27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2007-5461<br />

Ruby Version Detection<br />

<strong>PVS</strong> ID: 4246 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Ruby web application. The reported version is '%L'<br />

Solution: N/A<br />

CVE Not available<br />

Ruby on Rails Version Detection<br />

<strong>PVS</strong> ID: 4247 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Ruby on Rails web application. The reported version is<br />

'%L'<br />

Solution: N/A<br />

CVE Not available<br />

Ruby on Rails < 1.2.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4248 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

server is running the Ruby on Rails web application. The reported version is '%L'\nThis<br />

version of Rails is reported to be vulnerable to a number of flaws. It is reported that a<br />

remote attacker can perform man-in-the-middle attacks and gain user credentials. It is also<br />

reported that there is a content-parsing flaw in the XML handler that would allow an<br />

attacker to either gain unauthorized access to data or cause the application to fail.<br />

Solution: Upgrade to version 1.2.5 or higher.<br />

CVE-2007-5380<br />

Opera < 9.24 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4249 FAMILY: Web Clients RISK: HIGH NESSUS ID:27506<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by two<br />

vulnerabilities.\n\nThe version of Opera installed on the remote host reportedly may allow<br />

for arbitrary code execution if it has been configured to use an external news reader or<br />

email client and a user views a specially-crafted web page. In addition, it may also allow a<br />

script to bypass the same-origin policy and overwrite functions on pages from other<br />

domains when processing frames from different web sites, which can be leveraged to<br />

conduct cross-site scripting attacks.<br />

Family Internet Services 1105

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!