We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Source: QUALYS Finding Description: CentOS has released security update for kernel to fix the vulnerabilities. Affected Products: centos 6
Impact: Successful exploitation allows attacker to cause privilege escalation and compromise the system.
Target(s): Asset name: 192.168.56.103 Asset name: 192.168.56.133
Solution: To resolve this issue, upgrade to the latest packages which contain a patch. Refer to CentOS advisory centos 6 (https://lists.centos.org/pipermail/centos-announce/2018-January/022756.html) for updates and patch information. Patch: Following are links for downloading patches to fix the vulnerabilities: CESA-2018:0169: centos 6 (https://lists.centos.org/pipermail/centos-announce/2018-January/022756.html)
References: QID:440043 CVE:CVE-2017-7542, CVE-2017-9074, CVE-2017-11176 Category:CentOS PCI Flagged:yes Vendor References:CESA-2018:0169 centos 6 Bugtraq IDs:99953, 98577, 99136, 99919
Severity: High Exploitable: Yes Date Discovered: 2022-05-11 11:46:00 Nucleus Notification Rules Triggered: 43-2 Project Name: 9355-other connectors Please see Nucleus for more information on these vulnerabilities:https://192.168.56.101/nucleus/public/app/index.html#vuln/130000004/NDQwMDQz/UVVBTFlT/VnVsbg--/false/MTMwMDAwMDA0/c3VtbWFyeQ--/false
The text was updated successfully, but these errors were encountered:
mcsaez2
No branches or pull requests
Source: QUALYS
Finding Description: CentOS has released security update for kernel to fix the vulnerabilities. Affected Products: centos 6
Impact: Successful exploitation allows attacker to cause privilege escalation and compromise the system.
Target(s): Asset name: 192.168.56.103
Asset name: 192.168.56.133
Solution: To resolve this issue, upgrade to the latest packages which contain a patch. Refer to CentOS advisory centos 6 (https://lists.centos.org/pipermail/centos-announce/2018-January/022756.html) for updates and patch information.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
CESA-2018:0169: centos 6 (https://lists.centos.org/pipermail/centos-announce/2018-January/022756.html)
References:
QID:440043
CVE:CVE-2017-7542, CVE-2017-9074, CVE-2017-11176
Category:CentOS
PCI Flagged:yes
Vendor References:CESA-2018:0169 centos 6
Bugtraq IDs:99953, 98577, 99136, 99919
Severity: High
Exploitable: Yes
Date Discovered: 2022-05-11 11:46:00
Nucleus Notification Rules Triggered: 43-2
Project Name: 9355-other connectors
Please see Nucleus for more information on these vulnerabilities:https://192.168.56.101/nucleus/public/app/index.html#vuln/130000004/NDQwMDQz/UVVBTFlT/VnVsbg--/false/MTMwMDAwMDA0/c3VtbWFyeQ--/false
The text was updated successfully, but these errors were encountered: