27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 5233 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42801<br />

Description: Synopsis : \n\nThe remote web server is hosting a web application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote host is running a version of WordPress earlier than<br />

2.8.6. Such versions are potentially affected by multiple vulnerabilities : \n\n - A<br />

file-upload and code execution vulnerability in the 'wp-admin/includes/file.php' script.\n\n -<br />

A cross-site scripting vulnerability in 'Press This'.\n\nFor your information, the observed<br />

version of WordPress is: \n %L<br />

Solution: Upgrade to WordPress 2.8.6 or later.<br />

CVE Not available<br />

Google Chrome < 3.0.195.33 <strong>Security</strong> Bypass Vulnerability.<br />

<strong>PVS</strong> ID: 5234 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42798<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to remote code<br />

execution attacks.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 3.0.195.33. Such versions are potentially affected by a security bypass vulnerability<br />

caused by custom headers being incorrectly sent for 'CORS OPTIONS' requests. A<br />

malicious web site operator could set custom HTTP headers on cross-origin 'OPTIONS'<br />

requests. For your information, the observed version of Google Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 3.0.195.33 or later.<br />

CVE-2009-2816<br />

IBM WebSphere Application Server < 7.0.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5235 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42821<br />

Description: Synopsis : \n\nThe remote host is running an application server that is vulnerable to<br />

multiple attack vectors.\n\nThe remote host appears to be running IBM WebSphere<br />

Application Server 7.0 before fix pack 7. Such versions are potentially affected by multiple<br />

issues : \n\n - A cross-site request forgery vulnerability exists due to insufficient validation<br />

of user supplied input to the administrative console. (PK87176)\n\n - Due to an error in<br />

Java Naming and Directory Interface, it may be possible to obtain sensitive information.<br />

(PK91414)\n\n - The administrative console is affected by a cross-site scripting<br />

vulnerability. (PK92057)\n\n - It may be possible to bypass security restrictions using a<br />

specially crafted HTTP HEAD method. (PK83258)\n\nFor your information, the observed<br />

version of WebSphere Application Server is: \n %L<br />

Solution: Apply Fix Pack 7 (7.0.0.7) or later.<br />

CVE-2009-2747<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1396

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!