27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

Mantis 1.2.x < 1.2.3 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5676 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is vulnerable to<br />

multiple cross-site scripting attacks.\n\nThe remote web server is hosting Mantis, an open<br />

source bugtracking application written in PHP. For your information, the observed version<br />

of Mantis is %L.\n\nVersions of Mantis 1.2.x prior to 1.2.3 are potentially affected by<br />

multiple cross-site scripting vulnerabilities :\n\n - A cross-site scripting issue exists when<br />

viewing the Summary page. (Bug 0012309)\n\n - A cross-site scripting issue exists in<br />

print_all_bug_page_word.php when printing project and category names. (Bug<br />

0012238)\n\n - Multiple cross-site scripting issues exist which relate to custom field<br />

enumeration values. (Bug 0012232)\n\n - A cross-site scripting vulnerability exists when<br />

deleting maliciously named categories. (Bug 012230)\n\n - A cross-site scripting issue<br />

exists in NuSOAP WSDL. (Bug 0012312)<br />

Solution: Upgrade to Mantis 1.2.3 or later.<br />

CVE-2010-3070<br />

MySQL Community Server 5.1 < 5.1.51 Multiple Denial of Service Vulnerabilities<br />

<strong>PVS</strong> ID: 5677 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:49711<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community Server is %L.\n\nVersions<br />

of MySQL Community Server 5.1 earlier than 5.1.51 are potentially affected by multiple<br />

vulnerabilities :\n\n - A privilege escalation vulnerability exists when using<br />

statement-based replication. Version specific comments used on a master server with a<br />

lesser release version than its slave can allow the MySQL privilege system on the slave<br />

server to be subverted. (49124)\n\n - The improper handling of type errors during argument<br />

evaluation in extreme-value functions, e.g., 'LEAST()' or 'GREATEST()' caused server<br />

crashes. (55826)\n\n - The creation of derived tables needing a temporary grouping table<br />

caused server crashes. (55568)\n\n - The re-evaluation of a user-variable assignment<br />

expression after the creation of a temporary table caused server crashes. (55564)\n\n - The<br />

pre-evaluation of 'LIKE' predicates while preparing a view caused server crashes.<br />

(54568)\n\n - The use of 'GROUP_CONCAT()' and 'WITH ROLLUP' caused server<br />

crashes. (54476)\n\n - The use of an intermediate temporary table and queries containing<br />

calls to 'GREATEST()' or 'LEAST()', having a list of both numeric and 'LONGBLOB'<br />

arguments, caused server crashes. (54461)\n\n - The use of nested joins in prepared<br />

statements or stored procedures could result in infinite loops. (53544)<br />

Solution: Upgrade to MySQL Community Server 5.1.51 or later.<br />

CVE-2010-3840<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1532

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!