27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote FTP server is hosting .divx files. As an example, consider the following file<br />

that was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a<br />

common way of distributing information; however, efforts should be taken to ensure that<br />

the hosted files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Database Version Detection<br />

<strong>PVS</strong> ID: 4993 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Oracle database server version %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Database Client Detection<br />

<strong>PVS</strong> ID: 4994 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running Oracle client software used to remotely manage or query an<br />

Oracle server.<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Database Server Detection<br />

<strong>PVS</strong> ID: 4995 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Oracle database server.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM WebSphere Application Server < 6.1.0.23 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4996 FAMILY: Web Servers RISK: HIGH NESSUS ID:36161<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nIBM WebSphere<br />

Application Server 6.1 before Fix Pack 23 appears to be running on the remote host. Such<br />

versions are reportedly affected by multiple vulnerabilities :\n\n - Provided an attacker has<br />

valid credentials, it may be possible to hijack an authenticated session. (PK66676)\n\n - It<br />

may be possible for a remote attacker to redirect users to arbitrary sites using<br />

ibm_security_logout servlet. (PK71126) \n\n - Under certain conditions it may be possible<br />

to access administrative console user sessions. (PK74966)\n\n - If APAR PK41002 has<br />

Family Internet Services 1320

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!