Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.58799
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: kdebase3
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following packages are affected:

kdebase3
kdelibs3

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-3820
BugTraq ID: 24912
http://www.securityfocus.com/bid/24912
BugTraq ID: 24918
http://www.securityfocus.com/bid/24918
Bugtraq: 20070713 Opera/Konqueror: data: URL scheme address bar spoofing (Google Search)
http://www.securityfocus.com/archive/1/473703/100/0/threaded
Bugtraq: 20070714 Re: Opera/Konqueror: data: URL scheme address bar spoofing (Google Search)
http://www.securityfocus.com/archive/1/473712/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:176
http://alt.swiecki.net/oper1.html
http://osvdb.org/37242
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10345
http://www.redhat.com/support/errata/RHSA-2007-0905.html
http://www.redhat.com/support/errata/RHSA-2007-0909.html
http://www.securitytracker.com/id?1018396
http://secunia.com/advisories/26091
http://secunia.com/advisories/26612
http://secunia.com/advisories/26720
http://secunia.com/advisories/27089
http://secunia.com/advisories/27090
http://secunia.com/advisories/27096
http://secunia.com/advisories/27106
http://secunia.com/advisories/27108
http://securityreason.com/securityalert/2905
http://www.ubuntu.com/usn/usn-502-1
http://www.vupen.com/english/advisories/2007/2538
XForce ISS Database: opera-konqueror-addressbar-spoofing(35430)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35430
Common Vulnerability Exposure (CVE) ID: CVE-2007-4224
BugTraq ID: 25219
http://www.securityfocus.com/bid/25219
Bugtraq: 20070806 Konqueror: URL address bar spoofing vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/475689/100/0/threaded
Bugtraq: 20070806 Re: Konqueror: URL address bar spoofing vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/475731/100/0/threaded
Bugtraq: 20070806 Re: Konqueror: URL address bar spoofingvulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/475730/100/0/threaded
Bugtraq: 20070807 Re: [Full-disclosure] Konqueror: URL address bar spoofing vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/475763/100/0/threaded
http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9879
http://securitytracker.com/id?1018579
http://secunia.com/advisories/26351
http://secunia.com/advisories/26690
http://secunia.com/advisories/27271
http://securityreason.com/securityalert/2982
SuSE Security Announcement: SUSE-SR:2007:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
http://www.vupen.com/english/advisories/2007/2807
XForce ISS Database: konqueror-setinterval-spoofing(35828)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35828
Common Vulnerability Exposure (CVE) ID: CVE-2007-4225
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00084.html
XForce ISS Database: konqueror-data-spoofing(35829)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35829
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.