27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Authenticated attackers can exploit this issue to gain access to administrative functions. For<br />

your information, the reported version of WordPress is: \n %L<br />

Solution: Upgrade to WordPress 2.8.3 or later.<br />

CVE Not available<br />

Bugzilla < 3.4.1 Information Disclosure<br />

<strong>PVS</strong> ID: 5121 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an information disclosure flaw.\n\nThe<br />

remote host is running Bugzilla, a bug-tracking software with a web interface. The version<br />

of Bugzilla on the remote host suffers from flaw which allows authenticated users who can<br />

edit bugs to view names of all products through the 'show_bug.cgi' script.<br />

Solution: Upgrade to Bugzilla 3.4.1 or later.<br />

CVE Not available<br />

Mac OS X 10.5 < 10.5.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5122 FAMILY: Generic RISK: HIGH NESSUS ID:40502<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Mac OS X 10.5 that is older than version 10.5.8. Mac OS X 10.5.8<br />

contains security fixes for the following products : \n\n - bzip2\n - CF<strong>Network</strong>\n -<br />

ColorSync\n - CoreTypes\n - Dock\n - Image RAW\n - ImageIO\n - Kernel\n - launched\n<br />

- Login Window\n - MobileMe\n - <strong>Network</strong>ing\n - XQuery\n\nFor your information, the<br />

reported version of Mac OS X is: \n %L<br />

Solution: Upgrade to Mac OS X 10.5.8 or later.<br />

CVE-2009-2194<br />

CMS Made Simple < 1.6.3 Local File Include Vulnerability<br />

<strong>PVS</strong> ID: 5123 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40551<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is affected by an<br />

information disclosure vulnerability.\n\nThe remote host is running CMS Made Simple, a<br />

web-based content manager written in PHP. The installed version of CMS Made Simple is<br />

earlier than 1.6.2. Such versions are potentially affected by an information disclosure<br />

vulnerability because they fail to properly sanitize user supplied data to the 'url' parameter<br />

of the 'modules/Printing/output.php' script. For your information, the reported version of<br />

CMS Made Simple is: \n %L<br />

Solution: Upgrade to CMS Made Simple 1.6.3 or later.<br />

Family Internet Services 1360

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!