27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RISK:<br />

MEDIUM<br />

Description: The remote host is running phpMyAdmin, an open-source software written in PHP to<br />

handle the administration of MySQL over the Web. The remote host is vulnerable to a<br />

remote Cross-Site Scripting (XSS) flaw. An attacker exploiting these flaws would be need<br />

to be able to convince a user to click on a malicious URL. Upon successful exploitation, the<br />

attacker would be able to steal credentials or execute code within the browser.<br />

Solution: Upgrade to phpMyAdmin 2.6.2 RC1 or higher.<br />

CVE-2005-0992<br />

Firefox < 1.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2788 FAMILY: Web Clients RISK: HIGH NESSUS ID:18064<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Firefox. \n\nThe remote version of this software contains various<br />

security issues that may\nallow an attacker to execute arbitrary code on the remote host.<br />

The reported browser version (as seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.0.3 or higher.<br />

CVE-2005-0752<br />

Mozilla < 1.7.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2789 FAMILY: Web Clients RISK: HIGH NESSUS ID:18065<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Mozilla. The remote version of this software contains various security<br />

issues that may allow an attacker to execute arbitrary code on the remote host. The reported<br />

browser version (as seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.7.7 or higher.<br />

CVE-2005-0752<br />

CommuniGatePro < 4.3c3 Undisclosed LISTS Module Multipart Message DoS<br />

<strong>PVS</strong> ID: 2790 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17985<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote CommuniGatePro, according to its version number, is vulnerable to a flaw that may<br />

allow an attacker to crash the server using a malformed request. While the details of the<br />

vulnerability are unknown, the exploit is thought to cause a disruption to availability.<br />

Solution: Upgrade to CommuniGatePro 4.3c3 or higher.<br />

Family Internet Services 718

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!