27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

.ost File Upload Detection<br />

<strong>PVS</strong> ID: 4032 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.uni File Upload Detection<br />

<strong>PVS</strong> ID: 4033 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.pdf File Upload Detection<br />

<strong>PVS</strong> ID: 4034 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WebGUI < 7.3.14 viewList() Function Authentication Bypass<br />

<strong>PVS</strong> ID: 4035 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running WebGUI, a content management framework.<br />

The remote version of this software is vulnerable to a flaw where an attacker can bypass<br />

Family Internet Services 1046

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!