27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 2147 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a version of the Easy File Share Web<br />

Server that is vulnerable to an information disclosure vulnerability. It is reported that in<br />

versions up to 1.25, an attacker may obtain read access to the server underlying filesystem<br />

using virtual folders URLs.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1743<br />

Easy File Sharing Large HTTP Request Remote DoS<br />

<strong>PVS</strong> ID: 2148 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of the Easy File Sharing Web Server that is vulnerable to<br />

an remote denial of service. An attacker may deny service to legitimate users by sending<br />

large HTTP request to the web server. When processing such requests, this service<br />

consumes CPU resources exponentially.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1744<br />

PHP Code Snippet Library index.php XSS<br />

<strong>PVS</strong> ID: 2149 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a version of PHP-CSL that is reported prone to a cross-site scripting<br />

vulnerability. An attacker may steal cookie-based authentication credentials from a<br />

legitimate user using crafted link to this web application.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1746<br />

Outlook Express BCC: Recipient Disclosure<br />

<strong>PVS</strong> ID: 2150 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote email client is vulnerable to a flaw where the 'BCC' address is<br />

not hidden.\n\nThe remote host is using Outlook Express version 6.00 or 6.00 SP1. It is<br />

reported that the effectiveness of the BCC: field in these versions cannot be trusted. People<br />

receiving the mail through the To: and CC: fields can find the invisible receipients by<br />

opening the mail in a text editor.<br />

Family Internet Services 536

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!