CERTA-2005-AVI-362
Vulnerability from certfr_avis
Le navigateur Secure Web Browser d'OpenVMS peut être compromis par le biais de nombreuses vulnérabilités pouvant déboucher sur des actions malveillantes diverses.
Description
Le navigateur Secure Web Browser d'OpenVMS est construit à partir du navigateur Mozilla. Les récentes failles concernant ce dernier touchent aussi Secure Web Browser.
L'exploitation de ces failles peut conduire à des actions malveillantes diverses telles que le contournement de la politique de sécurité, les attaques de type Cross Site Scritping, le détournement de consultation web, l'exécution de code arbitraire, etc..
Solution
- Bulletin de sécurité de l'éditeur : HP SSRT5999
http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBOV01229
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "OpenVMS 7.x.",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "OpenVMS 6.x ;",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLe navigateur Secure Web Browser d\u0027OpenVMS est construit \u00e0 partir du\nnavigateur Mozilla. Les r\u00e9centes failles concernant ce dernier touchent\naussi Secure Web Browser.\n\nL\u0027exploitation de ces failles peut conduire \u00e0 des actions malveillantes\ndiverses telles que le contournement de la politique de s\u00e9curit\u00e9, les\nattaques de type Cross Site Scritping, le d\u00e9tournement de consultation\nweb, l\u0027ex\u00e9cution de code arbitraire, etc..\n\n## Solution\n\n- Bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur : HP SSRT5999\n\n http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBOV01229\n",
"cves": [],
"initial_release_date": "2005-09-23T00:00:00",
"last_revision_date": "2005-09-23T00:00:00",
"links": [],
"reference": "CERTA-2005-AVI-362",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-09-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Le navigateur Secure Web Browser d\u0027OpenVMS peut \u00eatre compromis par le\nbiais de nombreuses vuln\u00e9rabilit\u00e9s pouvant d\u00e9boucher sur des actions\nmalveillantes diverses.\n",
"title": "Multiples Vuln\u00e9rabilit\u00e9s dans Secure Web Browser d\u0027OpenVMS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 de HP",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…