27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 5.1.18 or higher.<br />

CVE-2007-2693<br />

vBulletin < 3.6.7 calendar.php title Parameter Persistent HTML Injection<br />

<strong>PVS</strong> ID: 3994 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe version<br />

of vBulletin installed on the remote host fails to properly sanitize user-supplied input.<br />

Specifically, the 'title' parameter of the calendar.php script can be used by an attacker to<br />

inject script code into a public section of the bulletin board. An attacker exploiting this flaw<br />

would only need the ability to post data to the calendar.php script. When an unsuspecting<br />

user browses the site, the script code would be executed within the client browser.<br />

Solution: Upgrade to version 3.6.7 or higher.<br />

CVE-2007-2908<br />

WordPress < 2.1.4 wp-admin/admin-ajax.php cookie Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3995 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe version of<br />

WordPress installed on the remote host is vulnerable to a SQL injection attack. The<br />

reported version is: \n %L \n\nAn attacker exploiting this flaw would only need to be able<br />

to send data to the 'wp-admin/admin-ajax.php' script. Successful exploitation would result<br />

in the attacker executing SQL commands on the remote database server<br />

Solution: Upgrade to version 2.1.4 or higher.<br />

CVE-2007-2821<br />

Opera < 9.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3996 FAMILY: Web Clients RISK: HIGH NESSUS ID:25290<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is prone to a buffer overflow<br />

attack.\n\nThe version of Opera installed on the remote host reportedly contains a buffer<br />

overflow vulnerability that can be triggered by a malicious Torrent file. Successful<br />

exploitation requires that a user on the affected host right-click on the torrent entry in the<br />

transfer manager rather than simply click on a torrent link and may allow a remote attacker<br />

to execute arbitrary code subject to the privileges of the user.<br />

Solution: Upgrade to version 9.21 or higher.<br />

CVE-2007-2274<br />

Symantec Discovery Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1036

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!