27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 5633 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The <strong>PVS</strong> has observed a failed SQL login to an MySQL server. The following UserID has<br />

just failed to login: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Drupal Ubercart Module < 5.x-1.10 / 6.x-2.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5634 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is affected by an<br />

authentication bypass vulnerability.\n\nThe remote web server hosts a Drupal install that<br />

uses the Ubercart, an e-commerce module for Drupal CMS. For your information, the<br />

observed version of Drupal Ubercart module is %L.\n\nVersions of Ubercart earlier than<br />

5.x-1.10 / 6.x-2.4 are potentially affected by multiple vulnerabilities :\n\n - The 2Checkout<br />

gateway module does not properly verify payment notification information. Note that this<br />

module must be enabled for the Drupal install to be affected.\n\n - The Paypal module's<br />

WPS payment method does not properly verify the payment notification information. Note<br />

that this module must be enabled for the Drupal install to be affected.\n\n - The Ubercart<br />

Cart Links module is vulnerable to both an Access Bypass and Cross Site Request Forgery<br />

where a malicious user can trick other users into adding or removing items from their cart<br />

and add items to a cart which are not published on the site. Note that this module must be<br />

enabled for the Drupal install to be affected.<br />

Solution: Upgrade to Drupal Ubercart Module 5.x-1.10 / 6.x-2.4 or later.<br />

CVE Not available<br />

Serv-U < 10.2.0.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5635 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48435<br />

Description: Synopsis :\n\nThe remote FTP server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running Serv-U File Server, an FTP Server for Windows. For your<br />

information, the observed version Serv-U is %L.\n\nVersions of Serv-U earlier than<br />

10.2.0.0 are potentially affected by multiple vulnerabilities :\n\n - It is possible to create a<br />

directory, when using virtual paths and various combinations of permissions, where the<br />

end-user does not have permission to create the directory. Note that this issue was<br />

introduced in Serv-U 9.2.0.1 and does not affect earlier version.\n\n - Certain web client<br />

invalid URL parameters could cause the affected application to crash.<br />

Solution: Upgrade to Serv-U version 10.2.0.0 or later.<br />

Family Internet Services 1516

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!