Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FreeBSD Local Security Checks >> FreeBSD : axel -- remote buffer overflow (386)


Vulnerability Assessment Details

FreeBSD : axel -- remote buffer overflow (386)

Vulnerability Assessment Summary
Check for axel

Detailed Explanation for this Vulnerability Assessment

The remote host is missing an update to the system

The following package is affected: axel

Solution : Update the package on the remote host
See also :


Networks Security ID: 13059

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Intel Core i7-9700K Coffee Lake 8-Core 3.6 GHz (4.9 GHz Turbo) LGA 1151 (300 Ser
$359.99
Intel Core i7-9700K Coffee Lake 8-Core 3.6 GHz (4.9 GHz Turbo) LGA 1151 (300 Ser pictureAMD Ryzen 7 3700X 3.6GHz 8 Core AM4 Boxed Processor with Wraith Prism Cooler
$280.0
AMD Ryzen 7 3700X 3.6GHz 8 Core AM4 Boxed Processor with Wraith Prism Cooler pictureAMD Ryzen 7 - 2700X 8 Core Processor
$220.0
AMD Ryzen 7 - 2700X 8 Core Processor pictureDell Poweredge R720 3.5" 2x E5-2690 2.9ghz 16-Cores 128gb H710 8x Trays 2x750w
$689.99
Dell Poweredge R720 3.5


Discussions

No Discussions have been posted on this vulnerability.