon in SUSE Linux Enterprise Server 10 SP 1, terminates upon an initialization error, which allows remote attackers to cause a denial of service (daemon exit) via a GSS-TSIG request. NOTE: this issue probably affects other daemons that attempt to initialize this library within a chroot configuration or other invalid configuration.

7.5 2007-10-14 CVE-2007-5196

Unspecified vulnerability in the SSL implementation in Groupwise client system in the novell-groupwise-client package in SUSE Linux Enterprise Desktop 10 allows remote attackers to obtain credentials via a man-in-the-middle attack, a different vulnerability than CVE-2007-5195.

6.8 2007-10-14 CVE-2007-5195

Unspecified vulnerability in the SSL implementation in Groupwise client system in the novell-groupwise-client package in SUSE Linux Enterprise Desktop 10 allows remote attackers to obtain credentials via a man-in-the-middle attack, a different vulnerability than CVE-2007-5196.

4.6 2007-08-20 CVE-2007-4432

Untrusted search path vulnerability in the wrapper scripts for the (1) rug, (2) zen-updater, (3) zen-installer, and (4) zen-remover programs on SUSE Linux 10.1 and Enterprise 10 allows local users to gain privileges via modified (a) LD_LIBRARY_PATH and (b) MONO_GAC_PREFIX environment variables.

2.1 2007-08-17 CVE-2007-4394

Unspecified vulnerability in a "core clean" cron job created by the findutils-locate package on SUSE Linux 10.0 and 10.1 and Enterprise Server 9 and 10 before 20070810 allows local users to delete of arbitrary files via unknown vectors.

4.6 2007-08-17 CVE-2007-4393

The installation script for orarun on SUSE Linux before 20070810 places the oracle user into the disk group, which allows the local oracle user to read or write raw disk partitions.

10 2007-07-30 CVE-2007-4074

The default configuration of Centre for Speech Technology Research (CSTR) Festival 1.95 beta (aka 2.0 beta) on Gentoo Linux, SUSE Linux, and possibly other distributions, is run locally with elevated privileges without requiring authentication, which allows local and remote attackers to execute arbitrary commands via the local daemon on port 1314, a different vulnerability than CVE-2001-0956. NOTE: this issue is local in some environments, but remote on others.

4.4 2007-05-14 CVE-2007-2654

xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems.

10 2007-02-15 CVE-2007-0980

Unspecified vulnerability in HP Serviceguard for Linux; packaged for SuSE SLES8 and United Linux 1.0 before SG A.11.15.07, SuSE SLES9 and SLES10 before SG A.11.16.10, and Red Hat Enterprise Linux (RHEL) before SG A.11.16.10; allows remote attackers to obtain unauthorized access via unspecified vectors.

10 2007-01-23 CVE-2007-0460

Multiple buffer overflows in ulogd for SUSE Linux 9.3 up to 10.1, and possibly other distributions, have unknown impact and attack vectors related to "improper string length calculations."

4.1 2006-12-20 CVE-2006-6662

Unspecified vulnerability in Linux User Management (novell-lum) on SUSE Linux Enterprise Desktop 10 and Open Enterprise Server 9, under unspecified conditions, allows local users to log in to the console without a password.

10 2006-10-30 CVE-2006-5616

Multiple unspecified vulnerabilities in OpenPBS, as used in SUSE Linux 9.2 through 10.1, allow attackers to execute arbitrary code via unspecified vectors.

5 2006-09-12 CVE-2006-2658

Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request.

6.4 2006-06-01 CVE-2006-2752

The RedCarpet /etc/ximian/rcd.conf configuration file in Novell Linux Desktop 9 and SUSE SLES 9 has world-readable permissions, which allows attackers to obtain the rc (RedCarpet) password.

5 2006-06-01 CVE-2006-2703

The RedCarpet command-line client (rug) does not verify SSL certificates from a server, which allows remote attackers to read network traffic and execute commands via a man-in-the-middle (MITM) attack.

7.2 2006-03-20 CVE-2006-0745

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.

5 2006-02-23 CVE-2006-0803

The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used.

4.4 2006-02-11 CVE-2006-0646

ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file.

4.6 2006-01-30 CVE-2006-0043

Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks.

6.9 2005-12-31 CVE-2005-4790

Multiple untrusted search path vulnerabilities in SUSE Linux 9.3 and 10.0, and possibly other distributions, cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) beagle, (2) tomboy, or (3) blam. NOTE: in August 2007, the tomboy vector was reported for other distributions.

CWE : Common Weakness Enumeration

%idName
21% (5) CWE-264 Permissions, Privileges, and Access Controls
13% (3) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
8% (2) CWE-399 Resource Management Errors
8% (2) CWE-310 Cryptographic Issues
8% (2) CWE-200 Information Exposure
8% (2) CWE-189 Numeric Errors
8% (2) CWE-20 Improper Input Validation
8% (2) CWE-16 Configuration
4% (1) CWE-362 Race Condition
4% (1) CWE-345 Insufficient Verification of Data Authenticity
4% (1) CWE-94 Failure to Control Generation of Code ('Code Injection')

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
CAPEC-15 Command Delimiters
CAPEC-19 Embedding Scripts within Scripts
CAPEC-21 Exploitation of Session Variables, Resource IDs and other Trusted Credentials
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-81 Web Logs Tampering
CAPEC-100 Overflow Buffers
CAPEC-123 Buffer Attacks
CAPEC-167 Lifting Sensitive Data from the Client

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:4047 Shell Redirect Symlink Attack Vulnerability
oval:org.mitre.oval:def:10736 The Internet Group Management Protocol (IGMP) allows local users to cause a d...
oval:org.mitre.oval:def:2961 Multiple Privilege Escalation Vulnerabilities in Linux Kernel
oval:org.mitre.oval:def:10155 Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local user...
oval:org.mitre.oval:def:9867 Unknown vulnerability in Linux kernel 2.x may allow local users to modify the...
oval:org.mitre.oval:def:11136 The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initia...
oval:org.mitre.oval:def:9426 Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local user...
oval:org.mitre.oval:def:2915 Linux Kernel Denial of Service Vulnerability via fsave and frstor Instructions
oval:org.mitre.oval:def:9398 Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allo...
oval:org.mitre.oval:def:9187 Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) P...
oval:org.mitre.oval:def:11796 Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2)...
oval:org.mitre.oval:def:11281 Konqueror in KDE 3.2.3 and earlier allows web sites to set cookies for countr...
oval:org.mitre.oval:def:8896 Multiple vulnerabilities in the RLE (run length encoding) decoders for libtif...
oval:org.mitre.oval:def:100114 libtiff RLE Decoder Buffer Overflow Vulnerabilities
oval:org.mitre.oval:def:11141 Samba 3.0.6 and earlier allows remote attackers to cause a denial of service ...
oval:org.mitre.oval:def:8843 Multiple heap-based buffer overflows in the imlib BMP image handler allow rem...
oval:org.mitre.oval:def:11123 Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4....
oval:org.mitre.oval:def:10330 Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 ...
oval:org.mitre.oval:def:9907 Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attacker...
oval:org.mitre.oval:def:100116 libtiff Malloc Error Denial of Service
oval:org.mitre.oval:def:9714 Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use x...
oval:org.mitre.oval:def:11201 Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Re...
oval:org.mitre.oval:def:10873 Stack-based buffer overflow in the writeGroup function in nsVCardObj.cpp for ...
oval:org.mitre.oval:def:10378 Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunder...
oval:org.mitre.oval:def:9943 Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in XFree86 ...

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
61983 SUSE Linux postfix Network Interface Remote Access Restriction Bypass
60300 SuSE resmgr Local Terminal Spoofing Weakness
60220 susehelp in SuSE CGI Query Shell Metacharacter Arbitrary Remote Command Execu...
60139 Gnuplot French Documentation Patch Unspecified Local Overflow
57715 Linux knfsd / linuxnfs rpc.kstatd Remote Format String
56093 SUSE Linux Enterprise Server yast2-ldap-server YaST2 LDAP Module Online Updat...
49558 Emacs Python Path Handling Weakness Script Import Arbitrary Code Execution
46784 SUSE Linux zen-remover Wrapper Script Search Path Subversion Local Privilege ...
46783 SUSE Linux zen-installer Wrapper Script Search Path Subversion Local Privileg...
46782 SUSE Linux zen-updater Wrapper Script Search Path Subversion Local Privilege ...
46781 SUSE Linux rug Wrapper Script Search Path Subversion Local Privilege Escalation
46404 SUSE Linux findutils-locate Package core clean Cron Job Unspecified Arbitrary...
46403 SUSE Linux orarun Script Oracle Account disk Group Privilege Escalation
45492 Groupwise Client System on SUSE Linux Enterprise Desktop Unspecified MitM Cre...
45491 Groupwise Client System on SUSE Linux Enterprise Desktop Unspecified MitM Cre...
44330 CUPS on Red Hat 64-bit pdftops Crafted PDF File Handling Overflow
44158 SuSE Linux yast2-core Search Path Subversion Arbitrary Code Execution
40935 ISC BIND on SUSE Linux Enterprise Server libgssapi named GSS-TSIG Request Rem...
39578 SuSE Linux tomboy LD_LIBRARY_PATH Variable Path Subversion Local Privilege Es...
39577 SuSE Linux blam LD_LIBRARY_PATH Variable Path Subversion Local Privilege Esca...
38622 CSTR Festival on Linux Unauthenticated Arbitrary Command Execution
36716 xfsdump xfs_fsr Symlink Arbitrary File Manipulation
35231 Linux User Management (novell-lum) on SUSE Linux Local Privilege Escalation
33201 HP Serviceguard for Linux Unspecified Remote Access
32939 ulogd Multiple Unspecified Overflows

ExploitDB Exploits

id Description
24696 Linux Kernel 2.6.x IPTables Logging Rules Integer Underflow Vulnerability
718 Linux Kernel 2.6.x chown() Group Ownership Alteration Exploit
629 Multiple AntiVirus (zip file) Detection Bypass Exploit

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2011-09-09 Name : Nfs-utils rpc.statd Multiple Remote Format String Vulnerabilities
File : nvt/secpod_nfs_rpc_statd_mult_format_string_vuln.nasl
2011-02-28 Name : Mandriva Update for tomboy MDVSA-2011:035 (tomboy)
File : nvt/gb_mandriva_MDVSA_2011_035.nasl
2010-05-12 Name : Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002
File : nvt/macosx_upd_10_5_7_secupd_2009-002.nasl
2010-02-19 Name : SuSE Update for postfix SUSE-SA:2010:011
File : nvt/gb_suse_2010_011.nasl
2010-02-03 Name : Solaris Update for CDE 1.6 119280-22
File : nvt/gb_solaris_119280_22.nasl
2010-02-03 Name : Solaris Update for Runtime library for Solaris 10 119281-22
File : nvt/gb_solaris_119281_22.nasl
2009-11-17 Name : Mac OS X Version
File : nvt/macosx_version.nasl
2009-10-13 Name : SLES10: Security update for festival
File : nvt/sles10_festival.nasl
2009-10-11 Name : SLES11: Security update for YaST2 LDAP module
File : nvt/sles11_yast2-ldap-serv.nasl
2009-10-10 Name : SLES9: Security update for Linux kernel
File : nvt/sles9p5010817.nasl
2009-10-10 Name : SLES9: Security update for openmotif
File : nvt/sles9p5010938.nasl
2009-10-10 Name : SLES9: Security update for ethereal
File : nvt/sles9p5010966.nasl
2009-10-10 Name : SLES9: Security update for Linux kernel
File : nvt/sles9p5011171.nasl
2009-10-10 Name : SLES9: Security update for enscript
File : nvt/sles9p5011436.nasl
2009-10-10 Name : SLES9: Security update for Midnight Commander
File : nvt/sles9p5011441.nasl
2009-10-10 Name : SLES9: Security update for cyrus-sasl
File : nvt/sles9p5011476.nasl
2009-10-10 Name : SLES9: Security update for kdelibs3
File : nvt/sles9p5011912.nasl
2009-10-10 Name : SLES9: Security update for Mozilla
File : nvt/sles9p5012017.nasl
2009-10-10 Name : SLES9: Security update for Perl
File : nvt/sles9p5013510.nasl
2009-10-10 Name : SLES9: Security update for apache
File : nvt/sles9p5014050.nasl
2009-10-10 Name : SLES9: Security update for imlib
File : nvt/sles9p5014360.nasl
2009-10-10 Name : SLES9: Security update for Linux kernel core
File : nvt/sles9p5014380.nasl
2009-10-10 Name : SLES9: Security update for CUPS
File : nvt/sles9p5014529.nasl
2009-10-10 Name : SLES9: Security update for OpenMotif
File : nvt/sles9p5014940.nasl
2009-10-10 Name : SLES9: Security update for unarj
File : nvt/sles9p5015411.nasl

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2019-08-31 Postfix IPv6 Relaying Security Issue
RuleID : 50859 - Type : SERVER-MAIL - Revision : 1
2014-01-10 SMB NT Trans NT SET SECURITY DESC unicode andx DACL overflow attempt
RuleID : 4674 - Type : NETBIOS - Revision : 4
2014-01-10 SMB NT Trans NT SET SECURITY DESC unicode DACL overflow attempt
RuleID : 4673 - Type : NETBIOS - Revision : 4
2014-01-10 SMB NT Trans NT SET SECURITY DESC andx DACL overflow attempt
RuleID : 4672 - Type : NETBIOS - Revision : 4
2014-01-10 SMB NT Trans NT SET SECURITY DESC DACL overflow attempt
RuleID : 4671 - Type : NETBIOS - Revision : 4
2014-01-10 SMB-DS NT Trans NT SET SECURITY DESC unicode andx DACL overflow attempt
RuleID : 4670 - Type : NETBIOS - Revision : 3
2014-01-10 SMB-DS NT Trans NT SET SECURITY DESC unicode DACL overflow attempt
RuleID : 4669 - Type : NETBIOS - Revision : 3
2014-01-10 SMB-DS NT Trans NT SET SECURITY DESC andx DACL overflow attempt
RuleID : 4668 - Type : NETBIOS - Revision : 3
2014-01-10 SMB-DS NT Trans NT SET SECURITY DESC DACL overflow attempt
RuleID : 4667 - Type : NETBIOS - Revision : 3
2014-01-10 SMB NT Trans NT SET SECURITY DESC unicode andx DACL overflow attempt
RuleID : 4666 - Type : NETBIOS - Revision : 2
2014-01-10 SMB NT Trans NT SET SECURITY DESC unicode DACL overflow attempt
RuleID : 4665 - Type : NETBIOS - Revision : 2
2014-01-10 SMB NT Trans NT SET SECURITY DESC andx DACL overflow attempt
RuleID : 4664 - Type : NETBIOS - Revision : 2
2014-01-10 SMB NT Trans NT SET SECURITY DESC DACL overflow attempt
RuleID : 4663 - Type : NETBIOS - Revision : 2
2014-01-10 SMB NT Trans NT SET SECURITY DESC unicode andx SACL overflow attempt
RuleID : 4662 - Type : NETBIOS - Revision : 4
2014-01-10 SMB NT Trans NT SET SECURITY DESC unicode SACL overflow attempt
RuleID : 4661 - Type : NETBIOS - Revision : 4
2014-01-10 SMB NT Trans NT SET SECURITY DESC andx SACL overflow attempt
RuleID : 4660 - Type : NETBIOS - Revision : 4
2014-01-10 SMB NT Trans NT SET SECURITY DESC SACL overflow attempt
RuleID : 4659 - Type : NETBIOS - Revision : 4
2014-01-10 SMB-DS NT Trans NT SET SECURITY DESC unicode andx SACL overflow attempt
RuleID : 4658 - Type : NETBIOS - Revision : 3
2014-01-10 SMB-DS NT Trans NT SET SECURITY DESC unicode SACL overflow attempt
RuleID : 4657 - Type : NETBIOS - Revision : 3
2014-01-10 SMB-DS NT Trans NT SET SECURITY DESC andx SACL overflow attempt
RuleID : 4656 - Type : NETBIOS - Revision : 3
2014-01-10 SMB-DS NT Trans NT SET SECURITY DESC SACL overflow attempt
RuleID : 4655 - Type : NETBIOS - Revision : 3
2014-01-10 SMB NT Trans NT SET SECURITY DESC unicode andx SACL overflow attempt
RuleID : 4654 - Type : NETBIOS - Revision : 2
2014-01-10 SMB NT Trans NT SET SECURITY DESC unicode SACL overflow attempt
RuleID : 4653 - Type : NETBIOS - Revision : 2
2014-01-10 SMB NT Trans NT SET SECURITY DESC andx SACL overflow attempt
RuleID : 4652 - Type : NETBIOS - Revision : 2
2014-01-10 SMB NT Trans NT SET SECURITY DESC SACL overflow attempt
RuleID : 4651 - Type : NETBIOS - Revision : 2

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-07-16 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_ca139c7f2a8c11e5a4a5002590263bf5.nasl - Type: ACT_GATHER_INFO
2015-01-19 Name: The remote Solaris system is missing a security patch for third-party software.
File: solaris11_perl-58_20131015.nasl - Type: ACT_GATHER_INFO
2014-01-27 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201401-28.nasl - Type: ACT_GATHER_INFO
2013-07-12 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2008-0206.nasl - Type: ACT_GATHER_INFO
2013-06-29 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2005-332-01.nasl - Type: ACT_GATHER_INFO
2012-09-24 Name: The remote Fedora Core host is missing a security update.
File: fedora_2004-414.nasl - Type: ACT_GATHER_INFO
2012-09-24 Name: The remote Fedora Core host is missing a security update.
File: fedora_2006-010.nasl - Type: ACT_GATHER_INFO
2012-09-24 Name: The remote Fedora Core host is missing a security update.
File: fedora_2006-011.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2000-002.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2000-021.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2000-064.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2000-071.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2000-075.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2001-018.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-027.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-034.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2005-041.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2005-042.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2005-043.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2005-044.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2005-056.nasl - Type: ACT_GATHER_INFO
2012-08-01 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20080401_cups_on_SL3_x.nasl - Type: ACT_GATHER_INFO
2011-08-29 Name: The SSH service running on the remote host has an information disclosure vuln...
File: sunssh_plaintext_recovery.nasl - Type: ACT_GATHER_INFO
2011-02-23 Name: The remote Mandriva Linux host is missing a security update.
File: mandriva_MDVSA-2011-035.nasl - Type: ACT_GATHER_INFO
2010-02-16 Name: The remote openSUSE host is missing a security update.
File: suse_11_2_postfix-100201.nasl - Type: ACT_GATHER_INFO