27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: N/A<br />

CVE Not available<br />

ActiveX Control Detection<br />

<strong>PVS</strong> ID: 4669 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting content that includes an embedded call to ActiveX. The<br />

CLSID of the ActiveX control is: \n %L >\n\nThe control is referenced at the following<br />

location: \n%P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Trojan/Backdoor - Potential Malicious Microsoft Executable Being Served<br />

<strong>PVS</strong> ID: 4670 FAMILY: Generic RISK: HIGH NESSUS ID:33950<br />

Description: Synopsis :\n\nThe remote host may be compromised.\n\nThis service appears to send a<br />

Microsoft Windows executable when a connection to it is established. This may be<br />

evidence of a type of malware that is known to propagate in this manner.<br />

realtime<br />

Solution: Check the host and disinfect or reinstall if necessary.<br />

CVE Not available<br />

Possible Social <strong>Security</strong> Number in Cookie<br />

<strong>PVS</strong> ID: 4671 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server sent a cookie with what appears to be an embedded Social<br />

<strong>Security</strong> Number. You should manually verify that confidential data is not being<br />

leaked from the network. The observed cookie was set to: \n %L \n\nThe request that<br />

generated the cookie was: \n%P<br />

Solution: Ensure that confidential data is not passed within plaintext cookies. Note: <strong>PVS</strong> only reports<br />

on the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Possible User ID and Password Sent Within a Web Form (POST)<br />

<strong>PVS</strong> ID: 4672 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1225

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!