27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote host is vulnerable to an HTML Injection attack\n\nThe version<br />

of CommuniGate Pro running on the remote host is prone to an HTML injection flaw. The<br />

root cause of this flaw is a failure within the CommuniGate software when processing a<br />

specially formatted URI. An attacker, exploiting this flaw, would need to be able to entice a<br />

user into opening an email. Upon opening the email, the attacker would be able to execute<br />

arbitrary script code.\n\nFor your information, the reported version of CommuniGatePro is:<br />

\n %L \n<br />

Solution: Upgrade to CommuniGate Pro 5.2.15 or newer.<br />

CVE Not available<br />

Snitz Forum < 3.4.0.08 SQL Injection<br />

<strong>PVS</strong> ID: 5105 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack\n\nThe remote host<br />

seems to be running Snitz Forum, a web forum application implemented in ASP. This<br />

version of Snitz ('%L') is reported vulnerable to a SQL injection flaw within the 'email'<br />

parameter of the 'register.asp' script. An attacker, exploiting this flaw, would send specially<br />

formed HTTP queries to the register.asp script. These queries would include SQL<br />

statements which would ultimately be executed on the database utilized by Snitz.<br />

Solution: Upgrade to Snitz Forum 3.4.0.08 or higher<br />

CVE-2003-0286<br />

WordPress < 2.8.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5106 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack\n\nThe<br />

remote host is running a version of WordPress earlier than 2.8.2. Such versions are<br />

reportedly affected by a cross-site scripting vulnerability. In particular, the 'uri' parameter<br />

of the 'wp-comments-post.php' script is not sufficiently sanitized. An attacker, exploiting<br />

this flaw, would be able to inject script code which would be executed within the browser.<br />

In order to exploit this flaw, the attacker would need to be able to entice an unsuspecting<br />

user into opening a specially formatted URI. For your information, the reported version of<br />

WordPress is: \n %L \n<br />

Solution: Upgrade to WordPress 2.8.1/WordPress MU 2.8.2 or later.<br />

CVE Not available<br />

ISC BIND Dynamic Update Message Handling Remote DoS<br />

<strong>PVS</strong> ID: 5107 FAMILY: DNS Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40422<br />

Family Internet Services 1355

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!