27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

function in the wiki module is not properly sanitized which could allow SQL injection<br />

attacks. (MSA-10-0006)\n\n - A problem exists in the handling of user submitted data in<br />

global search forms. (MSA-10-0007)\n\n - A persistent cross-site scripting issue exists<br />

when an admin uses the Login-as feature. (MSA-10-0008)\n\n - The 'Regenerate session id<br />

during login' setting is not enabled by default. (MSA-10-0009)\n\nFor your information, the<br />

observed version of Moodle is: \n %L<br />

Solution: Upgrade to Moodle version 1.8.12, 1.9.8, or later.<br />

CVE Not available<br />

ClamAV < 0.96 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5505 FAMILY: Web Clients RISK: HIGH NESSUS ID:45437<br />

Description: Synopsis : \n\nThe remote host is running an anti-virus application that is vulnerable to<br />

multiple attack vectors.\n\naccording to its version, the clamd anti-virus daemon on the<br />

remote host is earlier than 0.96. Such versions are reportedly affected by multiple<br />

vulnerabilities : \n\n - An attacker could bypass anti-virus detection by embedding<br />

malicious code in a specially crafted 'CAB' file. (1826)\n\n - An error in the<br />

'qtm_decompress()' function in 'libclamav/mspack.c' could lead to memory corruption<br />

when scanning a specially crafted Quantum-compressed file. (1771)\n\nFor your<br />

information, the observed version of ClamAV is: \n %L<br />

Solution: Upgrade to ClamAV 0.96 or later.<br />

CVE-2010-1311<br />

AjaXplorer < 2.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5506 FAMILY: CGI RISK: HIGH NESSUS ID:45489<br />

Description: Synopsis : \n\nThe remote web server is hosting a web application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting AjaXplorer, a web-based file<br />

management application. The installed version is earlier than 2.6. Such versions are<br />

potentially affected by multiple vulnerabilities : \n\n - A command-injection vulnerability<br />

via the 'destserver' parameter of the 'plugins/access.ssh/checkInstall.php' script.\n\n -<br />

Unspecified input is not properly validated before being used to read files.\n\nFor your<br />

information, the observed version of AjaXplorer is: \n %L<br />

Solution: Upgrade to AjaXplorer 2.6 or later.<br />

CVE Not available<br />

LogMeIn Listening Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5507 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 1473

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!