27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 5089 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is affected by<br />

multiple attack vectors.\n\nThe remote web server is running a version of MyBB earlier<br />

than 1.4.8. Such versions reportedly fail to properly sanitize user-supplied data to<br />

unspecified parameters in the 'Archive' and 'Attachment' features of the application. An<br />

attacker could exploit this flaw to launch cross-site scripting attacks. For your information,<br />

the reported version of MyBB is: \n %L<br />

Solution: Upgrade to MyBB 1.4.8 or later.<br />

CVE Not available<br />

FireStats < 1.6.2 SQL Injection Vulnerability<br />

<strong>PVS</strong> ID: 5090 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is affected by<br />

multiple attack vectors.\n\nThe remote web server is running FireStats, a PHP-based<br />

website statistics application. The installed version of FireStats is earlier than 1.6.2. Such<br />

versions are reportedly affected by a SQL-injection vulnerability through an unspecified<br />

vector.\n\nFor your information, the reported version of FireStats is: \n %L<br />

Solution: Upgrade to FireStats 1.6.2 or later.<br />

CVE-2009-2144<br />

Joomla! < 1.5.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5091 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe installed version of Joomla! is earlier than 1.5.12. Such<br />

versions are reportedly affected by multiple vulnerabilities : \n\n - A cross-site scripting<br />

vulnerability in the 'PHP_SELF' property. (20090605)\n\n - A cross-site scripting<br />

vulnerability in the 'HTTP_REFERER' parameter. (20090604)\n\n - An information<br />

disclosure vulnerability because several files were missing checks for JEXEC.<br />

(20090606)\n\nFor your information, the reported version of Joomla was: \n %L<br />

Solution: Upgrade to Joomla! 1.5.12 or later.<br />

CVE Not available<br />

Horde Passwd Module < 3.1.1 XSS<br />

<strong>PVS</strong> ID: 5092 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1350

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!