27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host seems to be running Ikonboard, a bulletin board service<br />

implemented in Perl. This version is reported vulnerable to a SQL injection vulnerability.<br />

An attacker may gain access to unauthorized information or may steal authentication<br />

credentials by sending malformed string to ikonboard.cgi.<br />

Solution: Upgrade to Ikonboard 2.0.9, Ikonboard-win32 1.3.13 or higher.<br />

CVE Not available<br />

WordPress < 1.2.2 Multiple Vulnerabilities (XSS, HTML Injection, SQL Injection)<br />

<strong>PVS</strong> ID: 2465 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15443<br />

Description: The remote host is running WordPress, a web blog manager written in PHP.\nThe remote<br />

version of this software is vulnerable to various flaws that may allow an attacker to perform<br />

an HTML injection attack against the remote host or to allow an attacker to execute<br />

arbitrary SQL statements against the remote database.<br />

Solution: Upgrade to WordPress 1.2.2 or higher.<br />

CVE-2004-1584<br />

Singapore Gallery Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2466 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15987<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nSingapore is a<br />

PHP based photo gallery web application. The remote version of this software is vulnerable<br />

to multiple flaws that may allow an attacker to read arbitrary files on the remote host or to<br />

execute arbitrary PHP commands.<br />

Solution: Upgrade to Singapore 0.9.11 or higher.<br />

CVE-2004-1408<br />

Opera < 7.54u1 Download Box Spoofing<br />

<strong>PVS</strong> ID: 2467 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote browser allows attackers to spoof download file<br />

extensions.\n\nThe remote host is using a version of Opera that is prone to a security flaw<br />

where a malicious website can spoof a filename within a download dialog box. An attacker<br />

exploiting this flaw would need to be able to entice a local user to browse to a malicious<br />

website. Upon visiting the website, the user would download a file with an obfuscated<br />

name.<br />

Family Internet Services 626

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!