27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2004-1061<br />

Gallery Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2533 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16185<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running the Gallery web-based photo album.\nThere are various flaws in the<br />

remote version of this software that may allow an attacker to perform a cross-site scripting<br />

attack using the remote host, or to exploit an information disclosure flaw to gain more<br />

knowledge about the remote system.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

AWStats < 6.3 awstats.pl configdir Parameter Remote Command Execution<br />

<strong>PVS</strong> ID: 2534 FAMILY: CGI RISK: HIGH NESSUS ID:16189<br />

Description: The remote host is running AWStats, a CGI log analyzer.\nThere are various flaws in the<br />

remote version of this software that may allow an attacker to execute code on the remote<br />

host.<br />

Solution: Upgrade to AWStats 6.3 or higher.<br />

CVE-2005-0116<br />

VBulletin Init.PHP Unspecified Remote Vulnerability<br />

<strong>PVS</strong> ID: 2535 FAMILY: CGI RISK: HIGH NESSUS ID:16203<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a version of vBulletin, a forum application<br />

implemented in PHP, that is vulnerable to an unspecified remote vulnerability. It is reported<br />

that versions prior to 3.0.5 are prone to this issue. Additionally, versions of vBulletin prior<br />

to 3.0.5 are vulnerable to a content-parsing flaw within the forumdisplay.php script. An<br />

attacker exploiting this flaw would be able to run arbitrary commands on the remote web<br />

server.<br />

Solution: Upgrade to vBulletin 3.0.5 or higher.<br />

CVE-2005-0429<br />

SparkleBlog journal.php SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2536 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 645

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!