27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome installed on the<br />

remote host is : %L\n\nVersions of Google Chrome earlier than 5.0.375.70 are potentially<br />

affected by multiple vulnerabilities :\n\n - A cross-origin keystroke redirection<br />

vulnerability. (Bug 15766)\n\n - A cross-origin bypass in DOM methods. (Bug 39985)\n\n -<br />

A memory error exists in table layout. (Bug 42723)\n\n - It is possible to escape the<br />

sandbox in Linux. (Bug 43304)\n\n - A stale pointer exists in bitmap. (Bug 43307) - A<br />

memory corruption vulnerability exists in DOM mode normalization. (Bug 43315)\n\n - A<br />

memory corruption vulnerability exists in text transforms. (Bug 43487)\n\n - A cross-site<br />

scripting vulnerability exists in the innerHTML property of textarea. (Bug 43902)\n\n - A<br />

memory corruption vulnerability exists in font handling. (Bug 44740)\n\n - Geolocation<br />

events fire after document deletion. (Bug 44868)\n\n - A memory corruption vulnerability<br />

exists in the rendering of list markers. (44955)<br />

Solution: Upgrade to Google Chrome 5.0.375.70 or later.<br />

CVE-2010-1773<br />

PRTG Traffic Grapher < 6.2.1.963 / 9.2.1.964 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5568 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:46857<br />

Description: Synopsis :\n\nThe remote host contains a web application that is vulnerable to a cross-site<br />

scripting attack.\n\nThe remote host is running PRTG Traffic Grapher, a web-based<br />

application for monitoring network traffic. For your information, the observed version of<br />

PRTG Traffic Grapher on the remote host is %L.\n\nVersions of PRTG Traffic Graher<br />

earlier than 6.2.1.963 / 9.2.1.964 are potentially affected by a cross-site scripting<br />

vulnerability in the 'url' parameter of the 'login.htm' script. An unauthenticated remote<br />

attacker, exploiting this flaw, could execute arbitrary script code in a user's browser.<br />

Solution: Upgrade to PRTG Traffic Grapher 6.2.1.963, 6.2.1.964, or later.<br />

CVE Not available<br />

Flash Player < 10.1.53.64 / 9.0.277.0 Multiple Vulnerabilities (APSB10-14)<br />

<strong>PVS</strong> ID: 5569 FAMILY: Web Clients RISK: HIGH NESSUS ID:46859<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is vulnerable to multiple<br />

attack vector.\n\nFor your information, the observed version of Flash player is<br />

%L.\n\nVersions of Flash Player earlier than 10.1.53.64 are potentially affected by multiple<br />

vulnerabilities, such as memory corruption, buffer overflows, and memory exhaustion, that<br />

could be exploited to cause an application crash or even allow execution of arbitrary code.<br />

Solution: Upgrade to Flash Player 10.1.53.64 / 9.0.277.0 or later.<br />

CVE-2010-2189<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Novell eDirectory < 8.8 SP5 Patch 4 Multiple Vulnerabilities<br />

Family Internet Services 1493

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!