27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade or patch according to vendor recommendations.<br />

Raxnet Cacti Detection<br />

CVE-2005-2028<br />

<strong>PVS</strong> ID: 3025 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Cacti, a web frontend to RRDTool. Cacti allows<br />

administrators to view network graphs, utilization, architecture, and more. An attacker<br />

happening upon an instance of Cacti would gain information useful in future attacks.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

i-Gallery Traversal File Access / XSS<br />

<strong>PVS</strong> ID: 3026 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18539<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Directory Traversal flaw.\n\nThe remote<br />

host is running i-Gallery, a web-based photo gallery.\nThis version of i-Gallery is<br />

vulnerable to multiple flaws. Most importantly, the application is vulnerable to a directory<br />

traversal flaw. An attacker exploiting this flaw would only need to be able to send '../'<br />

HTTP requests to the vulnerable system. A successful attack would result in the attacker<br />

being able to download confidential files (such as password data).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2033<br />

IpSwitch WhatsUp < 2005 SP 1A Login.asp Multiple Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3027 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18552<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running the IpSwitch WhatsUp application, a tool for managing network hosts. This<br />

version of IpSwitch WhatsUp is vulnerable to a remote SQL Injection flaw.\nThe login.asp<br />

script fails to parse out SQL-reserved characters and would allow a remote attacker to read<br />

or write data as well as potentially execute arbitrary code on the remote database<br />

Solution: Upgrade to version 2005 SP 1A or higher.<br />

CVE-2005-1250<br />

Simple Machines Forum < 1.0.5 SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 772

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!