27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 10.0.2 or higher.<br />

CVE-2008-6967<br />

vBulletin < 3.7.4 Visitor Messages Add-on HTML Injection<br />

<strong>PVS</strong> ID: 4766 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe version<br />

of vBulletin installed on the remote host fails to properly sanitize user-supplied input.<br />

Specifically, the 'Visitor Messages' addon can be used by an attacker to inject script code<br />

into a public section of the bulletin board. An attacker exploiting this flaw would only need<br />

the ability to post data to the server. When an unsuspecting user browses the site, the script<br />

code would be executed within the client browser. The reported version of vBulletin is: \n<br />

%L<br />

Solution: Upgrade to version 3.7.4 or higher.<br />

MyBB < 1.4.4 CSRF<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4767 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a cross-site request forgery (CSRF)<br />

attack.\n\nThe version of MyBB installed on the remote host is vulnerable to an<br />

information-disclosure flaw. Specifically, the 'my_post_key' variable of the<br />

'moderation.php' script can be harvested by malicious third party sites. An attacker can use<br />

this information to generate cross-site request forgery (CSRF) attacks. The reported version<br />

of MyBB is: \n %L \n<br />

Solution: Upgrade to version 1.4.4 or higher.<br />

CVE-2008-7082<br />

Apple Error Reporting DNS Lookup<br />

<strong>PVS</strong> ID: 4768 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Apple computer. <strong>PVS</strong> just observed the host making a query to<br />

an Apple server that handles error reports.<br />

Solution: N/A<br />

CVE Not available<br />

Apple iPhone Web Utility Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1255

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!