Certain function pointers in Trusted Boot can cause arbitrary code executio
Reporter | Title | Published | Views | Family All 25 |
---|---|---|---|---|
SUSE Linux | Security update for tboot (important) | 26 Nov 201700:08 | – | suse |
Prion | Code injection | 16 Nov 201702:29 | – | prion |
Debian CVE | CVE-2017-16837 | 16 Nov 201702:29 | – | debiancve |
Tenable Nessus | EulerOS 2.0 SP3 : tboot (EulerOS-SA-2021-1855) | 30 Apr 202100:00 | – | nessus |
Tenable Nessus | EulerOS Virtualization 3.0.2.6 : tboot (EulerOS-SA-2021-1452) | 10 Mar 202100:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : tboot (openSUSE-2017-1308) | 27 Nov 201700:00 | – | nessus |
Tenable Nessus | RHEL 7 : tboot (Unpatched Vulnerability) | 3 Jun 202400:00 | – | nessus |
Tenable Nessus | SUSE SLES12 Security Update : Recommended update for tboot (SUSE-SU-2017:3090-1) | 27 Nov 201700:00 | – | nessus |
Tenable Nessus | RHEL 7 : tboot (Unpatched Vulnerability) | 11 May 202400:00 | – | nessus |
Tenable Nessus | EulerOS 2.0 SP5 : tboot (EulerOS-SA-2021-1236) | 4 Feb 202100:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo