2016-AUG-31 FSL version 7.5.843
MCAFEE FOUNDSTONE FSL UPDATE
To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release.
NEW CHECKS
144825 - SuSE SLES 12 SP1, SLED 12 SP1 SUSE-SU-2016:2154-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-2099, CVE-2016-4463
Description The scan detected that the host is missing the following update: SUSE-SU-2016:2154-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002228.html
SuSE SLES 12 SP1 x86_64 libxerces-c-3_1-32bit-3.1.1-12.3 libxerces-c-3_1-debuginfo-32bit-3.1.1-12.3 xerces-c-debugsource-3.1.1-12.3 xerces-c-debuginfo-3.1.1-12.3 libxerces-c-3_1-debuginfo-3.1.1-12.3 libxerces-c-3_1-3.1.1-12.3
SuSE SLED 12 SP1 x86_64 libxerces-c-3_1-32bit-3.1.1-12.3 libxerces-c-3_1-debuginfo-32bit-3.1.1-12.3 xerces-c-debugsource-3.1.1-12.3 xerces-c-debuginfo-3.1.1-12.3 libxerces-c-3_1-debuginfo-3.1.1-12.3 libxerces-c-3_1-3.1.1-12.3
144827 - SuSE Linux 13.2 openSUSE-SU-2016:2144-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2012-6701, CVE-2013-7446, CVE-2014-9904, CVE-2015-3288, CVE-2015-6526, CVE-2015-7566, CVE-2015-8709, CVE- 2015-8785, CVE-2015-8812, CVE-2015-8816, CVE-2015-8830, CVE-2016-0758, CVE-2016-1583, CVE-2016-2053, CVE-2016-2184, CVE-2016-2185, CVE-2016-2186, CVE-2016-2187, CVE-2016-2188, CVE-2016-2384, CVE-2016-2543, CVE-2016-2544, CVE-2016- 2545, CVE-2016-2546, CVE-2016-2547, CVE-2016-2548, CVE-2016-2549, CVE-2016-2782, CVE-2016-2847, CVE-2016-3134, CVE- 2016-3136, CVE-2016-3137, CVE-2016-3138, CVE-2016-3139, CVE-2016-3140, CVE-2016-3156, CVE-2016-3672, CVE-2016-3689, CVE-2016-3951, CVE-2016-4470, CVE-2016-4482, CVE-2016-4485, CVE-2016-4486, CVE-2016-4565, CVE-2016-4569, CVE-2016- 4578, CVE-2016-4580, CVE-2016-4581, CVE-2016-4805, CVE-2016-4913, CVE-2016-4997, CVE-2016-5244, CVE-2016-5829 Description The scan detected that the host is missing the following update: openSUSE-SU-2016:2144-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00099.html
SuSE Linux 13.2 i586 xtables-addons-debugsource-2.6-22.3 hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 bbswitch-0.8-3.20.3 ipset-kmp-xen-6.23_k3.16.7_42-20.3 xtables-addons-debuginfo-2.6-22.3 kernel-obs-build-3.16.7-42.2 ipset-kmp-default-debuginfo-6.23_k3.16.7_42-20.3 crash-devel-7.0.8-20.3 virtualbox-websrv-5.0.20-48.5 pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 xtables-addons-kmp-xen-debuginfo-2.6_k3.16.7_42-22.3 bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 bbswitch-kmp-pae-debuginfo-0.8_k3.16.7_42-3.20.3 pcfclock-kmp-pae-debuginfo-0.44_k3.16.7_42-260.20.2 pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 virtualbox-qt-debuginfo-5.0.20-48.5 bbswitch-debugsource-0.8-3.20.3 ipset-debugsource-6.23-20.3 cloop-debuginfo-2.639-14.20.3 crash-kmp-xen-debuginfo-7.0.8_k3.16.7_42-20.3 virtualbox-guest-x11-5.0.20-48.5 crash-eppic-7.0.8-20.3 cloop-debugsource-2.639-14.20.3 pcfclock-kmp-default-debuginfo-0.44_k3.16.7_42-260.20.2 virtualbox-debugsource-5.0.20-48.5 kernel-obs-qa-xen-3.16.7-42.1 pcfclock-kmp-desktop-debuginfo-0.44_k3.16.7_42-260.20.2 ipset-devel-6.23-20.3 vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 kernel-syms-3.16.7-42.1 virtualbox-guest-tools-debuginfo-5.0.20-48.5 virtualbox-guest-kmp-pae-debuginfo-5.0.20_k3.16.7_42-48.5 python-virtualbox-debuginfo-5.0.20-48.5 cloop-kmp-xen-debuginfo-2.639_k3.16.7_42-14.20.3 bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 virtualbox-devel-5.0.20-48.5 xen-tools-domU-debuginfo-4.4.4_02-46.2 virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 kernel-ec2-devel-3.16.7-42.1 cloop-kmp-default-debuginfo-2.639_k3.16.7_42-14.20.3 crash-debuginfo-7.0.8-20.3 crash-eppic-debuginfo-7.0.8-20.3 cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 kernel-default-devel-3.16.7-42.1 kernel-ec2-base-3.16.7-42.1 bbswitch-kmp-desktop-debuginfo-0.8_k3.16.7_42-3.20.3 kernel-default-debugsource-3.16.7-42.1 kernel-default-3.16.7-42.1 kernel-default-debuginfo-3.16.7-42.1 xen-libs-4.4.4_02-46.2 vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 kernel-obs-qa-3.16.7-42.1 cloop-kmp-default-2.639_k3.16.7_42-14.20.3 cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 crash-kmp-pae-debuginfo-7.0.8_k3.16.7_42-20.3 crash-7.0.8-20.3 python-virtualbox-5.0.20-48.5 kernel-ec2-3.16.7-42.1 ipset-debuginfo-6.23-20.3 vhba-kmp-default-debuginfo-20140629_k3.16.7_42-2.20.2 crash-gcore-7.0.8-20.3 hdjmod-kmp-default-debuginfo-1.28_k3.16.7_42-18.21.3 xen-tools-domU-4.4.4_02-46.2 crash-kmp-default-debuginfo-7.0.8_k3.16.7_42-20.3 crash-kmp-desktop-debuginfo-7.0.8_k3.16.7_42-20.3 crash-gcore-debuginfo-7.0.8-20.3 virtualbox-guest-x11-debuginfo-5.0.20-48.5 virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 cloop-kmp-desktop-debuginfo-2.639_k3.16.7_42-14.20.3 cloop-2.639-14.20.3 xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 virtualbox-guest-kmp-desktop-debuginfo-5.0.20_k3.16.7_42-48.5 xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 pcfclock-debuginfo-0.44-260.20.2 ipset-kmp-pae-debuginfo-6.23_k3.16.7_42-20.3 xen-libs-debuginfo-4.4.4_02-46.2 libipset3-6.23-20.3 bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 virtualbox-qt-5.0.20-48.5 hdjmod-kmp-pae-debuginfo-1.28_k3.16.7_42-18.21.3 cloop-kmp-pae-debuginfo-2.639_k3.16.7_42-14.20.3 crash-kmp-default-7.0.8_k3.16.7_42-20.3 xtables-addons-kmp-pae-debuginfo-2.6_k3.16.7_42-22.3 vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 virtualbox-host-kmp-pae-debuginfo-5.0.20_k3.16.7_42-48.5 bbswitch-kmp-default-debuginfo-0.8_k3.16.7_42-3.20.3 ipset-kmp-desktop-6.23_k3.16.7_42-20.3 xen-devel-4.4.4_02-46.2 ipset-kmp-xen-debuginfo-6.23_k3.16.7_42-20.3 hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 bbswitch-kmp-xen-debuginfo-0.8_k3.16.7_42-3.20.3 virtualbox-guest-kmp-default-debuginfo-5.0.20_k3.16.7_42-48.5 kernel-default-base-debuginfo-3.16.7-42.1 virtualbox-host-kmp-desktop-debuginfo-5.0.20_k3.16.7_42-48.5 ipset-kmp-pae-6.23_k3.16.7_42-20.3 hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 hdjmod-kmp-xen-debuginfo-1.28_k3.16.7_42-18.21.3 crash-kmp-pae-7.0.8_k3.16.7_42-20.3 crash-doc-7.0.8-20.3 pcfclock-0.44-260.20.2 xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 crash-kmp-xen-7.0.8_k3.16.7_42-20.3 virtualbox-5.0.20-48.5 crash-debugsource-7.0.8-20.3 vhba-kmp-pae-debuginfo-20140629_k3.16.7_42-2.20.2 libipset3-debuginfo-6.23-20.3 virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 vhba-kmp-default-20140629_k3.16.7_42-2.20.2 kernel-default-base-3.16.7-42.1 hdjmod-kmp-desktop-debuginfo-1.28_k3.16.7_42-18.21.3 virtualbox-websrv-debuginfo-5.0.20-48.5 virtualbox-guest-tools-5.0.20-48.5 xtables-addons-kmp-desktop-debuginfo-2.6_k3.16.7_42-22.3 xtables-addons-2.6-22.3 xtables-addons-kmp-default-debuginfo-2.6_k3.16.7_42-22.3 xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 hdjmod-debugsource-1.28-18.21.3 vhba-kmp-xen-debuginfo-20140629_k3.16.7_42-2.20.2 kernel-obs-build-debugsource-3.16.7-42.2 vhba-kmp-debugsource-20140629-2.20.2 virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 virtualbox-debuginfo-5.0.20-48.5 vhba-kmp-desktop-debuginfo-20140629_k3.16.7_42-2.20.2 pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 ipset-6.23-20.3 ipset-kmp-desktop-debuginfo-6.23_k3.16.7_42-20.3 virtualbox-host-kmp-default-debuginfo-5.0.20_k3.16.7_42-48.5 ipset-kmp-default-6.23_k3.16.7_42-20.3 pcfclock-debugsource-0.44-260.20.2 xen-debugsource-4.4.4_02-46.2 i686 kernel-desktop-debuginfo-3.16.7-42.1 kernel-desktop-debugsource-3.16.7-42.1 kernel-pae-debuginfo-3.16.7-42.1 kernel-debug-debuginfo-3.16.7-42.1 kernel-vanilla-debuginfo-3.16.7-42.1 kernel-ec2-debuginfo-3.16.7-42.1 kernel-vanilla-devel-3.16.7-42.1 kernel-debug-3.16.7-42.1 kernel-desktop-3.16.7-42.1 kernel-xen-base-debuginfo-3.16.7-42.1 kernel-xen-debuginfo-3.16.7-42.1 kernel-pae-devel-3.16.7-42.1 kernel-pae-base-3.16.7-42.1 kernel-debug-base-3.16.7-42.1 kernel-pae-debugsource-3.16.7-42.1 kernel-pae-base-debuginfo-3.16.7-42.1 kernel-debug-base-debuginfo-3.16.7-42.1 kernel-vanilla-debugsource-3.16.7-42.1 kernel-debug-devel-debuginfo-3.16.7-42.1 kernel-vanilla-3.16.7-42.1 kernel-ec2-debugsource-3.16.7-42.1 kernel-desktop-base-debuginfo-3.16.7-42.1 kernel-debug-devel-3.16.7-42.1 kernel-debug-debugsource-3.16.7-42.1 kernel-desktop-devel-3.16.7-42.1 kernel-xen-debugsource-3.16.7-42.1 kernel-ec2-base-debuginfo-3.16.7-42.1 kernel-desktop-base-3.16.7-42.1 kernel-xen-3.16.7-42.1 kernel-xen-base-3.16.7-42.1 kernel-pae-3.16.7-42.1 kernel-xen-devel-3.16.7-42.1 noarch kernel-source-vanilla-3.16.7-42.1 kernel-docs-3.16.7-42.2 virtualbox-guest-desktop-icons-5.0.20-48.5 kernel-devel-3.16.7-42.1 kernel-source-3.16.7-42.1 kernel-macros-3.16.7-42.1 virtualbox-host-source-5.0.20-48.5 x86_64 kernel-vanilla-debuginfo-3.16.7-42.1 bbswitch-debugsource-0.8-3.20.3 cloop-debugsource-2.639-14.20.3 xen-kmp-default-4.4.4_02_k3.16.7_42-46.2
163146 - Oracle Enterprise Linux ELSA-2016-3596 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Oracle Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2013-4312, CVE-2015-7513, CVE-2015-7799, CVE-2015-7837, CVE-2015-8767, CVE-2015-8785, CVE-2015-8787, CVE- 2015-8816, CVE-2016-0723, CVE-2016-0758, CVE-2016-2069, CVE-2016-2085, CVE-2016-2117, CVE-2016-2847, CVE-2016-3136, CVE-2016-3137, CVE-2016-3156, CVE-2016-3157, CVE-2016-4470, CVE-2016-4565, CVE-2016-4581, CVE-2016-4805, CVE-2016- 4913, CVE-2016-4951, CVE-2016-6197, CVE-2016-6198
Description The scan detected that the host is missing the following update: ELSA-2016-3596
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/el-errata/2016-August/006312.html http://oss.oracle.com/pipermail/el-errata/2016-August/006313.html
OEL7 x86_64 kernel-uek-debug-devel-4.1.12-61.1.6.el7uek kernel-uek-doc-4.1.12-61.1.6.el7uek kernel-uek-firmware-4.1.12-61.1.6.el7uek kernel-uek-4.1.12-61.1.6.el7uek kernel-uek-devel-4.1.12-61.1.6.el7uek dtrace-modules-4.1.12-61.1.6.el7uek-0.5.3-2.el7 kernel-uek-debug-4.1.12-61.1.6.el7uek
OEL6 x86_64 kernel-uek-devel-4.1.12-61.1.6.el6uek kernel-uek-firmware-4.1.12-61.1.6.el6uek kernel-uek-debug-4.1.12-61.1.6.el6uek kernel-uek-debug-devel-4.1.12-61.1.6.el6uek kernel-uek-doc-4.1.12-61.1.6.el6uek kernel-uek-4.1.12-61.1.6.el6uek dtrace-modules-4.1.12-61.1.6.el6uek-0.5.3-2.el6 182104 - FreeBSD libxml2 Multiple Vulnabilities (e195679d-045b-4953-bb33-be0073ba2ac6)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2016-1762, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE- 2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705, CVE-2016-4449, CVE-2016-4483
Description The scan detected that the host is missing the following update: libxml2 -- multiple vulnabilities (e195679d-045b-4953-bb33-be0073ba2ac6)
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/e195679d-045b-4953-bb33-be0073ba2ac6.html
Affected packages: libxml2 < 2.9.4
20458 - D-link Routers Buffer Overflow Vulnerability
Category: Wireless Assessment -> NonIntrusive -> Wireless Risk Level: High CVE: CVE-2016-5681
Description A buffer overflow vulnerability is present in some versions of D-Link DIR-model.
Observation D-Link DIR is a wireless router.
A buffer overflow vulnerability is present in some versions of D-Link DIR-model. The flaw lies in cgibin interface on port 8181. Successful exploitation could allow an attacker to remotely execute arbitrary code.
141269 - Red Hat Enterprise Linux RHSA-2016-1776 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-3458, CVE-2016-3500, CVE-2016-3508, CVE-2016-3550, CVE-2016-3606
Description The scan detected that the host is missing the following update: RHSA-2016-1776
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://rhn.redhat.com/errata/RHSA-2016-1776.html
RHEL5S x86_64 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.4.el5_11 i386 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.4.el5_11
RHEL7S x86_64 java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2
RHEL6S x86_64 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8 i386 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8
RHEL6WS x86_64 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8 i386 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8
RHEL5D x86_64 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.4.el5_11 i386 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.4.el5_11
RHEL7D x86_64 java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2
RHEL6D x86_64 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8 i386 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8
RHEL7WS x86_64 java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2
160139 - CentOS 5, 6, 7 CESA-2016-1776 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Cent OS Patches and Hotfixes Risk Level: High CVE: CVE-2016-3458, CVE-2016-3500, CVE-2016-3508, CVE-2016-3550, CVE-2016-3606
Description The scan detected that the host is missing the following update: CESA-2016-1776
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.centos.org/pipermail/centos-announce/2016-August/022055.html http://lists.centos.org/pipermail/centos-announce/2016-August/022054.html http://lists.centos.org/pipermail/centos-announce/2016-August/022056.html
CentOS 6 x86_64 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.6.el6_8 i686 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.6.el6_8
CentOS 7 x86_64 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2
CentOS 5 x86_64 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.4.el5_11 i386 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.4.el5_11
163145 - Oracle Enterprise Linux ELSA-2016-1776 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Oracle Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-3458, CVE-2016-3500, CVE-2016-3508, CVE-2016-3550, CVE-2016-3606
Description The scan detected that the host is missing the following update: ELSA-2016-1776
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/el-errata/2016-August/006299.html http://oss.oracle.com/pipermail/el-errata/2016-August/006298.html http://oss.oracle.com/pipermail/el-errata/2016-August/006297.html
OEL6 x86_64 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.6.el6_8 i386 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.6.el6_8
OEL5 x86_64 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.4.0.1.el5_11 java-1.6.0-openjdk-1.6.0.40-1.13.12.4.0.1.el5_11 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.4.0.1.el5_11 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.4.0.1.el5_11 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.4.0.1.el5_11 i386 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.4.0.1.el5_11 java-1.6.0-openjdk-1.6.0.40-1.13.12.4.0.1.el5_11 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.4.0.1.el5_11 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.4.0.1.el5_11 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.4.0.1.el5_11
OEL7 x86_64 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2
175006 - Scientific Linux Security ERRATA Important: java-1.6.0-openjdk on SL5.x, SL6.x, SL7.x i386/x86_64 (1608-14326)
Category: SSH Module -> NonIntrusive -> Scientific Linux Patches and HotFixes Risk Level: High CVE: CVE-2016-3458, CVE-2016-3500, CVE-2016-3508, CVE-2016-3550, CVE-2016-3606
Description The scan detected that the host is missing the following update: Security ERRATA Important: java-1.6.0-openjdk on SL5.x, SL6.x, SL7.x i386/x86_64 (1608-14326)
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://listserv.fnal.gov/scripts/wa.exe?A2=ind1608&L=scientific-linux-errata&F=&S=&P=14326 SL5 x86_64 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.4.el5_11 i386 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.4.el5_11 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.4.el5_11
SL7 x86_64 java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2
SL6 x86_64 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8 i386 java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-src-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-debuginfo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.6.el6_8 java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8
20457 - Oracle Directory Server Enterprise Edition Critical Patch Update July 2016
Category: General Vulnerability Assessment -> NonIntrusive -> Web Server Risk Level: High CVE: CVE-2015-2721, CVE-2015-4000, CVE-2015-7181, CVE-2015-7182, CVE-2015-7183, CVE-2015-7575
Description Multiple vulnerabilities are present in some versions of Oracle Directory Server Enterprise Edition.
Observation Oracle Directory Server Enterprise Edition provides a core directory service for enterprise environments.
Multiple vulnerabilities are present in some versions of Oracle Directory Server Enterprise Edition. The flaw lies in the Admin Server component. Successful exploitation could allow an attacker to remotely execute arbitrary code or cause a denial of service condition. 20467 - (HPSBGN03630) HP Operations Manager Apache Commons Collections Java Object Deserialization Vulnerability
Category: SSH Module -> NonIntrusive -> SSH Miscellaneous Risk Level: High CVE: CVE-2016-4373
Description A remote code execution vulnerability is present in some versions of HP Operations Manager.
Observation HP Operations Manager is a package management software.
A remote code execution vulnerability is present in some versions of HP Operations Manager. The flaw lies in the handling of Java object deserialization inside Apache Commons Collections. Successful exploitation could allow attackers to execute arbitrary code.
130568 - Debian Linux 8.0 DSA-3652-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Debian Patches and Hotfixes Risk Level: High CVE: CVE-2016-4562, CVE-2016-4563, CVE-2016-4564, CVE-2016-5010, CVE-2016-5687, CVE-2016-5688, CVE-2016-5689, CVE- 2016-5690, CVE-2016-5691, CVE-2016-5841, CVE-2016-5842, CVE-2016-6491
Description The scan detected that the host is missing the following update: DSA-3652-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.debian.org/security/2016/dsa-3652
Debian 8.0 all imagemagick_8:6.8.9.9-5+deb8u4
144821 - SuSE SLES 11 SP4 SUSE-SU-2016:2156-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-1234, CVE-2016-3075, CVE-2016-3706, CVE-2016-4429
Description The scan detected that the host is missing the following update: SUSE-SU-2016:2156-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html
SuSE SLES 11 SP4 i686 glibc-devel-2.11.3-17.102.1 glibc-2.11.3-17.102.1 i586 glibc-info-2.11.3-17.102.1 glibc-i18ndata-2.11.3-17.102.1 glibc-devel-2.11.3-17.102.1 glibc-locale-2.11.3-17.102.1 glibc-2.11.3-17.102.1 glibc-profile-2.11.3-17.102.1 glibc-html-2.11.3-17.102.1 nscd-2.11.3-17.102.1 x86_64 glibc-locale-32bit-2.11.3-17.102.1 glibc-info-2.11.3-17.102.1 glibc-i18ndata-2.11.3-17.102.1 glibc-devel-2.11.3-17.102.1 glibc-locale-2.11.3-17.102.1 glibc-2.11.3-17.102.1 glibc-devel-32bit-2.11.3-17.102.1 glibc-32bit-2.11.3-17.102.1 glibc-profile-2.11.3-17.102.1 glibc-html-2.11.3-17.102.1 glibc-profile-32bit-2.11.3-17.102.1 nscd-2.11.3-17.102.1
144822 - SuSE Linux 13.2 openSUSE-SU-2016:2182-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-6354
Description The scan detected that the host is missing the following update: openSUSE-SU-2016:2182-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00112.html
SuSE Linux 13.2 x86_64 mozilla-nss-debugsource-3.24-43.1 mozilla-nss-sysinit-debuginfo-3.24-43.1 libfreebl3-debuginfo-32bit-3.24-43.1 mozilla-nss-sysinit-debuginfo-32bit-3.24-43.1 MozillaFirefox-buildsymbols-48.0.1-77.4 MozillaFirefox-branding-upstream-48.0.1-77.4 mozilla-nss-debuginfo-3.24-43.1 libsoftokn3-3.24-43.1 mozilla-nss-3.24-43.1 MozillaFirefox-debugsource-48.0.1-77.4 MozillaFirefox-translations-other-48.0.1-77.4 mozilla-nss-32bit-3.24-43.1 libsoftokn3-debuginfo-32bit-3.24-43.1 MozillaFirefox-48.0.1-77.4 libfreebl3-3.24-43.1 mozilla-nss-devel-3.24-43.1 mozilla-nss-certs-debuginfo-3.24-43.1 mozilla-nss-tools-3.24-43.1 mozilla-nss-sysinit-32bit-3.24-43.1 mozilla-nss-sysinit-3.24-43.1 mozilla-nss-certs-debuginfo-32bit-3.24-43.1 libsoftokn3-debuginfo-3.24-43.1 mozilla-nss-debuginfo-32bit-3.24-43.1 MozillaFirefox-devel-48.0.1-77.4 libsoftokn3-32bit-3.24-43.1 mozilla-nss-tools-debuginfo-3.24-43.1 MozillaFirefox-debuginfo-48.0.1-77.4 libfreebl3-debuginfo-3.24-43.1 libfreebl3-32bit-3.24-43.1 mozilla-nss-certs-3.24-43.1 MozillaFirefox-translations-common-48.0.1-77.4 mozilla-nss-certs-32bit-3.24-43.1 i586 mozilla-nss-sysinit-debuginfo-3.24-43.1 MozillaFirefox-devel-48.0.1-77.4 mozilla-nss-tools-debuginfo-3.24-43.1 libfreebl3-debuginfo-3.24-43.1 MozillaFirefox-branding-upstream-48.0.1-77.4 libsoftokn3-debuginfo-3.24-43.1 libfreebl3-3.24-43.1 mozilla-nss-debugsource-3.24-43.1 mozilla-nss-3.24-43.1 MozillaFirefox-48.0.1-77.4 MozillaFirefox-debugsource-48.0.1-77.4 MozillaFirefox-translations-other-48.0.1-77.4 mozilla-nss-debuginfo-3.24-43.1 libsoftokn3-3.24-43.1 mozilla-nss-certs-3.24-43.1 mozilla-nss-devel-3.24-43.1 MozillaFirefox-translations-common-48.0.1-77.4 mozilla-nss-sysinit-3.24-43.1 MozillaFirefox-debuginfo-48.0.1-77.4 mozilla-nss-certs-debuginfo-3.24-43.1 MozillaFirefox-buildsymbols-48.0.1-77.4 mozilla-nss-tools-3.24-43.1
144824 - SuSE SLES 11 SP4 SUSE-SU-2016:2195-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-2830, CVE-2016-2835, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-2839, CVE-2016-5252, CVE- 2016-5254, CVE-2016-5258, CVE-2016-5259, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265, CVE-2016-6354
Description The scan detected that the host is missing the following update: SUSE-SU-2016:2195-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html
SuSE SLES 11 SP4 i586 MozillaFirefox-translations-45.3.0esr-50.1 MozillaFirefox-45.3.0esr-50.1 x86_64 MozillaFirefox-translations-45.3.0esr-50.1 MozillaFirefox-45.3.0esr-50.1
144826 - SuSE Linux 13.1 openSUSE-SU-2016:2184-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2014-9904, CVE-2015-7833, CVE-2015-8551, CVE-2015-8552, CVE-2015-8845, CVE-2016-0758, CVE-2016-1583, CVE- 2016-2053, CVE-2016-3672, CVE-2016-4470, CVE-2016-4482, CVE-2016-4486, CVE-2016-4565, CVE-2016-4569, CVE-2016-4578, CVE-2016-4805, CVE-2016-4997, CVE-2016-4998, CVE-2016-5244, CVE-2016-5828, CVE-2016-5829
Description The scan detected that the host is missing the following update: openSUSE-SU-2016:2184-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00113.html
SuSE Linux 13.1 i586 openvswitch-1.11.0-0.39.3 kernel-default-3.12.62-52.1 pcfclock-kmp-default-debuginfo-0.44_k3.12.62_52-258.33.2 openvswitch-kmp-desktop-debuginfo-1.11.0_k3.12.62_52-0.39.3 crash-kmp-default-7.0.2_k3.12.62_52-2.32.7 xtables-addons-debugsource-2.3-2.31.2 xen-debugsource-4.3.4_10-65.3 xen-kmp-default-4.3.4_10_k3.12.62_52-65.3 virtualbox-host-kmp-pae-4.2.36_k3.12.62_52-2.64.4 crash-debugsource-7.0.2-2.32.7 hdjmod-kmp-pae-debuginfo-1.28_k3.12.62_52-16.32.2 virtualbox-guest-x11-4.2.36-2.64.4 crash-kmp-desktop-debuginfo-7.0.2_k3.12.62_52-2.32.7 virtualbox-debuginfo-4.2.36-2.64.4 openvswitch-kmp-default-1.11.0_k3.12.62_52-0.39.3 ndiswrapper-kmp-desktop-1.58_k3.12.62_52-33.2 xtables-addons-kmp-default-debuginfo-2.3_k3.12.62_52-2.31.2 cloop-2.639-11.32.2 virtualbox-qt-4.2.36-2.64.4 iscsitarget-debugsource-1.4.20.3-13.32.2 ipset-kmp-xen-debuginfo-6.21.1_k3.12.62_52-2.36.2 cloop-debugsource-2.639-11.32.2 xen-kmp-desktop-debuginfo-4.3.4_10_k3.12.62_52-65.3 vhba-kmp-default-debuginfo-20130607_k3.12.62_52-2.32.2 ipset-kmp-default-debuginfo-6.21.1_k3.12.62_52-2.36.2 iscsitarget-debuginfo-1.4.20.3-13.32.2 pcfclock-debuginfo-0.44-258.33.2 xen-devel-4.3.4_10-65.3 iscsitarget-kmp-desktop-1.4.20.3_k3.12.62_52-13.32.2 virtualbox-qt-debuginfo-4.2.36-2.64.4 openvswitch-controller-1.11.0-0.39.3 crash-kmp-xen-debuginfo-7.0.2_k3.12.62_52-2.32.7 iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.12.62_52-13.32.2 xtables-addons-kmp-desktop-2.3_k3.12.62_52-2.31.2 xtables-addons-kmp-xen-2.3_k3.12.62_52-2.31.2 xen-libs-debuginfo-4.3.4_10-65.3 libipset3-debuginfo-6.21.1-2.36.2 pcfclock-kmp-pae-0.44_k3.12.62_52-258.33.2 python-openvswitch-test-1.11.0-0.39.3 xtables-addons-kmp-default-2.3_k3.12.62_52-2.31.2 xtables-addons-debuginfo-2.3-2.31.2 libipset3-6.21.1-2.36.2 xtables-addons-2.3-2.31.2 iscsitarget-1.4.20.3-13.32.2 vhba-kmp-pae-20130607_k3.12.62_52-2.32.2 cloop-kmp-default-2.639_k3.12.62_52-11.32.2 cloop-kmp-pae-2.639_k3.12.62_52-11.32.2 crash-eppic-debuginfo-7.0.2-2.32.7 hdjmod-kmp-default-debuginfo-1.28_k3.12.62_52-16.32.2 cloop-debuginfo-2.639-11.32.2 virtualbox-guest-kmp-default-debuginfo-4.2.36_k3.12.62_52-2.64.4 kernel-syms-3.12.62-52.1 hdjmod-kmp-desktop-1.28_k3.12.62_52-16.32.2 cloop-kmp-xen-debuginfo-2.639_k3.12.62_52-11.32.2 crash-gcore-7.0.2-2.32.7 virtualbox-host-kmp-default-debuginfo-4.2.36_k3.12.62_52-2.64.4 crash-gcore-debuginfo-7.0.2-2.32.7 vhba-kmp-default-20130607_k3.12.62_52-2.32.2 openvswitch-controller-debuginfo-1.11.0-0.39.3 xen-kmp-pae-debuginfo-4.3.4_10_k3.12.62_52-65.3 xen-libs-4.3.4_10-65.3 vhba-kmp-desktop-20130607_k3.12.62_52-2.32.2 ipset-kmp-pae-6.21.1_k3.12.62_52-2.36.2 crash-kmp-pae-7.0.2_k3.12.62_52-2.32.7 iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.12.62_52-13.32.2 xtables-addons-kmp-pae-2.3_k3.12.62_52-2.31.2 virtualbox-guest-kmp-default-4.2.36_k3.12.62_52-2.64.4 hdjmod-kmp-desktop-debuginfo-1.28_k3.12.62_52-16.32.2 openvswitch-kmp-pae-debuginfo-1.11.0_k3.12.62_52-0.39.3 virtualbox-websrv-debuginfo-4.2.36-2.64.4 hdjmod-kmp-pae-1.28_k3.12.62_52-16.32.2 virtualbox-guest-tools-debuginfo-4.2.36-2.64.4 ipset-devel-6.21.1-2.36.2 ndiswrapper-kmp-pae-1.58_k3.12.62_52-33.2 kernel-default-debuginfo-3.12.62-52.1 openvswitch-pki-1.11.0-0.39.3 virtualbox-host-kmp-desktop-4.2.36_k3.12.62_52-2.64.4 openvswitch-debuginfo-1.11.0-0.39.3 virtualbox-guest-kmp-pae-debuginfo-4.2.36_k3.12.62_52-2.64.4 virtualbox-4.2.36-2.64.4 virtualbox-websrv-4.2.36-2.64.4 ndiswrapper-1.58-33.2 ndiswrapper-kmp-pae-debuginfo-1.58_k3.12.62_52-33.2 crash-kmp-xen-7.0.2_k3.12.62_52-2.32.7 virtualbox-guest-x11-debuginfo-4.2.36-2.64.4 pcfclock-debugsource-0.44-258.33.2 cloop-kmp-desktop-2.639_k3.12.62_52-11.32.2 virtualbox-guest-tools-4.2.36-2.64.4 openvswitch-switch-debuginfo-1.11.0-0.39.3 xtables-addons-kmp-pae-debuginfo-2.3_k3.12.62_52-2.31.2 cloop-kmp-default-debuginfo-2.639_k3.12.62_52-11.32.2 xen-tools-domU-4.3.4_10-65.3 iscsitarget-kmp-default-1.4.20.3_k3.12.62_52-13.32.2 vhba-kmp-pae-debuginfo-20130607_k3.12.62_52-2.32.2 ipset-kmp-xen-6.21.1_k3.12.62_52-2.36.2 virtualbox-host-kmp-desktop-debuginfo-4.2.36_k3.12.62_52-2.64.4 kernel-default-debugsource-3.12.62-52.1 openvswitch-switch-1.11.0-0.39.3 crash-kmp-desktop-7.0.2_k3.12.62_52-2.32.7 crash-7.0.2-2.32.7 hdjmod-debugsource-1.28-16.32.2 iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.12.62_52-13.32.2 crash-doc-7.0.2-2.32.7 virtualbox-guest-kmp-desktop-debuginfo-4.2.36_k3.12.62_52-2.64.4 openvswitch-test-1.11.0-0.39.3 openvswitch-kmp-xen-debuginfo-1.11.0_k3.12.62_52-0.39.3 virtualbox-host-kmp-default-4.2.36_k3.12.62_52-2.64.4 vhba-kmp-desktop-debuginfo-20130607_k3.12.62_52-2.32.2 crash-kmp-default-debuginfo-7.0.2_k3.12.62_52-2.32.7 iscsitarget-kmp-pae-1.4.20.3_k3.12.62_52-13.32.2 python-openvswitch-1.11.0-0.39.3 iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.12.62_52-13.32.2 vhba-kmp-xen-20130607_k3.12.62_52-2.32.2 virtualbox-guest-kmp-desktop-4.2.36_k3.12.62_52-2.64.4 openvswitch-kmp-xen-1.11.0_k3.12.62_52-0.39.3 ipset-debuginfo-6.21.1-2.36.2 xen-tools-domU-debuginfo-4.3.4_10-65.3 xen-kmp-desktop-4.3.4_10_k3.12.62_52-65.3 cloop-kmp-desktop-debuginfo-2.639_k3.12.62_52-11.32.2 crash-kmp-pae-debuginfo-7.0.2_k3.12.62_52-2.32.7 ipset-debugsource-6.21.1-2.36.2 pcfclock-kmp-desktop-0.44_k3.12.62_52-258.33.2 virtualbox-host-kmp-pae-debuginfo-4.2.36_k3.12.62_52-2.64.4 hdjmod-kmp-xen-1.28_k3.12.62_52-16.32.2 cloop-kmp-pae-debuginfo-2.639_k3.12.62_52-11.32.2 ipset-kmp-desktop-debuginfo-6.21.1_k3.12.62_52-2.36.2 crash-debuginfo-7.0.2-2.32.7 ndiswrapper-debuginfo-1.58-33.2 iscsitarget-kmp-xen-1.4.20.3_k3.12.62_52-13.32.2 virtualbox-devel-4.2.36-2.64.4 kernel-default-devel-3.12.62-52.1 openvswitch-kmp-pae-1.11.0_k3.12.62_52-0.39.3 hdjmod-kmp-default-1.28_k3.12.62_52-16.32.2 python-virtualbox-debuginfo-4.2.36-2.64.4 ndiswrapper-kmp-default-debuginfo-1.58_k3.12.62_52-33.2 openvswitch-kmp-desktop-1.11.0_k3.12.62_52-0.39.3 ndiswrapper-kmp-desktop-debuginfo-1.58_k3.12.62_52-33.2 cloop-kmp-xen-2.639_k3.12.62_52-11.32.2 ipset-kmp-desktop-6.21.1_k3.12.62_52-2.36.2 xen-kmp-pae-4.3.4_10_k3.12.62_52-65.3 xtables-addons-kmp-xen-debuginfo-2.3_k3.12.62_52-2.31.2 kernel-default-base-3.12.62-52.1 crash-eppic-7.0.2-2.32.7 pcfclock-kmp-pae-debuginfo-0.44_k3.12.62_52-258.33.2 kernel-default-base-debuginfo-3.12.62-52.1 pcfclock-0.44-258.33.2 ndiswrapper-debugsource-1.58-33.2 ipset-kmp-default-6.21.1_k3.12.62_52-2.36.2 ipset-6.21.1-2.36.2 ipset-kmp-pae-debuginfo-6.21.1_k3.12.62_52-2.36.2 virtualbox-guest-kmp-pae-4.2.36_k3.12.62_52-2.64.4 vhba-kmp-debugsource-20130607-2.32.2 ndiswrapper-kmp-default-1.58_k3.12.62_52-33.2 virtualbox-debugsource-4.2.36-2.64.4 openvswitch-debugsource-1.11.0-0.39.3 crash-devel-7.0.2-2.32.7 xtables-addons-kmp-desktop-debuginfo-2.3_k3.12.62_52-2.31.2 python-virtualbox-4.2.36-2.64.4 pcfclock-kmp-desktop-debuginfo-0.44_k3.12.62_52-258.33.2 openvswitch-kmp-default-debuginfo-1.11.0_k3.12.62_52-0.39.3
144828 - SuSE SLES 12 SP1 SUSE-SU-2016:2188-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-3092, CVE-2016-5388
Description The scan detected that the host is missing the following update: SUSE-SU-2016:2188-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002240.html
SuSE SLES 12 SP1 noarch tomcat-jsp-2_3-api-8.0.32-8.7 tomcat-webapps-8.0.32-8.7 tomcat-8.0.32-8.7 tomcat-el-3_0-api-8.0.32-8.7 tomcat-javadoc-8.0.32-8.7 tomcat-docs-webapp-8.0.32-8.7 tomcat-lib-8.0.32-8.7 tomcat-admin-webapps-8.0.32-8.7 tomcat-servlet-3_1-api-8.0.32-8.7
144829 - SuSE Linux 13.1 openSUSE-SU-2016:2167-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-6354
Description The scan detected that the host is missing the following update: openSUSE-SU-2016:2167-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00104.html
SuSE Linux 13.1 x86_64 mozilla-nss-certs-32bit-3.24-88.1 MozillaFirefox-buildsymbols-48.0.1-122.3 libsoftokn3-debuginfo-3.24-88.1 mozilla-nss-debugsource-3.24-88.1 mozilla-nss-tools-debuginfo-3.24-88.1 libsoftokn3-32bit-3.24-88.1 libfreebl3-3.24-88.1 libsoftokn3-3.24-88.1 MozillaFirefox-translations-common-48.0.1-122.3 libfreebl3-debuginfo-3.24-88.1 mozilla-nss-sysinit-3.24-88.1 mozilla-nss-sysinit-debuginfo-3.24-88.1 mozilla-nss-devel-3.24-88.1 libfreebl3-32bit-3.24-88.1 mozilla-nss-debuginfo-3.24-88.1 mozilla-nss-tools-3.24-88.1 mozilla-nss-32bit-3.24-88.1 MozillaFirefox-translations-other-48.0.1-122.3 mozilla-nss-certs-debuginfo-3.24-88.1 mozilla-nss-sysinit-32bit-3.24-88.1 mozilla-nss-certs-3.24-88.1 MozillaFirefox-devel-48.0.1-122.3 mozilla-nss-certs-debuginfo-32bit-3.24-88.1 MozillaFirefox-48.0.1-122.3 libfreebl3-debuginfo-32bit-3.24-88.1 MozillaFirefox-branding-upstream-48.0.1-122.3 mozilla-nss-sysinit-debuginfo-32bit-3.24-88.1 mozilla-nss-3.24-88.1 MozillaFirefox-debugsource-48.0.1-122.3 libsoftokn3-debuginfo-32bit-3.24-88.1 mozilla-nss-debuginfo-32bit-3.24-88.1 MozillaFirefox-debuginfo-48.0.1-122.3 i586 mozilla-nss-3.24-88.1 MozillaFirefox-debugsource-48.0.1-122.3 MozillaFirefox-translations-common-48.0.1-122.3 mozilla-nss-devel-3.24-88.1 mozilla-nss-debuginfo-3.24-88.1 MozillaFirefox-devel-48.0.1-122.3 libsoftokn3-3.24-88.1 libfreebl3-debuginfo-3.24-88.1 libsoftokn3-debuginfo-3.24-88.1 mozilla-nss-debugsource-3.24-88.1 libfreebl3-3.24-88.1 mozilla-nss-tools-debuginfo-3.24-88.1 mozilla-nss-tools-3.24-88.1 MozillaFirefox-branding-upstream-48.0.1-122.3 MozillaFirefox-buildsymbols-48.0.1-122.3 mozilla-nss-certs-3.24-88.1 MozillaFirefox-48.0.1-122.3 MozillaFirefox-translations-other-48.0.1-122.3 mozilla-nss-sysinit-3.24-88.1 mozilla-nss-sysinit-debuginfo-3.24-88.1 MozillaFirefox-debuginfo-48.0.1-122.3 mozilla-nss-certs-debuginfo-3.24-88.1 144830 - SuSE SLES 12 SP1, SLED 12 SP1 SUSE-SU-2016:2189-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-5746
Description The scan detected that the host is missing the following update: SUSE-SU-2016:2189-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002241.html
SuSE SLES 12 SP1 x86_64 libstorage6-2.25.35.1-3.1 libstorage6-debuginfo-2.25.35.1-3.1 libstorage-debugsource-2.25.35.1-3.1 libstorage-ruby-debuginfo-2.25.35.1-3.1 libstorage-ruby-2.25.35.1-3.1
SuSE SLED 12 SP1 x86_64 libstorage6-2.25.35.1-3.1 libstorage6-debuginfo-2.25.35.1-3.1 libstorage-debugsource-2.25.35.1-3.1 libstorage-ruby-debuginfo-2.25.35.1-3.1 libstorage-ruby-2.25.35.1-3.1
144832 - SuSE Linux 13.2 openSUSE-SU-2016:2168-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-6606, CVE-2016-6607, CVE-2016-6608, CVE-2016-6609, CVE-2016-6610, CVE-2016-6611, CVE-2016-6612, CVE- 2016-6613, CVE-2016-6614, CVE-2016-6615, CVE-2016-6616, CVE-2016-6617, CVE-2016-6618, CVE-2016-6619, CVE-2016-6620, CVE-2016-6621, CVE-2016-6622, CVE-2016-6623, CVE-2016-6624, CVE-2016-6625, CVE-2016-6626, CVE-2016-6627, CVE-2016- 6628, CVE-2016-6629, CVE-2016-6630, CVE-2016-6631, CVE-2016-6632, CVE-2016-6633
Description The scan detected that the host is missing the following update: openSUSE-SU-2016:2168-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00105.html
SuSE Linux 13.2 noarch phpMyAdmin-4.4.15.8-39.1 144835 - SuSE Linux 13.1 openSUSE-SU-2016:2176-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-6606, CVE-2016-6607, CVE-2016-6608, CVE-2016-6609, CVE-2016-6610, CVE-2016-6611, CVE-2016-6612, CVE- 2016-6613, CVE-2016-6614, CVE-2016-6615, CVE-2016-6616, CVE-2016-6617, CVE-2016-6618, CVE-2016-6619, CVE-2016-6620, CVE-2016-6621, CVE-2016-6622, CVE-2016-6623, CVE-2016-6624, CVE-2016-6625, CVE-2016-6626, CVE-2016-6627, CVE-2016- 6628, CVE-2016-6629, CVE-2016-6630, CVE-2016-6631, CVE-2016-6632, CVE-2016-6633
Description The scan detected that the host is missing the following update: openSUSE-SU-2016:2176-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00111.html
SuSE Linux 13.1 noarch phpMyAdmin-4.4.15.8-63.1
185392 - Ubuntu Linux 16.04 USN-3070-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2016-1237, CVE-2016-5244, CVE-2016-5400, CVE-2016-5696, CVE-2016-5728, CVE-2016-5828, CVE-2016-5829, CVE- 2016-6197
Description The scan detected that the host is missing the following update: USN-3070-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003541.html
Ubuntu 16.04 linux-image-4.4.0-36-generic_4.4.0-36.55 linux-image-4.4.0-36-generic-lpae_4.4.0-36.55 linux-image-4.4.0-36-powerpc-e500mc_4.4.0-36.55 linux-image-4.4.0-36-powerpc-smp_4.4.0-36.55 linux-image-4.4.0-36-powerpc64-emb_4.4.0-36.55 linux-image-4.4.0-36-powerpc64-smp_4.4.0-36.55 linux-image-4.4.0-36-lowlatency_4.4.0-36.55
185393 - Ubuntu Linux 12.04, 14.04, 16.04 USN-3068-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2015-2059, CVE-2015-8948, CVE-2016-6261, CVE-2016-6262, CVE-2016-6263 Description The scan detected that the host is missing the following update: USN-3068-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003539.html
Ubuntu 12.04 libidn11_1.23-2ubuntu0.1
Ubuntu 16.04 libidn11_1.32-3ubuntu1.1
Ubuntu 14.04 libidn11_1.28-1ubuntu2.1
185394 - Ubuntu Linux 12.04 USN-3072-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2016-5244, CVE-2016-5696, CVE-2016-5829
Description The scan detected that the host is missing the following update: USN-3072-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003545.html
Ubuntu 12.04 linux-image-3.2.0-109-omap_3.2.0-109.150 linux-image-3.2.0-109-powerpc-smp_3.2.0-109.150 linux-image-3.2.0-109-virtual_3.2.0-109.150 linux-image-3.2.0-109-powerpc64-smp_3.2.0-109.150 linux-image-3.2.0-109-generic_3.2.0-109.150 linux-image-3.2.0-109-highbank_3.2.0-109.150 linux-image-3.2.0-109-generic-pae_3.2.0-109.150
185395 - Ubuntu Linux 12.04 USN-3072-2 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2016-5244, CVE-2016-5696, CVE-2016-5829
Description The scan detected that the host is missing the following update: USN-3072-2
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003544.html
Ubuntu 12.04 linux-image-3.2.0-1487-omap4_3.2.0-1487.114
185396 - Ubuntu Linux 14.04, 16.04 USN-3067-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2015-8947, CVE-2016-2052
Description The scan detected that the host is missing the following update: USN-3067-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003538.html
Ubuntu 14.04 libharfbuzz0b_0.9.27-1ubuntu1.1
Ubuntu 16.04 libharfbuzz0b_1.0.1-1ubuntu0.1
185397 - Ubuntu Linux 16.04 USN-3070-3 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2016-1237, CVE-2016-5244, CVE-2016-5400, CVE-2016-5696, CVE-2016-5728, CVE-2016-5828, CVE-2016-5829, CVE- 2016-6197
Description The scan detected that the host is missing the following update: USN-3070-3
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003547.html
Ubuntu 16.04 linux-image-4.4.0-1024-snapdragon_4.4.0-1024.27
185398 - Ubuntu Linux 12.04 USN-3071-2 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2016-5244, CVE-2016-5696, CVE-2016-5728, CVE-2016-5828, CVE-2016-5829
Description The scan detected that the host is missing the following update: USN-3071-2
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003543.html
Ubuntu 12.04 linux-image-3.13.0-95-generic_3.13.0-95.142~precise1 linux-image-3.13.0-95-generic-lpae_3.13.0-95.142~precise1
185399 - Ubuntu Linux 16.04 USN-3070-2 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2016-1237, CVE-2016-5244, CVE-2016-5400, CVE-2016-5696, CVE-2016-5728, CVE-2016-5828, CVE-2016-5829, CVE- 2016-6197
Description The scan detected that the host is missing the following update: USN-3070-2
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003546.html
Ubuntu 16.04 linux-image-4.4.0-1021-raspi2_4.4.0-1021.27
185400 - Ubuntu Linux 14.04 USN-3071-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2016-5244, CVE-2016-5696, CVE-2016-5728, CVE-2016-5828, CVE-2016-5829
Description The scan detected that the host is missing the following update: USN-3071-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003542.html
Ubuntu 14.04 linux-image-3.13.0-95-powerpc-e500mc_3.13.0-95.142 linux-image-3.13.0-95-generic-lpae_3.13.0-95.142 linux-image-3.13.0-95-powerpc-smp_3.13.0-95.142 linux-image-3.13.0-95-generic_3.13.0-95.142 linux-image-3.13.0-95-lowlatency_3.13.0-95.142 linux-image-3.13.0-95-powerpc64-smp_3.13.0-95.142 linux-image-3.13.0-95-powerpc64-emb_3.13.0-95.142 linux-image-3.13.0-95-powerpc-e500_3.13.0-95.142
185402 - Ubuntu Linux 14.04 USN-3070-4 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2016-1237, CVE-2016-5244, CVE-2016-5400, CVE-2016-5696, CVE-2016-5728, CVE-2016-5828, CVE-2016-5829, CVE- 2016-6197
Description The scan detected that the host is missing the following update: USN-3070-4
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003548.html
Ubuntu 14.04 linux-image-4.4.0-36-powerpc-e500mc_4.4.0-36.55~14.04.1 linux-image-4.4.0-36-generic_4.4.0-36.55~14.04.1 linux-image-4.4.0-36-powerpc64-smp_4.4.0-36.55~14.04.1 linux-image-4.4.0-36-powerpc64-emb_4.4.0-36.55~14.04.1 linux-image-4.4.0-36-generic-lpae_4.4.0-36.55~14.04.1 linux-image-4.4.0-36-powerpc-smp_4.4.0-36.55~14.04.1 linux-image-4.4.0-36-lowlatency_4.4.0-36.55~14.04.1
191027 - Fedora Linux 24 FEDORA-2016-4728dfe3ec Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: High CVE: CVE-2016-4590, CVE-2016-4591, CVE-2016-4622, CVE-2016-4624
Description The scan detected that the host is missing the following update: FEDORA-2016-4728dfe3ec
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=2
Fedora Core 24 webkitgtk4-2.12.4-1.fc24
20455 - (HPSBHF03441) HPE iLO Multiple Vulnerabilities
Category: General Vulnerability Assessment -> NonIntrusive -> Web Server Risk Level: Medium CVE: CVE-2016-4375
Description Multiple vulnerabilities are present in some versions of HP Integrated Lights-Out.
Observation HP Integrated Lights-Out is a Hewlett-Packard proprietary embedded server management technology.
Multiple vulnerabilities are present in some versions of HP Integrated Lights-Out. The flaws lie in an unknown component. Successful exploitation could allow an attacker to execute remote code.
20463 - (VMSA-2016-0013) VMware vRealize Automation Multiple Vulnerabilities
Category: SSH Module -> NonIntrusive -> SSH Miscellaneous Risk Level: Medium CVE: CVE-2016-5335, CVE-2016-5336
Description Multiple vulnerabilities are present in some versions of VMware vRealize Automation.
Observation VMware vRealize Automation Identity Appliance integrates with VMware vCloud Suite and automates IT tasks.
Multiple vulnerabilities are present in some versions of VMware vRealize Automation. The flaws lie in unknown components of the product. Successful exploitation could allow an attacker to escalate its privileges or compromise a low-privileged account.
20468 - (SB10166) McAfee ePolicy Orchestrator Multiple Java Vulnerabilities
Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: Medium CVE: CVE-2016-3485, CVE-2016-3500, CVE-2016-3508
Description Multiple vulnerabilities are present in some versions of McAfee ePolicy Orchestrator.
Observation McAfee ePolicy Orchestrator (ePO) is widely acknowledged as the most advanced and scalable security management software.
Multiple vulnerabilities are present in some versions of McAfee ePolicy Orchestrator. The flaws lie in the Java component. Successful exploitation could allow an attacker to affect integrity and availability.
144823 - SuSE SLES 12 SP1, SLED 12 SP1 SUSE-SU-2016:2151-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: Medium CVE: CVE-2014-9512
Description The scan detected that the host is missing the following update: SUSE-SU-2016:2151-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002227.html
SuSE SLES 12 SP1 x86_64 rsync-debuginfo-3.1.0-9.3 rsync-3.1.0-9.3 rsync-debugsource-3.1.0-9.3
SuSE SLED 12 SP1 x86_64 rsync-debuginfo-3.1.0-9.3 rsync-3.1.0-9.3 rsync-debugsource-3.1.0-9.3
144837 - SuSE SLES 11 SP4 SUSE-SU-2016:2147-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-4051, CVE-2016-4554
Description The scan detected that the host is missing the following update: SUSE-SU-2016:2147-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002226.html
SuSE SLES 11 SP4 i586 squid-2.7.STABLE5-2.12.29.1 x86_64 squid-2.7.STABLE5-2.12.29.1
20461 - (SB10167) McAfee Web Gateway Linux Kernel Challenge ACK Counter Information Disclosure Vulnerability Category: SSH Module -> NonIntrusive -> SSH Miscellaneous Risk Level: Medium CVE: CVE-2016-5696
Description An information disclosure vulnerability is present in some versions of McAfee Web Gateway.
Observation McAfee Web Gateway is a web based security control system designed to prevent web application attacks.
An information disclosure vulnerability is present in some versions of McAfee Web Gateway. The flaw lies in Linux kernel. Successful exploitation could allow an attacker to hijack TCP connection and obtain communication traffic.
20462 - Splunk Enterprise Open Redirect Vulnerability
Category: General Vulnerability Assessment -> NonIntrusive -> Web Server Risk Level: Medium CVE: CVE-MAP-NOMATCH
Description An open redirect vulnerability is present in some versions of Splunk.
Observation Splunk Enterprise is an operational intelligence solution.
An open redirect vulnerability is present in some versions of Splunk. The flaw lies in Splunk Web. Successful exploitation could allow an attacker to redirect a user to an attacker controlled website.
20465 - SSL/TLS Protocol Triple-DES Information Disclosure Vulnerability
Category: General Vulnerability Assessment -> NonIntrusive -> Miscellaneous Risk Level: Medium CVE: CVE-2016-2183
Description An information disclosure vulnerability is present in some versions of TLS/SSL implementations.
Observation TLS/SSL is a secure communications protocol.
An information disclosure vulnerability is present in some versions of TLS/SSL implementations. The flaw lies in 3DES cipher suites. Successful exploitation could allow an attacker to recover encrypted plain texts.
130571 - Debian Linux 8.0 DSA-3654-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Debian Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-4036, CVE-2016-4049
Description The scan detected that the host is missing the following update: DSA-3654-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.debian.org/security/2016/dsa-3654
Debian 8.0 all quagga_0.99.23.1-1+deb8u2
160140 - CentOS 6 CESA-2016-1664 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Cent OS Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-5696
Description The scan detected that the host is missing the following update: CESA-2016-1664
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.centos.org/pipermail/centos-announce/2016-August/022053.html
CentOS 6 i686 python-perf-2.6.32-642.4.2.el6 kernel-debug-2.6.32-642.4.2.el6 perf-2.6.32-642.4.2.el6 kernel-headers-2.6.32-642.4.2.el6 kernel-debug-devel-2.6.32-642.4.2.el6 kernel-2.6.32-642.4.2.el6 kernel-devel-2.6.32-642.4.2.el6 noarch kernel-abi-whitelists-2.6.32-642.4.2.el6 kernel-doc-2.6.32-642.4.2.el6 kernel-firmware-2.6.32-642.4.2.el6 x86_64 python-perf-2.6.32-642.4.2.el6 kernel-debug-2.6.32-642.4.2.el6 perf-2.6.32-642.4.2.el6 kernel-headers-2.6.32-642.4.2.el6 kernel-debug-devel-2.6.32-642.4.2.el6 kernel-2.6.32-642.4.2.el6 kernel-devel-2.6.32-642.4.2.el6
182103 - FreeBSD kdelibs Directory Traversal Vulnerability (4472ab39-6c66-11e6-9ca5-50e549ebab6c)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-6232 Description The scan detected that the host is missing the following update: kdelibs -- directory traversal vulnerability (4472ab39-6c66-11e6-9ca5-50e549ebab6c)
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/4472ab39-6c66-11e6-9ca5-50e549ebab6c.html
Affected packages: kdelibs < 4.14.10_7
144831 - SuSE Linux 13.2 openSUSE-SU-2016:2169-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: Medium CVE: CVE-2013-7073, CVE-2014-9508, CVE-2015-2047
Description The scan detected that the host is missing the following update: openSUSE-SU-2016:2169-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html
SuSE Linux 13.2 noarch typo3-cms-4_5-4.5.40-2.3.1
144833 - SuSE SLES 12 SP1, SLED 12 SP1 SUSE-SU-2016:2190-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-5384
Description The scan detected that the host is missing the following update: SUSE-SU-2016:2190-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002242.html
SuSE SLES 12 SP1 x86_64 fontconfig-debuginfo-2.11.0-6.1 fontconfig-32bit-2.11.0-6.1 fontconfig-debugsource-2.11.0-6.1 fontconfig-2.11.0-6.1 fontconfig-debuginfo-32bit-2.11.0-6.1
SuSE SLED 12 SP1 x86_64 fontconfig-debuginfo-2.11.0-6.1 fontconfig-32bit-2.11.0-6.1 fontconfig-debugsource-2.11.0-6.1 fontconfig-2.11.0-6.1 fontconfig-debuginfo-32bit-2.11.0-6.1
144836 - SuSE SLES 11 SP4 SUSE-SU-2016:2186-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-5384
Description The scan detected that the host is missing the following update: SUSE-SU-2016:2186-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002238.html
SuSE SLES 11 SP4 i586 fontconfig-2.6.0-10.19.1 x86_64 fontconfig-2.6.0-10.19.1 fontconfig-32bit-2.6.0-10.19.1
88801 - Slackware Linux 14.1 SSA:2016-242-01 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Slackware Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5389
Description The scan detected that the host is missing the following update: SSA:2016-242-01
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.650340
Slackware 14.1 i686 kernel-generic-smp-3.10.103_smp-i686-1 kernel-modules-smp-3.10.103_smp-i686-1 kernel-huge-smp-3.10.103_smp-i686-1 noarch kernel-source-3.10.103-noarch-1 kernel-source-3.10.103_smp-noarch-1 x86_64 kernel-generic-3.10.103-x86_64-1 kernel-huge-3.10.103-x86_64-1 kernel-modules-3.10.103-x86_64-1
130567 - Debian Linux 8.0 DSA-3653-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Debian Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6354
Description The scan detected that the host is missing the following update: DSA-3653-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.debian.org/security/2016/dsa-3653
Debian 8.0 all flex_2.5.39-8+deb8u1
130569 - Debian Linux 8.0 DSA-3655-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Debian Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6265, CVE-2016-6525
Description The scan detected that the host is missing the following update: DSA-3655-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.debian.org/security/2016/dsa-3655
Debian 8.0 all mupdf_1.5-1+deb8u1
130570 - Debian Linux 8.0 DSA-3651-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Debian Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6316 Description The scan detected that the host is missing the following update: DSA-3651-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.debian.org/security/2016/dsa-3651
Debian 8.0 all rails_2:4.1.8-1+deb8u4
182102 - FreeBSD mailman CSRF Protection Enhancements (b11ab01b-6e19-11e6-ab24-080027ef73ec)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6893
Description The scan detected that the host is missing the following update: mailman -- CSRF protection enhancements (b11ab01b-6e19-11e6-ab24-080027ef73ec)
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/b11ab01b-6e19-11e6-ab24-080027ef73ec.html
Affected packages: mailman < 2.1.23
185401 - Ubuntu Linux 12.04, 14.04, 16.04 USN-3069-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6855
Description The scan detected that the host is missing the following update: USN-3069-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003540.html
Ubuntu 12.04 eog_3.4.2-0ubuntu1.3
Ubuntu 16.04 eog_3.18.2-1ubuntu2.1
Ubuntu 14.04 eog_3.10.2-0ubuntu5.2
191021 - Fedora Linux 24 FEDORA-2016-b4919ffe56 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6317
Description The scan detected that the host is missing the following update: FEDORA-2016-b4919ffe56
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 24 rubygem-activerecord-4.2.5.2-2.fc24 rubygem-actionpack-4.2.5.2-3.fc24
191022 - Fedora Linux 25 FEDORA-2016-2a64a1a329 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-2a64a1a329
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=2
Fedora Core 25 ganglia-3.7.2-10.fc25
191023 - Fedora Linux 25 FEDORA-2016-5760339e76 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6316, CVE-2016-6317
Description The scan detected that the host is missing the following update: FEDORA-2016-5760339e76
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=4
Fedora Core 25 rubygem-activesupport-5.0.0.1-1.fc25 rubygem-rails-5.0.0.1-1.fc25 rubygem-activerecord-5.0.0.1-1.fc25 rubygem-railties-5.0.0.1-2.fc25 rubygem-actionmailer-5.0.0.1-1.fc25 rubygem-activejob-5.0.0.1-1.fc25 rubygem-actionpack-5.0.0.1-2.fc25 rubygem-activemodel-5.0.0.1-1.fc25 rubygem-actioncable-5.0.0.1-1.fc25 rubygem-actionview-5.0.0.1-2.fc25
191024 - Fedora Linux 23 FEDORA-2016-ab8bf51cf3 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6316
Description The scan detected that the host is missing the following update: FEDORA-2016-ab8bf51cf3
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=5
Fedora Core 23 rubygem-actionview-4.2.3-6.fc23
191025 - Fedora Linux 24 FEDORA-2016-5abbc35b6a Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6855
Description The scan detected that the host is missing the following update: FEDORA-2016-5abbc35b6a
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=6
Fedora Core 24 eog-3.20.4-1.fc24
191026 - Fedora Linux 24 FEDORA-2016-92a3655b70 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5404
Description The scan detected that the host is missing the following update: FEDORA-2016-92a3655b70
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 24 freeipa-4.3.2-2.fc24
191028 - Fedora Linux 25 FEDORA-2016-417ceefc85 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6264
Description The scan detected that the host is missing the following update: FEDORA-2016-417ceefc85
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=4
Fedora Core 25 uClibc-0.9.33.2-11.fc25
191029 - Fedora Linux 25 FEDORA-2016-57cba655d5 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6323
Description The scan detected that the host is missing the following update: FEDORA-2016-57cba655d5
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=4
Fedora Core 25 glibc-2.24-3.fc25
191030 - Fedora Linux 25 FEDORA-2016-663608c5bb Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-1000110
Description The scan detected that the host is missing the following update: FEDORA-2016-663608c5bb
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=2
Fedora Core 25 python-2.7.12-3.fc25
191031 - Fedora Linux 24 FEDORA-2016-53cc023dd6 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6264
Description The scan detected that the host is missing the following update: FEDORA-2016-53cc023dd6
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=2
Fedora Core 24 uClibc-0.9.33.2-10.fc24
191032 - Fedora Linux 23 FEDORA-2016-f734302c3f Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-f734302c3f
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 23 borgbackup-1.0.7-1.fc23
191033 - Fedora Linux 24 FEDORA-2016-7810e24465 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6329
Description The scan detected that the host is missing the following update: FEDORA-2016-7810e24465
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=5
Fedora Core 24 openvpn-2.3.12-1.fc24
191034 - Fedora Linux 25 FEDORA-2016-81d6e6a9ac Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6329
Description The scan detected that the host is missing the following update: FEDORA-2016-81d6e6a9ac
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 25 openvpn-2.3.12-1.fc25
191035 - Fedora Linux 23 FEDORA-2016-0f8779baa6 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6855
Description The scan detected that the host is missing the following update: FEDORA-2016-0f8779baa6
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=5
Fedora Core 23 eog-3.18.3-1.fc23
191036 - Fedora Linux 25 FEDORA-2016-2bb049dda6 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-2bb049dda6
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=2
Fedora Core 25 filezilla-3.21.0-1.fc25
191037 - Fedora Linux 25 FEDORA-2016-f56c765d67 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5404
Description The scan detected that the host is missing the following update: FEDORA-2016-f56c765d67
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=4
Fedora Core 25 freeipa-4.3.2-2.fc25
191038 - Fedora Linux 25 FEDORA-2016-bcf95f3847 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-bcf95f3847
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 25 java-1.8.0-openjdk-aarch32-1.8.0.102-1.160812.fc25
191039 - Fedora Linux 25 FEDORA-2016-4820585b11 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-4820585b11
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 25 borgbackup-1.0.7-1.fc25
191040 - Fedora Linux 25 FEDORA-2016-b66a0aef08 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6313 Description The scan detected that the host is missing the following update: FEDORA-2016-b66a0aef08
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=4
Fedora Core 25 libgcrypt-1.6.6-1.fc25
191041 - Fedora Linux 24 FEDORA-2016-24c2453d6c Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-24c2453d6c
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=5
Fedora Core 24 mingw-lcms2-2.8-2.fc24
191042 - Fedora Linux 25 FEDORA-2016-bc8647110a Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-bc8647110a
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=4
Fedora Core 25 lcms2-2.8-2.fc25 191043 - Fedora Linux 23 FEDORA-2016-f58d7ecc8a Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6317
Description The scan detected that the host is missing the following update: FEDORA-2016-f58d7ecc8a
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 23 rubygem-actionpack-4.2.3-6.fc23 rubygem-activerecord-4.2.3-3.fc23
191044 - Fedora Linux 24 FEDORA-2016-0d9890f7b5 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6316
Description The scan detected that the host is missing the following update: FEDORA-2016-0d9890f7b5
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=5
Fedora Core 24 rubygem-actionview-4.2.5.2-3.fc24
191045 - Fedora Linux 24 FEDORA-2016-c07d18b2a5 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-c07d18b2a5
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 24 java-1.8.0-openjdk-aarch32-1.8.0.102-1.160812.fc24
191046 - Fedora Linux 24 FEDORA-2016-9864953aa3 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6313
Description The scan detected that the host is missing the following update: FEDORA-2016-9864953aa3
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=5
Fedora Core 24 gnupg-1.4.21-1.fc24
191047 - Fedora Linux 25 FEDORA-2016-7f0fb9b38d Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6171
Description The scan detected that the host is missing the following update: FEDORA-2016-7f0fb9b38d
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=3
Fedora Core 25 knot-2.3.0-2.fc25
191048 - Fedora Linux 25 FEDORA-2016-aab0a156ab Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6313
Description The scan detected that the host is missing the following update: FEDORA-2016-aab0a156ab
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 25 gnupg-1.4.21-1.fc25
191049 - Fedora Linux 25 FEDORA-2016-a2b4a9589e Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-a2b4a9589e
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 25 canl-c-2.1.7-1.fc25
191050 - Fedora Linux 24 FEDORA-2016-1ebd9e116b Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-1ebd9e116b
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=2
Fedora Core 24 lcms2-2.8-2.fc24
191051 - Fedora Linux 23 FEDORA-2016-7898627d08 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5404
Description The scan detected that the host is missing the following update: FEDORA-2016-7898627d08
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 23 freeipa-4.2.4-2.fc23
191052 - Fedora Linux 25 FEDORA-2016-0f8e794de0 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-0f8e794de0
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=4
Fedora Core 25 mingw-lcms2-2.8-2.fc25
191053 - Fedora Linux 25 FEDORA-2016-765bb26915 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5423, CVE-2016-5424
Description The scan detected that the host is missing the following update: FEDORA-2016-765bb26915
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=3
Fedora Core 25 postgresql-9.5.4-1.fc25
191054 - Fedora Linux 24 FEDORA-2016-20014bf2bd Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: FEDORA-2016-20014bf2bd
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=1
Fedora Core 24 borgbackup-1.0.7-1.fc24
191055 - Fedora Linux 25 FEDORA-2016-c843c68c77 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: Low CVE: CVE-2016-1000110
Description The scan detected that the host is missing the following update: FEDORA-2016-c843c68c77
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2016/8/?count=200&page=2
Fedora Core 25 python3-3.5.1-15.fc25
144834 - SuSE SLES 11 SP4 SUSE-SU-2016:2146-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: Low CVE: CVE-2015-8872, CVE-2016-4804
Description The scan detected that the host is missing the following update: SUSE-SU-2016:2146-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002225.html
SuSE SLES 11 SP4 i586 dosfstools-3.0.26-3.1 x86_64 dosfstools-3.0.26-3.1
144838 - SuSE SLES 12 SP1, SLED 12 SP1 SUSE-SU-2016:2145-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: Low CVE: CVE-2015-8872, CVE-2016-4804
Description The scan detected that the host is missing the following update: SUSE-SU-2016:2145-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002224.html
SuSE SLES 12 SP1 x86_64 dosfstools-debugsource-3.0.26-6.5 dosfstools-debuginfo-3.0.26-6.5 dosfstools-3.0.26-6.5
SuSE SLED 12 SP1 x86_64 dosfstools-debugsource-3.0.26-6.5 dosfstools-debuginfo-3.0.26-6.5 dosfstools-3.0.26-6.5
ENHANCED CHECKS
The following checks have been updated. Enhancements may include optimizations, changes that reflect new information on a vulnerability and anything else that improves upon an existing FSL check. 20326 - (APSB16-26) Vulnerabilities In Adobe Reader And Acrobat
Category: Windows Host Assessment -> Adobe Patches Only (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE- 2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4209, CVE-2016-4210, CVE-2016-4211, CVE-2016-4212, CVE-2016- 4213, CVE-2016-4214, CVE-2016-4215, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4255, CVE- 2016-4265, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, CVE-2016-4269, CVE-2016-4270
Update Details CVE is updated
160138 - CentOS 7 CESA-2016-1633 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Cent OS Patches and Hotfixes Risk Level: High CVE: CVE-2016-5696
Update Details CVE is updated
160137 - CentOS 6, 7 CESA-2016-1626 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Cent OS Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-0772, CVE-2016-1000110, CVE-2016-5699
Update Details CVE is updated
70086 - oracle.fasl3.inc
Category: General Vulnerability Assessment -> NonIntrusive -> Invalid Category Risk Level: Informational CVE: CVE-MAP-NOMATCH
Update Details FASLScript is updated
70087 - hp.fasl3.inc
Category: General Vulnerability Assessment -> NonIntrusive -> Invalid Category Risk Level: Informational CVE: CVE-MAP-NOMATCH
Update Details FASLScript is updated
HOW TO UPDATE
FS1000 APPLIANCE customers should follow the instructions for Enterprise/Professional customers, below. In addition, we strongly urge all appliance customers to authorize and install any Windows Update critical patches. The appliance will auto-download any critical updates but will wait for your explicit authorization before installing.
FOUNDSTONE ENTERPRISE and PROFESSIONAL customers may obtain these new scripts using the FSUpdate Utility by selecting "FoundScan Update" on the help menu. Make sure that you have a valid FSUpdate username and password. The new vulnerability scripts will be automatically included in your scans if you have selected that option by right-clicking the selected vulnerability category and checking the "Run New Checks" checkbox.
MANAGED SERVICE CUSTOMERS already have the newest update applied to their environment. The new vulnerability scripts will be automatically included when your scans are next scheduled, provided the Run New Scripts option has been turned on. MCAFEE TECHNICAL SUPPORT
ServicePortal: https://mysupport.mcafee.com Multi-National Phone Support available here: http://www.mcafee.com/us/about/contact/index.html Non-US customers - Select your country from the list of Worldwide Offices.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review or distribution by others is strictly prohibited. If you are not the intended recipient please contact the sender and delete all copies.
Copyright 2016 McAfee, Inc. McAfee is a registered trademark of McAfee, Inc. and/or its affiliates