27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2010-0109<br />

Google Chrome < 4.1.249.1059 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5516 FAMILY: Web Clients RISK: HIGH NESSUS ID:45610<br />

Description: Synopsis : \n\nThe remote host is using a web client that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

4.1.249.1059. Such versions are reportedly affected by multiple vulnerabilities : \n\n - An<br />

error related to type confusion with forms. (39443)\n\n - An HTTP request error leading to<br />

a possible cross-site request forgery. (39698)\n\n - A local file reference through developer<br />

tools. (40136)\n\n - A cross-site scripting issue in chrome: //net-internals. (40137)\n\n - A<br />

cross-site scripting issue in chrome: //downloads. (40138)\n\n - Pages might load with the<br />

privileges of the new tab page. (40575)\n\n - A memory corruption vulnerability in the V8<br />

bindings. (40635)\n\nFor your information, the observed version of Google Chrome is: \n<br />

%L<br />

Solution: Upgrade to Google Chrome 4.1.249.1059 or later.<br />

CVE-2010-1767<br />

Alt-N MDaemon < 11.0.1 Multiple Remote DoS Vulnerabilities<br />

<strong>PVS</strong> ID: 5517 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45627<br />

Description: Synopsis : \n\nThe remote Windows host contains a program that is vulnerable to multiple<br />

attack vectors.\n\nThe remote Windows host is running the Alt-N MDaemon mail server.<br />

The installed version of MDaemon is earlier than 11.0.1. Such versions are potentially<br />

affected by multiple unspecified denial of service vulnerabilities.\nFor your information,<br />

the observed version of MDaemon is: \n %L<br />

Solution: Upgrade to MDaemon 11.0.1 or later.<br />

CVE Not available<br />

Joomla! < 1.5.16 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5518 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server has an application installed that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting a version of Joomla! earlier<br />

than 1.5.16. Such versions are potentially affected by multiple security issues : \n\n - If a<br />

user enters a URL with a negative query limit or offset, a PHP notice displays revealing<br />

information about the system.\n\n - The migration script in the Joomla! installer does not<br />

check the file type being uploaded.\n\n - A user's session ID doesn't get modified when the<br />

user logs on.\n\n - When a user requests a password reset, the reset token is stored in plain<br />

text in the database.\n\nFor your information, the observed version of Joomla! is: \n %L<br />

Solution: Upgrade to Joomla! 1.5.16 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1477

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!