Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:088: mozilla


Vulnerability Assessment Details

MDKSA-2005:088: mozilla

Vulnerability Assessment Summary
Check for the version of the mozilla package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:088 (mozilla).



A number of security vulnerabilities were fixed in the Mozilla Firefox 1.0.4
and Mozilla Suite 1.7.8 releases. Patches have been backported where
appropriate
Corporate 3.0 is receiving the new Mozilla Suite 1.7.8 release.


Mandriva recommends all users to upgrade to these packages immediately.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:088
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Aureal_A3D_Vortex_Mousepad_Mouse_Pad_Vintage_Collectible_PC_Gaming_Gamer_Round_
$9.95
Aureal_A3D_Vortex_Mousepad_Mouse_Pad_Vintage_Collectible_PC_Gaming_Gamer_Round_ pictureVintage APPLE Disk IIc External 5.25" Floppy Drive A2M4050 Tested & Working
$59.99
Vintage APPLE Disk IIc External 5.25Vintage 1999 Apple Computer USB Keyboard M2452 Teal Bondi Aqua Blue iMac
$12.99
Vintage 1999 Apple Computer USB Keyboard M2452 Teal Bondi Aqua Blue iMac pictureVintage Apple Macintosh Design M2980 Mac Desktop Computer Wired Keyboard ADB
$19.99
Vintage Apple Macintosh Design M2980 Mac Desktop Computer Wired Keyboard ADB picture


Discussions

No Discussions have been posted on this vulnerability.