27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote client is running the Computer Associate License Application.<br />

Solution: N/A<br />

CVE Not available<br />

CA License Service Detection<br />

<strong>PVS</strong> ID: 2690 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Computer Associate License Application.<br />

Solution: N/A<br />

CVE Not available<br />

CA License Service Detection<br />

<strong>PVS</strong> ID: 2691 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Computer Associate License Application.<br />

Solution: N/A<br />

CVE Not available<br />

Zorum < 3.6.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2692 FAMILY: CGI RISK: HIGH NESSUS ID:17312<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by<br />

numerous flaws. The remote host is running Zorum, an open-source electronic forum<br />

written in PHP. The version of Zorum installed on the remote host is prone to several<br />

vulnerabilities. Namely:\n\nAn attacker can execute arbitrary shell commands by means of<br />

specially-crafted arguments to the 'argv[1]' parameter of the 'gorum/prod.php' script<br />

provided that PHP's 'register_globals' setting is enabled and 'register_argc_argv' is<br />

disabled.\n\nAn attacker can adjust the 'id' parameter to the 'index.php' script after<br />

authentication, setting it to that of another currently authenticated user to gain their<br />

privileges.\n\nAn attacker can insert SQL code in the 'Search in messages created by user'<br />

box as well as the 'rollid' parameter to trigger an SQL error and possibly manipulate SQL<br />

queries if PHP's 'magic_quotes' is disabled.\n\nThe 'list', 'method', and 'frommethod'<br />

parameters of the 'index.php' script are not sanitized properly, allowing a remote attacker to<br />

inject arbitrary HTML or script code in a user's browser in the context of the affected web<br />

site, resulting in theft of authentication data or other such attacks.<br />

Solution: Upgrade to version 3.6.0 or higher.<br />

CVE-2005-4619<br />

Active WebCam < 5.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 690

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!