Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 7.4
https://bugzilla.novell.com/show_bug.cgi?id=846404
https://bugzilla.novell.com/show_bug.cgi?id=864464
https://bugzilla.novell.com/show_bug.cgi?id=866911
https://bugzilla.novell.com/show_bug.cgi?id=870173
https://bugzilla.novell.com/show_bug.cgi?id=870576
https://bugzilla.novell.com/show_bug.cgi?id=871676
https://bugzilla.novell.com/show_bug.cgi?id=871797
https://bugzilla.novell.com/show_bug.cgi?id=871854
https://bugzilla.novell.com/show_bug.cgi?id=872634
https://bugzilla.novell.com/show_bug.cgi?id=873374
https://bugzilla.novell.com/show_bug.cgi?id=876590
https://bugzilla.novell.com/show_bug.cgi?id=877257
https://bugzilla.novell.com/show_bug.cgi?id=877775
https://bugzilla.novell.com/show_bug.cgi?id=878115
https://bugzilla.novell.com/show_bug.cgi?id=878509
https://bugzilla.novell.com/show_bug.cgi?id=879921
https://bugzilla.novell.com/show_bug.cgi?id=880484
https://bugzilla.novell.com/show_bug.cgi?id=881051
https://bugzilla.novell.com/show_bug.cgi?id=882804
https://bugzilla.novell.com/show_bug.cgi?id=883724
https://bugzilla.novell.com/show_bug.cgi?id=883795
https://bugzilla.novell.com/show_bug.cgi?id=885422
https://bugzilla.novell.com/show_bug.cgi?id=885725
https://bugzilla.novell.com/show_bug.cgi?id=886474
https://bugzilla.novell.com/show_bug.cgi?id=889173
https://bugzilla.novell.com/show_bug.cgi?id=889324
http://www.nessus.org/u?066d07d5
http://www.nessus.org/u?450f83cf
http://www.nessus.org/u?f1c84536
http://www.nessus.org/u?e13ba0a5
http://www.nessus.org/u?afade347
http://www.nessus.org/u?c061881e
https://www.suse.com/security/cve/CVE-2013-4299/
https://www.suse.com/security/cve/CVE-2014-0055/
https://www.suse.com/security/cve/CVE-2014-0077/
https://www.suse.com/security/cve/CVE-2014-1739/
https://www.suse.com/security/cve/CVE-2014-2706/
https://www.suse.com/security/cve/CVE-2014-2851/
https://www.suse.com/security/cve/CVE-2014-3144/
https://www.suse.com/security/cve/CVE-2014-3145/
https://www.suse.com/security/cve/CVE-2014-3917/
https://www.suse.com/security/cve/CVE-2014-4508/
https://www.suse.com/security/cve/CVE-2014-4652/
https://www.suse.com/security/cve/CVE-2014-4653/
https://www.suse.com/security/cve/CVE-2014-4654/
https://www.suse.com/security/cve/CVE-2014-4655/
https://www.suse.com/security/cve/CVE-2014-4656/
https://www.suse.com/security/cve/CVE-2014-4667/
https://www.suse.com/security/cve/CVE-2014-4699/
Severity: High
ID: 83633
File Name: suse_SU-2014-1105-1.nasl
Version: 2.13
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/20/2015
Updated: 1/19/2021
Dependencies: ssh_get_info.nasl
Risk Factor: High
VPR Score: 7.4
Base Score: 7.1
Temporal Score: 5.9
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Temporal Vector: E:F/RL:OF/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-pae-devel, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-trace-base, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-xen-devel, p-cpe:/a:novell:suse_linux:xen-kmp-default, p-cpe:/a:novell:suse_linux:xen-kmp-pae, p-cpe:/a:novell:suse_linux:xen-kmp-trace, cpe:/o:novell:suse_linux:11
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/9/2014
Vulnerability Publication Date: 10/24/2013
Core Impact
CVE: CVE-2013-4299, CVE-2014-0055, CVE-2014-0077, CVE-2014-1739, CVE-2014-2706, CVE-2014-2851, CVE-2014-3144, CVE-2014-3145, CVE-2014-3917, CVE-2014-4508, CVE-2014-4652, CVE-2014-4653, CVE-2014-4654, CVE-2014-4655, CVE-2014-4656, CVE-2014-4667, CVE-2014-4699, CVE-2014-5077
BID: 63183, 66441, 66591, 66678, 66779, 67309, 67321, 67699, 68048, 68126, 68162, 68163, 68164, 68170, 68224, 68411, 68881