27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-3305<br />

PHP-Fusion < 6.00.205 HTML Injection<br />

<strong>PVS</strong> ID: 3267 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to several injection attacks.\n\nAccording to its<br />

version number, the remote host is running a version of PHP-Fusion that suffers from an<br />

HTML Injection flaw. An attacker exploiting these flaws would be able to inject code that<br />

would be executed either by the target web server or by unsuspecting users browsing the<br />

website. In addition, this version of PHP-Fusion may be vulnerable to a SQL injection<br />

attack. \n<br />

Solution: Upgrade to version 6.00.205 or higher.<br />

CVE-2005-4005<br />

Skype Technologies Multiple Buffer Overflows<br />

<strong>PVS</strong> ID: 3268 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Skype, a peer-to-peer chat and VoIP software. The remote version of this software<br />

contains multiple flaws that would allow an attacker to overflow memory buffers and either<br />

cause the service to stop or execute arbitrary code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-3265<br />

Flyspray Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3269 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running FlySpray, a bug-reporting web application. This version of Flyspray is<br />

vulnerable to a remote cross-site scripting (XSS) attack. An attacker exploiting this flaw<br />

would typically need to convince a user to browse to a malicious URI. Success exploitation<br />

would result in the theft of confidential materials (such as authentication cookies). In<br />

addition, the remote host is vulnerable to a remote file inclusion flaw. A remote attacker<br />

can supply PHP code and then trick the FlySpray server into executing the code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

WindWeb <<br />

CVE-2005-3334<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 841

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!