27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote Apache server is running a version of mod_python that is older than<br />

3.1.4. This version contains a flaw wherein specially formatted requests can cause<br />

mod_python to divulge information regarding paths, file locations, and more. An attacker<br />

can use this flaw in order to gain more information about the machine.<br />

Solution: Upgrade to mod_python 3.1.4 or higher.<br />

CVE-2005-0088<br />

PGP Email Client Detection<br />

<strong>PVS</strong> ID: 2609 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running PGP. PGP is an encryption software often used in conjunction<br />

with email. The sending email address is\n%L<br />

realtime<br />

Solution: Ensure that the use of PGP is within corporate guidelines.<br />

CVE Not available<br />

Generic Email Client Detection<br />

<strong>PVS</strong> ID: 2610 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Generic check for an email client.<br />

Solution: N/A<br />

CVE Not available<br />

Generic Email Client Detection<br />

<strong>PVS</strong> ID: 2611 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Generic check for an email client.<br />

Solution: N/A<br />

CVE Not available<br />

IBM WebSphere JSP Engine Source Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2612 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote WebSphere web server is vulnerable to an<br />

information leak. There is a flaw in the JSP engine that would allow a remote<br />

attacker to view the source code of any of the web server scripts. An attacker<br />

Family Internet Services 666

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!