The following SCAP content has been released to SCAP Repo and SecPod Saner solution. SecPod Saner will automatically pull the relevant content on its next scheduled update.

oval:org.secpod.oval:def:1501802 CVE-2016-2125
CVE-2016-2126
ELSA-2017-0662
ELSA-2017-0662 — Oracle samba
oval:org.secpod.oval:def:1501803 CVE-2013-2236
CVE-2016-1245
CVE-2016-2342
CVE-2016-4049
CVE-2017-5495
ELSA-2017-0794
ELSA-2017-0794 — Oracle quagga
oval:org.secpod.oval:def:1501804 CVE-2016-0634
CVE-2016-7543
CVE-2016-9401
ELSA-2017-0725
ELSA-2017-0725 — Oracle bash
oval:org.secpod.oval:def:1501805 CVE-2015-8869
ELSA-2017-0565
ELSA-2017-0565 — Oracle ocaml
oval:org.secpod.oval:def:1501806 CVE-2014-9761
CVE-2015-8776
CVE-2015-8778
CVE-2015-8779
ELSA-2017-0680
ELSA-2017-0680 — Oracle glibc
oval:org.secpod.oval:def:1501807 CVE-2016-3712
ELSA-2017-0621
ELSA-2017-0621 — Oracle qemu-kvm_qemu-guest-agent
oval:org.secpod.oval:def:1501808 CVE-2016-10088
CVE-2016-10142
CVE-2016-2069
CVE-2016-2384
CVE-2016-6480
CVE-2016-7042
CVE-2016-7097
CVE-2016-8399
CVE-2016-9576
ELSA-2017-0817
ELSA-2017-0817 — Oracle kernel_python-perf_perf
oval:org.secpod.oval:def:1501809 CVE-2016-8610
CVE-2017-5335
CVE-2017-5336
CVE-2017-5337
ELSA-2017-0574
ELSA-2017-0574 — Oracle gnutls
oval:org.secpod.oval:def:1501810 CVE-2015-8325
ELSA-2017-0641
ELSA-2017-0641 — Oracle openssh
oval:org.secpod.oval:def:1501811 CVE-2016-10207
CVE-2017-5581
ELSA-2017-0630
ELSA-2017-0630 — Oracle tigervnc
oval:org.secpod.oval:def:1501812 CVE-2017-2628
ELSA-2017-0847
ELSA-2017-0847 — Oracle curl
oval:org.secpod.oval:def:1501813 CVE-2013-4075
CVE-2015-3811
CVE-2015-3812
CVE-2015-3813
ELSA-2017-0631
ELSA-2017-0631 — Oracle wireshark
oval:org.secpod.oval:def:1501814 CVE-2016-2125
CVE-2016-2126
ELSA-2017-0744
ELSA-2017-0744 — Oracle samba4
oval:org.secpod.oval:def:1501815 CVE-2015-8869
ELSA-2017-0564
ELSA-2017-0564 — Oracle libguestfs
oval:org.secpod.oval:def:1501816 CVE-2017-2616
ELSA-2017-0654
ELSA-2017-0654 — Oracle coreutils
oval:org.secpod.oval:def:39719 CVE-2017-4901 Out-of-bounds memory access vulnerability in VMware Workstation and VMware Player – CVE-2017-4901
oval:org.secpod.oval:def:39720 CVE-2017-4898 Privilege escalation vulnerability in VMware Workstation and VMware Player due to the &quot
oval:org.secpod.oval:def:39721 CVE-2017-4899 Out of bounds read vulnerability in VMware Workstation and VMware Player due to a flaw in SVGA driver
oval:org.secpod.oval:def:39722 CVE-2017-4900 NULL pointer dereference vulnerability in the SVGA driver in VMware Workstation and VMware Player
oval:org.secpod.oval:def:39723 CVE-2017-4901 Out-of-bounds memory access vulnerability in VMware Workstation and VMware Player – CVE-2017-4901
oval:org.secpod.oval:def:39724 CVE-2017-4902 Heap-buffer overflow vulnerability in VMware Workstation and VMware Player – CVE-2017-4902
oval:org.secpod.oval:def:39725 CVE-2017-4903 Stack-buffer overflow vulnerability in VMware Workstation and VMware Player – CVE-2017-4903
oval:org.secpod.oval:def:39726 CVE-2017-4904 Memory corruption vulnerability in VMware Workstation and VMware Player – CVE-2017-4904
oval:org.secpod.oval:def:39727 CVE-2017-4905 Information disclosure vulnerability in VMware Workstation and VMware Player – CVE-2017-4905
oval:org.secpod.oval:def:502010 CVE-2017-2628
RHSA-2017:0847-01
RHSA-2017:0847-01 — Redhat curl
oval:org.secpod.oval:def:602832 CVE-2016-9809
CVE-2016-9812
CVE-2016-9813
CVE-2017-5843
CVE-2017-5848
DSA-3818-1
DSA-3818-1 gst-plugins-bad1.0 — gst-plugins-bad1.0
oval:org.secpod.oval:def:602833 CVE-2017-6964
DSA-3823-1
DSA-3823-1 eject — eject
oval:org.secpod.oval:def:602834 CVE-2016-10198
CVE-2016-10199
CVE-2017-5840
CVE-2017-5841
CVE-2017-5845
DSA-3820-1
DSA-3820-1 gst-plugins-good1.0 — gst-plugins-good1.0
oval:org.secpod.oval:def:602835 CVE-2017-5846
CVE-2017-5847
DSA-3821-1
DSA-3821-1 gst-plugins-ugly1.0 — gst-plugins-ugly1.0
oval:org.secpod.oval:def:602836 CVE-2017-6369
DSA-3824-1
DSA-3824-1 firebird2.5 — firebird2.5
oval:org.secpod.oval:def:602837 CVE-2016-9811
CVE-2017-5837
CVE-2017-5839
CVE-2017-5842
CVE-2017-5844
DSA-3819-1
DSA-3819-1 gst-plugins-base1.0 — gst-plugins-base1.0
oval:org.secpod.oval:def:602838 DSA-3798-2 DSA-3798-2 tnef — tnef
oval:org.secpod.oval:def:602839 CVE-2017-5838
DSA-3822-1
DSA-3822-1 gstreamer1.0 — gstreamer1.0
oval:org.secpod.oval:def:703537 CVE-2017-7184
USN-3251-1
USN-3251-1 — linux-image
oval:org.secpod.oval:def:703538 CVE-2017-7184
USN-3251-2
USN-3251-2 — linux-image
oval:org.secpod.oval:def:703539 CVE-2017-7184
USN-3250-2
USN-3250-2 — linux-image
oval:org.secpod.oval:def:703540 CVE-2017-7184
USN-3248-1
USN-3248-1 — linux-image
oval:org.secpod.oval:def:703541 CVE-2017-7184
USN-3249-2
USN-3249-2 — linux-image
oval:org.secpod.oval:def:703542 CVE-2017-6964
USN-3246-1
USN-3246-1 — eject vulnerability
oval:org.secpod.oval:def:703543 CVE-2017-7184
USN-3249-1
USN-3249-1 — linux-image
oval:org.secpod.oval:def:703544 CVE-2017-7184
USN-3250-1
USN-3250-1 — linux-image
oval:org.secpod.oval:def:703545 CVE-2016-9811
CVE-2017-5837
CVE-2017-5839
CVE-2017-5842
CVE-2017-5844
USN-3244-1
USN-3244-1 — gstreamer base plugins vulnerabilities
oval:org.secpod.oval:def:703546 CVE-2017-5029
CVE-2017-5030
CVE-2017-5031
CVE-2017-5033
CVE-2017-5035
CVE-2017-5037
CVE-2017-5040
CVE-2017-5041
CVE-2017-5044
CVE-2017-5045
CVE-2017-5046
USN-3236-1
USN-3236-1 — oxide vulnerabilities
oval:org.secpod.oval:def:703547 CVE-2017-6507
USN-3247-1
USN-3247-1 — apparmor vulnerability
oval:org.secpod.oval:def:703548 CVE-2016-10198
CVE-2016-10199
CVE-2017-5840
CVE-2017-5841
CVE-2017-5845
USN-3245-1
USN-3245-1 — gstreamer good plugins vulnerabilities
oval:org.secpod.oval:def:703549 CVE-2017-5398
CVE-2017-5399
CVE-2017-5400
CVE-2017-5401
CVE-2017-5402
CVE-2017-5403
CVE-2017-5404
CVE-2017-5405
CVE-2017-5406
CVE-2017-5407
CVE-2017-5408
CVE-2017-5410
CVE-2017-5412
CVE-2017-5413
CVE-2017-5414
CVE-2017-5415
CVE-2017-5416
CVE-2017-5417
CVE-2017-5418
CVE-2017-5419
CVE-2017-5420
CVE-2017-5421
CVE-2017-5422
CVE-2017-5426
CVE-2017-5427
USN-3216-2
USN-3216-2 — firefox regression
oval:org.secpod.oval:def:703550 USN-3242-2 USN-3242-2 — samba regression

Leave a Reply

Your email address will not be published. Required fields are marked *