|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> FeedDemon < 2.0.0.25 Active Script Code Execution Vulnerability Vulnerability Assessment Details
|
FeedDemon < 2.0.0.25 Active Script Code Execution Vulnerability |
||
Checks version of FeedDemon Detailed Explanation for this Vulnerability Assessment Summary : The remote Windows application may permit execution of arbitrary Active Script code. Description : FeedDemon, an RSS reader for Windows, is installed on the remote host. According to the Windows registry, the installed version of FeedDemon fails to sanitize RSS feeds of Active Script code. A possible hacker may be able to exploit this issue to inject arbitrary script into the affected application, which could lead to various cross-site scripting attacks. See also : http://nick.typepad.com/blog/2006/08/feed_security_a_1.html http://nick.typepad.com/blog/2006/08/ann_feeddemon_2.html Solution : Upgrade to FeedDemon 2.0.0.25 or later. Network Security Threat Level: Low / CVSS Base Score : 2.3 (AV:R/AC:L/Au:NR/C:N/I:P/A:N/B:N) Networks Security ID: 20114 Vulnerability Assessment Copyright: This script is Copyright (C) 2006-2007 Tenable Network Security |
||
Cables, Connectors |
Vintage DEC Digital Rainbow Drive Controller PC100 RD51 CNTLR
$69.99
DEC DIGITAL VINTAGE DECRepeater Lot
$155.00
$99.00
$99.00
Vintage DEC VR201 green phosphor CRT for VT240 Rainbow 8529
$175.00
$50.00
$65.00
$59.00
VINTAGE DEC DIGITAL 5017638-01-B1-P2 5417639-01 TZK50 BOARD MODULE (B4)
$54.99
VINTAGE DEC DIGITAL PDP M7702 DEC PACK CYLINDER ADDRESS AND DIFFERENCE for RK05
$79.99
|
||
No Discussions have been posted on this vulnerability. |