The following SCAP content has been released to SCAP Repo and SecPod ANCOR. SecPod Saner will automatically pull the relevant content on its next scheduled update.
oval:org.secpod.oval:def:34971 | CVE-2016-5108, | Buffer overflow vulnerability in the DecodeAdpcmImaQT function in VLC media player via a crafted QuickTime IMA file |
oval:org.secpod.oval:def:34968 | CVE-2016-2815 CVE-2016-2818 MFSA2016-49 |
Multiple memory corruption vulnerabilities in Mozilla Firefox and Firefox ESR – MFSA2016-49 |
oval:org.secpod.oval:def:34969 | CVE-2016-2818, | Memory corruption vulnerability in Mozilla Firefox and Firefox ESR – CVE-2016-2818 |
oval:org.secpod.oval:def:34970 | CVE-2016-2815, | Memory corruption vulnerability in Mozilla Firefox and Firefox ESR – CVE-2016-2815 |
oval:org.secpod.oval:def:34966 | CVE-2016-2819, MFSA2016-50, |
Buffer overflow vulnerability in Mozilla Firefox and Firefox ESR – MFSA2016-50 |
oval:org.secpod.oval:def:34967 | CVE-2016-2819, | Buffer overflow vulnerability in Mozilla Firefox and Firefox ESR – CVE-2016-2819 |
oval:org.secpod.oval:def:34964 | CVE-2016-2821, MFSA2016-51, |
Use-after-free vulnerability in Mozilla Firefox and Firefox ESR – MFSA2016-51 |
oval:org.secpod.oval:def:34965 | CVE-2016-2821, | Use-after-free vulnerability in Mozilla Firefox and Firefox ESR – CVE-2016-2821 |
oval:org.secpod.oval:def:34962 | CVE-2016-2822, MFSA2016-52, |
Addressbar spoofing vulnerability in Mozilla Firefox and Firefox ESR – MFSA2016-52 |
oval:org.secpod.oval:def:34963 | CVE-2016-2822, | Addressbar spoofing vulnerability in Mozilla Firefox and Firefox ESR – CVE-2016-2822 |
oval:org.secpod.oval:def:34960 | CVE-2016-2824, MFSA2016-53, |
Out-of-bounds write vulnerability in ANGLE graphics library Mozilla Firefox and Firefox ESR – MFSA2016-53 |
oval:org.secpod.oval:def:34961 | CVE-2016-2824, | Out-of-bounds write vulnerability in ANGLE graphics library in Mozilla Firefox and Firefox ESR – CVE-2016-2824 |
oval:org.secpod.oval:def:34958 | CVE-2016-2825, MFSA2016-54, |
Same-origin-policy bypass vulnerability in Mozilla Firefox – MFSA2016-54 |
oval:org.secpod.oval:def:34959 | CVE-2016-2825, | Same-origin-policy bypass vulnerability in Mozilla Firefox – CVE-2016-2825 |
oval:org.secpod.oval:def:34956 | CVE-2016-2826, MFSA2016-55, |
Privilege escalation vulnerability in Mozilla Firefox and Firefox ESR – MFSA2016-55 |
oval:org.secpod.oval:def:34957 | CVE-2016-2826, | Privilege escalation vulnerability in Mozilla Firefox and Firefox ESR – CVE-2016-2826 |
oval:org.secpod.oval:def:34954 | CVE-2016-2828, MFSA2016-56, |
Use-after-free vulnerability in Mozilla Firefox and Firefox ESR – MFSA2016-56 |
oval:org.secpod.oval:def:34955 | CVE-2016-2828, | Use-after-free vulnerability in Mozilla Firefox and Firefox ESR – CVE-2016-2828 |
oval:org.secpod.oval:def:34952 | CVE-2016-2829, MFSA2016-57, |
Privilege escalation vulnerability in Mozilla Firefox via unknown vectors – MFSA2016-57 |
oval:org.secpod.oval:def:34953 | CVE-2016-2829, | Privilege escalation vulnerability in Mozilla Firefox via unknown vectors – CVE-2016-2829 |
oval:org.secpod.oval:def:34950 | CVE-2016-2831, MFSA2016-58, |
Privilege escalation vulnerability in Mozilla Firefox and Firefox ESR – MFSA2016-58 |
oval:org.secpod.oval:def:34951 | CVE-2016-2831, | Privilege escalation vulnerability in Mozilla Firefox and Firefox ESR – CVE-2016-2831 |
oval:org.secpod.oval:def:34948 | CVE-2016-2832, MFSA2016-59, |
Information disclosure vulnerability in Mozilla Firefox via unknown vectors – MFSA2016-59 |
oval:org.secpod.oval:def:34949 | CVE-2016-2832, | Information disclosure vulnerability in Mozilla Firefox via unknown vectors – CVE-2016-2832 |
oval:org.secpod.oval:def:34946 | CVE-2016-2833, MFSA2016-60, |
Content security policy bypass vulnerability in Mozilla Firefox via unknown vectors – MFSA2016-60 |
oval:org.secpod.oval:def:34947 | CVE-2016-2833, | Content security policy bypass vulnerability in Mozilla Firefox via unknown vectors – CVE-2016-2833 |
oval:org.secpod.oval:def:34944 | CVE-2016-2834, MFSA2016-61, |
Network security services bypass vulnerability in Mozilla Firefox – MFSA2016-61 |
oval:org.secpod.oval:def:34945 | CVE-2016-2834, | Network security services bypass vulnerability in Mozilla Firefox – CVE-2016-2834 |
oval:org.secpod.oval:def:1600406 | ALAS-2016-704, CVE-2016-4913, |
ALAS-2016-704 —- kernel perf |
oval:org.secpod.oval:def:1600407 | ALAS-2016-707, CVE-2013-7456, CVE-2016-4343, CVE-2016-5093, CVE-2016-5094, CVE-2016-5096, |
ALAS-2016-707 —- php55 |
oval:org.secpod.oval:def:1600408 | ALAS-2016-708, CVE-2016-1548, CVE-2016-1550, CVE-2016-2516, CVE-2016-2518, |
ALAS-2016-708 —- ntp |
oval:org.secpod.oval:def:1600409 | ALAS-2016-711, CVE-2016-3659, |
ALAS-2016-711 —- cacti |
oval:org.secpod.oval:def:1600410 | ALAS-2016-706, CVE-2013-7456, CVE-2016-5093, CVE-2016-5094, CVE-2016-5096, |
ALAS-2016-706 —- php56 |
oval:org.secpod.oval:def:1600411 | ALAS-2016-705, CVE-2015-8863, |
ALAS-2016-705 —- jq |
oval:org.secpod.oval:def:1600413 | ALAS-2016-710, CVE-2016-2167, CVE-2016-2168, |
ALAS-2016-710 —- mod_dav_svn |
oval:org.secpod.oval:def:1600414 | ALAS-2016-709, CVE-2016-2167, CVE-2016-2168, |
ALAS-2016-709 —- subversion mod24_dav_svn |
oval:org.secpod.oval:def:1600415 | ALAS-2016-712, CVE-2016-4356, CVE-2016-4574, CVE-2016-4579, |
ALAS-2016-712 —- libksba |
oval:org.secpod.oval:def:203945 | CESA-2016:1204, CVE-2016-0749, CVE-2016-2150, |
CESA-2016:1204 — centos 6 spice-server |
oval:org.secpod.oval:def:203946 | CESA-2016:1205, CVE-2016-0749, CVE-2016-2150, |
CESA-2016:1205 — centos 7 spice |
oval:org.secpod.oval:def:602528 | CVE-2016-0749, CVE-2016-2150, DSA-3596-1, |
DSA-3596-1 spice — spice |
oval:org.secpod.oval:def:602529 | CVE-2012-0876, CVE-2012-6702, CVE-2016-5300, DSA-3597-1, |
DSA-3597-1 expat — expat |
oval:org.secpod.oval:def:602530 | CVE-2016-5108, DSA-3598-1, |
DSA-3598-1 vlc — vlc |
oval:org.secpod.oval:def:110606 | CVE-2016-4450, FEDORA-2016-ea323bd6cf, |
FEDORA-2016-ea323bd6cf — Fedora 23 nginx-1.8.1-3.fc23 |
oval:org.secpod.oval:def:110607 | CVE-2016-4912, FEDORA-2016-33ad3f97d4, |
FEDORA-2016-33ad3f97d4 — Fedora 22 openslp-2.0.0-6.fc22 |
oval:org.secpod.oval:def:110608 | CVE-2016-4429, FEDORA-2016-b2dfb591cd, |
FEDORA-2016-b2dfb591cd — Fedora 23 glibc-2.22-17.fc23 |
oval:org.secpod.oval:def:110609 | CVE-2016-4912, FEDORA-2016-d9dbd6d339, |
FEDORA-2016-d9dbd6d339 — Fedora 23 openslp-2.0.0-8.fc23 |
oval:org.secpod.oval:def:110610 | CVE-2016-4020, CVE-2016-4439, CVE-2016-4441, FEDORA-2016-d3a56228f5, |
FEDORA-2016-d3a56228f5 — Fedora 22 qemu-2.3.1-15.fc22 |
oval:org.secpod.oval:def:110600 | FEDORA-2016-d25ebba412, | FEDORA-2016-d25ebba412 — Fedora 23 sudo-1.8.15-2.fc23 |
oval:org.secpod.oval:def:110601 | CVE-2016-5093, CVE-2016-5094, CVE-2016-5095, CVE-2016-5096, FEDORA-2016-65f1ffdc0c, |
FEDORA-2016-65f1ffdc0c — Fedora 22 php-5.6.22-1.fc22 |
oval:org.secpod.oval:def:110602 | CVE-2016-5103, FEDORA-2016-396403ec02, |
FEDORA-2016-396403ec02 — Fedora 23 roundcubemail-1.2.0-1.fc23 |
oval:org.secpod.oval:def:110603 | CVE-2016-5097, CVE-2016-5098, CVE-2016-5099, FEDORA-2016-cd05bd994a, |
FEDORA-2016-cd05bd994a — Fedora 22 phpMyAdmin-4.6.2-1.fc22 |
oval:org.secpod.oval:def:110604 | CVE-2014-3672, CVE-2016-4439, CVE-2016-4441, CVE-2016-5105, CVE-2016-5106, FEDORA-2016-8d3fe9914b, |
FEDORA-2016-8d3fe9914b — Fedora 23 xen-4.5.3-6.fc23 |
oval:org.secpod.oval:def:110605 | CVE-2016-5103, FEDORA-2016-e4c559515c, |
FEDORA-2016-e4c559515c — Fedora 22 roundcubemail-1.2.0-1.fc22 |
oval:org.secpod.oval:def:602525 | CVE-2016-1696, CVE-2016-1697, CVE-2016-1698, CVE-2016-1699, CVE-2016-1700, CVE-2016-1701, CVE-2016-1702, CVE-2016-1703, DSA-3594-1, |
DSA-3594-1 chromium-browser — chromium-browser |
oval:org.secpod.oval:def:602526 | CVE-2016-0640, CVE-2016-0641, CVE-2016-0643, CVE-2016-0644, CVE-2016-0646, CVE-2016-0647, CVE-2016-0648, CVE-2016-0649, CVE-2016-0650, CVE-2016-0655, CVE-2016-0666, CVE-2016-0668, DSA-3595-1, |
DSA-3595-1 mariadb-10.0 — mariadb-10.0 |
oval:org.secpod.oval:def:602527 | CVE-2015-0005, CVE-2015-5370, CVE-2016-2110, CVE-2016-2111, CVE-2016-2112, CVE-2016-2113, CVE-2016-2114, CVE-2016-2115, CVE-2016-2118, DSA-3548-3, |
DSA-3548-3 samba — samba |
Pingback: SCAP Feed Release: 09-Jun-2016 – sec.uno