27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is running the IPSEC Express 4.0.1 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 4.1.0 VPN Detection<br />

<strong>PVS</strong> ID: 3084 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 4.1.0 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 4.2.0 VPN Detection<br />

<strong>PVS</strong> ID: 3085 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 4.2.0 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

VP-ASP Multiple Script SQL Injection (2)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3086 FAMILY: CGI RISK: HIGH NESSUS ID:19229<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is using the VP-ASP, a shopping cart program written in ASP.<br />

The remote version of this software is vulnerable to three SQL injection vulnerabilities in<br />

the files shopaddtocart.asp, shopaddtocartnodb.asp and shopproductselect.asp. An attacker<br />

may exploit these flaws to execute arbitrary SQL statements against the remote database.<br />

Family Internet Services 789

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!