27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2005-2602<br />

Firefox < 1.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3239 FAMILY: Web Clients RISK: HIGH NESSUS ID:19719<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Firefox. The installed version of Firefox contains various security issues, several of<br />

which are critical as they can be easily exploited to execute arbitrary shell code on the<br />

remote host. The reported browser version (as seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.0.7 or higher.<br />

CVE-2005-2871<br />

Maxthon Web Browser < 1.3.3 Cross-Domain Dialog Box Spoofing<br />

<strong>PVS</strong> ID: 3240 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running Maxthon Web Browser. Maxthon Web Browser is reported to<br />

be prone to a cross-domain dialog box spoofing vulnerability. This issue may allow a<br />

remote attacker to carry out phishing style attacks.<br />

Solution: Upgrade to version 1.3.3 or higher.<br />

CVE Not available<br />

Interchange < 5.2.1 Multiple Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3241 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Interchange, a web-based content management<br />

application. This version of Interchange is vulnerable to a flaw in the way that it handles<br />

malformed data. An attacker exploiting these flaws would be able to inject commands into<br />

SQL statements or inject executable code that would be executed by the web server<br />

process.<br />

Solution: Upgrade to version 5.2.1 or higher.<br />

CVE-2005-3073<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SEO-Board < 1.03 admin.php user_pass_sha1 Cookie SQL Injection<br />

<strong>PVS</strong> ID: 3242 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running SEO-Board, a web forum written in PHP. This<br />

version of SEO-Board is vulnerable to a flaw in the way that it handles malformed data. An<br />

Family Internet Services 833

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!