|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:211: lynx Vulnerability Assessment Details
|
MDKSA-2005:211: lynx |
||
Check for the version of the lynx package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory MDKSA-2005:211 (lynx). An arbitrary command execution vulnerability was discovered in the lynx 'lynxcgi:' URI handler. A possible hacker could create a web page that redirects to a malicious URL which could then execute arbitrary code as the user running lynx. The updated packages have been patched to address this issue. Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:211 Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security |
||
Cables, Connectors |
Atari 800XL Retro Computer Vintage Computing Gaming - Tested - No Power Supply
$150.00
vintage nickelodeon computer mouse orange logo usb
$100.99
Vintage Apple Mouse Working Condition
$15.00
Z80 - NABU PC & Keyboard - (With Issues) Vintage NOS (Retro 80's)
$99.99
Dell Latitude E6410 Windows XP Vintage Gaming Laptop i5 2GB 250GB Office #A3
$99.99
Vintage Bipolar LSI 1982 Databook, Fourth Edition, by Monoliithic Memories
$24.00
Vintage Apple Desktop Bus Mouse G5431
$14.99
Vintage BIOSTAR MB-1212V VLSI AT Motherboard w/ 286-12MHz CPU + 640KB RAM
$79.00
Vintage IBM Model M 1391401 Clicky Mechanical Keyboard Jan1988 Genuine IBM Cable
$85.00
Vintage Industrial 1984 Micro Systems - Z80 CPX-BMX Board 128K
$115.00
|
||
No Discussions have been posted on this vulnerability. |