27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

database.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0282<br />

All Enthusiast ReviewPost PHP Pro < 2.5.2 Multiple Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 2486 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running All Enthusiast ReviewPost, a web-based bulletin board written in PHP.\nThe<br />

remote version of this software is prone to multiple input validation vulnerabilities. This<br />

may allow an attacker to steal authentication credentials, inject SQL data or run arbitrary<br />

scripts.<br />

Solution: Upgrade to version 2.5.2 or higher.<br />

CVE-2004-2175<br />

b2evolution index.php SQL Injection<br />

<strong>PVS</strong> ID: 2487 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running b2evolution, a web-based blog engine written in<br />

PHP.\nThe remote version of this software is prone to a SQL injection vulnerability. This<br />

may allow an attacker to steal authentication credentials or run arbitrary code on the remote<br />

host.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Google API "Google Hacking" Detection<br />

<strong>PVS</strong> ID: 2488 FAMILY: Internet Services RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host appears to be using the Google API to execute<br />

'Google hacking' queries. Many vulnerabilities can be found by querying for the error string<br />

(or similar) coming from an incorrectly configured or broken web application. An attacker<br />

queries the Google cache for these error strings which then gives them a list of potential<br />

targets.<br />

Solution: Ensure that this behavior is in accordance with corporate standards and policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Lotus Domino Default Administration Database Detection<br />

Family Internet Services 632

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!