Language:
Severity: High
ID: 148315
File Name: openSUSE-2021-485.nasl
Version: 1.4
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 4/5/2021
Updated: 1/5/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 4.6
Temporal Score: 3.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2020-27225
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:opensuse:eclipse-bootstrap-debuginfo, p-cpe:/a:novell:opensuse:eclipse-bootstrap-debugsource, p-cpe:/a:novell:opensuse:eclipse-contributor-tools, p-cpe:/a:novell:opensuse:eclipse-contributor-tools-bootstrap, p-cpe:/a:novell:opensuse:eclipse-debuginfo, p-cpe:/a:novell:opensuse:eclipse-debugsource, p-cpe:/a:novell:opensuse:eclipse-equinox-osgi, p-cpe:/a:novell:opensuse:eclipse-equinox-osgi-bootstrap, p-cpe:/a:novell:opensuse:eclipse-jdt, p-cpe:/a:novell:opensuse:eclipse-jdt-bootstrap, p-cpe:/a:novell:opensuse:eclipse-p2-discovery, p-cpe:/a:novell:opensuse:eclipse-p2-discovery-bootstrap, p-cpe:/a:novell:opensuse:eclipse-pde, p-cpe:/a:novell:opensuse:eclipse-pde-bootstrap, p-cpe:/a:novell:opensuse:eclipse-platform, p-cpe:/a:novell:opensuse:eclipse-platform-bootstrap, p-cpe:/a:novell:opensuse:eclipse-platform-bootstrap-debuginfo, p-cpe:/a:novell:opensuse:eclipse-platform-debuginfo, p-cpe:/a:novell:opensuse:eclipse-swt, p-cpe:/a:novell:opensuse:eclipse-swt-bootstrap, p-cpe:/a:novell:opensuse:eclipse-swt-bootstrap-debuginfo, p-cpe:/a:novell:opensuse:eclipse-swt-debuginfo, p-cpe:/a:novell:opensuse:eclipse-tests, p-cpe:/a:novell:opensuse:eclipse-tests-bootstrap, cpe:/o:novell:opensuse:15.2
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/30/2021
Vulnerability Publication Date: 3/9/2021
CVE: CVE-2020-27225