27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is running client software that may be considered<br />

questionable.\n\nThe remote host is running the Limewire server.\nLimewire is a P2P<br />

application that allows users to quickly download files from multiple locations.<br />

Solution: Ensure that Limewire is allowed with respect to corporate policies and guidelines.<br />

CVE Not available<br />

FuseTalk Multiple XSS Vulnerabilities<br />

<strong>PVS</strong> ID: 4111 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25553<br />

Description: Synopsis :\n\nThe remote web server contains a ColdFusion script that is susceptible to<br />

multiple cross-site scripting attacks.\n\nThe remote host is running FuseTalk, a discussion<br />

forum implemented in ColdFusion. The version of FuseTalk installed on the remote host<br />

fails to properly sanitize user-supplied input to several parameters and scripts before using<br />

it to generate dynamic content. An unauthenticated remote attacker may be able to leverage<br />

this issue to inject arbitrary HTML or script code into a user's browser to be executed<br />

within the security context of the affected site.<br />

Solution: No solution is known at this time.<br />

CVE-2007-3339<br />

FuseTalk txForumID Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4112 FAMILY: CGI RISK: HIGH NESSUS ID:25548<br />

Description: Synopsis :\n\nThe remote web server contains a ColdFusion script that is prone to a SQL<br />

injection attack.\n\nThe remote host is running FuseTalk, a discussion forum implemented<br />

in ColdFusion. The version of FuseTalk installed on the remote host fails to properly<br />

sanitize user-supplied input to the 'txForumID' parameter before using it in the<br />

'forum/include/error/forumerror.cfm' script in database queries. An unauthenticated remote<br />

attacker can leverage this issue to launch SQL injection attacks against the affected<br />

application.<br />

Solution: No solution is known at this time.<br />

Calendarix <<br />

CVE-2007-3273<br />

<strong>PVS</strong> ID: 4113 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25567<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is prone to SQL injection<br />

attacks.\n\nThe remote host is running Calendarix, a free web-based calendar application<br />

written in PHP. The version of Calendarix installed on the remote host fails to sanitize<br />

input to the 'month' and 'year' parameters of the 'calendar.php' script before using it in<br />

database queries. Provided PHP's 'magic_quotes_gpc' setting is disabled, an<br />

Family Internet Services 1067

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!