27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

phpMyDirectory < 10.1.6 review.php Multiple Parameter XSS<br />

<strong>PVS</strong> ID: 2774 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17634<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of phpMyDirectory installed on the remote host suffers from multiple cross-site<br />

scripting vulnerabilities due to its failure to sanitize user-input to its 'review.php' script<br />

through various parameters. A remote attacker can exploit these flaws to steal cookie-based<br />

authentication credentials and perform other such attacks.<br />

Solution: Upgrade to a version of phpMyDirectory greater than 10.1.6 when it becomes available.<br />

CVE-2005-0896<br />

AOLServer Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2775 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running AOLServer, a web server from AOL. This version of AOLServer is<br />

vulnerable to multiple remote overflows. An attacker exploiting these flaws would be able<br />

to execute arbitrary code on the remote server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0205<br />

Ublog < 1.0.5 login.asp msg Parameter XSS<br />

<strong>PVS</strong> ID: 2776 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Ublog, a blog program written in ASP. This version of Ublog is<br />

vulnerable to a remote Cross-Site Scripting (XSS) attack. An attacker exploiting this flaw<br />

would typically need to be able to convince a user to browse a malicious URI. A successful<br />

attack would result in the theft of potentially confidential client data (cookies,<br />

authentication credentials, and more) or malicious code being executed within the client<br />

browser.<br />

Solution: Upgrade to version 1.0.5 or higher.<br />

CVE-2005-0925<br />

Sylpheed MIME Content-parsing Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2777 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running Sylpheed, an email client for Unix and Unix-like operating systems. This version is<br />

vulnerable to a buffer overflow via specially crafted MIME messages or attachments. An<br />

attacker exploiting this flaw would need to be able to convince a user to open a malicious<br />

Family Internet Services 714

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!