English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 123947 CVE Beschreibungen
und 58962 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.835172
Kategorie:HP-UX Local Security Checks
Titel:HP-UX Update for Apache HPSBUX02365
Zusammenfassung:Check for the Version of Apache
Beschreibung:Description:


Vulnerability Insight:
A potential security vulnerability has been identified with HP-UX running
Apache. These vulnerabilities could be exploited remotely resulting in Cross
Site Scripting (XSS) or Denial of Service (DoS).

Impact:
Remote Cross Site Scripting (XSS) or Denial of Service (DoS)

Affected Software/OS:
Apache on
HP-UX B.11.11, B.11.23, B.11.31 running Apache v2.0.59.05 and previous

Fix: Please Install the Updated Packages.

References:
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01539432-4

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-4465
Bugtraq: 20070912 Apache2 Undefined Charset UTF-7 XSS Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/479237/100/0/threaded
http://securityreason.com/achievement_securityalert/46
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html
http://security.gentoo.org/glsa/glsa-200711-06.xml
HPdes Security Advisory: HPSBUX02365
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
HPdes Security Advisory: SSRT080118
HPdes Security Advisory: HPSBUX02431
http://marc.info/?l=bugtraq&m=124654546101607&w=2
HPdes Security Advisory: SSRT090085
HPdes Security Advisory: HPSBUX02465
http://marc.info/?l=bugtraq&m=125631037611762&w=2
HPdes Security Advisory: SSRT090192
http://www.mandriva.com/security/advisories?name=MDVSA-2008:014
http://www.redhat.com/support/errata/RHSA-2007-0911.html
http://www.redhat.com/support/errata/RHSA-2008-0004.html
http://www.redhat.com/support/errata/RHSA-2008-0005.html
http://www.redhat.com/support/errata/RHSA-2008-0006.html
http://www.redhat.com/support/errata/RHSA-2008-0008.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
SuSE Security Announcement: SUSE-SA:2007:061 (Google Search)
http://www.novell.com/linux/security/advisories/2007_61_apache2.html
http://www.ubuntu.com/usn/usn-575-1
Cert/CC Advisory: TA08-150A
http://www.us-cert.gov/cas/techalerts/TA08-150A.html
BugTraq ID: 25653
http://www.securityfocus.com/bid/25653
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929
http://secunia.com/advisories/35650
http://www.vupen.com/english/advisories/2008/1697
http://securitytracker.com/id?1019194
http://secunia.com/advisories/26842
http://secunia.com/advisories/26952
http://secunia.com/advisories/27563
http://secunia.com/advisories/27732
http://secunia.com/advisories/28467
http://secunia.com/advisories/28471
http://secunia.com/advisories/28607
http://secunia.com/advisories/28749
http://secunia.com/advisories/30430
http://secunia.com/advisories/31651
http://secunia.com/advisories/33105
http://securityreason.com/securityalert/3113
XForce ISS Database: apache-utf7-xss(36586)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36586
Common Vulnerability Exposure (CVE) ID: CVE-2008-2168
Bugtraq: 20080508 Apache Server HTML Injection and UTF-7 XSS Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/491862/100/0/threaded
Bugtraq: 20080510 Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/491901/100/0/threaded
Bugtraq: 20080510 Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/491930/100/0/threaded
Bugtraq: 20080512 Re: Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/491967/100/0/threaded
http://www.ubuntu.com/usn/USN-731-1
BugTraq ID: 29112
http://www.securityfocus.com/bid/29112
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5143
http://secunia.com/advisories/34219
http://securityreason.com/securityalert/3889
XForce ISS Database: apache-403-xss(42303)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42303
Common Vulnerability Exposure (CVE) ID: CVE-2008-2364
Bugtraq: 20080729 rPSA-2008-0236-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/494858/100/0/threaded
Bugtraq: 20081122 rPSA-2008-0328-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498567/100/0/threaded
AIX APAR: PK67579
http://www-1.ibm.com/support/docview.wss?uid=swg1PK67579
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00153.html
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00055.html
http://security.gentoo.org/glsa/glsa-200807-06.xml
HPdes Security Advisory: HPSBUX02401
http://marc.info/?l=bugtraq&m=123376588623823&w=2
HPdes Security Advisory: SSRT090005
http://www.mandriva.com/security/advisories?name=MDVSA-2008:195
http://www.mandriva.com/security/advisories?name=MDVSA-2008:237
RedHat Security Advisories: RHSA-2008:0967
http://rhn.redhat.com/errata/RHSA-2008-0967.html
http://www.redhat.com/support/errata/RHSA-2008-0966.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1
SuSE Security Announcement: SUSE-SR:2009:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
SuSE Security Announcement: SUSE-SR:2009:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
BugTraq ID: 29653
http://www.securityfocus.com/bid/29653
BugTraq ID: 31681
http://www.securityfocus.com/bid/31681
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6084
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11713
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9577
http://secunia.com/advisories/34259
http://secunia.com/advisories/34418
http://www.vupen.com/english/advisories/2008/1798
http://www.vupen.com/english/advisories/2008/2780
http://www.vupen.com/english/advisories/2009/0320
http://www.securitytracker.com/id?1020267
http://secunia.com/advisories/30621
http://secunia.com/advisories/31026
http://secunia.com/advisories/31404
http://secunia.com/advisories/31416
http://secunia.com/advisories/31904
http://secunia.com/advisories/32222
http://secunia.com/advisories/32685
http://secunia.com/advisories/33156
http://secunia.com/advisories/33797
http://secunia.com/advisories/32838
XForce ISS Database: apache-modproxy-module-dos(42987)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42987
CopyrightCopyright (C) 2009 Greenbone Networks GmbH

Dies ist nur einer von 58962 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Developer APIs | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2018 E-Soft Inc. Alle Rechte vorbehalten.