Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.108926
Category:Web application abuses
Title:Western Digital My Cloud Multiple Products < 2.12.127 / 2.20 - 2.30 < 2.31.149 Multiple Vulnerabilities
Summary:Multiple Western Digital My Cloud products are prone to multiple; vulnerabilities.
Description:Summary:
Multiple Western Digital My Cloud products are prone to multiple
vulnerabilities.

Vulnerability Insight:
The following issues have been addressed:

- Resolved multiple command injection vulnerabilities including CVE-2016-10108 and CVE-2016-10107

- Resolved multiple cross site request forgery (CSRF) vulnerabilities

- Resolved a Linux kernel Dirty Cow vulnerability (CVE-2016-5195)

- Resolved multiple denial-of-service vulnerabilities

- Improved security by disabling SSH shadow information

- Resolved a buffer overflow issue that could lead to unauthenticated access

- Resolved a click-jacking vulnerability in the webinterface

- Resolved multiple security issues in the Webfile viewer on-devic eapp

- Improved the security of volume mount options

- Resolved multiple security issues in the EULA onboarding flow

- Resolved leakage of debug messages in the webinterface

- Improved credential handling for the remote MyCloud-to-MyCloud backup feature

- Improved credential handling for upload-logs-to-support option

Additionally the following components received an update containing security fixes:

- Apache v2.4.34 (CVE-2018-1301, CVE-2018-1302, CVE-2018-1303, CVE-2018-1312, CVE-2017-15715)

- PHP v5.4.45 (CVE-2015-6834, CVE-2015-6835, CVE-2015-6836, CVE-2015-6837, CVE-2015-6838,
CVE-2014-9767)

- OpenSSH v7.5p1

- OpenSSL v1.0.1u

- libupnp v1.6.25 (CVE-2012-5958)

- jQuery v3.3.1 (CVE-2010-5312)

- Rsync v3.1.3 (CVE-2018-5764)

Affected Software/OS:
Western Digital My Cloud with firmware versions prior to
2.12.127 and 2.2 - 2.3 versions prior to 2.31.149.

Solution:
Update to firmware version 2.12.127, 2.31.149 or later.

Note: Some My Cloud products are already end-of-life and doesn't receive any updates anymore.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-10108
BugTraq ID: 95200
http://www.securityfocus.com/bid/95200
http://packetstormsecurity.com/files/173802/Western-Digital-MyCloud-Unauthenticated-Command-Injection.html
https://www.stevencampbell.info/2016/12/command-injection-in-western-digital-mycloud-nas/
Common Vulnerability Exposure (CVE) ID: CVE-2016-10107
BugTraq ID: 95201
http://www.securityfocus.com/bid/95201
Common Vulnerability Exposure (CVE) ID: CVE-2016-5195
BugTraq ID: 93793
http://www.securityfocus.com/bid/93793
Bugtraq: 20161020 [CVE-2016-5195] "Dirty COW" Linux privilege escalation vulnerability (Google Search)
http://www.securityfocus.com/archive/1/539611/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded
Bugtraq: 20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege (Google Search)
http://www.securityfocus.com/archive/1/540252/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded
Bugtraq: 20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege (Google Search)
http://www.securityfocus.com/archive/1/540344/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded
Bugtraq: 20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege (Google Search)
http://www.securityfocus.com/archive/1/540736/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded
CERT/CC vulnerability note: VU#243144
https://www.kb.cert.org/vuls/id/243144
Cisco Security Advisory: 20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux
Cisco Security Advisory: 20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd
Debian Security Information: DSA-3696 (Google Search)
http://www.debian.org/security/2016/dsa-3696
https://www.exploit-db.com/exploits/40611/
https://www.exploit-db.com/exploits/40616/
https://www.exploit-db.com/exploits/40839/
https://www.exploit-db.com/exploits/40847/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/
http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html
http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html
http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html
http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html
http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html
http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html
https://dirtycow.ninja
https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026
http://www.openwall.com/lists/oss-security/2016/10/21/1
http://www.openwall.com/lists/oss-security/2016/10/26/7
http://www.openwall.com/lists/oss-security/2016/10/27/13
http://www.openwall.com/lists/oss-security/2016/10/30/1
http://www.openwall.com/lists/oss-security/2016/11/03/7
http://www.openwall.com/lists/oss-security/2022/03/07/1
http://www.openwall.com/lists/oss-security/2022/08/08/1
http://www.openwall.com/lists/oss-security/2022/08/08/2
http://www.openwall.com/lists/oss-security/2022/08/08/7
http://www.openwall.com/lists/oss-security/2022/08/08/8
http://www.openwall.com/lists/oss-security/2022/08/09/4
http://www.openwall.com/lists/oss-security/2022/08/15/1
RedHat Security Advisories: RHSA-2016:2098
http://rhn.redhat.com/errata/RHSA-2016-2098.html
RedHat Security Advisories: RHSA-2016:2105
http://rhn.redhat.com/errata/RHSA-2016-2105.html
RedHat Security Advisories: RHSA-2016:2106
http://rhn.redhat.com/errata/RHSA-2016-2106.html
RedHat Security Advisories: RHSA-2016:2107
http://rhn.redhat.com/errata/RHSA-2016-2107.html
RedHat Security Advisories: RHSA-2016:2110
http://rhn.redhat.com/errata/RHSA-2016-2110.html
RedHat Security Advisories: RHSA-2016:2118
http://rhn.redhat.com/errata/RHSA-2016-2118.html
RedHat Security Advisories: RHSA-2016:2120
http://rhn.redhat.com/errata/RHSA-2016-2120.html
RedHat Security Advisories: RHSA-2016:2124
http://rhn.redhat.com/errata/RHSA-2016-2124.html
RedHat Security Advisories: RHSA-2016:2126
http://rhn.redhat.com/errata/RHSA-2016-2126.html
RedHat Security Advisories: RHSA-2016:2127
http://rhn.redhat.com/errata/RHSA-2016-2127.html
RedHat Security Advisories: RHSA-2016:2128
http://rhn.redhat.com/errata/RHSA-2016-2128.html
RedHat Security Advisories: RHSA-2016:2132
http://rhn.redhat.com/errata/RHSA-2016-2132.html
RedHat Security Advisories: RHSA-2016:2133
http://rhn.redhat.com/errata/RHSA-2016-2133.html
RedHat Security Advisories: RHSA-2017:0372
https://access.redhat.com/errata/RHSA-2017:0372
http://www.securitytracker.com/id/1037078
SuSE Security Announcement: SUSE-SU-2016:2585 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html
SuSE Security Announcement: SUSE-SU-2016:2592 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html
SuSE Security Announcement: SUSE-SU-2016:2593 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html
SuSE Security Announcement: SUSE-SU-2016:2596 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html
SuSE Security Announcement: SUSE-SU-2016:2614 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html
SuSE Security Announcement: SUSE-SU-2016:2629 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html
SuSE Security Announcement: SUSE-SU-2016:2630 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html
SuSE Security Announcement: SUSE-SU-2016:2631 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html
SuSE Security Announcement: SUSE-SU-2016:2632 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html
SuSE Security Announcement: SUSE-SU-2016:2633 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html
SuSE Security Announcement: SUSE-SU-2016:2634 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html
SuSE Security Announcement: SUSE-SU-2016:2635 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html
SuSE Security Announcement: SUSE-SU-2016:2636 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html
SuSE Security Announcement: SUSE-SU-2016:2637 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html
SuSE Security Announcement: SUSE-SU-2016:2638 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html
SuSE Security Announcement: SUSE-SU-2016:2655 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html
SuSE Security Announcement: SUSE-SU-2016:2657 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html
SuSE Security Announcement: SUSE-SU-2016:2658 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html
SuSE Security Announcement: SUSE-SU-2016:2659 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html
SuSE Security Announcement: SUSE-SU-2016:2673 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html
SuSE Security Announcement: SUSE-SU-2016:3069 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html
SuSE Security Announcement: SUSE-SU-2016:3304 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html
SuSE Security Announcement: openSUSE-SU-2016:2583 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html
SuSE Security Announcement: openSUSE-SU-2016:2584 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html
SuSE Security Announcement: openSUSE-SU-2016:2625 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html
SuSE Security Announcement: openSUSE-SU-2016:2649 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html
SuSE Security Announcement: openSUSE-SU-2020:0554 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html
http://www.ubuntu.com/usn/USN-3104-1
http://www.ubuntu.com/usn/USN-3104-2
http://www.ubuntu.com/usn/USN-3105-1
http://www.ubuntu.com/usn/USN-3105-2
http://www.ubuntu.com/usn/USN-3106-1
http://www.ubuntu.com/usn/USN-3106-2
http://www.ubuntu.com/usn/USN-3106-3
http://www.ubuntu.com/usn/USN-3106-4
http://www.ubuntu.com/usn/USN-3107-1
http://www.ubuntu.com/usn/USN-3107-2
Common Vulnerability Exposure (CVE) ID: CVE-2012-5958
BugTraq ID: 57602
http://www.securityfocus.com/bid/57602
CERT/CC vulnerability note: VU#922681
http://www.kb.cert.org/vuls/id/922681
Cisco Security Advisory: 20130129 Portable SDK for UPnP Devices Contains Buffer Overflow Vulnerabilities
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp
Debian Security Information: DSA-2614 (Google Search)
http://www.debian.org/security/2013/dsa-2614
Debian Security Information: DSA-2615 (Google Search)
http://www.debian.org/security/2013/dsa-2615
http://www.mandriva.com/security/advisories?name=MDVSA-2013:098
http://packetstormsecurity.com/files/160242/libupnp-1.6.18-Denial-Of-Service.html
https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play
https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf
https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb
https://www.tenable.com/security/research/tra-2017-10
SuSE Security Announcement: openSUSE-SU-2013:0255 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-02/msg00013.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-5312
1037035
http://www.securitytracker.com/id/1037035
71106
http://www.securityfocus.com/bid/71106
DSA-3249
http://www.debian.org/security/2015/dsa-3249
FEDORA-2022-9d655503ea
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/
FEDORA-2022-bf18450366
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/
RHSA-2015:0442
http://rhn.redhat.com/errata/RHSA-2015-0442.html
RHSA-2015:1462
http://rhn.redhat.com/errata/RHSA-2015-1462.html
[debian-lts-announce] 20220119 [SECURITY] [DLA-2889-1] drupal7 security update
https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html
[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E
[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E
[oss-security] 20141114 Re: old CVE assignments for JQuery 1.10.0
http://seclists.org/oss-sec/2014/q4/616
[oss-security] 20141114 old CVE assignments for JQuery 1.10.0
http://seclists.org/oss-sec/2014/q4/613
http://bugs.jqueryui.com/ticket/6016
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3
https://security.netapp.com/advisory/ntap-20190416-0007/
https://www.drupal.org/sa-core-2022-002
jqueryui-cve20105312-xss(98696)
https://exchange.xforce.ibmcloud.com/vulnerabilities/98696
Common Vulnerability Exposure (CVE) ID: CVE-2018-1301
BugTraq ID: 103515
http://www.securityfocus.com/bid/103515
Debian Security Information: DSA-4164 (Google Search)
https://www.debian.org/security/2018/dsa-4164
https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
http://www.openwall.com/lists/oss-security/2018/03/24/2
RedHat Security Advisories: RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2018:3558
RedHat Security Advisories: RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0366
RedHat Security Advisories: RHSA-2019:0367
https://access.redhat.com/errata/RHSA-2019:0367
http://www.securitytracker.com/id/1040573
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://usn.ubuntu.com/3937-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-1302
BugTraq ID: 103528
http://www.securityfocus.com/bid/103528
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
http://www.openwall.com/lists/oss-security/2018/03/24/5
http://www.securitytracker.com/id/1040567
https://usn.ubuntu.com/3783-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-1303
BugTraq ID: 103522
http://www.securityfocus.com/bid/103522
http://www.openwall.com/lists/oss-security/2018/03/24/3
http://www.securitytracker.com/id/1040572
Common Vulnerability Exposure (CVE) ID: CVE-2018-1312
BugTraq ID: 103524
http://www.securityfocus.com/bid/103524
http://www.openwall.com/lists/oss-security/2018/03/24/7
RedHat Security Advisories: RHSA-2019:1898
https://access.redhat.com/errata/RHSA-2019:1898
http://www.securitytracker.com/id/1040571
Common Vulnerability Exposure (CVE) ID: CVE-2017-15715
BugTraq ID: 103525
http://www.securityfocus.com/bid/103525
https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
http://www.openwall.com/lists/oss-security/2018/03/24/6
http://www.securitytracker.com/id/1040570
Common Vulnerability Exposure (CVE) ID: CVE-2015-6834
BugTraq ID: 76649
http://www.securityfocus.com/bid/76649
Debian Security Information: DSA-3358 (Google Search)
http://www.debian.org/security/2015/dsa-3358
https://security.gentoo.org/glsa/201606-10
http://www.securitytracker.com/id/1033548
Common Vulnerability Exposure (CVE) ID: CVE-2015-6835
BugTraq ID: 76734
http://www.securityfocus.com/bid/76734
Common Vulnerability Exposure (CVE) ID: CVE-2015-6836
BugTraq ID: 76644
http://www.securityfocus.com/bid/76644
Common Vulnerability Exposure (CVE) ID: CVE-2015-6837
BugTraq ID: 76738
http://www.securityfocus.com/bid/76738
Common Vulnerability Exposure (CVE) ID: CVE-2015-6838
BugTraq ID: 76733
http://www.securityfocus.com/bid/76733
Common Vulnerability Exposure (CVE) ID: CVE-2014-9767
BugTraq ID: 76652
http://www.securityfocus.com/bid/76652
http://www.openwall.com/lists/oss-security/2016/03/16/20
RedHat Security Advisories: RHSA-2016:2750
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securitytracker.com/id/1035311
SuSE Security Announcement: SUSE-SU-2016:1145 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
SuSE Security Announcement: SUSE-SU-2016:1166 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
SuSE Security Announcement: openSUSE-SU-2016:1167 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
SuSE Security Announcement: openSUSE-SU-2016:1173 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
Common Vulnerability Exposure (CVE) ID: CVE-2018-5764
BugTraq ID: 102803
http://www.securityfocus.com/bid/102803
https://security.gentoo.org/glsa/201805-04
https://lists.debian.org/debian-lts-announce/2018/01/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00028.html
http://www.securitytracker.com/id/1040276
https://usn.ubuntu.com/3543-1/
CopyrightCopyright (C) 2020 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.