27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

filter may allow registered users to launch persistent cross-site scripting attacks.<br />

(MSA-10-012)\n\n - A potential cross-site request forgery vulnerability exists in Quiz<br />

reports.\n\n (MSA-10-013)<br />

Solution: Upgrade to Moodle version 1.8.13, 1.9.9, or later.<br />

CVE Not available<br />

Opera < 10.54 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5576 FAMILY: Web Clients RISK: HIGH NESSUS ID:47113<br />

Description: Synopsis :\n\nThe remote host has a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running the Opera web browser. For your information, the<br />

observed version of Opera is %L.\n\nVersions of Opera earlier than 10.54 are potentially<br />

affected by multiple vulnerabilities :\n\n - Opera may be used as a vector for a font issue in<br />

the underlying operating system. (KB 954)\n\n - An extremely severe issue due to an<br />

undisclosed error.\n\n - A highly severe issue due to an undisclosed error.\n\n - A<br />

moderately severe issue due to an undisclosed issue.\n\n - A less severe issue due to an<br />

undisclosed error.<br />

Solution: Upgrade to Opera 10.54 or later.<br />

CVE-2010-2666<br />

Atlassian JIRA < 4.1.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5577 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:47114<br />

Description: Synopsis :\n\nThe remote web server hosts an application that is vulnerable to multiple<br />

attack vectors.\n\nAtlassian JIRA, a web-based application for bug tracking, issue tracking,<br />

and project management is installed on the remote web server. For your information, the<br />

observed version of Atlassian JIRA is %L.\n\nVersions of JIRA earlier than 4.1.2 are<br />

potentially affected by multiple vulnerabilities :\n\n - Multiple cross-site scripting<br />

vulnerabilities in URL query strings.\n\n - JIRA standalone fails to properly protect<br />

sensitive cookie data with the 'HTTPOnly' protection mechanism.\n\n - Users without the<br />

'JIRA Users' permission can login via crowd single-sign-on.\n\nA cross-site request forgery<br />

in the 'logout' action.\n\n - Multiple vulnerabilities in the FishEye plugin.\n\n - A security<br />

vulnerability in the Bamboo plugin.<br />

Solution: Upgrade to Atlassian JIRA 4.1.2.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apple iPhone/iPad OS < 4.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5578 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1496

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!