27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Firebird Database Detection<br />

<strong>PVS</strong> ID: 2000 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host appears to be running the Firebird database server. You should manually<br />

inspect the system to ensure that the database is at least version 1.5.0<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Potential SQL Injection Vulnerability Detection<br />

<strong>PVS</strong> ID: 2001 FAMILY: Database RISK: HIGH NESSUS ID:11139<br />

Description: Synopsis :\n\nThe remote web server contains a script that appears to be vulnerable to a<br />

SQL injection attack.\n\n<strong>PVS</strong> observed a response from a web server that was driven by an<br />

error message from an underlying SQL server. It is possible that the application may be<br />

susceptible to an attack known as 'SQL Injection' in which an attacker can pass SQL<br />

commands via a web query. Successful exploitation would allow the remote attacker to<br />

execute arbitrary SQL commands on the backend database server.\nThe following request<br />

was made :\n%P\nWe saw : \n%L<br />

Solution: Audit and modify the application to properly validate user input.<br />

CVE Not available<br />

Potential SQL Injection Vulnerability Detection<br />

<strong>PVS</strong> ID: 2002 FAMILY: Database RISK: HIGH NESSUS ID:11139<br />

Description: Synopsis :\n\nThe remote web server contains a script that appears to be vulnerable to a<br />

SQL injection attack.\n\n<strong>PVS</strong> observed a response from a web server that was driven by an<br />

error message from an underlying SQL server. It is possible that the application may be<br />

susceptible to an attack known as 'SQL Injection' in which an attacker can pass SQL<br />

commands via a web query. Successful exploitation would allow the remote attacker to<br />

execute arbitrary SQL commands on the backend database server.\nThe following request<br />

was made :\n%P\nWe saw : \n%L<br />

Solution: Audit and modify the application to properly validate user input.<br />

CVE Not available<br />

Potential SQL Injection Vulnerability Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2003 FAMILY: Database RISK: HIGH NESSUS ID:11139<br />

Description: Synopsis :\n\nThe remote web server contains a script that appears to be vulnerable to a<br />

SQL injection attack.\n\n<strong>PVS</strong> observed a response from a web server that was driven by an<br />

error message from an underlying SQL server. It is possible that the application may be<br />

susceptible to an attack known as 'SQL Injection' in which an attacker can pass SQL<br />

Family Internet Services 511

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!