27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Vignette StoryServer Information Disclosure<br />

<strong>PVS</strong> ID: 1566 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11526<br />

Description: The remote host is running Vignette StoryServer. There is a flaw in this version which may<br />

allow an attacker to extract parts of the sessions of the other users.<br />

Solution: The vendor has released a patch to address this issue.<br />

CVE-2002-0385<br />

Coppermine Gallery < 1.1 Beta 2 PHP Code Execution<br />

<strong>PVS</strong> ID: 1567 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Coppermine Gallery, a set of PHP scripts to handle galleries of<br />

pictures. There is a flaw in the version of Coppermine Gallery used by the remote host that<br />

may allow an attacker to execute arbitrary commands on this host.<br />

Solution: Upgrade to Coppermine 1.1 beta 2 or higher.<br />

CVE Not available<br />

Linksys Router Default Password<br />

<strong>PVS</strong> ID: 1568 FAMILY: Web Servers RISK: HIGH NESSUS ID:11522<br />

Description: The remote Linksys router has its default password (admin) set. An attacker may use it to<br />

reconfigure this device.<br />

Solution: Log into the remote host and set a strong password for the administrator.<br />

CVE Not available<br />

VPOPMail vpopmail.php Remote Command Execution<br />

<strong>PVS</strong> ID: 1569 FAMILY: CGI RISK: HIGH NESSUS ID:11397<br />

Description: The remote VPOPMail webmail interface lets authenticated users to execute arbitrary<br />

commands on this host. An attacker may use it to gain a shell on this host.<br />

Solution: Upgrade to the VPOPMail 0.98 or higher.<br />

CVE Not available<br />

Abyss Malformed GET Request Remote DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1570 FAMILY: Web Servers RISK: HIGH NESSUS ID:11521<br />

Family Internet Services 403

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!