27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Sybase SQL-Anywhere Database Client Detection<br />

<strong>PVS</strong> ID: 5149 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running a Sybase SQL-Anywhere database client<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL-Anywhere Database Server Default Credentials<br />

<strong>PVS</strong> ID: 5150 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote web server is running the Sybase SQL-Anywhere database<br />

server with default credentials. That is, the Sybase SQL Anywhere server ships with the<br />

default administrative credentials of 'dba/sql'. The <strong>PVS</strong> has just observed a user logging in<br />

using those credentials.<br />

Solution: Change the credentials and require an encrypted login<br />

CVE Not available<br />

Sun GlassFish Server 3.0 Preview Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5151 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Sun GlassFish Server 3.0 Preview. This versions is potentially affected by<br />

multiple issues : \n\n - An information disclosure vulnerability affects the 'filename' and<br />

'file' parameters of the 'jsft_resource.jsf' script.\n\n - An information disclosure<br />

vulnerability affects the 'file' and 'filename' parameters of the 'scale_static_resource.jsf'<br />

script.\n\nFor your information, the reported version of Sun GlassFish is: \n %L<br />

Solution: Use the current stable version 2 of Sun GlassFish Enterprise Server.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey < 1.1.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5152 FAMILY: Web Clients RISK: HIGH NESSUS ID:40874<br />

Description: Synopsis : \n\nThe remote host is running a web browser that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla SeaMonkey earlier than<br />

1.1.18. Such versions are potentially affected by multiple vulnerabilities : \n\n - A heap<br />

overflow vulnerability in the code that handles regular expressions in certificate names.<br />

(MFSA-2009-43)\n\n - A mismatch in the treatment of domain names in SSL certificates<br />

between SSL clients and the Certificate Authorities which issue server certificates.<br />

(MFSA-2009-42)\n\nFor your information, the reported version of SeaMonkey is: \n %L<br />

Family Internet Services 1369

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!