![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.123308 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2014-1194) |
Summary: | The remote host is missing an update for the 'conga' package(s) announced via the ELSA-2014-1194 advisory. |
Description: | Summary: The remote host is missing an update for the 'conga' package(s) announced via the ELSA-2014-1194 advisory. Vulnerability Insight: [0.12.2-81.0.2.el5] - Replaced redhat logo image in Data.fs [0.12.2-81.0.1.el5] - Added conga-enterprise-Carthage.patch to support OEL5 - Replaced redhat logo image in conga-0.12.2.tar.gz [0.12.2-81] - luci: prevent non-admin user from unauthorized executive access Resolves: rhbz#1089310 [0.12.2-79] - luci: drop unsuccessful monkey patch application wrt. Plone 20121106 advisory Related: rhbz#956861 [0.12.2-78] - luci: reflect startup_wait parameter added in postgres-8 RA Resolves: rhbz#1065263 - luci: Multiple information leak flaws in various luci site extensions Resolves: rhbz#1076148 [0.12.2-72] - luci: fix mishandling of distro release string Resolves: rhbz#1072075 - luci: fix initscript does not check return values correctly Resolves: rhbz#970288 - ricci: fix end-use modules do not handle stdin polling correctly Resolves: rhbz#1076711 [0.12.2-69] - luci: apply relevant parts of Plone 20121106 advisory (multiple vectors) Resolves: rhbz#956861 Affected Software/OS: 'conga' package(s) on Oracle Linux 5. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-5485 RHSA-2014:1194 http://rhn.redhat.com/errata/RHSA-2014-1194.html [oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix http://www.openwall.com/lists/oss-security/2012/11/10/1 https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt https://plone.org/products/plone-hotfix/releases/20121106 https://plone.org/products/plone/security/advisories/20121106/01 Common Vulnerability Exposure (CVE) ID: CVE-2012-5486 https://bugs.launchpad.net/zope2/+bug/930812 https://plone.org/products/plone/security/advisories/20121106/02 Common Vulnerability Exposure (CVE) ID: CVE-2012-5488 https://plone.org/products/plone/security/advisories/20121106/04 Common Vulnerability Exposure (CVE) ID: CVE-2012-5497 https://plone.org/products/plone/security/advisories/20121106/13 Common Vulnerability Exposure (CVE) ID: CVE-2012-5498 http://www.openwall.com/lists/oss-security/2012/11/09/7 https://plone.org/products/plone/security/advisories/20121106/14 Common Vulnerability Exposure (CVE) ID: CVE-2012-5499 https://plone.org/products/plone/security/advisories/20121106/15 Common Vulnerability Exposure (CVE) ID: CVE-2012-5500 https://plone.org/products/plone/security/advisories/20121106/16 Common Vulnerability Exposure (CVE) ID: CVE-2013-6496 https://bugzilla.redhat.com/show_bug.cgi?id=971541 Common Vulnerability Exposure (CVE) ID: CVE-2014-3521 https://bugzilla.redhat.com/show_bug.cgi?id=1112813 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |