27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

and 'libclamav/sis.c'. (Report from )<br />

Solution: Upgrade to ClamAV 0.97 or later.<br />

CVE-2011-1003<br />

phpMyAdmin 2.x < 2.11.11.3 / 3.x < 3.3.9.2 SQL Injection Vulnerability (PMASA-2011-2)<br />

<strong>PVS</strong> ID: 5797 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to a<br />

SQL-injection attack.\n\nFor your information, the observed version of phpMyAdmin is :<br />

\n %L \n\nVersions of phpMyAdmin earlier than 2.11.11.3 / 3.3.9.2 are potentially affected<br />

by a SQL-injection vulnerability, because the application makes it possible to create a<br />

bookmark which would be executed unintentionally by other users.<br />

Solution: Upgrade to phpMyAdmin 2.11.11.3, 3.3.9.2, or later.<br />

CVE-2011-0987<br />

MySQL Eventum < 2.3.1 Multiple HTML Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 5798 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:52054<br />

Description: Synopsis : \n\nThe remote web server hosts a web application that is affected by multiple<br />

cross-site scripting vulnerability.\n\nThe remote web server host MySQL Eventum, a<br />

web-based issue tracking application. For your information, the observed version of<br />

MySQL Eventum is : \n %L \n\nVersions of MySQL Eventum earlier than 2.3.1 are<br />

potentially affected by multiple cross-site scripting vulnerabilities : \n\n - The application<br />

fails to properly sanitize user-supplied input to the 'keywords' parameter of the 'list.php'<br />

script.\n\n - The application fails to properly sanitize user-supplied input to the<br />

'REQUEST_URI' variable of the 'forgot_password.php' and 'select_project.php' scripts.<br />

Solution: Upgrade to MySQL Eventum 2.3.1 or later.<br />

CVE Not available<br />

Web Server HttpOnly Cookies Not In Use<br />

<strong>PVS</strong> ID: 5799 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote server does not adequately protect data stored with<br />

cookies\n\nBased on the HTTP 'Cookie' header, <strong>PVS</strong> has determined that the remote server<br />

is not using the 'HttpOnly' cookie setting. By not using this setting, client side script can<br />

access the cookie. This can allow attackers to access cookies with potentially confidential<br />

data.<br />

Family Internet Services 1572

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!