27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

Oracle Secure Enterprise Search 10.x Version Detection<br />

<strong>PVS</strong> ID: 5124 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running the Oracle Secure Enterprise Search version %L<br />

Solution: N/A<br />

CVE Not available<br />

Safari < 4.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5125 FAMILY: Web Clients RISK: HIGH NESSUS ID:40554<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Safari installed on the remote host is earlier than 4.0.3. Such versions are potentially<br />

affected by several issues : \n\n - A buffer overflow exists in the handling of EXIF<br />

metadata could lead to a crash or arbitrary code execution. (CVE-2009-2188)\n\n - A<br />

vulnerability in WebKit's parsing of floating point numbers may allow for remote code<br />

execution. (CVE-2009-2195)\n\n - A vulnerability in Safari may let a malicious website to<br />

be promoted in Safari's Top Sites. (CVE-2009-2196)\n\n - A vulnerability in how WebKit<br />

renders an URL with look alike characters could be used to masquerade a website.<br />

(CVE-2009-2199)\n\n - A vulnerability in WebKit may lead to the disclosure of sensitive<br />

information. (CVE-2009-2200)\n\n - A heap buffer overflow in CoreGraphics involving the<br />

drawing of long text strings could lead to a crash or arbitrary code execution.<br />

(CVE-2009-2468)\n\nFor your information, the reported version of Safari is: \n %L<br />

Solution: Upgrade to Safari 4.0.3 or later.<br />

CVE-2009-2468<br />

WordPress < 2.8.4 <strong>Security</strong> Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5126 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40578<br />

Description: Synopsis : \n\nThe remote host is affected by a security bypass vulnerability.\n\nThe<br />

remote host is running a version of WordPress earlier than 2.8.4. Such versions are<br />

potentially affected by a flaw in the 'reset_password()' function of the 'wp-login.php' script<br />

which allows an attacker to reset the password for the first account without a key in the<br />

database (usually the admin account). For your information, the reported version of<br />

WordPress is: \n %L<br />

Solution: Upgrade to WordPress 2.8.4 or later.<br />

CVE-2009-2762<br />

Microsoft IIS 7.0 Webserver Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1361

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!