27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote server is running the Hassan Shopping Cart script. This script is used to<br />

manage online shopping carts. There have been many vulnerabilities noted in the Hassan<br />

CGI scripts. \nThe version of Hassan Shopping Cart is %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Cisco 'tech-support' Anonymous User Debugging Information Disclosure<br />

<strong>PVS</strong> ID: 2497 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nCisco routers and switches ship with a default web interface that<br />

allows remote administrators to view the entire configuration via the web. Unfortunately,<br />

many of these devices are not password protected and allow anonymous users to download<br />

critical router/switch configuration information.\nAn attacker can download the Cisco<br />

configuration file by browsing to /exec/show/tech-support/cr<br />

Solution: Enable passwords for the Cisco IOS web server.<br />

CVE Not available<br />

Xerox Default Administrative Web Page Detection<br />

<strong>PVS</strong> ID: 2498 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote Xerox printer does not have a protected default configuration<br />

web page. An attacker connecting to the Xerox web server would be able to view and<br />

modify the printer configuration.<br />

Solution: Enable passwords for the XEROX printer.<br />

CVE Not available<br />

Mnogosearch search.cgi Detection<br />

<strong>PVS</strong> ID: 2499 FAMILY: Web Servers RISK: HIGH NESSUS ID:11735<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running the mnogosearch search.cgi CGI program. There<br />

is a flaw in older versions of this software that may allow an attacker to gain a shell on this<br />

host.<br />

Solution: Upgrade or patch according to vendor recommendations, or discontinue use of the script.<br />

CVE-2003-0437<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 635

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!