|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200505-01] Horde Framework: Multiple XSS vulnerabilities Vulnerability Assessment Details
|
[GLSA-200505-01] Horde Framework: Multiple XSS vulnerabilities |
||
Horde Framework: Multiple XSS vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200505-01 (Horde Framework: Multiple XSS vulnerabilities) Cross-site scripting vulnerabilities have been discovered in various modules of the Horde Framework. Impact These vulnerabilities could be exploited by a possible hacker to execute arbitrary HTML and script code in context of the victim's browser. Workaround There is no known workaround at this time. References: http://marc.theaimsgroup.com/?l=horde-announce&r=1&b=200504&w=2 Solution: All Horde users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/horde-2.2.8" All Horde Vacation users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/horde-vacation-2.2.2" All Horde Turba users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/horde-turba-1.2.5" All Horde Passwd users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/horde-passwd-2.2.2" All Horde Nag users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/horde-nag-1.1.3" All Horde Mnemo users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/horde-mnemo-1.1.4" All Horde Kronolith users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/horde-kronolith-1.1.4" All Horde IMP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/horde-imp-3.2.8" All Horde Accounts users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/horde-accounts-2.1.2" All Horde Forwards users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/horde-forwards-2.2.2" All Horde Chora users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/horde-chora-1.2.3" Network Security Threat Level: Low Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
Adaptec ASR-81605ZQ 12G SAS 16-Port 1GB Cache PCIe x8 RAID Controller
$131.99
ATTO R608 8-Port 6Gb/s SAS RAID Controller
$33.99
Intel PCIe SSD AIC RAID Controller Card G97168-252
$44.55
DELL 4Y5H1 PERC H330 12GB SAS 6GB SATA PCI-E RAID CONTROLLER CARD
$38.49
Inspur LSI 9300-8i Raid Card 12Gbps HBA HDD Controller High Profile IT MODE
$15.98
LSI MegaRAID 9361-8i 12Gb PCIe 8-Port SAS/SATA RAID 1Gb w/BBU/CacheVault/License
$39.95
LSI MegaRaid 9361-8i 12Gbps SAS / SATA Raid Controller PCIe x8 3.0 Tested
$29.00
ORICO Multi Bay RAID Hard Drive Enclosure USB 3.0/ Type-C For 2.5/3.5'' HDD SSDs
$87.99
4 Bay RAID External Hard Drive Enclosure for 2.5/3.5" SATA HDD/SSD
$79.99
G TECHNOLOGY G RAID 0G04228 2-Bay Thunderbolt 2 RAID Array W/Power Supply
$99.99
|
||
No Discussions have been posted on this vulnerability. |