27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is running the MySQL Community server (GPL) version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Google Chrome < 1.0.154.59 Same Origin Policy Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5004 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:38154<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by a same origin<br />

bypass vulnerability.\n\nThe version of Google Chrome installed on the remote host is<br />

earlier than 1.0.154.59. Such versions are reportedly affected by a same origin policy<br />

bypass vulnerability when handling URLS with a 'chromehtml: ' protocol which could<br />

allow an attacker to run scripts of his choosing on any page or enumerate files on the local<br />

disk.\n\nIf a user has Google Chrome installed, visiting an attacker-controlled web page in<br />

another browser could cause Google Chrome to launch, open multiple tabs, and load scripts<br />

that run after navigating to a URL of the attacker's choice (Issue number 9860).\nFor your<br />

information, the exact browser version is: \n %L<br />

Solution: Upgrade to Google Chrome 1.0.154.59.<br />

CVE Not available<br />

OrangeHRM < 2.4.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5005 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote host<br />

is running OrangeHRM, a human resource management system written in PHP. The<br />

reported version of OrangeHRM is: \n %L \n\nThe version of OrangeHRM installed on the<br />

remote host fails to sanitize input to the 'Time Mod', 'Benefits Mod', 'Leave Mod', 'PIM<br />

Mod', and 'Admin Mod' parameters. Given this, an authenticated user may be able to<br />

bypass security restrictions and gain access to confidential data. In addition, the version of<br />

OrangeHRM is vulnerable to multiple cross-site scripting (XSS) attacks. An attacker,<br />

exploiting these XSS flaws, would be able to execute script code within the browser of an<br />

unsuspecting OrangeHRM user.<br />

Solution: Upgrade to version 2.4.2 or higher<br />

CVE Not available<br />

DB2 9.1 < Fix Pack 7 Information Disclosure<br />

<strong>PVS</strong> ID: 5006 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:36216<br />

Family Internet Services 1324

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!