27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

mailfile.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1670 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The mailfile.cgi status exists on this web server. Some versions of this file are vulnerable to<br />

a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

mailview.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1671 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The mailview.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

sendmessage.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1672 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The sendmessage.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

nsManager.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1673 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The nsManager.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

perlshop.cgi Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1674 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The perlshop.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Family Internet Services 426

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!