Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA768] DSA-768-1 phpbb2


Vulnerability Assessment Details

[DSA768] DSA-768-1 phpbb2

Vulnerability Assessment Summary
DSA-768-1 phpbb2

Detailed Explanation for this Vulnerability Assessment

A cross-site scripting vulnerability has been detected in phpBB2, a
fully featured and skinneable flat webforum software, that permits
remote attackers to inject arbitrary web script or HTML via nested
tags.
The old stable distribution (woody) does not contain phpbb2.
For the stable distribution (sarge) this problem has been fixed in
version 2.0.13-6sarge1.
For the unstable distribution (sid) this problem has been fixed in
version 2.0.13-6sarge1.
We recommend that you upgrade your phpbb2 packages.


Solution : http://www.debian.org/security/2005/dsa-768
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

Used Tandy TRS-80 Model 16 Motorola 68K CPU Board - 26-6010 - Tested & Working
$49.95
Used Tandy TRS-80 Model 16 Motorola 68K CPU Board - 26-6010 - Tested & Working pictureNOS - Tandy TRS-80 Model 16 Motorola 68K CPU Board - NOS - 26-6010
$79.95
NOS - Tandy TRS-80 Model 16 Motorola 68K CPU Board - NOS - 26-6010 pictureIntel Pentium Dual-Core G645T 2.50GHz SR0S0 Processor Desktop CPU
$20.0
Intel Pentium Dual-Core G645T 2.50GHz SR0S0 Processor Desktop CPU picture41*200 Water Cooling Heatsink Block Waterblock Liquid Cooler For CPU GPU EMRY
$13.84
41*200 Water Cooling Heatsink Block Waterblock Liquid Cooler For CPU GPU EMRY picture


Discussions

No Discussions have been posted on this vulnerability.