English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 75096 CVE Beschreibungen
und 39644 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.65840
Kategorie:SuSE Local Security Checks
Titel:SLES10: Security update for MozillaFirefox
Zusammenfassung:SLES10: Security update for MozillaFirefox
Beschreibung:The remote host is missing updates to packages that affect
the security of your system. One or more of the following packages
are affected:

MozillaFirefox
MozillaFirefox-translations


More details may also be found by searching for the SuSE
Enterprise Server 10 patch database located at
http://download.novell.com/patch/finder/

Solution:

Please install the updates provided by SuSE.
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-0352
Debian Security Information: DSA-1830 (Google Search)
http://www.debian.org/security/2009/dsa-1830
https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:044
http://www.mandriva.com/security/advisories?name=MDVSA-2009:083
RedHat Security Advisories: RHSA-2009:0256
http://rhn.redhat.com/errata/RHSA-2009-0256.html
http://www.redhat.com/support/errata/RHSA-2009-0257.html
http://www.redhat.com/support/errata/RHSA-2009-0258.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952
SuSE Security Announcement: SUSE-SA:2009:023 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html
SuSE Security Announcement: SUSE-SA:2009:009 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html
http://www.ubuntu.com/usn/usn-717-1
http://www.ubuntulinux.org/support/documentation/usn/usn-741-1
BugTraq ID: 33598
http://www.securityfocus.com/bid/33598
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10699
http://secunia.com/advisories/33802
http://secunia.com/advisories/33831
http://secunia.com/advisories/33841
http://secunia.com/advisories/33846
http://secunia.com/advisories/34387
http://secunia.com/advisories/34324
http://secunia.com/advisories/34417
http://secunia.com/advisories/34462
http://secunia.com/advisories/34464
http://secunia.com/advisories/34527
http://www.vupen.com/english/advisories/2009/0313
http://www.securitytracker.com/id?1021663
http://secunia.com/advisories/33799
http://secunia.com/advisories/33808
http://secunia.com/advisories/33809
http://secunia.com/advisories/33816
http://secunia.com/advisories/33869
Common Vulnerability Exposure (CVE) ID: CVE-2009-0353
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11193
Common Vulnerability Exposure (CVE) ID: CVE-2009-0772
Debian Security Information: DSA-1751 (Google Search)
http://www.debian.org/security/2009/dsa-1751
http://www.mandriva.com/security/advisories?name=MDVSA-2009:075
http://www.redhat.com/support/errata/RHSA-2009-0315.html
http://www.redhat.com/support/errata/RHSA-2009-0325.html
SuSE Security Announcement: SUSE-SA:2009:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html
BugTraq ID: 33990
http://www.securityfocus.com/bid/33990
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5703
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5945
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6097
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6811
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9609
http://www.securitytracker.com/id?1021795
http://secunia.com/advisories/34145
http://secunia.com/advisories/34272
http://secunia.com/advisories/34383
http://secunia.com/advisories/34137
http://secunia.com/advisories/34140
http://www.vupen.com/english/advisories/2009/0632
Common Vulnerability Exposure (CVE) ID: CVE-2009-0774
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11138
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5947
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6057
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6121
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6945
Common Vulnerability Exposure (CVE) ID: CVE-2009-0776
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5956
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6017
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6191
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7390
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9241
http://www.securitytracker.com/id?1021797
Common Vulnerability Exposure (CVE) ID: CVE-2009-0040
Bugtraq: 20090312 rPSA-2009-0046-1 libpng (Google Search)
http://www.securityfocus.com/archive/1/archive/1/501767/100/0/threaded
Bugtraq: 20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues (Google Search)
http://www.securityfocus.com/archive/1/archive/1/503912/100/0/threaded
Bugtraq: 20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server (Google Search)
http://www.securityfocus.com/archive/1/archive/1/505990/100/0/threaded
http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com
http://lists.vmware.com/pipermail/security-announce/2009/000062.html
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
Debian Security Information: DSA-1750 (Google Search)
http://www.debian.org/security/2009/dsa-1750
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html
http://security.gentoo.org/glsa/glsa-200903-28.xml
http://security.gentoo.org/glsa/glsa-201209-25.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:051
http://www.redhat.com/support/errata/RHSA-2009-0333.html
http://www.redhat.com/support/errata/RHSA-2009-0340.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
SuSE Security Announcement: SUSE-SR:2009:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Cert/CC Advisory: TA09-218A
http://www.us-cert.gov/cas/techalerts/TA09-218A.html
CERT/CC vulnerability note: VU#649212
http://www.kb.cert.org/vuls/id/649212
BugTraq ID: 33827
http://www.securityfocus.com/bid/33827
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10316
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6458
http://secunia.com/advisories/34210
http://secunia.com/advisories/34265
http://secunia.com/advisories/34320
http://secunia.com/advisories/34388
http://secunia.com/advisories/35074
http://secunia.com/advisories/35258
http://secunia.com/advisories/35302
http://secunia.com/advisories/35379
http://secunia.com/advisories/35386
http://secunia.com/advisories/36096
http://secunia.com/advisories/34143
http://secunia.com/advisories/34152
http://www.vupen.com/english/advisories/2009/0469
http://www.vupen.com/english/advisories/2009/0473
http://secunia.com/advisories/33970
http://secunia.com/advisories/33976
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2009/1451
http://www.vupen.com/english/advisories/2009/1462
http://www.vupen.com/english/advisories/2009/1522
http://www.vupen.com/english/advisories/2009/1560
http://www.vupen.com/english/advisories/2009/1621
http://www.vupen.com/english/advisories/2009/2172
XForce ISS Database: libpng-pointer-arrays-code-execution(48819)
http://xforce.iss.net/xforce/xfdb/48819
Common Vulnerability Exposure (CVE) ID: CVE-2009-1169
http://blogs.zdnet.com/security/?p=3013
http://www.milw0rm.com/exploits/8285
Debian Security Information: DSA-1756 (Google Search)
http://www.debian.org/security/2009/dsa-1756
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01023.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01040.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:084
http://www.redhat.com/support/errata/RHSA-2009-0397.html
http://www.redhat.com/support/errata/RHSA-2009-0398.html
SuSE Security Announcement: SUSE-SA:2009:022 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00008.html
http://www.ubuntu.com/usn/usn-745-1
BugTraq ID: 34235
http://www.securityfocus.com/bid/34235
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11372
http://www.securitytracker.com/id?1021939
http://secunia.com/advisories/34471
http://secunia.com/advisories/34549
http://secunia.com/advisories/34550
http://secunia.com/advisories/34505
http://secunia.com/advisories/34486
http://secunia.com/advisories/34510
http://secunia.com/advisories/34511
http://secunia.com/advisories/34521
http://secunia.com/advisories/34792
http://www.vupen.com/english/advisories/2009/0853
XForce ISS Database: mozilla-xslt-code-execution(49439)
http://xforce.iss.net/xforce/xfdb/49439
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 39644 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.