27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Xerox Document Centre Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2836 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote host is running Xerox Document Centre, an administrative web-based GUI to a<br />

Xerox device. This version is reportedly prone to several remote attacks which, if<br />

exploited, would lead to remote administrative access. The details of the attack are not<br />

currently known.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1179<br />

mvnForum < 1.0 RC4_03 Search Parameter XSS<br />

<strong>PVS</strong> ID: 2837 FAMILY: CGI RISK: LOW NESSUS ID:18359<br />

Description: The remote host is running mvnForum, a web-based bulletin board. This version of<br />

mvnForum is vulnerable to a Cross-Site Scripting (XSS) attack. An attacker exploiting this<br />

flaw would need to entice a user into browsing a malicious URI. Successful exploitation<br />

could lead to disclosure of confidential information (such as cookies).<br />

Solution: Upgrade to version 1.0 RC4_03 or higher.<br />

CVE-2005-1183<br />

CVS < 1.12.12 Unspecified Remote Overflow<br />

<strong>PVS</strong> ID: 2838 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a CVS server that, according to its version number, is vulnerable to an undisclosed<br />

remote buffer overflow. An attacker exploiting this flaw is alleged to be able to execute<br />

arbitrary code on the target CVS server.<br />

Solution: Upgrade to version 1.12.12 or higher.<br />

CVE-2005-0753<br />

Coppermine Gallery < 1.3.3 init.inc.php HTML Injection<br />

<strong>PVS</strong> ID: 2839 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running CopperMine Gallery, a set of PHP scripts to handle galleries of pictures.<br />

There is a flaw in this version of Coppermine Gallery. Specifically, the x-forwarded-for<br />

variable is not properly parsed by the application. An attacker exploiting this flaw can<br />

inject HTML or script into a browser session. Typically, exploiting this flaw involves<br />

convincing a user to browse to a malicious URI. Successful exploitation results in a<br />

Family Internet Services 732

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!