27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is running a TFTP client.<br />

Solution: N/A<br />

CVE Not available<br />

Broadlogic XLT Router Default Password<br />

<strong>PVS</strong> ID: 3347 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Broadlogic XLT router server with the default<br />

login and password set ('webadmin'/'webadmin').\nThe affected web application is:\n%P<br />

Solution: Do not use default passwords for this device.<br />

CVE Not available<br />

'admin/1234' Default Password<br />

<strong>PVS</strong> ID: 3348 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and password<br />

set to 'admin/1234'.\nThe affected web application is:\n%P<br />

Solution: Do not use default passwords.<br />

CVE Not available<br />

Apache < 2.0.3 mod_auth_pgsql Module Server Log Format String<br />

<strong>PVS</strong> ID: 3358 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the Apache mod_auth_pgsql module, a module for authenticating remote<br />

users against a PostgreSQL database. This version of mod_auth_pgsql is vulnerable to<br />

multiple format string flaws. An attacker exploiting these flaws would be able to execute<br />

arbitrary code on the remote web server.<br />

Solution: Upgrade to version 2.0.3 or higher.<br />

CVE-2005-3656<br />

SocketScanner Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3359 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 864

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!