27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote server is acting as a VPN server.<br />

Solution: N/A<br />

CVE Not available<br />

Fortinet VPN Server Detection (over PPTP)<br />

<strong>PVS</strong> ID: 2916 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Fortinet %L PPTP VPN.<br />

Solution: Ensure that the VPN is within corporate policy.<br />

CVE Not available<br />

JGS-Portal < 3.03 Multiple Scripts SQL Injection<br />

<strong>PVS</strong> ID: 2917 FAMILY: CGI RISK: HIGH NESSUS ID:18289<br />

Description: The remote host is running JGS-Portal, a plugin for the Woltlab web\napplication. This<br />

version of JGS-Portal is vulnerable to a remote SQL\ninjection attack. An attacker<br />

exploiting this flaw would send a\nmalformed HTTP query to one of the following php<br />

scripts:\n- jgs_portal.php\n- jgs_portal_statistik.php\n- jgs_portal_beitraggraf.php\njgs_portal_mitgraf.php\n-jgs_portal_themengraf.php\njgs_portal_viewsgraf.php\n\nSuccessful<br />

exploitation would result in the attacker being able<br />

to\nread or write confidential data. In addition, the attacker may be\nable to execute<br />

arbitrary code on the remote database server.<br />

Solution: Upgrade to version 3.0.3 or higher.<br />

CVE Not available<br />

WordPress < 1.5.1.2 SQL Injection and XSS<br />

<strong>PVS</strong> ID: 2918 FAMILY: CGI RISK: HIGH NESSUS ID:18301<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running WordPress, a web blog manager written in PHP. The remote version of this<br />

software is vulnerable to various flaws that may allow an attacker to perform a SQL<br />

injection attack against the remote host. Successful exploitation would allow an attacker to<br />

read/write confidential data as well as potentially execute arbitrary code on the remote<br />

database. In addition, the remote host is vulnerable to multiple cross-site scripting (XSS)<br />

flaws.<br />

Solution: Upgrade to WordPress 1.5.1.2 or higher.<br />

CVE-2005-1810<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ignitionServer < 0.3.6p1 Channel Locking Remote DoS<br />

Family Internet Services 756

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!