![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.800935 |
Categoría: | Web application abuses |
Título: | Buildbot Multiple Cross-Site Scripting Vulnerabilities |
Resumen: | Buildbot is prone to multiple Cross Site Scripting vulnerabilities. |
Descripción: | Summary: Buildbot is prone to multiple Cross Site Scripting vulnerabilities. Vulnerability Insight: Several scripts in the application do not adequately sanitise user supplied data before processing and returning it to the user. Vulnerability Impact: Successful exploitation will allow attacker to inject arbitrary web script or HTML via unspecified vectors and conduct cross-site scripting attacks. Affected Software/OS: Buildbot version 0.7.6 through 0.7.11p2 on all platforms. Solution: Apply the patches or upgrade to version 0.7.11p3. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-2967 BugTraq ID: 36100 http://www.securityfocus.com/bid/36100 https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00978.html https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00985.html http://sourceforge.net/mailarchive/message.php?msg_name=42338fbf0908130837o86b77d6y725233076286226f%40mail.gmail.com http://secunia.com/advisories/36352 http://secunia.com/advisories/36418 http://www.vupen.com/english/advisories/2009/2352 XForce ISS Database: buildbot-unspecified-xss(52896) https://exchange.xforce.ibmcloud.com/vulnerabilities/52896 |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |