27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde Imp installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 3.2.8 or higher.<br />

CVE Not available<br />

Horde Turba < 1.2.5 Parent Frame Page Title XSS<br />

<strong>PVS</strong> ID: 2857 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18138<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde Turba installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 1.2.5 or higher.<br />

CVE Not available<br />

Horde Kronolith Multiple XSS<br />

<strong>PVS</strong> ID: 2858 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde Kronolith installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 1.1.4, H3 2.0.3-rc1, or higher.<br />

CVE Not available<br />

Yappa-NG < 2.3.2 Multiple vulnerabilities<br />

<strong>PVS</strong> ID: 2859 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running Yappa-NG, a web-based photo album. This version is vulnerable to several<br />

remote script injection flaws. An attacker exploiting these flaws would typically need to be<br />

able to convince a user to browse a malicious URI. Successful exploitation would result in<br />

the execution of script code which could cause a loss of confidential data.<br />

Family Internet Services 738

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!