27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 9.0.0.3263, 10.0.0.3901 or higher.<br />

CVE Not available<br />

Mozilla Browser < 1.7.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2902 FAMILY: Web Clients RISK: HIGH NESSUS ID:18244<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using Mozilla. The remote version of this software contains various security issues that<br />

may allow an attacker to execute arbitrary code on the remote host. The reported browser<br />

version (as seen on the network) is: \n %L<br />

Solution: Upgrade to Mozilla 1.7.8 or higher.<br />

CVE-2005-1532<br />

PhotoPost PHP Pro < 5.02 RC4 member.php uid Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2903 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PhotoPost, a web-based image gallery written in<br />

PHP. This version of PhotoPost is reported vulnerable to a remote SQL Injection flaw. An<br />

attacker exploiting this flaw would only need to be able to send HTTP requests to or from<br />

the application web server. Successful exploitation would result in the attacker being able<br />

to read or write data. In addition, the attacker may be able to execute arbitrary code on the<br />

remote database server.<br />

Solution: Upgrade to version 5.02 RC4 or higher.<br />

CVE-2005-1629<br />

Checkpoint Firewall-1 Patch Level 0 Detection<br />

<strong>PVS</strong> ID: 2904 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 4.1 VPN Server. The remote server is not running any Checkpoint<br />

patches. Since the release of version 4.1, there have been at least six (6) critical patches<br />

released by Checkpoint. This version of Firewall-1 is vulnerable to a myriad of remote<br />

attacks that would give the attacker the ability to impact confidentiality, integrity, and<br />

availability of the remote system<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 Patch Level 1 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 752

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!