27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Cisco Ciso Aironet 1100 series Rev. 01 server<br />

with the default login and password set (''/'Cisco').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Cisco Aironet 1200 Default Password<br />

<strong>PVS</strong> ID: 4845 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Cisco Aironet 1200 server with the default<br />

login and password set ('root'/'Cisco').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Conexant Router Default Password<br />

<strong>PVS</strong> ID: 4846 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Conexant Router server with the default login<br />

and password set (''/'epicrouter').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Coppermine < 1.4.20 'img_dir' Arbitrary File Upload<br />

<strong>PVS</strong> ID: 4847 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a file upload vulnerability.\n\nThe remote<br />

host is running Coppermine version: \n %L \n\nThis version of Coppermine is vulnerable to<br />

a file upload vulnerability due to a flaw in the way that the program parses data sent to the<br />

'img_dir' parameter of the 'picEditor.php' script. An attacker exploiting this flaw would be<br />

able to upload arbitrary files to the 'album' subdirectory.<br />

Solution: Upgrade to version 1.4.20 or higher.<br />

CVE Not available<br />

Cyclades TS800 Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4848 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1279

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!