The following SCAP content has been released to SCAP Repo and SecPod ANCOR. SecPod Saner will automatically pull the relevant content on its next scheduled update.
oval:org.secpod.oval:def:34302 | CVE-2016-0152, | Remote code execution vulnerability in Microsoft Windows – CVE-2016-0152 |
oval:org.secpod.oval:def:34303 | CVE-2016-0152, MS16-058, |
Remote code execution vulnerability in Microsoft Windows – MS16-058 |
oval:org.secpod.oval:def:34304 | CVE-2016-0179, | Remote code execution vulnerability in Windows shell – CVE-2016-0179 |
oval:org.secpod.oval:def:34305 | CVE-2016-0179, MS16-057, |
Windows shell remote code execution vulnerability – MS16-057 |
oval:org.secpod.oval:def:34306 | CVE-2016-0190, | Information disclosure vulnerability in Microsoft Windows when a USB disk mounted over Remote Desktop Protocol (RDP) |
oval:org.secpod.oval:def:34307 | CVE-2016-0190, MS16-067, |
Information disclosure vulnerability in Microsoft Windows – MS16-067 |
oval:org.secpod.oval:def:34308 | CVE-2016-0181, | Hypervisor code integrity security feature bypass vulnerability in Windows – CVE-2016-0181 |
oval:org.secpod.oval:def:34309 | CVE-2016-0181, MS16-066, |
Hypervisor code integrity security feature bypass vulnerability in Windows – MS16-066 |
oval:org.secpod.oval:def:34312 | CVE-2016-0180, | Elevation of privilege vulnerability in Microsoft Windows due to crafted symbolic links |
oval:org.secpod.oval:def:34313 | CVE-2016-0180, MS16-060, |
Windows kernel elevation of privilege vulnerability – MS16-060 |
oval:org.secpod.oval:def:34311 | CVE-2016-0178, MS16-061, |
RPC network data representation engine elevation of privilege vulnerability in Microsoft Remote Procedure Call (LRPC) – MS16-061 |
oval:org.secpod.oval:def:34310 | CVE-2016-0178, | RPC network data representation engine elevation of privilege vulnerability in Microsoft Remote Procedure Call (LRPC) |
oval:org.secpod.oval:def:34315 | CVE-2016-0185, | Remote Code Execution Vulnerability in Windows Media Center via a specially crafted Media Center link (.mcl) file |
oval:org.secpod.oval:def:34314 | CVE-2016-0185, MS16-059, |
Remote code execution vulnerability in Windows Media Center – MS16-059 |
oval:org.secpod.oval:def:203926 | CESA-2016:0726, CVE-2016-3714, CVE-2016-3715, CVE-2016-3716, CVE-2016-3717, CVE-2016-3718, |
CESA-2016:0726 — centos 6 ImageMagick |
oval:org.secpod.oval:def:203927 | CESA-2016:0723, CVE-2016-0686, CVE-2016-0687, CVE-2016-0695, CVE-2016-3425, CVE-2016-3427, |
CESA-2016:0723 — centos 5 java-1.6.0-openjdk |
oval:org.secpod.oval:def:203928 | CESA-2016:0726, CVE-2016-3714, CVE-2016-3715, CVE-2016-3716, CVE-2016-3717, CVE-2016-3718, |
CESA-2016:0726 — centos 7 ImageMagick |
oval:org.secpod.oval:def:203929 | CESA-2016:0723, CVE-2016-0686, CVE-2016-0687, CVE-2016-0695, CVE-2016-3425, CVE-2016-3427, |
CESA-2016:0723 — centos 7 java-1.6.0-openjdk |
oval:org.secpod.oval:def:203930 | CESA-2016:0723, CVE-2016-0686, CVE-2016-0687, CVE-2016-0695, CVE-2016-3425, CVE-2016-3427, |
CESA-2016:0723 — centos 6 java-1.6.0-openjdk |
oval:org.secpod.oval:def:203931 | CESA-2016:0724, CVE-2016-3710, |
CESA-2016:0724 — centos 7 qemu-kvm,libcacard |
oval:org.secpod.oval:def:203932 | CESA-2016:0722, CVE-2016-0799, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2842, |
CESA-2016:0722 — centos 7 openssl |
oval:org.secpod.oval:def:34316 | CVE-2016-3714, | Remote code execution vulnerability in ImageMagick due to insufficient shell characters filtering |
oval:org.secpod.oval:def:34318 | CVE-2016-3718, | Server Side Request Forgery vulnerability in ImageMagick – CVE-2016-3718 |
oval:org.secpod.oval:def:34319 | CVE-2016-3715, | File deletion vulnerability in ImageMagick – CVE-2016-3715 |
oval:org.secpod.oval:def:34320 | CVE-2016-3716, | Vulnerability in ImageMagick allows File moving |
oval:org.secpod.oval:def:34321 | CVE-2016-3717, | Vulnerability in ImageMagick allows Local file read |
oval:org.secpod.oval:def:34317 | cpe:/a:graphicsmagick:graphicsmagick, | graphicsmagick is installed |
oval:org.secpod.oval:def:34322 | CVE-2016-3710, | qemu vulnerability – CVE-2016-3710 |
oval:org.secpod.oval:def:602497 | CVE-2016-3710, CVE-2016-3712, DSA-3573-1, |
DSA-3573-1 qemu — qemu |
oval:org.secpod.oval:def:501813 | CVE-2015-5157, CVE-2015-8767, RHSA-2016:0715-01, |
RHSA-2016:0715-01 — Redhat kernel, perf |
oval:org.secpod.oval:def:501814 | CVE-2016-3068, CVE-2016-3069, RHSA-2016:0706-01, |
RHSA-2016:0706-01 — Redhat mercurial |
oval:org.secpod.oval:def:501815 | CVE-2016-3710, RHSA-2016:0724-01, |
RHSA-2016:0724-01 — Redhat qemu-kvm, libcacard |
oval:org.secpod.oval:def:501821 | CVE-2016-3710, RHSA-2016:0997-01, |
RHSA-2016:0997-01 — Redhat qemu-kvm, qemu-guest-agent |
oval:org.secpod.oval:def:110466 | FEDORA-2016-34f9ed9753, | FEDORA-2016-34f9ed9753 — Fedora 23 libreoffice-5.0.6.2-3.fc23 |
oval:org.secpod.oval:def:110467 | FEDORA-2016-25843fda6b, | FEDORA-2016-25843fda6b — Fedora 23 firefox-46.0.1-1.fc23 |
oval:org.secpod.oval:def:110468 | CVE-2016-4414, FEDORA-2016-0431acaa78, |
FEDORA-2016-0431acaa78 — Fedora 22 quassel-0.12.4-1.fc22 |
oval:org.secpod.oval:def:110469 | CVE-2016-1926, FEDORA-2016-9851b69dbb, |
FEDORA-2016-9851b69dbb — Fedora 22 openvas-manager-6.0.8-2.fc22 |
oval:org.secpod.oval:def:110470 | CVE-2015-3455, CVE-2015-5400, CVE-2016-2571, CVE-2016-2572, FEDORA-2016-7b40eb9e29, |
FEDORA-2016-7b40eb9e29 — Fedora 22 squid-3.5.10-1.fc22 |
oval:org.secpod.oval:def:110471 | CVE-2015-8853, FEDORA-2016-5a9313e4b4, |
FEDORA-2016-5a9313e4b4 — Fedora 22 perl-5.20.3-330.fc22 |
oval:org.secpod.oval:def:110472 | CVE-2016-1926, FEDORA-2016-9851b69dbb, |
FEDORA-2016-9851b69dbb — Fedora 22 openvas-gsa-6.0.10-3.fc22 |
oval:org.secpod.oval:def:110473 | CVE-2015-8839, CVE-2016-3672, CVE-2016-3951, CVE-2016-3955, CVE-2016-3961, FEDORA-2016-373c063e79, |
FEDORA-2016-373c063e79 — Fedora 22 kernel-4.4.8-200.fc22 |
oval:org.secpod.oval:def:110474 | CVE-2016-1926, FEDORA-2016-9851b69dbb, |
FEDORA-2016-9851b69dbb — Fedora 22 openvas-libraries-8.0.7-2.fc22 |
oval:org.secpod.oval:def:110475 | CVE-2016-1926, FEDORA-2016-9851b69dbb, |
FEDORA-2016-9851b69dbb — Fedora 22 openvas-scanner-5.0.5-3.fc22 |
oval:org.secpod.oval:def:110476 | CVE-2015-3455, CVE-2015-5400, CVE-2016-2571, CVE-2016-2572, FEDORA-2016-7b40eb9e29, |
FEDORA-2016-7b40eb9e29 — Fedora 22 libecap-1.0.0-1.fc22 |
oval:org.secpod.oval:def:110478 | CVE-2016-1926, FEDORA-2016-9851b69dbb, |
FEDORA-2016-9851b69dbb — Fedora 22 openvas-cli-1.4.4-1.fc22 |
oval:org.secpod.oval:def:110479 | CVE-2016-4414, FEDORA-2016-42f30d76a0, |
FEDORA-2016-42f30d76a0 — Fedora 23 quassel-0.12.4-1.fc23 |
oval:org.secpod.oval:def:110480 | FEDORA-2016-e2acbd739f, | FEDORA-2016-e2acbd739f — Fedora 22 firefox-46.0.1-1.fc22 |