Cross-Site Scripting in openvas-gsa
ID: | FEDORA-2016-afdedc8da9 |
Distribution: | Fedora |
Plattformen: | Fedora 23 |
Datum: | Mo, 2. Mai 2016, 07:18 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1926 |
Applikationen: | openvas-gsa |
Originalnachricht |
|
Name : openvas-gsa Product : Fedora 23 Version : 6.0.10 Release : 3.fc23 URL : http://www.openvas.org Summary : Greenbone Security Assistant (GSA) is GUI to the OpenVAS Description : The Greenbone Security Assistant (GSA) is a lean web service offering a user web interface for the Open Vulnerability Assessment System (OpenVAS). The GSA uses XSL transformation style-sheets that converts OMP responses from the OpenVAS infrastructure into presentable HTML. -------------------------------------------------------------------------------- Update Information: Bump to latest upstream bugfix releases. Contains Security fix for CVE-2016-1926 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1300683 - CVE-2016-1926 openvas-gsa: XSS vulnerability due to improper handling of the parameters of get_aggregate command https://bugzilla.redhat.com/show_bug.cgi?id=1300683 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update openvas-gsa' at the command line. For more information, refer to "Managing Software with yum", available at https://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce |