2925 lines
172 KiB
HTML
2925 lines
172 KiB
HTML
<!DOCTYPE html>
|
|
<html lang="en">
|
|
<head>
|
|
<title>Hyperclair report : jgsqware/ubuntu-git</title>
|
|
|
|
<link href='https://fonts.googleapis.com/css?family=Open+Sans:400,600,600italic,400italic,300italic,300' rel='stylesheet' type='text/css'>
|
|
<link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/font-awesome/4.6.1/css/font-awesome.min.css">
|
|
|
|
<style>
|
|
body {
|
|
font-family: 'Open Sans', sans-serif;
|
|
margin: 0;
|
|
padding: 0;
|
|
background: ghostwhite;
|
|
padding-bottom: 2em;
|
|
}
|
|
|
|
/* Typography */
|
|
|
|
.lead {
|
|
font-size: 1.4em;
|
|
}
|
|
|
|
/* global layout */
|
|
.container {
|
|
padding: 0 0;
|
|
}
|
|
|
|
.clearfix:after {
|
|
content:"";
|
|
display:block;
|
|
clear:both;
|
|
}
|
|
|
|
.row {
|
|
margin: 0 -20px;
|
|
}
|
|
|
|
.row:after {
|
|
display: block;
|
|
clear: both;
|
|
}
|
|
|
|
[class*="col-"] {
|
|
padding: 0 20px;
|
|
float: left;
|
|
box-sizing: border-box;
|
|
}
|
|
|
|
.col-6 {
|
|
width: 50%;
|
|
}
|
|
|
|
.panel {
|
|
/* padding: 1em; */
|
|
border-radius: 4px;
|
|
background: white;
|
|
box-shadow: 0px 1px 2px #e2e2e2;
|
|
}
|
|
|
|
.panel h2 {
|
|
margin-top: 0;
|
|
padding-bottom: .2em;
|
|
border-bottom: solid 1px gainsboro;
|
|
}
|
|
|
|
.panel :last-child {
|
|
margin-bottom: 0;
|
|
}
|
|
|
|
/* Header */
|
|
|
|
.app-header {
|
|
background: #2196F3;
|
|
color: white;
|
|
margin: 0 0px 0px 0px;
|
|
padding: 16px 20px;
|
|
box-shadow: 0 -2px 16px #263238;
|
|
position: relative;
|
|
}
|
|
|
|
.app-header h1 {
|
|
margin: 0;
|
|
font-weight: lighter;
|
|
text-transform: uppercase;
|
|
}
|
|
|
|
.app-intro {
|
|
padding: 20px;
|
|
text-align: center;
|
|
color: #263238;
|
|
background: rgba(255, 255, 255, .8);
|
|
border-bottom: solid 1px #ECEFF1;
|
|
}
|
|
|
|
.app-intro h2 {
|
|
font-size: 2em;
|
|
font-weight: lighter;
|
|
}
|
|
|
|
.summary {
|
|
line-height: .6em;
|
|
}
|
|
|
|
/* report */
|
|
|
|
.report {
|
|
margin-top: 20px;
|
|
}
|
|
|
|
.graph {
|
|
margin: 0 auto;
|
|
max-width: 960px;
|
|
margin-top: 30px;
|
|
}
|
|
|
|
/* Style of the graph */
|
|
.graph .node {
|
|
position: relative;
|
|
display: inline-block;
|
|
height: 24px;
|
|
width: 24px;
|
|
margin: 2px;
|
|
}
|
|
.graph .node .dot {
|
|
position: relative;
|
|
|
|
height: 24px;
|
|
width: 24px;
|
|
border-radius: 24px;
|
|
|
|
float: left;
|
|
|
|
background: gray;
|
|
|
|
/* box-shadow: 0 1px 2px rgba(0, 0, 0, .2);
|
|
border: solid 1px rgba(255, 255, 255, .2); */
|
|
}
|
|
|
|
.graph .node.High .dot {
|
|
background: #E91E63;
|
|
}
|
|
|
|
.graph .node.Medium .dot {
|
|
background: #FFA726;
|
|
}
|
|
|
|
.graph .node.Low .dot {
|
|
background: #8BC34A;
|
|
}
|
|
|
|
.graph .node .popup {
|
|
display: none;
|
|
|
|
width: 300px;
|
|
|
|
position: absolute;
|
|
bottom: 100%;
|
|
margin-bottom: 20px;
|
|
margin-left: -150px;
|
|
left: 2px;
|
|
|
|
background: white;
|
|
box-shadow: 0px 1px 2px rgba(0, 0, 0, .2);
|
|
|
|
padding: 10px;
|
|
border-radius: 4px;
|
|
/* border: solid 1px #e2e2e2; */
|
|
text-shadow: 0 0 0 transparent;
|
|
}
|
|
|
|
.graph .node .popup:after {
|
|
content: '';
|
|
position: absolute;
|
|
top: 100%;
|
|
left: 50%;
|
|
margin-left: -10px;
|
|
display: block;
|
|
width: 0;
|
|
height: 0;
|
|
border-width: 10px 10px 0 10px;
|
|
border-color: white transparent transparent transparent;
|
|
border-style: solid;
|
|
}
|
|
|
|
.graph .node .popup:before {
|
|
content: '';
|
|
position: absolute;
|
|
top: 100%;
|
|
left: 50%;
|
|
margin-left: -10px;
|
|
display: block;
|
|
width: 0;
|
|
height: 0;
|
|
border-width: 11px 11px 0 10px;
|
|
border-color: rgba(0, 0, 0, .2) transparent transparent transparent;
|
|
border-style: solid;
|
|
}
|
|
|
|
.graph .node .popup > div {
|
|
overflow: hidden;
|
|
text-overflow: ellipsis;
|
|
}
|
|
|
|
.graph .node:hover .dot {
|
|
opacity: .8;
|
|
}
|
|
|
|
.graph .node:hover .popup {
|
|
display: block;
|
|
max-height: 180px;
|
|
color: dimgray;
|
|
}
|
|
|
|
/* bars */
|
|
.bar-bg {
|
|
display: inline-block;
|
|
width: 240px;
|
|
height: 6px;
|
|
position: relative;
|
|
}
|
|
|
|
.bar-bar {
|
|
display: block;
|
|
position: absolute;
|
|
top: 0;
|
|
bottom: 0;
|
|
left: 0;
|
|
background: #E91E63;
|
|
border-radius: 2px;
|
|
}
|
|
|
|
.bar-bar.High {
|
|
background: #E91E63;
|
|
}
|
|
|
|
.bar-bar.Medium {
|
|
background: #FFA726;
|
|
}
|
|
|
|
.bar-bar.Low {
|
|
background: #8BC34A;
|
|
}
|
|
|
|
/* vulnerabilities */
|
|
.report {
|
|
margin: 18px auto;
|
|
max-width: 960px;
|
|
}
|
|
|
|
.report .vulnerabilities,
|
|
.report .features > ul {
|
|
margin: 0;
|
|
padding: 0;
|
|
}
|
|
|
|
.report .features > ul {
|
|
list-style: none;
|
|
}
|
|
|
|
.feature {
|
|
border-bottom: solid 1px #ECEFF1;
|
|
}
|
|
|
|
.feature:last-child {
|
|
border-color: #CFD8DC;
|
|
}
|
|
|
|
.feature__title {
|
|
padding: 1em;
|
|
}
|
|
|
|
.vulnerabilities {
|
|
padding-left: 2.6em !important;
|
|
}
|
|
|
|
.vulnerability {
|
|
padding-bottom: .8em;
|
|
padding-right: 2.2em;
|
|
}
|
|
|
|
.vulnerabilities .High .name {
|
|
color: #E91E63;
|
|
}
|
|
|
|
.vulnerabilities .Medium .name {
|
|
color: #FFA726;
|
|
}
|
|
|
|
.vulnerabilities .Low .name {
|
|
color: #8BC34A;
|
|
}
|
|
|
|
/* layers */
|
|
|
|
.layer .layer__title {
|
|
cursor: pointer;
|
|
padding: 1em;
|
|
border-bottom: solid 1px #CFD8DC;
|
|
color: #37474F;
|
|
margin: 0;
|
|
}
|
|
|
|
.layer .layer__title:hover {
|
|
background: #ECEFF1;
|
|
}
|
|
|
|
.layer.closed .features {
|
|
display: none;
|
|
}
|
|
|
|
</style>
|
|
</head>
|
|
<body>
|
|
<div class="container">
|
|
<header class="app-header">
|
|
<h1>Hyperclair report</h1>
|
|
</header>
|
|
|
|
<div class="app-intro clearfix">
|
|
<h2>Image: jgsqware/ubuntu-git</h2>
|
|
|
|
<section class="summary">
|
|
<div>
|
|
|
|
<p><span class="lead"><strong>Total : 76</strong></span></p>
|
|
<p>
|
|
<span style="display: inline-block; width: 120px;">Critical : <strong>1</strong></span>
|
|
<!--<span class="bar-bg">
|
|
<span class="bar-bar High" style="width: 1.32%"></span>
|
|
</span>-->
|
|
</p>
|
|
<p>
|
|
<span style="display: inline-block; width: 120px;">Medium : <strong>17</strong></span>
|
|
<!--<span class="bar-bg">
|
|
<span class="bar-bar Medium" style="width: 22.37%"></span>
|
|
</span>-->
|
|
</p>
|
|
<p>
|
|
<span style="display: inline-block; width: 120px;">Low : <strong>57</strong></span>
|
|
<!--<span class="bar-bg">
|
|
<span class="bar-bar Low" style="width: 75%"></span>
|
|
</span>-->
|
|
</p>
|
|
<span style="display: inline-block; width: 120px;">Negligible : <strong>1</strong></span>
|
|
<p>
|
|
</p>
|
|
|
|
</div>
|
|
</section>
|
|
|
|
<div class="graph">
|
|
|
|
<a class="node High" href="#CVE-2015-7547">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-7547</strong></div>
|
|
<div>High</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2015-8239">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8239</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>sudo:1.8.9p5-1ubuntu1.2</div>-->
|
|
<!--<div>race condition checking digests/checksums in sudoers</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2015-8605">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8605</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>isc-dhcp:4.2.4-7ubuntu12.3</div>-->
|
|
<!--<div>ISC DHCP 4.x before 4.1-ESV-R12-P1 and 4.2.x and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2015-8540">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8540</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>libpng:1.2.50-1ubuntu2.14.04.1</div>-->
|
|
<!--<div>underflow read in png_check_keyword in pngwutil.c</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2015-8472">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8472</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>libpng:1.2.50-1ubuntu2.14.04.1</div>-->
|
|
<!--<div>Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2015-5277">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-5277</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2015-7575">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-7575</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>gnutls26:2.12.23-12ubuntu2.3</div>-->
|
|
<!--<div>Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2016-3191">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-3191</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>pcre3:1:8.31-2ubuntu2.1</div>-->
|
|
<!--<div>The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2016-2842">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-2842</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>openssl:1.0.1f-1ubuntu2.16</div>-->
|
|
<!--<div>The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-0799.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2016-2037">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-2037</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>cpio:2.11+dfsg-1ubuntu1.1</div>-->
|
|
<!--<div>The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2015-7511">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-7511</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>libgcrypt11:1.5.3-2ubuntu4.2</div>-->
|
|
<!--<div>ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2011-5325">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2011-5325</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>busybox:1:1.21.0-1ubuntu1</div>-->
|
|
<!--<div>path traversal vulnerability in busybox tar</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2015-7978">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-7978</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>ntp:1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</div>-->
|
|
<!--<div>Stack exhaustion in recursive traversal of restriction list</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2015-7977">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-7977</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>ntp:1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</div>-->
|
|
<!--<div>reslist NULL pointer dereference</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2016-2381">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-2381</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>perl:5.18.2-2ubuntu1</div>-->
|
|
<!--<div>environment variable confusion</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2015-8138">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8138</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>ntp:1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</div>-->
|
|
<!--<div>ntp: missing check for zero originate timestamp</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2016-2781">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-2781</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>coreutils:8.21-1ubuntu5.3</div>-->
|
|
<!--<div>nonpriv session can escape to the parent session by using the TIOCSTI ioctl</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Medium" href="#CVE-2015-5602">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-5602</strong></div>
|
|
<div>Medium</div>
|
|
<!--<div>sudo:1.8.9p5-1ubuntu1.2</div>-->
|
|
<!--<div>sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-2583">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-2583</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pam:1.1.8-1ubuntu2</div>-->
|
|
<!--<div>Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create aribitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty funtion, which is used by the format_timestamp_name function.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-5276">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-5276</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>gcc-4.8:4.8.4-2ubuntu1~14.04</div>-->
|
|
<!--<div>The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-5044">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-5044</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>gcc-4.8:4.8.4-2ubuntu1~14.04</div>-->
|
|
<!--<div>Array memory allocations could cause an integer overflow and thus memory overflow issues at runtime.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-0245">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-0245</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>dbus:1.6.18-0ubuntu4.3</div>-->
|
|
<!--<div>D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-4330">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-4330</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>perl:5.18.2-2ubuntu1</div>-->
|
|
<!--<div>The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-0727">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-0727</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>ntp:1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</div>-->
|
|
<!--<div>NTP statsdir cleanup cronjob insecure</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8158">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8158</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>ntp:1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</div>-->
|
|
<!--<div>Potential Infinite Loop in ntpq</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-7973">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-7973</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>ntp:1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</div>-->
|
|
<!--<div>Deja Vu: Replay attack on authenticated broadcast mode</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8140">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8140</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>ntp:1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</div>-->
|
|
<!--<div>ntpq vulnerable to replay attacks</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8139">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8139</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>ntp:1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</div>-->
|
|
<!--<div>Origin Leak: ntpq and ntpdc, disclose origin</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-7976">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-7976</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>ntp:1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</div>-->
|
|
<!--<div>ntpq saveconfig command allows dangerous characters in filenames</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-7979">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-7979</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>ntp:1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</div>-->
|
|
<!--<div>Off-path Denial of Service (DoS) attack on authenticated broadcast mode</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2013-7422">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2013-7422</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>perl:5.18.2-2ubuntu1</div>-->
|
|
<!--<div>Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-2148">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-2148</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>busybox:1:1.21.0-1ubuntu1</div>-->
|
|
<!--<div>heap overflow in OPTION_6RD parsing</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-2147">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-2147</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>busybox:1:1.21.0-1ubuntu1</div>-->
|
|
<!--<div>OOB heap write due to integer underflow</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-7974">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-7974</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>ntp:1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</div>-->
|
|
<!--<div>NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-9621">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-9621</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>file:1:5.14-2ubuntu3.3</div>-->
|
|
<!--<div>The ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-9620">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-9620</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>file:1:5.14-2ubuntu3.3</div>-->
|
|
<!--<div>The ELF parser in file 5.08 through 5.21 allows remote attackers to cause a denial of service via a large number of notes.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-9653">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-9653</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>file:1:5.14-2ubuntu3.3</div>-->
|
|
<!--<div>readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-9645">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-9645</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>busybox:1:1.21.0-1ubuntu1</div>-->
|
|
<!--<div>modprobe wrongly accepts paths as module names</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-2667">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-2667</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>python3.4:3.4.3-1ubuntu1~14.04.3</div>-->
|
|
<!--<div>Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2013-4235">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2013-4235</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>shadow:1:4.1.5.1-1ubuntu9.1</div>-->
|
|
<!--<div>TOCTOU race conditions by copying and removing directory trees</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-0797">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-0797</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>openssl:1.0.1f-1ubuntu2.16</div>-->
|
|
<!--<div>Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2013-7041">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2013-7041</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pam:1.1.8-1ubuntu2</div>-->
|
|
<!--<div>The pam_userdb module for Pam uses a case-insensitive method to compare hashed passwords, which makes it easier for attackers to guess the password via a brute force attack.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-0702">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-0702</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>openssl:1.0.1f-1ubuntu2.16</div>-->
|
|
<!--<div>The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-0705">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-0705</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>openssl:1.0.1f-1ubuntu2.16</div>-->
|
|
<!--<div>Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-0798">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-0798</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>openssl:1.0.1f-1ubuntu2.16</div>-->
|
|
<!--<div>Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-0799">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-0799</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>openssl:1.0.1f-1ubuntu2.16</div>-->
|
|
<!--<div>The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-9114">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-9114</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>util-linux:2.20.1-5.1ubuntu20.7</div>-->
|
|
<!--<div>blkid command injection</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2013-0157">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2013-0157</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>util-linux:2.20.1-5.1ubuntu20.7</div>-->
|
|
<!--<div>(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8393">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8393</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pcre3:1:8.31-2ubuntu2.1</div>-->
|
|
<!--<div>pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8387">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8387</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pcre3:1:8.31-2ubuntu2.1</div>-->
|
|
<!--<div>PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8391">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8391</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pcre3:1:8.31-2ubuntu2.1</div>-->
|
|
<!--<div>The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-3238">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-3238</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pam:1.1.8-1ubuntu2</div>-->
|
|
<!--<div>The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8390">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8390</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pcre3:1:8.31-2ubuntu2.1</div>-->
|
|
<!--<div>PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8394">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8394</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pcre3:1:8.31-2ubuntu2.1</div>-->
|
|
<!--<div>PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-2328">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-2328</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pcre3:1:8.31-2ubuntu2.1</div>-->
|
|
<!--<div>PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8385">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8385</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pcre3:1:8.31-2ubuntu2.1</div>-->
|
|
<!--<div>PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8380">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8380</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pcre3:1:8.31-2ubuntu2.1</div>-->
|
|
<!--<div>The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8386">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8386</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pcre3:1:8.31-2ubuntu2.1</div>-->
|
|
<!--<div>PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8382">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8382</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>pcre3:1:8.31-2ubuntu2.1</div>-->
|
|
<!--<div>The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8778">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8778</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>hcreate((size_t)-1) should fail with ENOMEM</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-9761">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-9761</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>nan function unbounded stack allocation</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-5180">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-5180</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>DNS resolver NULL pointer dereference with crafted record type</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2013-2207">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2013-2207</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8776">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8776</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>Passing out of range data to strftime() causes a segfault</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8779">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8779</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>catopen() Multiple unbounded stack allocations</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-8625">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-8625</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>dpkg:1.17.5ubuntu5.5</div>-->
|
|
<!--<div>Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-2524">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-2524</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>readline6:6.3-4ubuntu2</div>-->
|
|
<!--<div>The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2014-8121">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2014-8121</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over the database, which triggers the file pointer to be reset.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-1781">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-1781</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-8777">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-8777</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-1234">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-1234</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>glob: buffer overflow with GLOB_ALTDIRFUNC due to incorrect NAME_MAX limit assumption</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-3075">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-3075</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>eglibc:2.19-0ubuntu6.6</div>-->
|
|
<!--<div>The getnetbyname implementation in nss_dns contains a potentially unbounded alloca call (in the form of a call to strdupa), leading to a stack overflow (stack exhaustion) and a crash if getnetbyname is invoked on a very long name.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2015-1197">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-1197</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>cpio:2.11+dfsg-1ubuntu1.1</div>-->
|
|
<!--<div>cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-2774">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-2774</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>isc-dhcp:4.2.4-7ubuntu12.3</div>-->
|
|
<!--<div>ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Low" href="#CVE-2016-2090">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2016-2090</strong></div>
|
|
<div>Low</div>
|
|
<!--<div>libbsd:0.6.0-2ubuntu1</div>-->
|
|
<!--<div>Heap buffer overflow in fgetwln function of libbsd</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
<a class="node Negligible" href="#CVE-2015-5186">
|
|
<div class="dot"></div>
|
|
<div class="popup">
|
|
<div><strong>CVE-2015-5186</strong></div>
|
|
<div>Negligible</div>
|
|
<!--<div>audit:1:2.3.2-2ubuntu1</div>-->
|
|
<!--<div>log terminal emulator escape sequences handling</div>-->
|
|
<div>sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</div>
|
|
</div>
|
|
</a>
|
|
|
|
</div>
|
|
</div>
|
|
|
|
<section class="report">
|
|
<div>
|
|
<div class="panel">
|
|
<div class="layers">
|
|
|
|
<div id="sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845" class="layer">
|
|
<h3 class="layer__title" data-toggle-layer="sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845">sha256:d89e1bee20d9cb344674e213b581f14fbd8e70274ecf9d10c514bab78a307845</h3>
|
|
<div></div>
|
|
<div class="features">
|
|
<ul>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>eglibc</strong> <span>2.19-0ubuntu6.6</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability High">
|
|
<a class="vulnerability__title" name="CVE-2015-7547"></a>
|
|
<strong class="name">CVE-2015-7547</strong>
|
|
<div>Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-7547" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2015-5277"></a>
|
|
<strong class="name">CVE-2015-5277</strong>
|
|
<div>The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-5277" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8778"></a>
|
|
<strong class="name">CVE-2015-8778</strong>
|
|
<div>hcreate((size_t)-1) should fail with ENOMEM</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8778" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2013-2207"></a>
|
|
<strong class="name">CVE-2013-2207</strong>
|
|
<div>pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2013-2207" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8776"></a>
|
|
<strong class="name">CVE-2015-8776</strong>
|
|
<div>Passing out of range data to strftime() causes a segfault</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8776" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8779"></a>
|
|
<strong class="name">CVE-2015-8779</strong>
|
|
<div>catopen() Multiple unbounded stack allocations</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8779" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-5180"></a>
|
|
<strong class="name">CVE-2015-5180</strong>
|
|
<div>DNS resolver NULL pointer dereference with crafted record type</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-5180" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-9761"></a>
|
|
<strong class="name">CVE-2014-9761</strong>
|
|
<div>nan function unbounded stack allocation</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9761" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-8121"></a>
|
|
<strong class="name">CVE-2014-8121</strong>
|
|
<div>DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over the database, which triggers the file pointer to be reset.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8121" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-1781"></a>
|
|
<strong class="name">CVE-2015-1781</strong>
|
|
<div>Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-1781" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8777"></a>
|
|
<strong class="name">CVE-2015-8777</strong>
|
|
<div>The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8777" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-1234"></a>
|
|
<strong class="name">CVE-2016-1234</strong>
|
|
<div>glob: buffer overflow with GLOB_ALTDIRFUNC due to incorrect NAME_MAX limit assumption</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-1234" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-3075"></a>
|
|
<strong class="name">CVE-2016-3075</strong>
|
|
<div>The getnetbyname implementation in nss_dns contains a potentially unbounded alloca call (in the form of a call to strdupa), leading to a stack overflow (stack exhaustion) and a crash if getnetbyname is invoked on a very long name.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-3075" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>ntp</strong> <span>1:4.2.6.p5+dfsg-3ubuntu2.14.04.6</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2015-8138"></a>
|
|
<strong class="name">CVE-2015-8138</strong>
|
|
<div>ntp: missing check for zero originate timestamp</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8138" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2015-7977"></a>
|
|
<strong class="name">CVE-2015-7977</strong>
|
|
<div>reslist NULL pointer dereference</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-7977" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2015-7978"></a>
|
|
<strong class="name">CVE-2015-7978</strong>
|
|
<div>Stack exhaustion in recursive traversal of restriction list</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-7978" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-0727"></a>
|
|
<strong class="name">CVE-2016-0727</strong>
|
|
<div>NTP statsdir cleanup cronjob insecure</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-0727" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8139"></a>
|
|
<strong class="name">CVE-2015-8139</strong>
|
|
<div>Origin Leak: ntpq and ntpdc, disclose origin</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8139" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-7976"></a>
|
|
<strong class="name">CVE-2015-7976</strong>
|
|
<div>ntpq saveconfig command allows dangerous characters in filenames</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-7976" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-7979"></a>
|
|
<strong class="name">CVE-2015-7979</strong>
|
|
<div>Off-path Denial of Service (DoS) attack on authenticated broadcast mode</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-7979" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8158"></a>
|
|
<strong class="name">CVE-2015-8158</strong>
|
|
<div>Potential Infinite Loop in ntpq</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8158" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-7973"></a>
|
|
<strong class="name">CVE-2015-7973</strong>
|
|
<div>Deja Vu: Replay attack on authenticated broadcast mode</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-7973" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8140"></a>
|
|
<strong class="name">CVE-2015-8140</strong>
|
|
<div>ntpq vulnerable to replay attacks</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8140" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-7974"></a>
|
|
<strong class="name">CVE-2015-7974</strong>
|
|
<div>NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-7974" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>pcre3</strong> <span>1:8.31-2ubuntu2.1</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2016-3191"></a>
|
|
<strong class="name">CVE-2016-3191</strong>
|
|
<div>The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-3191" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8393"></a>
|
|
<strong class="name">CVE-2015-8393</strong>
|
|
<div>pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8393" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8387"></a>
|
|
<strong class="name">CVE-2015-8387</strong>
|
|
<div>PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8387" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8391"></a>
|
|
<strong class="name">CVE-2015-8391</strong>
|
|
<div>The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8391" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8390"></a>
|
|
<strong class="name">CVE-2015-8390</strong>
|
|
<div>PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8390" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8394"></a>
|
|
<strong class="name">CVE-2015-8394</strong>
|
|
<div>PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8394" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-2328"></a>
|
|
<strong class="name">CVE-2015-2328</strong>
|
|
<div>PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-2328" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8385"></a>
|
|
<strong class="name">CVE-2015-8385</strong>
|
|
<div>PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8385" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8380"></a>
|
|
<strong class="name">CVE-2015-8380</strong>
|
|
<div>The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8380" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8386"></a>
|
|
<strong class="name">CVE-2015-8386</strong>
|
|
<div>PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8386" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-8382"></a>
|
|
<strong class="name">CVE-2015-8382</strong>
|
|
<div>The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8382" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>openssl</strong> <span>1.0.1f-1ubuntu2.16</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2016-2842"></a>
|
|
<strong class="name">CVE-2016-2842</strong>
|
|
<div>The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-0799.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2842" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-0797"></a>
|
|
<strong class="name">CVE-2016-0797</strong>
|
|
<div>Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-0797" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-0702"></a>
|
|
<strong class="name">CVE-2016-0702</strong>
|
|
<div>The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-0702" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-0705"></a>
|
|
<strong class="name">CVE-2016-0705</strong>
|
|
<div>Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-0705" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-0798"></a>
|
|
<strong class="name">CVE-2016-0798</strong>
|
|
<div>Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-0798" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-0799"></a>
|
|
<strong class="name">CVE-2016-0799</strong>
|
|
<div>The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-0799" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>busybox</strong> <span>1:1.21.0-1ubuntu1</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2011-5325"></a>
|
|
<strong class="name">CVE-2011-5325</strong>
|
|
<div>path traversal vulnerability in busybox tar</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2011-5325" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-9645"></a>
|
|
<strong class="name">CVE-2014-9645</strong>
|
|
<div>modprobe wrongly accepts paths as module names</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9645" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-2147"></a>
|
|
<strong class="name">CVE-2016-2147</strong>
|
|
<div>OOB heap write due to integer underflow</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2147" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-2148"></a>
|
|
<strong class="name">CVE-2016-2148</strong>
|
|
<div>heap overflow in OPTION_6RD parsing</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2148" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>perl</strong> <span>5.18.2-2ubuntu1</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2016-2381"></a>
|
|
<strong class="name">CVE-2016-2381</strong>
|
|
<div>environment variable confusion</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2381" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2013-7422"></a>
|
|
<strong class="name">CVE-2013-7422</strong>
|
|
<div>Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2013-7422" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-4330"></a>
|
|
<strong class="name">CVE-2014-4330</strong>
|
|
<div>The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-4330" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>file</strong> <span>1:5.14-2ubuntu3.3</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-9621"></a>
|
|
<strong class="name">CVE-2014-9621</strong>
|
|
<div>The ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9621" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-9620"></a>
|
|
<strong class="name">CVE-2014-9620</strong>
|
|
<div>The ELF parser in file 5.08 through 5.21 allows remote attackers to cause a denial of service via a large number of notes.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9620" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-9653"></a>
|
|
<strong class="name">CVE-2014-9653</strong>
|
|
<div>readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9653" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libpng</strong> <span>1.2.50-1ubuntu2.14.04.1</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2015-8540"></a>
|
|
<strong class="name">CVE-2015-8540</strong>
|
|
<div>underflow read in png_check_keyword in pngwutil.c</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8540" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2015-8472"></a>
|
|
<strong class="name">CVE-2015-8472</strong>
|
|
<div>Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8472" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>sudo</strong> <span>1.8.9p5-1ubuntu1.2</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2015-8239"></a>
|
|
<strong class="name">CVE-2015-8239</strong>
|
|
<div>race condition checking digests/checksums in sudoers</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8239" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2015-5602"></a>
|
|
<strong class="name">CVE-2015-5602</strong>
|
|
<div>sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-5602" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>pam</strong> <span>1.1.8-1ubuntu2</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-3238"></a>
|
|
<strong class="name">CVE-2015-3238</strong>
|
|
<div>The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-3238" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2013-7041"></a>
|
|
<strong class="name">CVE-2013-7041</strong>
|
|
<div>The pam_userdb module for Pam uses a case-insensitive method to compare hashed passwords, which makes it easier for attackers to guess the password via a brute force attack.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2013-7041" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-2583"></a>
|
|
<strong class="name">CVE-2014-2583</strong>
|
|
<div>Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create aribitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty funtion, which is used by the format_timestamp_name function.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-2583" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>isc-dhcp</strong> <span>4.2.4-7ubuntu12.3</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2015-8605"></a>
|
|
<strong class="name">CVE-2015-8605</strong>
|
|
<div>ISC DHCP 4.x before 4.1-ESV-R12-P1 and 4.2.x and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8605" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-2774"></a>
|
|
<strong class="name">CVE-2016-2774</strong>
|
|
<div>ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2774" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>cpio</strong> <span>2.11+dfsg-1ubuntu1.1</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2016-2037"></a>
|
|
<strong class="name">CVE-2016-2037</strong>
|
|
<div>The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2037" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-1197"></a>
|
|
<strong class="name">CVE-2015-1197</strong>
|
|
<div>cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-1197" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>gcc-4.8</strong> <span>4.8.4-2ubuntu1~14.04</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-5044"></a>
|
|
<strong class="name">CVE-2014-5044</strong>
|
|
<div>Array memory allocations could cause an integer overflow and thus memory overflow issues at runtime.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-5044" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-5276"></a>
|
|
<strong class="name">CVE-2015-5276</strong>
|
|
<div>The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-5276" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>util-linux</strong> <span>2.20.1-5.1ubuntu20.7</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-9114"></a>
|
|
<strong class="name">CVE-2014-9114</strong>
|
|
<div>blkid command injection</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9114" target="blank">Link</a>
|
|
</li>
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2013-0157"></a>
|
|
<strong class="name">CVE-2013-0157</strong>
|
|
<div>(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2013-0157" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>coreutils</strong> <span>8.21-1ubuntu5.3</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2016-2781"></a>
|
|
<strong class="name">CVE-2016-2781</strong>
|
|
<div>nonpriv session can escape to the parent session by using the TIOCSTI ioctl</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2781" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libgcrypt11</strong> <span>1.5.3-2ubuntu4.2</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2015-7511"></a>
|
|
<strong class="name">CVE-2015-7511</strong>
|
|
<div>ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-7511" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>gnutls26</strong> <span>2.12.23-12ubuntu2.3</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Medium">
|
|
<a class="vulnerability__title" name="CVE-2015-7575"></a>
|
|
<strong class="name">CVE-2015-7575</strong>
|
|
<div>Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-7575" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>python3.4</strong> <span>3.4.3-1ubuntu1~14.04.3</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-2667"></a>
|
|
<strong class="name">CVE-2014-2667</strong>
|
|
<div>Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-2667" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>dbus</strong> <span>1.6.18-0ubuntu4.3</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2015-0245"></a>
|
|
<strong class="name">CVE-2015-0245</strong>
|
|
<div>D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-0245" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libbsd</strong> <span>0.6.0-2ubuntu1</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2016-2090"></a>
|
|
<strong class="name">CVE-2016-2090</strong>
|
|
<div>Heap buffer overflow in fgetwln function of libbsd</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2090" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>shadow</strong> <span>1:4.1.5.1-1ubuntu9.1</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2013-4235"></a>
|
|
<strong class="name">CVE-2013-4235</strong>
|
|
<div>TOCTOU race conditions by copying and removing directory trees</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2013-4235" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>dpkg</strong> <span>1.17.5ubuntu5.5</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-8625"></a>
|
|
<strong class="name">CVE-2014-8625</strong>
|
|
<div>Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8625" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>readline6</strong> <span>6.3-4ubuntu2</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Low">
|
|
<a class="vulnerability__title" name="CVE-2014-2524"></a>
|
|
<strong class="name">CVE-2014-2524</strong>
|
|
<div>The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-2524" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>audit</strong> <span>1:2.3.2-2ubuntu1</span> - <span class="fa fa-exclamation-triangle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
<li class="vulnerability Negligible">
|
|
<a class="vulnerability__title" name="CVE-2015-5186"></a>
|
|
<strong class="name">CVE-2015-5186</strong>
|
|
<div>log terminal emulator escape sequences handling</div>
|
|
<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-5186" target="blank">Link</a>
|
|
</li>
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>ucf</strong> <span>3.0027+nmu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>lsb</strong> <span>4.1+Debian11ubuntu6</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>ncurses</strong> <span>5.9+20140118-1ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libusb</strong> <span>2:0.1.12-23.3ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>mawk</strong> <span>1.3.3-17ubuntu2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>gzip</strong> <span>1.6-3ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>ubuntu-keyring</strong> <span>2012.05.19</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>json-c</strong> <span>0.11-3ubuntu1.2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>gccgo-4.9</strong> <span>4.9.1-0ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>e2fsprogs</strong> <span>1.42.9-3ubuntu1.3</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libtext-wrapi18n-perl</strong> <span>0.06-7</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>bzip2</strong> <span>1.0.6-5</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>tzdata</strong> <span>2015g-0ubuntu0.14.04</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>procps</strong> <span>1:3.3.9-1ubuntu2.2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>upstart</strong> <span>1.12.1-0ubuntu4.2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>dh-python</strong> <span>1.20140128-1ubuntu8.2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>db5.3</strong> <span>5.3.28-3ubuntu3</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>xz-utils</strong> <span>5.1.1alpha+20120614-2ubuntu2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>kmod</strong> <span>15-0ubuntu6</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>vim</strong> <span>2:7.4.052-1ubuntu3</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>mime-support</strong> <span>3.54ubuntu1.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>systemd</strong> <span>204-5ubuntu20.15</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libpod-latex-perl</strong> <span>0.61-1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libtasn1-6</strong> <span>3.4-3ubuntu0.3</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libterm-ui-perl</strong> <span>0.42-1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>sensible-utils</strong> <span>0.0.9</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libmodule-pluggable-perl</strong> <span>5.1-1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>hostname</strong> <span>3.15ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>init-system-helpers</strong> <span>1.14</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>netcat-openbsd</strong> <span>1.105-7ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>xkeyboard-config</strong> <span>2.10.1-1ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libtext-charwidth-perl</strong> <span>0.04-7build3</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>bash</strong> <span>4.3-7ubuntu1.5</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libcap2</strong> <span>1:2.24-0ubuntu2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>netbase</strong> <span>5.2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>popt</strong> <span>1.16-8ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>apt</strong> <span>1.0.1ubuntu2.10</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>mountall</strong> <span>2.53</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>ifupdown</strong> <span>0.7.47.2ubuntu4.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>sed</strong> <span>4.2.2-4ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>lvm2</strong> <span>2.02.98-6ubuntu2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>less</strong> <span>458-2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libtext-iconv-perl</strong> <span>1.7-5build2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>plymouth</strong> <span>0.8.8-0ubuntu17.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libtext-soundex-perl</strong> <span>3.4-1build1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libnih</strong> <span>1.0.3-4ubuntu25</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>initramfs-tools</strong> <span>0.103ubuntu4.2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>klibc</strong> <span>2.0.3-0ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>console-setup</strong> <span>1.70ubuntu8</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>dash</strong> <span>0.5.7-4ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>zlib</strong> <span>1:1.2.8.dfsg-1ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libdrm</strong> <span>2.4.60-2~ubuntu14.04.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>gnupg</strong> <span>1.4.16-1ubuntu2.3</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>rsyslog</strong> <span>7.4.4-1ubuntu2.6</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>sqlite3</strong> <span>3.8.2-1ubuntu2.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>attr</strong> <span>1:2.4.47-1ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>liblog-message-simple-perl</strong> <span>0.10-1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>ubuntu-meta</strong> <span>1.325</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>gdbm</strong> <span>1.8.3-12build1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>ureadahead</strong> <span>0.100.0-16</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>insserv</strong> <span>1.14.0-5ubuntu2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libsemanage</strong> <span>2.2-1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libselinux</strong> <span>2.2.2-1ubuntu0.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>newt</strong> <span>0.52.15-2ubuntu5</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libsepol</strong> <span>2.2-1ubuntu0.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>base-files</strong> <span>7.2ubuntu5.3</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>mpdecimal</strong> <span>2.4.0-6</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>iproute2</strong> <span>3.12.0-2ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>ustr</strong> <span>1.0.4-3ubuntu2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>resolvconf</strong> <span>1.69ubuntu1.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>iputils</strong> <span>3:20121221-4ubuntu1.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>grep</strong> <span>2.16-1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>fribidi</strong> <span>0.19.6-1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>acl</strong> <span>2.2.52-1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>python3-defaults</strong> <span>3.4.0-0ubuntu2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>debconf</strong> <span>1.5.51ubuntu2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>findutils</strong> <span>4.4.2-7</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>lockfile-progs</strong> <span>0.1.17</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>expat</strong> <span>2.1.0-4ubuntu1.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>tar</strong> <span>1.27.1-1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>slang2</strong> <span>2.2.4-15ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>net-tools</strong> <span>1.60-25ubuntu2.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>logrotate</strong> <span>3.8.7-1ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>adduser</strong> <span>3.113+nmu3ubuntu3</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>cron</strong> <span>3.0pl1-124ubuntu2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>base-passwd</strong> <span>3.5.33</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>kbd</strong> <span>1.15.5-1ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>p11-kit</strong> <span>0.20.2-2ubuntu2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>cgmanager</strong> <span>0.24-0ubuntu7.5</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>liblockfile</strong> <span>1.09-6ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libestr</strong> <span>0.1.9-0ubuntu2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>eject</strong> <span>2.1.5+deb1+cvs20081104-13.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>sysvinit</strong> <span>2.88dsf-41ubuntu6.2</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>cdebconf</strong> <span>0.187ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>diffutils</strong> <span>1:3.3-1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libarchive-extract-perl</strong> <span>0.70-1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libffi</strong> <span>3.1~rc1+r3.0.13-12ubuntu0.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>langpack-locales</strong> <span>2.13+git20120306-12.1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>makedev</strong> <span>2.3.1-93ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>libgpg-error</strong> <span>1.12-0.2ubuntu1</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>liblocale-gettext-perl</strong> <span>1.05-7build3</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
<li class="feature">
|
|
<div class="feature__title">
|
|
<strong>debianutils</strong> <span>4.4</span> - <span class="fa fa-check-circle" aria-hidden="true"></span>
|
|
</div>
|
|
<ul class="vulnerabilities">
|
|
|
|
</ul>
|
|
</li>
|
|
|
|
</ul>
|
|
</div>
|
|
</div>
|
|
|
|
<div id="sha256:9e0bc8a71bde464f710bc2b593a1fc21521517671e918687892303151331fa56" class="layer">
|
|
<h3 class="layer__title" data-toggle-layer="sha256:9e0bc8a71bde464f710bc2b593a1fc21521517671e918687892303151331fa56">sha256:9e0bc8a71bde464f710bc2b593a1fc21521517671e918687892303151331fa56</h3>
|
|
<div></div>
|
|
<div class="features">
|
|
<ul>
|
|
|
|
</ul>
|
|
</div>
|
|
</div>
|
|
|
|
<div id="sha256:27aa681c95e5165caf287dcfe896532df4ae8b10e099500f2f8f71acf4002a89" class="layer">
|
|
<h3 class="layer__title" data-toggle-layer="sha256:27aa681c95e5165caf287dcfe896532df4ae8b10e099500f2f8f71acf4002a89">sha256:27aa681c95e5165caf287dcfe896532df4ae8b10e099500f2f8f71acf4002a89</h3>
|
|
<div></div>
|
|
<div class="features">
|
|
<ul>
|
|
|
|
</ul>
|
|
</div>
|
|
</div>
|
|
|
|
<div id="sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4" class="layer">
|
|
<h3 class="layer__title" data-toggle-layer="sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4">sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4</h3>
|
|
<div></div>
|
|
<div class="features">
|
|
<ul>
|
|
|
|
</ul>
|
|
</div>
|
|
</div>
|
|
|
|
</div>
|
|
</div>
|
|
<br />
|
|
</div>
|
|
</div>
|
|
</section>
|
|
</div>
|
|
|
|
<script>
|
|
(function () {
|
|
const togglers = document.querySelectorAll('[data-toggle-layer]');
|
|
console.log(togglers);
|
|
|
|
for (var i = togglers.length - 1; i >= 0; i--) {
|
|
togglers[i].onclick = function (e) {
|
|
e.target.parentNode.classList.toggle('closed');
|
|
};
|
|
}
|
|
})();
|
|
</script>
|
|
</body>
|
|
</html> |