27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

arbitrary code execution. (MFSA 2010-011)\n\n - A cross-site scripting issue when using<br />

'addEventListener' and 'setTimeout' on a wrapped object. (MFSA 2010-12)\n\n - It is<br />

possible to corrupt a user's XUL cache. (MFSA 2010-14)\n\nFor your information, the<br />

observed version of Firefox is: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.0.18, 3.5.8, 3.6, or later.<br />

CVE-2010-0171<br />

Mozilla SeaMonkey < 2.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5343 FAMILY: Web Clients RISK: HIGH NESSUS ID:44660<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla SeaMonkey earlier than<br />

2.0.3. Such versions are potentially affected by multiple vulnerabilities : \n\n - Several<br />

crashes can result in arbitrary code execution. (MFSA 2010-01)\n\n - The implementation<br />

of 'Web Workers' contains an error in its handling of array data types when processing<br />

posted messages. (MFSA 2010-02)\n\n - The HTML parser incorrectly frees used memory<br />

when insufficient space is available to process remaining input. (MFSA 2010-03)\n\n - A<br />

cross-site scripting issue due to 'window.dialogArguments' being readable cross-domain.<br />

(CVE-2010-04)\n\n - A cross-site scripting issue when using SVG documents and binary<br />

Content-Type. (MFSA 2010-05)\n\n - Multiple crashes can result in arbitrary code<br />

execution. (MFSA 2010-11)\n\n - A cross-site scripting issue when using<br />

'addEventListener' and 'setTimeout' on a wrapped object. (MFSA 2010-12)\n\nFor your<br />

information, the observed version of SeaMonkey is: \n %L<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0.3 or later.<br />

CVE-2010-0171<br />

Sawmill < 7.2.18 Unspecified Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5344 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to a cross-site scripting attack.\n\nThe<br />

host is running Sawmill, a log analysis and reporting application. The installed version of<br />

Sawmill is earlier than 7.2.18. Such versions are potentially affected by a cross-site<br />

scripting vulnerability. An attacker, exploiting this flaw, could execute arbitrary script code<br />

in a user's browser. For your information, the observed version of Sawmill is: \n %L<br />

Solution: Upgrade to Sawmill 7.2.18 or later.<br />

CVE-2010-1079<br />

SilverStripe < 2.3.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5345 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44941<br />

Family Internet Services 1431

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!