Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FreeBSD Local Security Checks >> FreeBSD : phpicalendar -- cross site scripting vulnerability (623)


Vulnerability Assessment Details

FreeBSD : phpicalendar -- cross site scripting vulnerability (623)

Vulnerability Assessment Summary
Check for phpicalendar

Detailed Explanation for this Vulnerability Assessment

The remote host is missing an update to the system

The following package is affected: phpicalendar

Solution : Update the package on the remote host
See also :


Networks Security ID: 15193

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

ASUS V3 8 PORT GIGABIT SWITCH NETWORK INTERNET ADPATER GX-D1081 ETHERNET
$12.3
ASUS V3 8 PORT GIGABIT SWITCH NETWORK INTERNET ADPATER GX-D1081 ETHERNET pictureLeviton 47611-8GB 10/100/1000 Mbps 8-Port Gigabit Switch
$108.69
Leviton 47611-8GB 10/100/1000 Mbps 8-Port Gigabit Switch pictureCisco C6800-16P10G-XL network switch module
$32161.02
Cisco C6800-16P10G-XL network switch module pictureHewlett Packard Enterprise ARUBA 8320 48p 10G SFP/SFP+ SWITCH BUNDLE
$21622.9
Hewlett Packard Enterprise ARUBA 8320 48p 10G SFP/SFP+ SWITCH BUNDLE picture


Discussions

No Discussions have been posted on this vulnerability.