27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 5204 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client appears to be running Windows 98. Windows 98 is an older operating<br />

system and is no longer supported by Microsoft. In addition, there are many malware<br />

programs that use the string "Windows 98" within their headers. The reported banner which<br />

triggered this alert is: \n %L<br />

Solution: Manually inspect the workstation to ensure that it is not running software which may<br />

impact the security of the entire network.<br />

CVE Not available<br />

Policy - Dopewars Gaming Server Detection<br />

<strong>PVS</strong> ID: 5205 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable.\n\nThe remote server is acting as a Dopewars game server.<br />

Solution: Ensure that this gaming is in alignment with corporate and security policies.<br />

CVE Not available<br />

Symantec <strong>Security</strong>Expressions Audit and Compliance Server Multiple XSS<br />

<strong>PVS</strong> ID: 5206 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42083<br />

Description: Synopsis : \n\nThe remote web application is affected by multiple cross-site scripting<br />

vulnerabilities.\n\nThe remote web server is running Symantec <strong>Security</strong>Expressions Audit<br />

and Compliance Server. The installed version is potentially affected by multiple cross-site<br />

scripting vulnerabilities : \n\n - The web console fails to sanitize user supplied input to<br />

certain unspecified parameters. An authorized user may be able to exploit this issue to<br />

inject arbitrary HTML script code into an user's browser to be executed within the security<br />

context of the affected site.\n\n - Certain error messages are not properly encoded which<br />

could be exploited by an attacker to inject arbitrary HTML content into an user's browser<br />

session.\n\nFor your information, the observed version of Symantec <strong>Security</strong>Expressions<br />

Audit and Compliance Server is: \n %L<br />

Solution: Apply Hot Fix 1 referenced in article KB49452<br />

CVE-2009-3030<br />

OpenCms Multiple Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 5207 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1386

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!