|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 5 2006-1277: elinks Vulnerability Assessment Details
|
Fedora Core 5 2006-1277: elinks |
||
Check for the version of the elinks package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory FEDORA-2006-1277 (elinks). Links is a text-based Web browser. Links does not display any images, but it does support frames, tables and most other HTML tags. Links' advantage over graphical browsers is its speed--Links starts and exits quickly and swiftly displays Web pages. Update information : * Tue Nov 21 2006 Karel Zak - fix #215734: CVE-2006-5925 elinks smb protocol arbitrary file access Solution : Get the newest Fedora Updates Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security |
||
Cables, Connectors |
Vintage Atari 800XL Computer *UNTESTED* No Power Cords Or Cables
$50.00
Vintage Atari 1040STf Computer with Mouse and Box, Minimal Testing, Pls Read
$149.99
Atari Power Cube 800XL, 600XL, 65XE, 130XE USB-C Power Supply PSU
$11.25
A8picoCart Atari 130 / 65 XE 800 / 1200 XL XEGS multicart UnoCart clone game
$32.95
Atari 400/800/XL/XE Computer SIO2PC - PC/Mac Disk Drive Emulator Adapter/Device
$15.25
$3200.00
Atari 410 Program Cassette Recorder Clean Tested
$50.00
Atari Mega STE or TT Keyboard. Used. Untested.
$300.00
ATARI Home Computers HOME FILING MANAGER Software **SEALED NEW** 1982
$25.00
TEAM TAP Atari Jaguar Multi Player Adapter NEW In Box
$25.46
|
||
No Discussions have been posted on this vulnerability. |