English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 73247 CVE descriptions
and 39212 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64165
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-707-1 (cupsys)
Summary:Ubuntu USN-707-1 (cupsys)
Description:The remote host is missing an update to cupsys
announced via advisory USN-707-1.

Details follow:

It was discovered that CUPS didn't properly handle adding a large number of RSS
subscriptions. A local user could exploit this and cause CUPS to crash, leading
to a denial of service. This issue only applied to Ubuntu 7.10, 8.04 LTS and
8.10. (CVE-2008-5183)

It was discovered that CUPS did not authenticate users when adding and
cancelling RSS subscriptions. An unprivileged local user could bypass intended
restrictions and add a large number of RSS subscriptions. This issue only
applied to Ubuntu 7.10 and 8.04 LTS. (CVE-2008-5184)

It was discovered that the PNG filter in CUPS did not properly handle certain
malformed images. If a user or automated system were tricked into opening a
crafted PNG image file, a remote attacker could cause a denial of service or
execute arbitrary code with user privileges. In Ubuntu 7.10, 8.04 LTS, and 8.10,
attackers would be isolated by the AppArmor CUPS profile. (CVE-2008-5286)

It was discovered that the example pstopdf CUPS filter created log files in an
insecure way. Local users could exploit a race condition to create or overwrite
files with the privileges of the user invoking the program. This issue only
applied to Ubuntu 6.06 LTS, 7.10, and 8.04 LTS. (CVE-2008-5377)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
cupsys 1.2.2-0ubuntu0.6.06.12

Ubuntu 7.10:
cupsys 1.3.2-1ubuntu7.9

Ubuntu 8.04 LTS:
cupsys 1.3.7-1ubuntu3.3

Ubuntu 8.10:
cups 1.3.9-2ubuntu6.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-707-1
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-5183
http://www.milw0rm.com/exploits/7150
http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
http://lab.gnucitizen.org/projects/cups-0day
http://www.openwall.com/lists/oss-security/2008/11/19/3
http://www.openwall.com/lists/oss-security/2008/11/19/4
http://www.openwall.com/lists/oss-security/2008/11/20/1
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Debian Security Information: DSA-2176 (Google Search)
http://www.debian.org/security/2011/dsa-2176
http://www.mandriva.com/security/advisories?name=MDVSA-2009:028
http://www.redhat.com/support/errata/RHSA-2008-1029.html
SuSE Security Announcement: SUSE-SR:2008:026 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
BugTraq ID: 32419
http://www.securityfocus.com/bid/32419
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10586
http://secunia.com/advisories/43521
http://www.vupen.com/english/advisories/2009/0422
http://www.securitytracker.com/id?1021396
http://secunia.com/advisories/33937
http://www.vupen.com/english/advisories/2011/0535
XForce ISS Database: cups-rss-dos(46684)
http://xforce.iss.net/xforce/xfdb/46684
Common Vulnerability Exposure (CVE) ID: CVE-2008-5184
Common Vulnerability Exposure (CVE) ID: CVE-2008-5286
http://www.openwall.com/lists/oss-security/2008/12/01/1
Debian Security Information: DSA-1677 (Google Search)
http://www.debian.org/security/2008/dsa-1677
http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml
http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:029
http://www.redhat.com/support/errata/RHSA-2008-1028.html
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
BugTraq ID: 32518
http://www.securityfocus.com/bid/32518
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10058
http://www.securitytracker.com/id?1021298
http://secunia.com/advisories/33111
http://www.vupen.com/english/advisories/2008/3315
http://secunia.com/advisories/33101
http://secunia.com/advisories/32962
http://secunia.com/advisories/33568
XForce ISS Database: cups-cupsimagereadpng-overflow(46933)
http://xforce.iss.net/xforce/xfdb/46933
Common Vulnerability Exposure (CVE) ID: CVE-2008-5377
http://www.milw0rm.com/exploits/7550
http://lists.debian.org/debian-devel/2008/08/msg00347.html
http://uvw.ru/report.sid.txt
Common Vulnerability Exposure (CVE) ID: CVE-2009-0050
Bugtraq: 20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499827/100/0/threaded
http://www.ocert.org/advisories/ocert-2008-016.html
XForce ISS Database: openssl-dsa-verify-security-bypass(47837)
http://xforce.iss.net/xforce/xfdb/47837
Common Vulnerability Exposure (CVE) ID: CVE-2008-2383
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
Debian Security Information: DSA-1694 (Google Search)
http://www.debian.org/security/2009/dsa-1694
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00072.html
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00184.html
http://www.redhat.com/support/errata/RHSA-2009-0018.html
http://www.redhat.com/support/errata/RHSA-2009-0019.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-254208-1
SuSE Security Announcement: SUSE-SR:2009:003 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
http://www.ubuntulinux.org/support/documentation/usn/usn-703-1
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
BugTraq ID: 33060
http://www.securityfocus.com/bid/33060
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9317
http://www.securitytracker.com/id?1021522
http://secunia.com/advisories/33318
http://secunia.com/advisories/33419
http://secunia.com/advisories/33418
http://secunia.com/advisories/33397
http://secunia.com/advisories/33820
http://secunia.com/advisories/33388
http://secunia.com/advisories/35074
http://www.vupen.com/english/advisories/2009/1297
XForce ISS Database: xterm-decrqss-code-execution(47655)
http://xforce.iss.net/xforce/xfdb/47655
Common Vulnerability Exposure (CVE) ID: CVE-2007-4349
Bugtraq: 20081022 Secunia Research: HP OpenView Products Shared Trace Service Denial of Service (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497648/100/0/threaded
http://secunia.com/secunia_research/2007-83/
HPdes Security Advisory: HPSBMA02390
http://marc.info/?l=bugtraq&m=122876827120961&w=2
HPdes Security Advisory: HPSBMA02391
http://marc.info/?l=bugtraq&m=122876677518654&w=2
HPdes Security Advisory: SSRT071481
BugTraq ID: 31860
http://www.securityfocus.com/bid/31860
http://www.vupen.com/english/advisories/2008/2888
http://www.securitytracker.com/id?1021092
http://secunia.com/advisories/27054
http://securityreason.com/securityalert/4501
XForce ISS Database: ov-traceservice-rpc-dos(46028)
http://xforce.iss.net/xforce/xfdb/46028
Common Vulnerability Exposure (CVE) ID: CVE-2008-5077
Bugtraq: 20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502322/100/0/threaded
http://security.gentoo.org/glsa/glsa-200902-02.xml
HPdes Security Advisory: HPSBUX02418
http://marc.info/?l=bugtraq&m=123859864430555&w=2
HPdes Security Advisory: SSRT090002
HPdes Security Advisory: HPSBMA02426
http://marc.info/?l=bugtraq&m=124277349419254&w=2
HPdes Security Advisory: SSRT090053
http://www.redhat.com/support/errata/RHSA-2009-0004.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.544796
http://sunsolve.sun.com/search/document.do?assetkey=1-66-250826-1
SuSE Security Announcement: SUSE-SU-2011:0847 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
SuSE Security Announcement: openSUSE-SU-2011:0845 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
http://www.ubuntulinux.org/support/documentation/usn/usn-704-1
BugTraq ID: 33150
http://www.securityfocus.com/bid/33150
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6380
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9155
http://www.securitytracker.com/id?1021523
http://secunia.com/advisories/34211
http://secunia.com/advisories/35108
http://secunia.com/advisories/39005
http://secunia.com/advisories/33338
http://secunia.com/advisories/33394
http://www.vupen.com/english/advisories/2009/0040
http://www.vupen.com/english/advisories/2009/0289
http://www.vupen.com/english/advisories/2009/0362
http://secunia.com/advisories/33765
http://secunia.com/advisories/33673
http://secunia.com/advisories/33557
http://secunia.com/advisories/33436
http://www.vupen.com/english/advisories/2009/0558
http://www.vupen.com/english/advisories/2009/0913
http://www.vupen.com/english/advisories/2009/0904
http://www.vupen.com/english/advisories/2009/1338
Common Vulnerability Exposure (CVE) ID: CVE-2009-0021
https://lists.ntp.org/pipermail/announce/2009-January/000055.html
http://www.redhat.com/support/errata/RHSA-2009-0046.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.531177
SuSE Security Announcement: SUSE-SR:2009:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
SuSE Security Announcement: SUSE-SR:2009:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10035
http://secunia.com/advisories/34642
http://www.vupen.com/english/advisories/2009/0042
http://www.securitytracker.com/id?1021533
http://secunia.com/advisories/33406
http://secunia.com/advisories/33558
http://secunia.com/advisories/33648
Common Vulnerability Exposure (CVE) ID: CVE-2009-0025
Bugtraq: 20090120 rPSA-2009-0009-1 bind bind-utils (Google Search)
http://www.securityfocus.com/archive/1/archive/1/500207/100/0/threaded
http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00393.html
FreeBSD Security Advisory: FreeBSD-SA-09:04
http://security.freebsd.org/advisories/FreeBSD-SA-09:04.bind.asc
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362
http://sunsolve.sun.com/search/document.do?assetkey=1-26-250846-1
BugTraq ID: 33151
http://www.securityfocus.com/bid/33151
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10879
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5569
http://www.vupen.com/english/advisories/2009/0043
http://www.vupen.com/english/advisories/2009/0366
http://secunia.com/advisories/33559
http://secunia.com/advisories/33683
http://secunia.com/advisories/33494
http://secunia.com/advisories/33546
http://secunia.com/advisories/33551
http://secunia.com/advisories/33882
Common Vulnerability Exposure (CVE) ID: CVE-2008-5262
http://secunia.com/secunia_research/2008-59/
Debian Security Information: DSA-1717 (Google Search)
http://www.debian.org/security/2009/dsa-1717
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00845.html
BugTraq ID: 33231
http://www.securityfocus.com/bid/33231
http://secunia.com/advisories/33470
http://secunia.com/advisories/33637
http://secunia.com/advisories/33801
Common Vulnerability Exposure (CVE) ID: CVE-2008-2237
Debian Security Information: DSA-1661 (Google Search)
http://www.debian.org/security/2008/dsa-1661
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00905.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00923.html
http://security.gentoo.org/glsa/glsa-200812-13.xml
http://www.redhat.com/support/errata/RHSA-2008-0939.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-242627-1
http://www.ubuntu.com/usn/usn-677-2
http://www.ubuntu.com/usn/usn-677-1
BugTraq ID: 31962
http://www.securityfocus.com/bid/31962
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10784
http://secunia.com/advisories/32463
http://secunia.com/advisories/32856
http://www.vupen.com/english/advisories/2008/2947
http://www.vupen.com/english/advisories/2008/3103
http://www.securitytracker.com/id?1021120
http://secunia.com/advisories/32419
http://secunia.com/advisories/32461
http://secunia.com/advisories/32489
http://secunia.com/advisories/32676
http://secunia.com/advisories/32872
http://secunia.com/advisories/33140
XForce ISS Database: openoffice-wmf-bo(46165)
http://xforce.iss.net/xforce/xfdb/46165
Common Vulnerability Exposure (CVE) ID: CVE-2008-2238
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=750
http://sunsolve.sun.com/search/document.do?assetkey=1-26-243226-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10849
http://www.vupen.com/english/advisories/2008/3153
http://www.securitytracker.com/id?1021121
XForce ISS Database: openoffice-emf-file-bo(46166)
http://xforce.iss.net/xforce/xfdb/46166
Common Vulnerability Exposure (CVE) ID: CVE-2008-4314
http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00021.html
http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00141.html
HPdes Security Advisory: HPSBTU02454
http://marc.info/?l=bugtraq&m=125003356619515&w=2
HPdes Security Advisory: SSRT080172
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.453684
http://sunsolve.sun.com/search/document.do?assetkey=1-26-249087-1
SuSE Security Announcement: SUSE-SR:2008:027 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
http://www.ubuntu.com/usn/USN-680-1
BugTraq ID: 32494
http://www.securityfocus.com/bid/32494
http://secunia.com/advisories/36281
http://www.vupen.com/english/advisories/2008/3277
http://www.vupen.com/english/advisories/2009/0067
http://osvdb.org/50230
http://www.securitytracker.com/id?1021287
http://secunia.com/advisories/32813
http://secunia.com/advisories/32919
http://secunia.com/advisories/32951
http://secunia.com/advisories/32968
http://www.vupen.com/english/advisories/2009/2245
Common Vulnerability Exposure (CVE) ID: CVE-2008-5517
Bugtraq: 20090113 rPSA-2009-0005-1 git gitweb (Google Search)
http://www.securityfocus.com/archive/1/archive/1/500008/100/0/threaded
http://repo.or.cz/w/git.git?a=commitdiff;h=516381d5
http://www.openwall.com/lists/oss-security/2009/01/20/1
http://www.openwall.com/lists/oss-security/2009/01/21/7
http://www.openwall.com/lists/oss-security/2009/01/23/2
Debian Security Information: DSA-1708 (Google Search)
http://www.debian.org/security/2009/dsa-1708
http://www.gentoo.org/security/en/glsa/glsa-200903-15.xml
SuSE Security Announcement: SUSE-SR:2009:001 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html
http://www.ubuntu.com/usn/USN-723-1
BugTraq ID: 33215
http://www.securityfocus.com/bid/33215
http://secunia.com/advisories/33964
http://secunia.com/advisories/34194
http://www.vupen.com/english/advisories/2009/0175
Common Vulnerability Exposure (CVE) ID: CVE-2008-5516
http://repo.or.cz/w/git.git?a=commitdiff;h=c582abae
http://securityreason.com/securityalert/4919
Common Vulnerability Exposure (CVE) ID: CVE-2008-3825
Bugtraq: 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX (Google Search)
http://www.securityfocus.com/archive/1/archive/1/516397/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00150.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00166.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:209
http://www.redhat.com/support/errata/RHSA-2008-0907.html
BugTraq ID: 31534
http://www.securityfocus.com/bid/31534
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10923
http://www.securitytracker.com/id?1020978
http://secunia.com/advisories/32119
http://secunia.com/advisories/32135
http://secunia.com/advisories/32174
http://secunia.com/advisories/43314
XForce ISS Database: pamkrb5-existingticket-privilege-escalation(45635)
http://xforce.iss.net/xforce/xfdb/45635
Common Vulnerability Exposure (CVE) ID: CVE-2008-3997
BugTraq ID: 33177
http://www.securityfocus.com/bid/33177
http://www.vupen.com/english/advisories/2009/0115
http://www.securitytracker.com/id?1021561
http://secunia.com/advisories/33525
Common Vulnerability Exposure (CVE) ID: CVE-2008-4444
Bugtraq: 20090114 Cisco Unified IP Phone 7960G and 7940G (SIP) RTP Header Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/500059/100/0/threaded
BugTraq ID: 33264
http://www.securityfocus.com/bid/33264
http://securityreason.com/securityalert/4917
XForce ISS Database: cisco-unifiedipphone-rtp-dos(47948)
http://xforce.iss.net/xforce/xfdb/47948
Common Vulnerability Exposure (CVE) ID: CVE-2008-4006
Common Vulnerability Exposure (CVE) ID: CVE-2008-5449
Common Vulnerability Exposure (CVE) ID: CVE-2008-3979
Bugtraq: 20090113 Trigger Abuse of MDSYS.SDO_TOPO_DROP_FTBL in Oracle 10g R1 and R2 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/500061/100/0/threaded
http://www.milw0rm.com/exploits/8074
http://osvdb.org/51354
Common Vulnerability Exposure (CVE) ID: CVE-2008-3821
Bugtraq: 20090114 PR08-19: XSS on Cisco IOS HTTP Server (Google Search)
http://www.securityfocus.com/archive/1/archive/1/500063/100/0/threaded
http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-19
Cisco Security Advisory: 20090114 Cisco IOS Cross-Site Scripting Vulnerabilities
http://www.cisco.com/en/US/products/products_security_response09186a0080a5c501.html
http://jvn.jp/en/jp/JVN28344798/index.html
BugTraq ID: 33260
http://www.securityfocus.com/bid/33260
http://www.vupen.com/english/advisories/2009/0138
http://osvdb.org/51393
http://osvdb.org/51394
http://securitytracker.com/id?1021598
http://secunia.com/advisories/33461
http://securityreason.com/securityalert/4916
XForce ISS Database: cisco-ios-httpserver-ping-xss(47947)
http://xforce.iss.net/xforce/xfdb/47947
Common Vulnerability Exposure (CVE) ID: CVE-2008-2382
Bugtraq: 20081222 CORE-2008-1210: Qemu and KVM VNC server remote DoS (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499502/100/0/threaded
http://www.coresecurity.com/content/vnc-remote-dos
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01223.html
http://www.ubuntu.com/usn/usn-776-1
BugTraq ID: 32910
http://www.securityfocus.com/bid/32910
http://secunia.com/advisories/35062
http://www.vupen.com/english/advisories/2008/3488
http://www.vupen.com/english/advisories/2008/3489
http://securitytracker.com/id?1021488
http://securitytracker.com/id?1021489
http://secunia.com/advisories/33293
http://secunia.com/advisories/33303
http://secunia.com/advisories/33350
http://securityreason.com/securityalert/4803
XForce ISS Database: qemu-kvm-protocolclientmsg-dos(47561)
http://xforce.iss.net/xforce/xfdb/47561
Common Vulnerability Exposure (CVE) ID: CVE-2008-5714
http://lists.gnu.org/archive/html/qemu-devel/2008-11/msg01224.html
http://lists.gnu.org/archive/html/qemu-devel/2008-12/msg00498.html
BugTraq ID: 33020
http://www.securityfocus.com/bid/33020
XForce ISS Database: qemu-monitor-weak-security(47683)
http://xforce.iss.net/xforce/xfdb/47683
Common Vulnerability Exposure (CVE) ID: CVE-2008-3818
Cisco Security Advisory: 20090114 Cisco ONS Platform Crafted Packet Vulnerability
http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4fa.shtml
BugTraq ID: 33261
http://www.securityfocus.com/bid/33261
http://www.vupen.com/english/advisories/2009/0139
http://securitytracker.com/id?1021592
XForce ISS Database: cisco-ons-controlcard-dos(47940)
http://xforce.iss.net/xforce/xfdb/47940
Common Vulnerability Exposure (CVE) ID: CVE-2009-0053
Cisco Security Advisory: 20090114 IronPort Encryption Appliance / PostX and PXE Encryption Vulnerabilities
http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml
BugTraq ID: 33268
http://www.securityfocus.com/bid/33268
http://www.vupen.com/english/advisories/2009/0140
http://osvdb.org/51395
http://securitytracker.com/id?1021593
http://secunia.com/advisories/33479
Common Vulnerability Exposure (CVE) ID: CVE-2009-0054
http://osvdb.org/51396
Common Vulnerability Exposure (CVE) ID: CVE-2009-0055
http://osvdb.org/51397
http://securitytracker.com/id?1021594
Common Vulnerability Exposure (CVE) ID: CVE-2009-0056
http://osvdb.org/51398
Common Vulnerability Exposure (CVE) ID: CVE-2008-5500
https://bugzilla.mozilla.org/show_bug.cgi?id=460803
https://bugzilla.mozilla.org/show_bug.cgi?id=464998
Debian Security Information: DSA-1697 (Google Search)
http://www.debian.org/security/2009/dsa-1697
Debian Security Information: DSA-1704 (Google Search)
http://www.debian.org/security/2009/dsa-1704
Debian Security Information: DSA-1707 (Google Search)
http://www.debian.org/security/2009/dsa-1707
Debian Security Information: DSA-1696 (Google Search)
http://www.debian.org/security/2009/dsa-1696
http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
http://www.redhat.com/support/errata/RHSA-2008-1036.html
http://www.redhat.com/support/errata/RHSA-2008-1037.html
http://www.redhat.com/support/errata/RHSA-2009-0002.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
http://www.ubuntulinux.org/support/documentation/usn/usn-690-1
http://www.ubuntu.com/usn/usn-690-2
http://www.ubuntulinux.org/support/documentation/usn/usn-690-3
http://www.ubuntu.com/usn/usn-701-1
http://www.ubuntu.com/usn/usn-701-2
BugTraq ID: 32882
http://www.securityfocus.com/bid/32882
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11053
http://www.securitytracker.com/id?1021417
http://secunia.com/advisories/33231
http://secunia.com/advisories/33433
http://secunia.com/advisories/33216
http://secunia.com/advisories/33232
http://secunia.com/advisories/33523
http://secunia.com/advisories/33547
http://secunia.com/advisories/33184
http://secunia.com/advisories/33188
http://secunia.com/advisories/33189
http://secunia.com/advisories/33203
http://secunia.com/advisories/33204
http://secunia.com/advisories/33205
http://secunia.com/advisories/33421
http://secunia.com/advisories/33434
http://secunia.com/advisories/34501
http://secunia.com/advisories/35080
http://secunia.com/advisories/33408
http://secunia.com/advisories/33415
http://www.vupen.com/english/advisories/2009/0977
XForce ISS Database: mozilla-layout-code-execution-var3(47406)
http://xforce.iss.net/xforce/xfdb/47406
Common Vulnerability Exposure (CVE) ID: CVE-2008-5503
https://bugzilla.mozilla.org/show_bug.cgi?id=379959
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11423
http://www.securitytracker.com/id?1021424
XForce ISS Database: mozilla-xbl-information-disclosure(47409)
http://xforce.iss.net/xforce/xfdb/47409
Common Vulnerability Exposure (CVE) ID: CVE-2008-5506
https://bugzilla.mozilla.org/show_bug.cgi?id=458248
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10512
http://www.securitytracker.com/id?1021427
XForce ISS Database: mozilla-xmlhttprequest-302-info-disclosure(47412)
http://xforce.iss.net/xforce/xfdb/47412
Common Vulnerability Exposure (CVE) ID: CVE-2008-5507
Bugtraq: 20081218 Firefox cross-domain text theft (CESA-2008-011) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499353/100/0/threaded
https://bugzilla.mozilla.org/show_bug.cgi?id=461735
http://scary.beasts.org/security/CESA-2008-011.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9376
http://www.securitytracker.com/id?1021423
XForce ISS Database: mozilla-javascripturl-infor-disclosure(47413)
http://xforce.iss.net/xforce/xfdb/47413
Common Vulnerability Exposure (CVE) ID: CVE-2008-5508
https://bugzilla.mozilla.org/show_bug.cgi?id=425046
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11040
http://www.securitytracker.com/id?1021426
XForce ISS Database: mozilla-urlparsing-weak-security(47414)
http://xforce.iss.net/xforce/xfdb/47414
Common Vulnerability Exposure (CVE) ID: CVE-2008-5511
https://bugzilla.mozilla.org/show_bug.cgi?id=451680
https://bugzilla.mozilla.org/show_bug.cgi?id=464174
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11881
http://www.securitytracker.com/id?1021418
XForce ISS Database: mozilla-xbl-security-bypass(47417)
http://xforce.iss.net/xforce/xfdb/47417
Common Vulnerability Exposure (CVE) ID: CVE-2008-5512
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9814
XForce ISS Database: mozilla-xpcnativewrappers-code-execution(47416)
http://xforce.iss.net/xforce/xfdb/47416
Common Vulnerability Exposure (CVE) ID: CVE-2008-5256
http://www.mandriva.com/security/advisories?name=MDVSA-2009:011
http://sunsolve.sun.com/search/document.do?assetkey=1-26-247326-1
SuSE Security Announcement: SUSE-SR:2009:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
BugTraq ID: 32444
http://www.securityfocus.com/bid/32444
http://www.securitytracker.com/id?1021384
http://www.vupen.com/english/advisories/2008/3410
http://secunia.com/advisories/32851
XForce ISS Database: sun-virtualbox-ipcdunix-symlink(46826)
http://xforce.iss.net/xforce/xfdb/46826
Common Vulnerability Exposure (CVE) ID: CVE-2008-5448
Common Vulnerability Exposure (CVE) ID: CVE-2008-5718
http://www.openwall.com/lists/oss-security/2009/01/13/3
Debian Security Information: DSA-1705 (Google Search)
http://www.debian.org/security/2009/dsa-1705
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00962.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00966.html
BugTraq ID: 32925
http://www.securityfocus.com/bid/32925
http://osvdb.org/50824
http://secunia.com/advisories/33227
http://secunia.com/advisories/33548
http://secunia.com/advisories/34484
Common Vulnerability Exposure (CVE) ID: CVE-2007-4476
Debian Security Information: DSA-1438 (Google Search)
http://www.debian.org/security/2007/dsa-1438
Debian Security Information: DSA-1566 (Google Search)
http://www.debian.org/security/2008/dsa-1566
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00073.html
http://security.gentoo.org/glsa/glsa-200711-18.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:197
http://www.mandriva.com/security/advisories?name=MDKSA-2007:233
http://www.redhat.com/support/errata/RHSA-2010-0141.html
http://www.redhat.com/support/errata/RHSA-2010-0144.html
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1
SuSE Security Announcement: SUSE-SR:2007:018 (Google Search)
http://www.novell.com/linux/security/advisories/2007_18_sr.html
SuSE Security Announcement: SUSE-SR:2007:019 (Google Search)
http://www.novell.com/linux/security/advisories/2007_19_sr.html
http://www.ubuntu.com/usn/usn-709-1
http://www.ubuntu.com/usn/usn-650-1
BugTraq ID: 26445
http://www.securityfocus.com/bid/26445
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8599
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9336
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7114
http://secunia.com/advisories/26674
http://secunia.com/advisories/26987
http://secunia.com/advisories/27331
http://secunia.com/advisories/27453
http://secunia.com/advisories/27514
http://secunia.com/advisories/27681
http://secunia.com/advisories/27857
http://secunia.com/advisories/28255
http://secunia.com/advisories/29968
http://secunia.com/advisories/33567
http://secunia.com/advisories/32051
http://secunia.com/advisories/39008
http://www.vupen.com/english/advisories/2010/0628
http://www.vupen.com/english/advisories/2010/0629
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 39212 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.