27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote<br />

host is running Macallan Mail Solution, a mail server (POP,SMTP,HTTP) for<br />

Windows. It is reported that Macallan Mail Solution is prone to a HTTP GET<br />

buffer overflow vulnerability and to an authentication bypass vulnerability. An<br />

attacker exploiting those flaws may be able to access an administrative interface,<br />

crash the service or execute arbitrary code.<br />

Solution: Upgrade to version 4.1.1.0 or higher.<br />

CVE Not available<br />

FlatNuke < 2.5.2 Form Submission Arbitrary Script Injection<br />

<strong>PVS</strong> ID: 2483 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running FlatNuke, an open-source content management system.\nThe remote version of<br />

this software is prone to a form submission vulnerability. This may allow an attacker to<br />

execute script on the remote host.<br />

Solution: Upgrade to version 2.5.2 or higher.<br />

CVE-2005-0267<br />

All Enthusiast PhotoPost PHP Pro < 4.8.6 Multiple XSS<br />

<strong>PVS</strong> ID: 2484 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS)<br />

attack.\n\nThe remote host is running All Enthusiast PhotoPost PHP, a web-based<br />

gallery application.\nThe remote version of this software is prone to multiple<br />

cross-site scripting vulnerabilities. This may allow an attacker to steal<br />

authentication credentials.<br />

Solution: Upgrade to version 4.8.6 or higher.<br />

CVE-2005-0273<br />

MyBulletinBoard Multiple SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2485 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19525<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL<br />

injection attack.\n\nThe remote host is running MyBulletinBoard, a PHP-based<br />

bulletin board. The remote version of this software is prone to SQL injection<br />

attacks due to its failure to sanitize user-supplied input to various scripts before<br />

using it in database queries. This may allow an attacker to uncover sensitive<br />

information (such as password hashes), access the Admin Control Panel without<br />

authentication, modify existing data, and launch attacks against the underlying<br />

Family Internet Services 631

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!