27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to a version of Oracle Application Server higher than 10.1.2.0.0, when available.<br />

CVE-2005-1383<br />

PHPCoin < 1.2.2 2005-12-13 Multiple Script SQL Injection<br />

<strong>PVS</strong> ID: 2867 FAMILY: CGI RISK: HIGH NESSUS ID:18166<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running phpCOIN version 1.2.2 or older. This version of<br />

PHPCoin is vulnerable to a remote SQL injection attack. This vulnerability is possible due<br />

to the login.php and mod.php scripts not properly parsing SQL reserved characters from the<br />

user-supplied input. An attacker exploiting these flaws would be able to gain access to<br />

confidential materials with both read and write access. In addition, the attacker may be able<br />

to execute arbitrary code on the remote database server.<br />

Solution: Upgrade to phpCOIN 1.2.2 with at least fix-file 2005-12-13 or higher.<br />

CVE-2005-1384<br />

ICUII Peer-To-Peer Client Detection<br />

<strong>PVS</strong> ID: 2868 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote client is running ICUII, a peer-to-peer client for messaging<br />

and video. ICUII supports two primary modes: 'Family Oriented' and 'Adult'. There has<br />

been at least one local bug associated with ICUII.<br />

Solution: Ensure that ICUII is authorized with respect to corporate 'Appropriate <strong>Network</strong> Usage'<br />

policies. If authorized, ensure that ICUII is running with the most recent version.<br />

CVE-2005-1411<br />

FilePocket File Sharing Application Detection<br />

<strong>PVS</strong> ID: 2869 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote client is running FilePocket, an application for sharing<br />

files via the Internet. There has been at least one local bug associated with FilePocket.<br />

Solution: Ensure that FilePocket is authorized with respect to corporate 'Appropriate <strong>Network</strong> Usage'<br />

policies. If authorized, ensure that FilePocket is running with the most recent version.<br />

CVE-2005-1414<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 741

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!