ID OPENVAS:861986 Type openvas Reporter Copyright (c) 2010 Greenbone Networks GmbH Modified 2017-12-12T00:00:00
Description
Check for the Version of kde-l10n
###############################################################################
# OpenVAS Vulnerability Test
#
# Fedora Update for kde-l10n FEDORA-2010-8547
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
tag_affected = "kde-l10n on Fedora 11";
tag_insight = "Internationalization support for KDE";
tag_solution = "Please Install the Updated Packages.";
if(description)
{
script_xref(name : "URL" , value : "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041976.html");
script_id(861986);
script_version("$Revision: 8082 $");
script_tag(name:"last_modification", value:"$Date: 2017-12-12 07:31:24 +0100 (Tue, 12 Dec 2017) $");
script_tag(name:"creation_date", value:"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)");
script_tag(name:"cvss_base", value:"6.4");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:P");
script_xref(name: "FEDORA", value: "2010-8547");
script_cve_id("CVE-2010-1000", "CVE-2010-1511");
script_name("Fedora Update for kde-l10n FEDORA-2010-8547");
script_tag(name: "summary" , value: "Check for the Version of kde-l10n");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2010 Greenbone Networks GmbH");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms");
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "FC11")
{
if ((res = isrpmvuln(pkg:"kde-l10n", rpm:"kde-l10n~4.4.3~1.fc11", rls:"FC11")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
{"id": "OPENVAS:861986", "type": "openvas", "bulletinFamily": "scanner", "title": "Fedora Update for kde-l10n FEDORA-2010-8547", "description": "Check for the Version of kde-l10n", "published": "2010-05-28T00:00:00", "modified": "2017-12-12T00:00:00", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=861986", "reporter": "Copyright (c) 2010 Greenbone Networks GmbH", "references": ["2010-8547", "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041976.html"], "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "lastseen": "2017-12-12T11:11:18", "viewCount": 1, "enchantments": {"score": {"value": 5.5, "vector": "NONE", "modified": "2017-12-12T11:11:18", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2010-1511", "CVE-2010-1000"]}, {"type": "fedora", "idList": ["FEDORA:8BDD511130F", "FEDORA:E2CE1111310", "FEDORA:7CB0B111702", "FEDORA:CBA47111112", "FEDORA:D2048111114", "FEDORA:DAF24111710", "FEDORA:ADBD611131A", "FEDORA:4EC70111316", "FEDORA:2750B11130D", "FEDORA:7C52511110B"]}, {"type": "openvas", "idList": ["OPENVAS:862006", "OPENVAS:1361412562310861995", "OPENVAS:1361412562310862004", "OPENVAS:1361412562310861977", "OPENVAS:861992", "OPENVAS:861994", "OPENVAS:861980", "OPENVAS:1361412562310862009", "OPENVAS:1361412562310862007", "OPENVAS:862015"]}, {"type": "nessus", "idList": ["FEDORA_2010-8577.NASL", "MANDRIVA_MDVSA-2010-098.NASL", "FEDORA_2010-18029.NASL", "UBUNTU_USN-938-1.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:10840"]}, {"type": "ubuntu", "idList": ["USN-938-1"]}], "modified": "2017-12-12T11:11:18", "rev": 2}, "vulnersScore": 5.5}, "pluginID": "861986", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kde-l10n FEDORA-2010-8547\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kde-l10n on Fedora 11\";\ntag_insight = \"Internationalization support for KDE\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041976.html\");\n script_id(861986);\n script_version(\"$Revision: 8082 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-12 07:31:24 +0100 (Tue, 12 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-8547\");\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_name(\"Fedora Update for kde-l10n FEDORA-2010-8547\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kde-l10n\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"kde-l10n\", rpm:\"kde-l10n~4.4.3~1.fc11\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "naslFamily": "Fedora Local Security Checks"}
{"cve": [{"lastseen": "2020-10-03T11:57:24", "description": "KGet 2.4.2 in KDE SC 4.0.0 through 4.4.3 does not properly request download confirmation from the user, which makes it easier for remote attackers to overwrite arbitrary files via a crafted metalink file.", "edition": 3, "cvss3": {}, "published": "2010-05-17T21:00:00", "title": "CVE-2010-1511", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1511"], "modified": "2018-10-10T19:57:00", "cpe": ["cpe:/a:kde:kde_sc:4.4.1", "cpe:/a:kde:kde_sc:4.0.4", "cpe:/a:kde:kde_sc:4.0.1", "cpe:/a:kde:kde_sc:4.4.2", "cpe:/a:kde:kde_sc:4.0.2", "cpe:/a:kde:kde_sc:4.3.0", "cpe:/a:kde:kget:2.4.2", "cpe:/a:kde:kde_sc:4.0.0", "cpe:/a:kde:kde_sc:4.4.3", "cpe:/a:kde:kde_sc:4.1.0", "cpe:/a:kde:kde_sc:4.0.5", "cpe:/a:kde:kde_sc:4.2.2", "cpe:/a:kde:kde_sc:4.1.4", "cpe:/a:kde:kde_sc:4.1.80", "cpe:/a:kde:kde_sc:4.2.3", "cpe:/a:kde:kde_sc:4.3.1", "cpe:/a:kde:kde_sc:4.1.96", "cpe:/a:kde:kde_sc:4.3.5", "cpe:/a:kde:kde_sc:3.5.10", "cpe:/a:kde:kde_sc:4.3.4", "cpe:/a:kde:kde_sc:2.2.0", "cpe:/a:kde:kde_sc:4.1.1", "cpe:/a:kde:kde_sc:4.2.1", "cpe:/a:kde:kde_sc:4.0.3", "cpe:/a:kde:kde_sc:4.2.4", "cpe:/a:kde:kde_sc:4.1.2", "cpe:/a:kde:kde_sc:4.3.2", "cpe:/a:kde:kde_sc:4.2", "cpe:/a:kde:kde_sc:4.3.3", "cpe:/a:kde:kde_sc:4.4.0", "cpe:/a:kde:kde_sc:4.1.3", "cpe:/a:kde:kde_sc:4.1.85", "cpe:/a:kde:kde_sc:4.2.0"], "id": "CVE-2010-1511", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1511", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.96:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:kde:kget:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.85:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.0:rc:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.80:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:3.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2:rc:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:57:23", "description": "Directory traversal vulnerability in KGet in KDE SC 4.0.0 through 4.4.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.\nPer: http://www.kde.org/info/security/advisory-20100513-1.txt\r\n\r\n'Patches have been committed to the KDE Subversion repository in the\r\n following revision numbers:\r\n\r\n 4.3 branch: r1126227\r\n 4.4 branch: r1124974\r\n Trunk: r1124976'\r\n", "edition": 3, "cvss3": {}, "published": "2010-05-17T21:00:00", "title": "CVE-2010-1000", "type": "cve", "cwe": ["CWE-22"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1000"], "modified": "2018-10-10T19:55:00", "cpe": ["cpe:/a:kde:kde_sc:4.4.1", "cpe:/a:kde:kde_sc:4.0.4", "cpe:/a:kde:kde_sc:4.0.1", "cpe:/a:kde:kde_sc:4.4.2", "cpe:/a:kde:kde_sc:4.0.2", "cpe:/a:kde:kde_sc:4.3.0", "cpe:/a:kde:kde_sc:4.0.0", "cpe:/a:kde:kde_sc:4.4.3", "cpe:/a:kde:kde_sc:4.1.0", "cpe:/a:kde:kde_sc:4.0.5", "cpe:/a:kde:kde_sc:4.2.2", "cpe:/a:kde:kde_sc:4.1.4", "cpe:/a:kde:kde_sc:4.1.80", "cpe:/a:kde:kde_sc:4.2.3", "cpe:/a:kde:kde_sc:4.3.1", "cpe:/a:kde:kde_sc:4.1.96", "cpe:/a:kde:kde_sc:4.3.5", "cpe:/a:kde:kde_sc:4.3.4", "cpe:/a:kde:kde_sc:4.1.1", "cpe:/a:kde:kde_sc:4.2.1", "cpe:/a:kde:kde_sc:4.0.3", "cpe:/a:kde:kde_sc:4.2.4", "cpe:/a:kde:kde_sc:4.1.2", "cpe:/a:kde:kde_sc:4.3.2", "cpe:/a:kde:kde_sc:4.2", "cpe:/a:kde:kde_sc:4.3.3", "cpe:/a:kde:kde_sc:4.4.0", "cpe:/a:kde:kde_sc:4.1.3", "cpe:/a:kde:kde_sc:4.1.85", "cpe:/a:kde:kde_sc:4.2.0"], "id": "CVE-2010-1000", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1000", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.96:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.85:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.0:rc:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.80:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.2:rc:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*"]}], "fedora": [{"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1000", "CVE-2010-1511"], "description": "The kdeadmin package includes administrative tools including: * kcron: systemsettings module for the cron task scheduler * knetworkconf: systemsettings module for network settings * ksystemlog: system log viewer * kuser: user manager ", "modified": "2010-05-26T21:45:22", "published": "2010-05-26T21:45:22", "id": "FEDORA:654681116FE", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 11 Update: kdeadmin-4.4.3-1.fc11.1", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1000", "CVE-2010-1511"], "description": "kdetoys includes: * amor: Amusing Misuse Of Resources put's comic figures above your windows * kteatime: makes sure your tea does not get too strong * ktux: Tux-in-a-Spaceship screen saver * kweather: display the current weather outside ", "modified": "2010-05-26T21:41:20", "published": "2010-05-26T21:41:20", "id": "FEDORA:EA2C0111119", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kdetoys-4.4.3-1.fc12.1", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1000", "CVE-2010-1511"], "description": "KDE bindings to non-C++ languages ", "modified": "2010-05-26T21:42:53", "published": "2010-05-26T21:42:53", "id": "FEDORA:82B8F11106A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: kdebindings-4.4.3-1.fc13.1", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1000", "CVE-2010-1511"], "description": "Additional plasmoids for KDE. ", "modified": "2010-05-26T21:41:20", "published": "2010-05-26T21:41:20", "id": "FEDORA:DC33A111117", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kdeplasma-addons-4.4.3-1.fc12.1", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1000", "CVE-2010-1511"], "description": "Additional artwork for KDE, including additional styles, themes. ", "modified": "2010-05-26T21:45:22", "published": "2010-05-26T21:45:22", "id": "FEDORA:73F57111700", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 11 Update: kdeartwork-4.4.3-1.fc11.1", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1000", "CVE-2010-1511"], "description": "Networking applications, including: * kget: downloader manager * kopete: chat client * kppp: dialer and front end for pppd * krdc: a client for Desktop Sharing and other VNC servers * krfb: Desktop Sharing server, allow others to access your desktop via VNC ", "modified": "2011-04-20T19:23:08", "published": "2011-04-20T19:23:08", "id": "FEDORA:AE59D110E01", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: kdenetwork-4.5.5-2.fc13", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1000", "CVE-2010-1511"], "description": "Networking applications, including: * kget: downloader manager * kopete: chat client * kppp: dialer and front end for pppd * krdc: a client for Desktop Sharing and other VNC servers * krfb: Desktop Sharing server, allow others to access your desktop via VNC ", "modified": "2010-11-30T22:47:56", "published": "2010-11-30T22:47:56", "id": "FEDORA:AE378110E2C", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kdenetwork-4.4.5-4.fc12", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1000", "CVE-2010-1511"], "description": "kdetoys includes: * amor: Amusing Misuse Of Resources put's comic figures above your windows * kteatime: makes sure your tea does not get too strong * ktux: Tux-in-a-Spaceship screen saver * kweather: display the current weather outside ", "modified": "2010-05-26T21:45:22", "published": "2010-05-26T21:45:22", "id": "FEDORA:CA49F11170F", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 11 Update: kdetoys-4.4.3-1.fc11.1", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1000", "CVE-2010-1511"], "description": "A collection of applications and tools used by developers, including: * cervisia: a CVS frontend * kate: advanced text editor * kbugbuster: a tool to manage the KDE bug report system * kcachegrind: a browser for data produced by profiling tools (e.g. cachegr ind) * kompare: diff tool * kuiviewer: displays designer's UI files * lokalize: computer-aided translation system focusing on productivity and performance * umbrello: UML modeller and UML diagram tool ", "modified": "2010-05-26T21:41:20", "published": "2010-05-26T21:41:20", "id": "FEDORA:E574B111118", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kdesdk-4.4.3-1.fc12.1", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1000", "CVE-2010-1511"], "description": "Utilities for KDE 4. Includes: * ark: tar/gzip archive manager * kcalc: scientific calculator * kcharselect: character selector * kdelirc: Linux Infrared Remote Control frontend * kdf: view disk usage * kfloppy: floppy formatting tool * kgpg: gpg gui * ktimer: task scheduler * kwalletmanager: kde wallet management tool * okteta: binary/hex editor * superkaramba * sweeper: clean unwanted traces the user leaves on the system ", "modified": "2010-05-26T21:42:53", "published": "2010-05-26T21:42:53", "id": "FEDORA:67A4D111318", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: kdeutils-4.4.3-1.fc13.1", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-12T10:08:24", "description": "Includes fixes for a security issue in KGet, and login issue for\nkopete icq plugin ( see http://bugs.kde.org/257008 )\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2010-12-01T00:00:00", "title": "Fedora 12 : kdenetwork-4.4.5-4.fc12 (2010-18029)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "modified": "2010-12-01T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:kdenetwork", "cpe:/o:fedoraproject:fedora:12"], "id": "FEDORA_2010-18029.NASL", "href": "https://www.tenable.com/plugins/nessus/50847", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2010-18029.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50847);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_bugtraq_id(40141);\n script_xref(name:\"FEDORA\", value:\"2010-18029\");\n\n script_name(english:\"Fedora 12 : kdenetwork-4.4.5-4.fc12 (2010-18029)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Includes fixes for a security issue in KGet, and login issue for\nkopete icq plugin ( see http://bugs.kde.org/257008 )\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://bugs.kde.org/257008\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.kde.org/257008\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=591631\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2010-November/051692.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?11512c22\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kdenetwork package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdenetwork\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:12\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/12/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^12([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 12.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC12\", reference:\"kdenetwork-4.4.5-4.fc12\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kdenetwork\");\n}\n", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}], "openvas": [{"lastseen": "2017-12-15T11:58:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "description": "Check for the Version of kdetoys", "modified": "2017-12-15T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:862013", "href": "http://plugins.openvas.org/nasl.php?oid=862013", "type": "openvas", "title": "Fedora Update for kdetoys FEDORA-2010-8547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdetoys FEDORA-2010-8547\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdetoys on Fedora 11\";\ntag_insight = \"kdetoys includes:\n * amor: Amusing Misuse Of Resources put's comic figures above your windows\n * kteatime: makes sure your tea does not get too strong\n * ktux: Tux-in-a-Spaceship screen saver\n * kweather: display the current weather outside\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041988.html\");\n script_id(862013);\n script_version(\"$Revision: 8130 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-15 07:31:09 +0100 (Fri, 15 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-8547\");\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_name(\"Fedora Update for kdetoys FEDORA-2010-8547\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kdetoys\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdetoys\", rpm:\"kdetoys~4.4.3~1.fc11.1\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-06T13:04:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "description": "Check for the Version of kdeadmin", "modified": "2018-01-03T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:1361412562310861999", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310861999", "type": "openvas", "title": "Fedora Update for kdeadmin FEDORA-2010-8547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdeadmin FEDORA-2010-8547\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdeadmin on Fedora 11\";\ntag_insight = \"The kdeadmin package includes administrative tools including:\n * kcron: systemsettings module for the cron task scheduler\n * knetworkconf: systemsettings module for network settings\n * ksystemlog: system log viewer\n * kuser: user manager\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041974.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.861999\");\n script_version(\"$Revision: 8274 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-03 08:28:17 +0100 (Wed, 03 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-8547\");\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_name(\"Fedora Update for kdeadmin FEDORA-2010-8547\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kdeadmin\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdeadmin\", rpm:\"kdeadmin~4.4.3~1.fc11.1\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-15T11:58:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "description": "Check for the Version of kdepim", "modified": "2017-12-15T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:861991", "href": "http://plugins.openvas.org/nasl.php?oid=861991", "type": "openvas", "title": "Fedora Update for kdepim FEDORA-2010-8547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdepim FEDORA-2010-8547\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdepim on Fedora 11\";\ntag_insight = \"KDE PIM (Personal Information Manager) applications, including:\n * akregator: feed aggregator\n * blogilo: blogging application, focused on simplicity and usability\n * kmail: email client\n * knode: newsreader\n * knotes: sticky notes for the desktop\n * kontact: integrated PIM management\n * korganizer: journal, appointments, events, todos\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041977.html\");\n script_id(861991);\n script_version(\"$Revision: 8130 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-15 07:31:09 +0100 (Fri, 15 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-8547\");\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_name(\"Fedora Update for kdepim FEDORA-2010-8547\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kdepim\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdepim\", rpm:\"kdepim~4.4.3~1.fc11.1\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-14T11:48:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "description": "Check for the Version of kdeplasma-addons", "modified": "2017-12-13T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:862008", "href": "http://plugins.openvas.org/nasl.php?oid=862008", "type": "openvas", "title": "Fedora Update for kdeplasma-addons FEDORA-2010-8547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdeplasma-addons FEDORA-2010-8547\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdeplasma-addons on Fedora 11\";\ntag_insight = \"Additional plasmoids for KDE.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041981.html\");\n script_id(862008);\n script_version(\"$Revision: 8092 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-13 07:31:16 +0100 (Wed, 13 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-8547\");\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_name(\"Fedora Update for kdeplasma-addons FEDORA-2010-8547\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kdeplasma-addons\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdeplasma-addons\", rpm:\"kdeplasma-addons~4.4.3~1.fc11.1\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:54:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "description": "Check for the Version of kdegraphics", "modified": "2017-12-21T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:1361412562310862001", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862001", "type": "openvas", "title": "Fedora Update for kdegraphics FEDORA-2010-8547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdegraphics FEDORA-2010-8547\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdegraphics on Fedora 11\";\ntag_insight = \"Graphics applications, including\n * gwenview (an image viewer)\n * kamera (digital camera support)\n * kcolorchooser (a color chooser)\n * kolourpaint4 (an easy-to-use paint program)\n * kruler (screen ruler and color measurement tool)\n * ksnapshot (screen capture utility)\n * okular (a document viewer)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041980.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862001\");\n script_version(\"$Revision: 8207 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-21 08:30:12 +0100 (Thu, 21 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-8547\");\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_name(\"Fedora Update for kdegraphics FEDORA-2010-8547\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kdegraphics\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdegraphics\", rpm:\"kdegraphics~4.4.3~1.fc11.1\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-15T11:58:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "description": "Check for the Version of kdeadmin", "modified": "2017-12-15T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:861979", "href": "http://plugins.openvas.org/nasl.php?oid=861979", "type": "openvas", "title": "Fedora Update for kdeadmin FEDORA-2010-8544", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdeadmin FEDORA-2010-8544\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdeadmin on Fedora 12\";\ntag_insight = \"The kdeadmin package includes administrative tools including:\n * kcron: systemsettings module for the cron task scheduler\n * knetworkconf: systemsettings module for network settings\n * ksystemlog: system log viewer\n * kuser: user manager\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041915.html\");\n script_id(861979);\n script_version(\"$Revision: 8130 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-15 07:31:09 +0100 (Fri, 15 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-8544\");\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_name(\"Fedora Update for kdeadmin FEDORA-2010-8544\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kdeadmin\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC12\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdeadmin\", rpm:\"kdeadmin~4.4.3~1.fc12.1\", rls:\"FC12\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:54:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "description": "Check for the Version of kdeplasma-addons", "modified": "2017-12-25T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:1361412562310862008", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862008", "type": "openvas", "title": "Fedora Update for kdeplasma-addons FEDORA-2010-8547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdeplasma-addons FEDORA-2010-8547\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdeplasma-addons on Fedora 11\";\ntag_insight = \"Additional plasmoids for KDE.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041981.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862008\");\n script_version(\"$Revision: 8244 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-25 08:29:28 +0100 (Mon, 25 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-8547\");\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_name(\"Fedora Update for kdeplasma-addons FEDORA-2010-8547\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kdeplasma-addons\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdeplasma-addons\", rpm:\"kdeplasma-addons~4.4.3~1.fc11.1\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-06T13:05:04", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "description": "Check for the Version of kdetoys", "modified": "2018-01-03T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:1361412562310862013", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862013", "type": "openvas", "title": "Fedora Update for kdetoys FEDORA-2010-8547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdetoys FEDORA-2010-8547\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdetoys on Fedora 11\";\ntag_insight = \"kdetoys includes:\n * amor: Amusing Misuse Of Resources put's comic figures above your windows\n * kteatime: makes sure your tea does not get too strong\n * ktux: Tux-in-a-Spaceship screen saver\n * kweather: display the current weather outside\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041988.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862013\");\n script_version(\"$Revision: 8274 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-03 08:28:17 +0100 (Wed, 03 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-8547\");\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_name(\"Fedora Update for kdetoys FEDORA-2010-8547\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kdetoys\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdetoys\", rpm:\"kdetoys~4.4.3~1.fc11.1\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-17T11:05:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "description": "Check for the Version of kdepimlibs", "modified": "2018-01-16T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:1361412562310861978", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310861978", "type": "openvas", "title": "Fedora Update for kdepimlibs FEDORA-2010-8547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdepimlibs FEDORA-2010-8547\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdepimlibs on Fedora 11\";\ntag_insight = \"Personal Information Management (PIM) libraries for KDE 4.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041991.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.861978\");\n script_version(\"$Revision: 8438 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-16 18:38:23 +0100 (Tue, 16 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-8547\");\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_name(\"Fedora Update for kdepimlibs FEDORA-2010-8547\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kdepimlibs\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdepimlibs\", rpm:\"kdepimlibs~4.4.3~1.fc11.1\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:54:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "description": "Check for the Version of kdeedu", "modified": "2017-12-21T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:1361412562310862006", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862006", "type": "openvas", "title": "Fedora Update for kdeedu FEDORA-2010-8547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdeedu FEDORA-2010-8547\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdeedu on Fedora 11\";\ntag_insight = \"Educational/Edutainment applications:\n * blinken: Simon Says Game\n * kalzium: A periodic table of the elements\n * kanagram: Anagram game\n * kgeography: Learn geography\n * khangman: Hangman Game\n * kiten: Japanese Reference/Study Tool\n * klettres: French alphabet tutor\n * ktouch: Learn and practice touch typing\n * kturtle: Logo Programming Environment\n * kwordquiz: Flashcard and vocabulary learning\n * parley: Vocabulary Trainer\n * step: Interactive physical simulator\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041992.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862006\");\n script_version(\"$Revision: 8207 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-21 08:30:12 +0100 (Thu, 21 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-8547\");\n script_cve_id(\"CVE-2010-1000\", \"CVE-2010-1511\");\n script_name(\"Fedora Update for kdeedu FEDORA-2010-8547\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kdeedu\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdeedu\", rpm:\"kdeedu~4.4.3~1.fc11.1\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2020-07-09T00:23:24", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1511", "CVE-2010-1000"], "description": "It was discovered that KGet did not properly perform input validation when \nprocessing metalink files. If a user were tricked into opening a crafted \nmetalink file, a remote attacker could overwrite files via directory \ntraversal, which could eventually lead to arbitrary code execution. \n(CVE-2010-1000)\n\nIt was discovered that KGet would not always wait for user confirmation \nwhen downloading metalink files. If a user selected a file to download \nbut did not confirm or cancel the download, KGet would proceed with the \ndownload, overwriting any file with the same name. This issue only \naffected Ubuntu 10.04 LTS. (CVE-2010-1511)", "edition": 5, "modified": "2010-05-13T00:00:00", "published": "2010-05-13T00:00:00", "id": "USN-938-1", "href": "https://ubuntu.com/security/notices/USN-938-1", "title": "KDENetwork vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}]}