Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1094] DSA-1094-1 gforge


Vulnerability Assessment Details

[DSA1094] DSA-1094-1 gforge

Vulnerability Assessment Summary
DSA-1094-1 gforge

Detailed Explanation for this Vulnerability Assessment

Joxean Koret discovered several cross-site scripting vulnerabilities in
Gforge, an online collaboration suite for software development, which
permit injection of web script code.
The old stable distribution (woody) does not contain gforge packages.
For the stable distribution (sarge) this problem has been fixed in
version 3.1-31sarge1.
For the unstable distribution (sid) this problem has been fixed in
version 3.1-31sarge1.
We recommend that you upgrade your gforge package.


Solution : http://www.debian.org/security/2006/dsa-1094
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

1PC Intel Xeon E5504 Quad Core 2.0GHz/4M/4.80 SLBF9 Socket LGA1366 CPU
$0.99
1PC Intel Xeon E5504 Quad Core 2.0GHz/4M/4.80 SLBF9 Socket LGA1366 CPU pictureIntel SLBUD Core i3-550 3.20GHz 4M 1st Gen Socket 1156 Dual Core CPU / Processor
$22.95
Intel SLBUD Core i3-550 3.20GHz 4M 1st Gen Socket 1156 Dual Core CPU / Processor pictureIntel i5-750 2.66GHz/8M Socket 1156 Quad CPU Processor LGA1156
$35.0
Intel i5-750 2.66GHz/8M Socket 1156 Quad CPU Processor LGA1156 picture1PC Intel Xeon E5540 SLBF6 LGA 1366 2.53 GHz 5.86 GT/s Quad-Core CPU Processor
$0.99
1PC Intel Xeon E5540 SLBF6 LGA 1366 2.53 GHz 5.86 GT/s Quad-Core CPU Processor picture


Discussions

No Discussions have been posted on this vulnerability.