English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75516 CVE descriptions
and 39786 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64166
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-719-1 (libpam-krb5)
Summary:Ubuntu USN-719-1 (libpam-krb5)
Description:The remote host is missing an update to libpam-krb5
announced via advisory USN-719-1.

Details follow:

It was discovered that pam_krb5 parsed environment variables when run with
setuid applications. A local attacker could exploit this flaw to bypass
authentication checks and gain root privileges. (CVE-2009-0360)

Derek Chan discovered that pam_krb5 incorrectly handled refreshing existing
credentials when used with setuid applications. A local attacker could exploit
this to create or overwrite arbitrary files, and possibly gain root privileges.
(CVE-2009-0361)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
libpam-krb5 3.10-1ubuntu0.8.04.1

Ubuntu 8.10:
libpam-krb5 3.10-1ubuntu0.8.10.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-719-1
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-0360
Bugtraq: 20090211 pam-krb5 security advisory (3.12 and earlier) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/500892/100/0/threaded
http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html
Debian Security Information: DSA-1721 (Google Search)
http://www.debian.org/security/2009/dsa-1721
http://security.gentoo.org/glsa/glsa-200903-39.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1
http://www.ubuntu.com/usn/USN-719-1
BugTraq ID: 33740
http://www.securityfocus.com/bid/33740
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5669
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5732
http://secunia.com/advisories/34260
http://secunia.com/advisories/34449
http://www.vupen.com/english/advisories/2009/0410
http://www.vupen.com/english/advisories/2009/0426
http://securitytracker.com/id?1021711
http://secunia.com/advisories/33914
http://secunia.com/advisories/33917
http://www.vupen.com/english/advisories/2009/0979
Common Vulnerability Exposure (CVE) ID: CVE-2009-0361
Debian Security Information: DSA-1722 (Google Search)
http://www.debian.org/security/2009/dsa-1722
BugTraq ID: 33741
http://www.securityfocus.com/bid/33741
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5403
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5521
http://secunia.com/advisories/33918
Common Vulnerability Exposure (CVE) ID: CVE-2007-3996
http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/
http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/
Debian Security Information: DSA-1613 (Google Search)
http://www.debian.org/security/2008/dsa-1613
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
http://security.gentoo.org/glsa/glsa-200712-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
http://www.redhat.com/support/errata/RHSA-2007-0890.html
RedHat Security Advisories: RHSA-2007:0889
http://rhn.redhat.com/errata/RHSA-2007-0889.html
http://www.redhat.com/support/errata/RHSA-2007-0888.html
http://www.redhat.com/support/errata/RHSA-2007-0891.html
SuSE Security Announcement: SUSE-SA:2008:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
http://www.trustix.org/errata/2007/0026/
http://www.ubuntu.com/usn/usn-557-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11147
http://www.vupen.com/english/advisories/2007/3023
http://secunia.com/advisories/26642
http://secunia.com/advisories/26822
http://secunia.com/advisories/26838
http://secunia.com/advisories/26930
http://secunia.com/advisories/26871
http://secunia.com/advisories/26895
http://secunia.com/advisories/26967
http://secunia.com/advisories/27351
http://secunia.com/advisories/27377
http://secunia.com/advisories/27545
http://secunia.com/advisories/27102
http://secunia.com/advisories/28009
http://secunia.com/advisories/28147
http://secunia.com/advisories/28658
http://secunia.com/advisories/31168
http://securityreason.com/securityalert/3103
XForce ISS Database: php-gdimagecopyresized-bo(36383)
http://xforce.iss.net/xforce/xfdb/36383
XForce ISS Database: php-gdimagecreate-bo(36382)
http://xforce.iss.net/xforce/xfdb/36382
Common Vulnerability Exposure (CVE) ID: CVE-2007-5900
HPdes Security Advisory: HPSBUX02332
http://www.securityfocus.com/archive/1/archive/1/491693/100/0/threaded
HPdes Security Advisory: SSRT080056
http://securitytracker.com/id?1018934
http://secunia.com/advisories/27648
http://secunia.com/advisories/27659
http://secunia.com/advisories/30040
Common Vulnerability Exposure (CVE) ID: CVE-2008-3658
Bugtraq: 20090302 rPSA-2009-0035-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/501376/100/0/threaded
http://news.php.net/php.cvs/51219
http://www.openwall.com/lists/oss-security/2008/08/08/2
http://www.openwall.com/lists/oss-security/2008/08/13/8
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
Debian Security Information: DSA-1647 (Google Search)
http://www.debian.org/security/2008/dsa-1647
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html
http://security.gentoo.org/glsa/glsa-200811-05.xml
HPdes Security Advisory: HPSBTU02382
http://www.securityfocus.com/archive/1/archive/1/498647/100/0/threaded
HPdes Security Advisory: SSRT080132
HPdes Security Advisory: HPSBUX02401
http://marc.info/?l=bugtraq&m=123376588623823&w=2
HPdes Security Advisory: SSRT090005
HPdes Security Advisory: HPSBUX02465
http://marc.info/?l=bugtraq&m=125631037611762&w=2
HPdes Security Advisory: SSRT090192
http://www.mandriva.com/security/advisories?name=MDVSA-2009:021
http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
http://www.mandriva.com/security/advisories?name=MDVSA-2009:024
http://www.redhat.com/support/errata/RHSA-2009-0350.html
SuSE Security Announcement: SUSE-SR:2008:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
SuSE Security Announcement: SUSE-SR:2008:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
BugTraq ID: 30649
http://www.securityfocus.com/bid/30649
http://osvdb.org/47484
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9724
http://secunia.com/advisories/35074
http://secunia.com/advisories/35306
http://secunia.com/advisories/32746
http://www.vupen.com/english/advisories/2008/3275
http://www.vupen.com/english/advisories/2009/0320
http://secunia.com/advisories/32148
http://secunia.com/advisories/32316
http://secunia.com/advisories/32884
http://secunia.com/advisories/31982
http://secunia.com/advisories/33797
http://www.vupen.com/english/advisories/2008/2336
http://www.vupen.com/english/advisories/2009/1297
XForce ISS Database: php-imageloadfont-dos(44401)
http://xforce.iss.net/xforce/xfdb/44401
Common Vulnerability Exposure (CVE) ID: CVE-2008-3659
http://www.openwall.com/lists/oss-security/2008/08/08/3
http://www.openwall.com/lists/oss-security/2008/08/08/4
HPdes Security Advisory: HPSBUX02431
http://marc.info/?l=bugtraq&m=124654546101607&w=2
HPdes Security Advisory: SSRT090085
http://osvdb.org/47483
http://www.securitytracker.com/id?1020995
http://secunia.com/advisories/35650
XForce ISS Database: php-memnstr-bo(44405)
http://xforce.iss.net/xforce/xfdb/44405
Common Vulnerability Exposure (CVE) ID: CVE-2008-3660
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9597
http://www.securitytracker.com/id?1020994
XForce ISS Database: php-curl-unspecified(44402)
http://xforce.iss.net/xforce/xfdb/44402
Common Vulnerability Exposure (CVE) ID: CVE-2008-5557
http://archives.neohapsis.com/archives/fulldisclosure/2008-12/0477.html
Debian Security Information: DSA-1789 (Google Search)
http://www.debian.org/security/2009/dsa-1789
HPdes Security Advisory: HPSBMA02492
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444
HPdes Security Advisory: SSRT100079
http://www.mandriva.com/security/advisories?name=MDVSA-2009:045
SuSE Security Announcement: SUSE-SR:2009:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
SuSE Security Announcement: SUSE-SR:2009:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
BugTraq ID: 32948
http://www.securityfocus.com/bid/32948
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10286
http://securitytracker.com/id?1021482
http://secunia.com/advisories/34642
http://secunia.com/advisories/35003
XForce ISS Database: php-multibyte-bo(47525)
http://xforce.iss.net/xforce/xfdb/47525
Common Vulnerability Exposure (CVE) ID: CVE-2008-5624
http://securityreason.com/achievement_securityalert/59
Bugtraq: 20081206 SecurityReason: PHP 5.2.6 SAPI php_getuid() overload (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498985/100/0/threaded
BugTraq ID: 32688
http://www.securityfocus.com/bid/32688
http://osvdb.org/52207
http://osvdb.org/50483
XForce ISS Database: php-getuid-safemode-bypass(47318)
http://xforce.iss.net/xforce/xfdb/47318
Common Vulnerability Exposure (CVE) ID: CVE-2008-5625
http://securityreason.com/achievement_securityalert/57
Bugtraq: 20081120 SecurityReason : PHP 5.2.6 (error_log) safe_mode bypass (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2008-11/0152.html
http://www.milw0rm.com/exploits/7171
BugTraq ID: 32383
http://www.securityfocus.com/bid/32383
http://osvdb.org/52205
XForce ISS Database: php-error-safemode-bypass(47314)
http://xforce.iss.net/xforce/xfdb/47314
Common Vulnerability Exposure (CVE) ID: CVE-2008-5658
Bugtraq: 20081204 Advisory 06/2008: PHP ZipArchive::extractTo() Directory Traversal Vulnerability (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2008-12/0039.html
http://www.openwall.com/lists/oss-security/2008/12/04/3
http://www.sektioneins.de/advisories/SE-2008-06.txt
BugTraq ID: 32625
http://www.securityfocus.com/bid/32625
http://osvdb.org/50480
http://www.securitytracker.com/id?1021303
XForce ISS Database: php-ziparchive-directory-traversal(47079)
http://xforce.iss.net/xforce/xfdb/47079
Common Vulnerability Exposure (CVE) ID: CVE-2007-5625
Bugtraq: 20071020 [Aria-Security.Net] SearchSimon Lite Cross-Site Scripting Vuln. (Google Search)
http://www.securityfocus.com/archive/1/archive/1/482570/100/0/threaded
BugTraq ID: 26142
http://www.securityfocus.com/bid/26142
http://osvdb.org/38069
http://secunia.com/advisories/27337
http://securityreason.com/securityalert/3275
XForce ISS Database: searchsimonlite-filename-xss(37340)
http://xforce.iss.net/xforce/xfdb/37340
Common Vulnerability Exposure (CVE) ID: CVE-2007-6420
Bugtraq: 20080110 SecurityReason - Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/486169/100/0/threaded
Bugtraq: 20080729 rPSA-2008-0236-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/494858/100/0/threaded
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
http://security.gentoo.org/glsa/glsa-200807-06.xml
http://www.redhat.com/support/errata/RHSA-2008-0966.html
SuSE Security Announcement: SUSE-SR:2008:024 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html
http://www.ubuntu.com/usn/USN-731-1
BugTraq ID: 27236
http://www.securityfocus.com/bid/27236
BugTraq ID: 31681
http://www.securityfocus.com/bid/31681
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8371
http://secunia.com/advisories/34219
http://www.vupen.com/english/advisories/2008/2780
http://secunia.com/advisories/31026
http://secunia.com/advisories/32222
http://securityreason.com/securityalert/3523
Common Vulnerability Exposure (CVE) ID: CVE-2008-1232
Bugtraq: 20080801 [CVE-2008-1232] Apache Tomcat XSS vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495021/100/0/threaded
Bugtraq: 20090616 CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504351/100/0/threaded
Bugtraq: 20090806 CA20090806-02: Security Notice for Unicenter Asset Portfolio Management, Unicenter Desktop and Server Management, Unicenter Patch Management (Google Search)
http://www.securityfocus.com/archive/1/archive/1/505556/100/0/threaded
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html
HPdes Security Advisory: HPSBST02955
http://marc.info/?l=bugtraq&m=139344343412337&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2008:188
http://www.redhat.com/support/errata/RHSA-2008-0648.html
http://www.redhat.com/support/errata/RHSA-2008-0862.html
http://www.redhat.com/support/errata/RHSA-2008-0864.html
BugTraq ID: 30496
http://www.securityfocus.com/bid/30496
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5985
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11181
http://secunia.com/advisories/33999
http://secunia.com/advisories/34013
http://secunia.com/advisories/35474
http://secunia.com/advisories/36108
http://secunia.com/advisories/37460
http://secunia.com/advisories/57126
http://www.vupen.com/english/advisories/2008/2305
http://www.vupen.com/english/advisories/2008/2823
http://www.securitytracker.com/id?1020622
http://secunia.com/advisories/31379
http://secunia.com/advisories/31381
http://secunia.com/advisories/31639
http://secunia.com/advisories/31891
http://secunia.com/advisories/31865
http://secunia.com/advisories/32120
http://secunia.com/advisories/32266
http://securityreason.com/securityalert/4098
http://www.vupen.com/english/advisories/2009/0503
http://www.vupen.com/english/advisories/2009/1609
http://www.vupen.com/english/advisories/2009/2194
http://www.vupen.com/english/advisories/2009/3316
XForce ISS Database: tomcat-httpservletresponse-xss(44155)
http://xforce.iss.net/xforce/xfdb/44155
Common Vulnerability Exposure (CVE) ID: CVE-2008-1947
Bugtraq: 20080602 [SECURITY] CVE-2008-1947: Tomcat host-manager XSS vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/492958/100/0/threaded
http://marc.info/?l=tomcat-user&m=121244319501278&w=2
Debian Security Information: DSA-1593 (Google Search)
http://www.debian.org/security/2008/dsa-1593
SuSE Security Announcement: SUSE-SR:2008:014 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
BugTraq ID: 29502
http://www.securityfocus.com/bid/29502
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6009
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11534
http://www.vupen.com/english/advisories/2008/1725
http://www.securitytracker.com/id?1020624
http://secunia.com/advisories/30500
http://secunia.com/advisories/30592
http://secunia.com/advisories/30967
XForce ISS Database: apache-tomcat-hostmanager-xss(42816)
http://xforce.iss.net/xforce/xfdb/42816
Common Vulnerability Exposure (CVE) ID: CVE-2008-2364
Bugtraq: 20081122 rPSA-2008-0328-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498567/100/0/threaded
AIX APAR: PK67579
http://www-1.ibm.com/support/docview.wss?uid=swg1PK67579
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00153.html
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00055.html
HPdes Security Advisory: HPSBUX02365
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
HPdes Security Advisory: SSRT080118
http://www.mandriva.com/security/advisories?name=MDVSA-2008:195
http://www.mandriva.com/security/advisories?name=MDVSA-2008:237
RedHat Security Advisories: RHSA-2008:0967
http://rhn.redhat.com/errata/RHSA-2008-0967.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1
SuSE Security Announcement: SUSE-SR:2009:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
SuSE Security Announcement: SUSE-SR:2009:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
BugTraq ID: 29653
http://www.securityfocus.com/bid/29653
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6084
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11713
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9577
http://secunia.com/advisories/34259
http://secunia.com/advisories/34418
http://www.vupen.com/english/advisories/2008/1798
http://www.securitytracker.com/id?1020267
http://secunia.com/advisories/30621
http://secunia.com/advisories/31404
http://secunia.com/advisories/31416
http://secunia.com/advisories/31651
http://secunia.com/advisories/31904
http://secunia.com/advisories/32685
http://secunia.com/advisories/33156
http://secunia.com/advisories/32838
XForce ISS Database: apache-modproxy-module-dos(42987)
http://xforce.iss.net/xforce/xfdb/42987
Common Vulnerability Exposure (CVE) ID: CVE-2008-2370
Bugtraq: 20080801 [CVE-2008-2370] Apache Tomcat information disclosure vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495022/100/0/threaded
http://marc.info/?l=apache-announce&m=124972618803216&w=2
http://mail-archives.apache.org/mod_mbox/ode-user/200908.mbox/%3Cfbdc6a970908072141w20a7a9d9ka1f896ad8073dffb@mail.gmail.com%3E
BugTraq ID: 30494
http://www.securityfocus.com/bid/30494
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5876
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10577
http://secunia.com/advisories/35393
http://secunia.com/advisories/36249
http://www.securitytracker.com/id?1020623
http://securityreason.com/securityalert/4099
http://www.vupen.com/english/advisories/2009/1535
http://www.vupen.com/english/advisories/2009/2215
XForce ISS Database: tomcat-requestdispatcher-info-disclosure(44156)
http://xforce.iss.net/xforce/xfdb/44156
Common Vulnerability Exposure (CVE) ID: CVE-2008-2938
Bugtraq: 20080811 Apache Tomcat <= 6.0.18 UTF8 Directory Traversal Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495318/100/0/threaded
Bugtraq: 20091107 ToutVirtual VirtualIQ Multiple Vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507729/100/0/threaded
http://www.milw0rm.com/exploits/6229
http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt
CERT/CC vulnerability note: VU#343355
http://www.kb.cert.org/vuls/id/343355
BugTraq ID: 30633
http://www.securityfocus.com/bid/30633
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10587
http://secunia.com/advisories/37297
http://www.vupen.com/english/advisories/2008/2343
http://www.securitytracker.com/id?1020665
http://securityreason.com/securityalert/4148
XForce ISS Database: tomcat-allowlinking-utf8-directory-traversal(44411)
http://xforce.iss.net/xforce/xfdb/44411
Common Vulnerability Exposure (CVE) ID: CVE-2008-2939
Bugtraq: 20080806 Apache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495180/100/0/threaded
Bugtraq: 20081122 rPSA-2008-0327-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498566/100/0/threaded
http://www.rapid7.com/advisories/R7-0033
AIX APAR: PK70197
http://www-1.ibm.com/support/docview.wss?uid=swg1PK70197
AIX APAR: PK70937
http://www-1.ibm.com/support/docview.wss?uid=swg1PK70937
http://www.mandriva.com/security/advisories?name=MDVSA-2008:194
http://www.mandriva.com/security/advisories?name=MDVSA-2009:124
CERT/CC vulnerability note: VU#663763
http://www.kb.cert.org/vuls/id/663763
BugTraq ID: 30560
http://www.securityfocus.com/bid/30560
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11316
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7716
http://www.vupen.com/english/advisories/2008/2315
http://www.vupen.com/english/advisories/2008/2461
http://www.securitytracker.com/id?1020635
http://secunia.com/advisories/31384
http://secunia.com/advisories/31673
XForce ISS Database: apache-modproxyftp-xss(44223)
http://xforce.iss.net/xforce/xfdb/44223
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 39786 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.