The following SCAP content has been released to SCAP Repo and SecPod Saner Solution. SecPod Saner will automatically pull the relevant content on its next scheduled update.

oval:org.secpod.oval:def:42400 CVE-2017-15193 Memory corruption vulnerability in the MBIM dissector in Wireshark – CVE-2017-15193
oval:org.secpod.oval:def:42401 CVE-2017-15192 Memory corruption vulnerability in the Bluetooth Attribute Protocol dissector in Wireshark – CVE-2017-15192
oval:org.secpod.oval:def:42402 CVE-2017-15191 Memory corruption vulnerability in the DMP dissector in Wireshark – CVE-2017-15191
oval:org.secpod.oval:def:42403 CVE-2017-15190 Memory corruption vulnerability in the RTSP dissector in Wireshark – CVE-2017-15190
oval:org.secpod.oval:def:42404 CVE-2017-15189 Memory corruption vulnerability in the DOCSIS dissector in Wireshark – CVE-2017-15189
oval:org.secpod.oval:def:42405 CVE-2017-15191 Memory corruption vulnerability in the DMP dissector in Wireshark – CVE-2017-15191 (Mac OS X)
oval:org.secpod.oval:def:42406 CVE-2017-15193 Memory corruption vulnerability in the MBIM dissector in Wireshark – CVE-2017-15193 (Mac OS X)
oval:org.secpod.oval:def:42407 CVE-2017-15192 Memory corruption vulnerability in the Bluetooth Attribute Protocol dissector in Wireshark – CVE-2017-15192 (Mac OS X)
oval:org.secpod.oval:def:42408 CVE-2017-15190 Memory corruption vulnerability in the RTSP dissector in Wireshark – CVE-2017-15190 (Mac OS X)
oval:org.secpod.oval:def:42409 CVE-2017-15189 Memory corruption vulnerability in the DOCSIS dissector in Wireshark – CVE-2017-15189 (Mac OS X)
oval:org.secpod.oval:def:42410 CVE-2017-11292 Remote Code Execution vulnerability in Adobe Flash Player – CVE-2017-11292
oval:org.secpod.oval:def:42411 APSB17-32
CVE-2017-11292
Remote Code Execution vulnerability in Adobe Flash player – APSB17-32
oval:org.secpod.oval:def:42413 CVE-2017-13080
KB4042723
Windows Server 2008 Windows wireless WPA group key reinstallation vulnerability – KB4042723
oval:org.secpod.oval:def:42414 CVE-2017-13077 Key reinstallation attack vulnerability in the 4-way handshake in RHEL – CVE-2017-13077
oval:org.secpod.oval:def:42415 CVE-2017-13078 Key reinstallation attack vulnerability in the 4-way handshake in RHEL – CVE-2017-13078
oval:org.secpod.oval:def:42416 CVE-2017-13080 Key reinstallation attack vulnerability in the group key handshake in RHEL – CVE-2017-13080
oval:org.secpod.oval:def:42417 CVE-2017-13082 Key reinstallation attack vulnerability in RHEL due to a retransmitted FT Reassociation Request – CVE-2017-13082
oval:org.secpod.oval:def:42418 CVE-2017-13086 Key reinstallation attack vulnerability in the TDLS handshake in RHEL – CVE-2017-13086
oval:org.secpod.oval:def:42419 CVE-2017-13088 Key reinstallation attack vulnerability when processing a Wireless Network Management (WNM) Sleep Mode Response frame – CVE-2017-13088
oval:org.secpod.oval:def:42420 CVE-2017-13087 Key reinstallation attack vulnerability when processing a Wireless Network Management (WNM) Sleep Mode Response frame – CVE-2017-13087
oval:org.secpod.oval:def:603131 CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
DSA-3999-1
DSA-3999-1 wpa — wpa
oval:org.secpod.oval:def:703860 CVE-2016-4476
CVE-2016-4477
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
USN-3455-1
USN-3455-1 — wpa_supplicant and hostapd vulnerabilities

Summary
Article Name
SCAP Feed Release : 17-Oct-2017
Author
Publisher Name
SecPod Technologies
Publisher Logo
Loading Facebook Comments ...

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>