Linux audit¶
To do a Linux audit, you need versions of the packages installed on your system.
Audit Linux hosts for vulnerabilities (RPM/DEB based)¶
Example for CentOS 7. You can use it for any RPM based OS. Execute command: rpm -qa --qf '%{NAME}-%{VERSION}-%{RELEASE}.%{ARCH}\\n'
.
Use it as package variable input:
Query:
POST /api/v3/audit/audit/
Query example:
curl -XPOST https://vulners.com/api/v3/audit/audit/ -H 'Content-Type: application/json' -d '{
"os": "centos",
"version": "7",
"package": ["glibc-common-2.17-157.el7_3.5.x86_64"],
"apiKey": "{API key}"
}'
centos_vulnerabilities = vulners_api.os_audit(
os= 'centos', os_version= '7', package= ['glibc-common-2.17-157.el7_3.5.x86_64'])
vulnerable_packages = centos_vulnerabilities.get('packages')
missed_patches_ids = centos_vulnerabilities.get('vulnerabilities')
cve_list = centos_vulnerabilities.get('cvelist')
how_to_fix = centos_vulnerabilities.get('cumulativeFix')
centos_vulnerabilities = vulners_api.audit(
os= 'centos', os_version= '7', package= ['glibc-common-2.17-157.el7_3.5.x86_64'])
vulnerable_packages = centos_vulnerabilities.get('packages')
missed_patches_ids = centos_vulnerabilities.get('vulnerabilities')
cve_list = centos_vulnerabilities.get('cvelist')
how_to_fix = centos_vulnerabilities.get('cumulativeFix')
{
"glibc-common-2.17-157.el7_3.5.x86_64": {
"CESA-2017:1916": [
{
"package": "glibc-common-2.17-157.el7_3.5.x86_64",
"providedOSName": "centos",
"matchedOSName": "centos",
"bulletinOSName": "CentOS",
"providedOSVersion": "7",
"bulletinOSVersion": "7",
"providedVersion": "0:2.17-157.el7_3.5",
"bulletinVersion": "2.17-196.el7",
"providedPackage": "glibc-common-2.17-157.el7_3.5.x86_64",
"bulletinPackage": "glibc-common-2.17-196.el7.x86_64.rpm",
"operator": "lt",
"bulletinID": "CESA-2017:1916",
"cvelist": [
"CVE-2015-8776",
"CVE-2015-8777",
"CVE-2015-8779",
"CVE-2015-8778",
"CVE-2014-9761"
],
"cvss": {
"score": 7.5,
"vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"fix": "sudo yum -y update glibc-common"
}
],
"CESA-2018:3092": [
{
"package": "glibc-common-2.17-157.el7_3.5.x86_64",
"providedOSName": "centos",
"matchedOSName": "centos",
"bulletinOSName": "CentOS",
"providedOSVersion": "7",
"bulletinOSVersion": "7",
"providedVersion": "0:2.17-157.el7_3.5",
"bulletinVersion": "2.17-260.el7",
"providedPackage": "glibc-common-2.17-157.el7_3.5.x86_64",
"bulletinPackage": "glibc-common-2.17-260.el7.x86_64.rpm",
"operator": "lt",
"bulletinID": "CESA-2018:3092",
"cvelist": [
"CVE-2018-11237",
"CVE-2018-6485",
"CVE-2018-11236",
"CVE-2017-16997"
],
"cvss": {
"score": 9.3,
"vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
},
"fix": "sudo yum -y update glibc-common"
}
],
"CESA-2018:0805": [
{
"package": "glibc-common-2.17-157.el7_3.5.x86_64",
"providedOSName": "centos",
"matchedOSName": "centos",
"bulletinOSName": "CentOS",
"providedOSVersion": "7",
"bulletinOSVersion": "7",
"providedVersion": "0:2.17-157.el7_3.5",
"bulletinVersion": "2.17-222.el7",
"providedPackage": "glibc-common-2.17-157.el7_3.5.x86_64",
"bulletinPackage": "glibc-common-2.17-222.el7.x86_64.rpm",
"operator": "lt",
"bulletinID": "CESA-2018:0805",
"cvelist": [
"CVE-2014-9402",
"CVE-2017-15670",
"CVE-2015-5180",
"CVE-2017-15804",
"CVE-2017-12132",
"CVE-2018-1000001"
],
"cvss": {
"score": 7.8,
"vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
},
"fix": "sudo yum -y update glibc-common"
}
],
"CESA-2019:2118": [
{
"package": "glibc-common-2.17-157.el7_3.5.x86_64",
"providedOSName": "centos",
"matchedOSName": "centos",
"bulletinOSName": "CentOS",
"providedOSVersion": "7",
"bulletinOSVersion": "7",
"providedVersion": "0:2.17-157.el7_3.5",
"bulletinVersion": "2.17-292.el7",
"providedPackage": "glibc-common-2.17-157.el7_3.5.x86_64",
"bulletinPackage": "glibc-common-2.17-292.el7.x86_64.rpm",
"operator": "lt",
"bulletinID": "CESA-2019:2118",
"cvelist": [
"CVE-2016-10739"
],
"cvss": {
"score": 4.6,
"vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"fix": "sudo yum -y update glibc-common"
},
{
"package": "glibc-common-2.17-157.el7_3.5.x86_64",
"providedOSName": "centos",
"matchedOSName": "centos",
"bulletinOSName": "CentOS",
"providedOSVersion": "7",
"bulletinOSVersion": "7",
"providedVersion": "0:2.17-157.el7_3.5",
"bulletinVersion": "2.17-292.el7",
"providedPackage": "glibc-common-2.17-157.el7_3.5.x86_64",
"bulletinPackage": "glibc-common-2.17-292.el7.x86_64.rpm",
"operator": "lt",
"bulletinID": "CESA-2019:2118",
"cvelist": [
"CVE-2016-10739"
],
"cvss": {
"score": 4.6,
"vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"fix": "sudo yum -y update glibc-common"
}
],
"CESA-2020:3861": [
{
"package": "glibc-common-2.17-157.el7_3.5.x86_64",
"providedOSName": "centos",
"matchedOSName": "centos",
"bulletinOSName": "CentOS",
"providedOSVersion": "7",
"bulletinOSVersion": "7",
"providedVersion": "0:2.17-157.el7_3.5",
"bulletinVersion": "2.17-317.el7",
"providedPackage": "glibc-common-2.17-157.el7_3.5.x86_64",
"bulletinPackage": "glibc-common-2.17-317.el7.x86_64.rpm",
"operator": "lt",
"bulletinID": "CESA-2020:3861",
"cvelist": [
"CVE-2019-19126"
],
"cvss": {
"score": 2.1,
"vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"
},
"fix": "sudo yum -y update glibc-common"
}
],
"CESA-2021:0348": [
{
"package": "glibc-common-2.17-157.el7_3.5.x86_64",
"providedOSName": "centos",
"matchedOSName": "centos",
"bulletinOSName": "CentOS",
"providedOSVersion": "7",
"bulletinOSVersion": "7",
"providedVersion": "0:2.17-157.el7_3.5",
"bulletinVersion": "2.17-322.el7_9",
"providedPackage": "glibc-common-2.17-157.el7_3.5.x86_64",
"bulletinPackage": "glibc-common-2.17-322.el7_9.x86_64.rpm",
"operator": "lt",
"bulletinID": "CESA-2021:0348",
"cvelist": [
"CVE-2020-10029",
"CVE-2020-29573",
"CVE-2019-25013"
],
"cvss": {
"score": 7.1,
"vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"
},
"fix": "sudo yum -y update glibc-common"
}
]
}
}
[
"CESA-2018:0805",
"CESA-2021:0348",
"CESA-2020:3861",
"CESA-2017:1916",
"CESA-2018:3092",
"CESA-2019:2118"
]
[
"CVE-2016-10739",
"CVE-2015-8776",
"CVE-2014-9402",
"CVE-2020-10029",
"CVE-2017-15670",
"CVE-2020-29573",
"CVE-2018-11237",
"CVE-2015-8777",
"CVE-2018-6485",
"CVE-2015-5180",
"CVE-2015-8779",
"CVE-2017-15804",
"CVE-2015-8778",
"CVE-2018-11236",
"CVE-2017-16997",
"CVE-2017-12132",
"CVE-2019-25013",
"CVE-2014-9761",
"CVE-2019-19126",
"CVE-2018-1000001"
]
"sudo yum -y update glibc-common"
Example for Debian 8. You can use it for any DEB based OS. Execute command: dpkg-query -W -f='${Package} ${Version} ${Architecture}\\n'
.
Use it as package variable input:
Query:
POST /api/v3/audit/audit/
Query example:
curl -XPOST https://vulners.com/api/v3/audit/audit/ -H 'Content-Type: application/json' -d '{
"os": "debian",
"version": "8",
"package": ["uno-libs3 4.3.3-2+deb8u7 amd64"],
"apiKey": "{API key}"
}'
debian_vulnerabilities = vulners_api.os_audit(
os= 'debian', os_version= '8', package= ['uno-libs3 4.3.3-2+deb8u7 amd64'])
debian_vulnerabilities = vulners_api.audit(
os= 'debian', os_version= '8', package= ['uno-libs3 4.3.3-2+deb8u7 amd64'])
{
"packages": {
"uno-libs3 4.3.3-2+deb8u7 amd64": {
"DEBIAN:DSA-3608-1:00C2E": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u5",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u5_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3608-1:00C2E",
"cvelist": [
"CVE-2016-4324"
],
"cvss": {
"score": 6.8,
"vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"DEBIAN:DSA-4111-2:43AFA": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u10",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u10_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-4111-2:43AFA",
"cvelist": [
"CVE-2018-6871"
],
"cvss": {
"score": 5.0,
"vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"DEBIAN:DSA-3394-1:77FE6": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u2",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u2_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3394-1:77FE6",
"cvelist": [
"CVE-2015-5214",
"CVE-2015-5212",
"CVE-2015-4551",
"CVE-2015-5213"
],
"cvss": {
"score": 6.8,
"vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"DEBIAN:DSA-3837-1:BCC65": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u7",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u7_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3837-1:BCC65",
"cvelist": [
"CVE-2017-7870"
],
"cvss": {
"score": 7.5,
"vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"DEBIAN:DSA-3236-1:341CA": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u1",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u1_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3236-1:341CA",
"cvelist": [
"CVE-2015-1774"
],
"cvss": {
"score": 6.8,
"vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"DEBIAN:BSA-096:958E6": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.2.5-1",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.2.5-1_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:BSA-096:958E6",
"cvelist": [
"CVE-2014-0247"
],
"cvss": {
"score": 10.0,
"vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"DEBIAN:DSA-4178-1:A9FA0": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u11",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u11_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-4178-1:A9FA0",
"cvelist": [
"CVE-2018-10120",
"CVE-2018-10119"
],
"cvss": {
"score": 6.8,
"vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"DEBIAN:DSA-3792-1:CB086": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u6",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u6_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3792-1:CB086",
"cvelist": [
"CVE-2017-3157"
],
"cvss": {
"score": 4.3,
"vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"DEBIAN:DSA-4022-1:5372C": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u9",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u9_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-4022-1:5372C",
"cvelist": [
"CVE-2017-12607",
"CVE-2017-12608"
],
"cvss": {
"score": 6.8,
"vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"DEBIAN:DSA-3482-1:91A41": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u3",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u3_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3482-1:91A41",
"cvelist": [
"CVE-2016-0794",
"CVE-2016-0795"
],
"cvss": {
"score": 9.3,
"vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"DEBIAN:DLA-1669-1:E907A": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u12",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u12_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DLA-1669-1:E907A",
"cvelist": [
"CVE-2018-16858"
],
"cvss": {
"score": 7.5,
"vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"DEBIAN:DLA-1947-1:BAC22": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u13",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u13_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DLA-1947-1:BAC22",
"cvelist": [
"CVE-2019-9852",
"CVE-2019-9854",
"CVE-2019-9849",
"CVE-2019-9853",
"CVE-2019-9850",
"CVE-2019-9848",
"CVE-2018-16858",
"CVE-2019-9851"
],
"cvss": {
"score": 7.5,
"vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
]
}
},
"vulnerabilities": [
"DEBIAN:DSA-3837-1:BCC65",
"DEBIAN:DLA-1669-1:E907A",
"DEBIAN:BSA-096:958E6",
"DEBIAN:DSA-3482-1:91A41",
"DEBIAN:DSA-4111-2:43AFA",
"DEBIAN:DSA-4178-1:A9FA0",
"DEBIAN:DSA-4022-1:5372C",
"DEBIAN:DSA-3608-1:00C2E",
"DEBIAN:DSA-3792-1:CB086",
"DEBIAN:DSA-3394-1:77FE6",
"DEBIAN:DSA-3236-1:341CA",
"DEBIAN:DLA-1947-1:BAC22"
],
"reasons": [
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u5",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u5_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3608-1:00C2E",
"cvelist": [
"CVE-2016-4324"
],
"cvss": {
"score": 6.8,
"vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
},
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u10",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u10_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-4111-2:43AFA",
"cvelist": [
"CVE-2018-6871"
],
"cvss": {
"score": 5.0,
"vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
},
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u2",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u2_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3394-1:77FE6",
"cvelist": [
"CVE-2015-5214",
"CVE-2015-5212",
"CVE-2015-4551",
"CVE-2015-5213"
],
"cvss": {
"score": 6.8,
"vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
},
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u7",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u7_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3837-1:BCC65",
"cvelist": [
"CVE-2017-7870"
],
"cvss": {
"score": 7.5,
"vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
},
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u1",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u1_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3236-1:341CA",
"cvelist": [
"CVE-2015-1774"
],
"cvss": {
"score": 6.8,
"vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
},
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.2.5-1",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.2.5-1_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:BSA-096:958E6",
"cvelist": [
"CVE-2014-0247"
],
"cvss": {
"score": 10.0,
"vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
},
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u11",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u11_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-4178-1:A9FA0",
"cvelist": [
"CVE-2018-10120",
"CVE-2018-10119"
],
"cvss": {
"score": 6.8,
"vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
},
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u6",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u6_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3792-1:CB086",
"cvelist": [
"CVE-2017-3157"
],
"cvss": {
"score": 4.3,
"vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
},
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u9",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u9_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-4022-1:5372C",
"cvelist": [
"CVE-2017-12607",
"CVE-2017-12608"
],
"cvss": {
"score": 6.8,
"vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
},
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u3",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u3_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DSA-3482-1:91A41",
"cvelist": [
"CVE-2016-0794",
"CVE-2016-0795"
],
"cvss": {
"score": 9.3,
"vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
},
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u12",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u12_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DLA-1669-1:E907A",
"cvelist": [
"CVE-2018-16858"
],
"cvss": {
"score": 7.5,
"vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
},
{
"package": "uno-libs3 4.3.3-2+deb8u7 amd64",
"providedOSName": "debian",
"matchedOSName": "debian",
"bulletinOSName": "Debian",
"providedOSVersion": "8",
"bulletinOSVersion": "8",
"providedVersion": "4.3.3-2+deb8u7",
"bulletinVersion": "1:4.3.3-2+deb8u13",
"providedPackage": "uno-libs3 4.3.3-2+deb8u7 amd64",
"bulletinPackage": "uno-libs3_1:4.3.3-2+deb8u13_all.deb",
"operator": "lt",
"bulletinID": "DEBIAN:DLA-1947-1:BAC22",
"cvelist": [
"CVE-2019-9852",
"CVE-2019-9854",
"CVE-2019-9849",
"CVE-2019-9853",
"CVE-2019-9850",
"CVE-2019-9848",
"CVE-2018-16858",
"CVE-2019-9851"
],
"cvss": {
"score": 7.5,
"vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"fix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3"
}
],
"cvss": {
"score": 10.0,
"vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvelist": [
"CVE-2017-12607",
"CVE-2019-9852",
"CVE-2017-3157",
"CVE-2019-9854",
"CVE-2018-10120",
"CVE-2015-5214",
"CVE-2016-0794",
"CVE-2019-9849",
"CVE-2015-1774",
"CVE-2017-12608",
"CVE-2018-10119",
"CVE-2019-9853",
"CVE-2019-9850",
"CVE-2015-5212",
"CVE-2018-6871",
"CVE-2015-4551",
"CVE-2015-5213",
"CVE-2017-7870",
"CVE-2016-4324",
"CVE-2019-9848",
"CVE-2014-0247",
"CVE-2018-16858",
"CVE-2016-0795",
"CVE-2019-9851"
],
"cumulativeFix": "sudo apt-get --assume-yes install --only-upgrade uno-libs3",
"id": "F6H17W4C3JPSSD46LYYW6STQ3WMMJGJF2G8BZJU2WVF68YEUEAVB8Z294A5O8OAYOWZ0B7X3RQ2CT5ZLAR241TX311RML7SDHFLRLZ0R2TC2SMUMW2C5GVZ52RVVBIAL"
}
Download Linux (RPM/DEB based) vulnerability assessment data¶
Try downloading Linux (RPM/DEB based) vulnerability assessment data and work with it locally for faster processing. This function is available to paying subscribers:
Query:
GET /api/v3/archive/distributive/
Query string example::
curl -GET https://vulners.com/api/v3/archive/distributive/?os=CentOS&version=7&apiKey={API key}
# Example for CentOS 7
centos_vulnerabilities_data = vulners_api.get_distributive("CentOS", "7")
# Example for CentOS 7
centos_vulnerabilities_data = vulners_api.distributive("CentOS", "7")