Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of Google Desktop
Detailed Explanation for this Vulnerability Assessment
The remote host has an application installed that is vulnerable to a
local cross-site scripting vulnerability.
The version of Google Desktop installed on the remote host is
vulnerable to a cross-site scripting flaw because it fails to properly
encode the output for the 'under' keyword. This issue cannot be
directly exploited remotely, however when used in conjunction with a
known Google.com cross-site scripting vulnerability to extract the
unique signature associated with Google Desktop software, and might
permit a possible hacker to query a victim's system for sensitive
See also :
Google Desktop automatically updates itself when a new version of the
software is available. However in some cases it may not be able to
update itself due to network connectivity issues. Please ensure that
Google Desktop version 5.0.0701.30540 or later is installed.
Network Security Threat Level:
High / CVSS Base Score : 8.0
Networks Security ID: 22650
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security
|Ubiquiti TOUGHSwitch PoE PRO TS-8-PRO Advanced Power Ethernet Controller
|Linksys Se3024 Gigabit 24-port Ethernet Switch - 24 Ports - 24 X Rj-45 -
|NETGEAR 8-Port Gigabit Ethernet Unmanaged PoE Switch GS308P - with 4 x PoE @
|TP-Link T2600G-18TS JetStream 16-Port Gigabit L2 Managed Switch with 2 SFP
No Discussions have been posted on this vulnerability.