27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 5590 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site request forgery attack.\n\nThe<br />

remote host is running Snare for Windows, a central logging application with the web<br />

interface enabled. For your information, the observed version of Snare is :%L\n\nVersions<br />

of Snare for Windows earlier than 3.1.8 are potentially affected by a cross-site request<br />

forgery vulnerability in the web administration interface. An attacker, exploiting this flaw,<br />

could execute arbitrary script code in a user's browser.<br />

Solution: Upgrade to Snare for Windows 3.1.8 or later.<br />

CVE-2010-2594<br />

Google Chrome < 5.0.375.99 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5591 FAMILY: Web Clients RISK: HIGH NESSUS ID:47595<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome installed on the<br />

remote host is %L.\n\nVersions of Google Chrome earlier than 5.0.375.99 are potentially<br />

affected by multiple vulnerabilities :\n\n - An unspecified issue in WebGL can trigger an<br />

OOB read. (Bug 42396)\n\n - Sandboxed iframes are not isolated strongly enough. (Bug<br />

42575)\n\n - A memory corruption issue exists with invalid SVGs. (Bug 43488)\n\n - A<br />

memory corruption issue exists in the bidi algorithm. (Bug 44424)\n\n - A memory<br />

corruption issue exists with invalid PNGs. (Bug 45983)\n\n - A memory corruption exists<br />

in CSS style rendering. (Bug 46360)\n\n - An unspecified issue with print dialogs. (Bug<br />

46575)\n\n - An unspecified crash relating to modal dialogs. (Bug 47056)<br />

Solution: Upgrade to Google Chrome 5.0.375.99 or later.<br />

CVE-2010-2652<br />

WordPress WP-UserOnline plugin URL HTML Injection Vulnerability<br />

<strong>PVS</strong> ID: 5592 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server hosts a web application that is vulnerable to an<br />

HTML-injection vulnerability.\n\nThe remote web server hosts WordPress with the<br />

WP-UserOnline plugin, a plugin to display how many users are online with detailed<br />

statistics. For your information, the observed version of the WP-UserOnline plugin is<br />

%L.\n\nVersions of WP-UserOnline earlier than 2.70 are potentially affected by an<br />

HTML-injection vulnerability. An attacker, exploiting this flaw, could potentially execute<br />

arbitrary script code in a user's browser.<br />

Solution: Upgrade to WP-UserOnline 2.70 or later.<br />

CVE Not available<br />

XLight FTP Server SFTP Directory Traversal<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5593 FAMILY: SSH NESSUS ID:47680<br />

Family Internet Services 1501

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!