Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.868508
Category:Fedora Local Security Checks
Title:Fedora Update for libxml2 FEDORA-2014-13047
Summary:Check the version of libxml2
Description:Summary:
Check the version of libxml2

Affected Software/OS:
libxml2 on Fedora 19

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-3660
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html
BugTraq ID: 70644
http://www.securityfocus.com/bid/70644
Debian Security Information: DSA-3057 (Google Search)
http://www.debian.org/security/2014/dsa-3057
http://www.mandriva.com/security/advisories?name=MDVSA-2014:244
https://bugzilla.redhat.com/attachment.cgi?id=944444&action=diff
https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html
http://www.openwall.com/lists/oss-security/2014/10/17/7
RedHat Security Advisories: RHSA-2014:1655
http://rhn.redhat.com/errata/RHSA-2014-1655.html
RedHat Security Advisories: RHSA-2014:1885
http://rhn.redhat.com/errata/RHSA-2014-1885.html
http://secunia.com/advisories/59903
http://secunia.com/advisories/61965
http://secunia.com/advisories/61966
http://secunia.com/advisories/61991
SuSE Security Announcement: openSUSE-SU-2014:1330 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html
SuSE Security Announcement: openSUSE-SU-2015:2372 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
http://www.ubuntu.com/usn/USN-2389-1
CopyrightCopyright (C) 2014 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.