27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Sunshop < 3.4RC2 index.php search Parameter XSS<br />

<strong>PVS</strong> ID: 2590 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Sunshop e-commerce shopping cart. This version of<br />

Sunshop is vulnerable to a remote cross-site scripting (XSS) attack. An attacker<br />

exploiting this flaw would need to be able to convince a user to click on a malicious<br />

URL which, when executed, would run potentially malicious code within the client<br />

browser.<br />

Solution: Upgrade to version 3.4RC2 or higher.<br />

CVE Not available<br />

ngIRCd < 0.8.3 Log_Resolver() Remote Format String Overflow<br />

<strong>PVS</strong> ID: 2591 FAMILY: Generic RISK: HIGH NESSUS ID:16310<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the ngIRCd service that may\nbe vulnerable to a buffer overflow in the<br />

way the server handles user-supplied data which is passed to syslog().<br />

Solution: Upgrade to version 0.8.3 or higher.<br />

CVE-2005-0226<br />

ht://Dig config Parameter XSS<br />

<strong>PVS</strong> ID: 2592 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote version of htsearch appears to be vulnerable to a remote Cross-Site<br />

Scripting (XSS) attack. An attacker exploiting this flaw would need to be able to<br />

entice a user into clicking on a malicious URL that would contain embedded script<br />

code designed to exploit trust and execute within the client browser.\nThe remote<br />

host is running %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0085<br />

WWWBoard Password File Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2593 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host appears to be running WWWBoard.<br />

WWWBoard is a web-based forum written in Perl. There is a flaw in the default<br />

configuration of WWWBoard that would allow a remote attacker to retrieve the password<br />

file. To exploit the flaw, the attacker would only need to be able to request the<br />

/wwwboard/passwd.txt file. The attacker could then crack the password file and log into the<br />

machine with enhanced access rights.<br />

Family Internet Services 661

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!