27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is running the QNX embedded operating system. The reported version<br />

information (via the qconn service) is: %L<br />

Solution: Verify that the software is up to date<br />

QNX Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5641 FAMILY: FTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the QNX embedded Operating System.<br />

Solution: Manually inspect the service to ensure that it is patched and necessary on your network<br />

CVE Not available<br />

CouchDB < 0.11.2 Futon Admin Interface Cross-Site Request Forgery<br />

<strong>PVS</strong> ID: 5642 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48382<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to a cross-site request forgery<br />

attack.\n\nThe remote host is running CouchDB, a document-oriented database. For your<br />

information, the observed version of CouchDB is %L.\n\nVersions of CouchDB earlier<br />

than 0.11.2 are potentially affected by a cross-site request forgery vulnerability. The<br />

application fails to properly sanitize user-supplied input before it is used in the Futon<br />

administrative interface.\n\n remote attacker could exploit this to execute arbitrary script<br />

code in the security context of CouchDB's admin interface.<br />

Solution: Upgrade to CouchDB 0.11.2 or later.<br />

CVE-2010-2234<br />

Drupal CCK "Node Reference" Module < 6.x-2.8 <strong>Security</strong> Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5643 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is vulnerable to a<br />

security bypass attack.\n\nThe remote web server hosts a Drupal install that uses the CCK<br />

"Node Reference" module. Versions of the CCK Module earlier than 6.x-2.8 are potentially<br />

affected by a security bypass vulnerability. The application provides a backend URL that is<br />

used for asynchronous requests by the 'autocomplete' widget which fails to correctly check<br />

that the user had field level access to the source field.<br />

Solution: Upgrade to Drupal CCK module 6.x-2.8 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1518

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!