27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

send a specially formed query to the script. Successful exploitation would result in the<br />

attacker being able to execute arbitrary SQL commands on the backend database server.<br />

Solution: Upgrade to version 6.00.308 or higher.<br />

CVE-2006-2459<br />

QuickBooks Enterprise Database Server Detection<br />

<strong>PVS</strong> ID: 3623 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running QuickBooks Enterprise. This software is used to manage<br />

accounting data and often contains confidential information. This server is acting as the<br />

central server that hosts corporate database files.<br />

Solution: Ensure that this server utilizes strong authentication and access controls.<br />

CVE Not available<br />

WhatsUp <strong>Network</strong> Monitoring Tool Detection<br />

<strong>PVS</strong> ID: 3624 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running WhatsUp, a network monitoring tool that discovers and<br />

monitors network resources.<br />

Solution: N/A<br />

CVE Not available<br />

WhatsUp <strong>Network</strong> Monitoring Tool Default Administrative Credentials<br />

<strong>PVS</strong> ID: 3625 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running WhatsUp, a network monitoring tool that<br />

discovers and monitors network resources. The remote install of WhatsUp is still utilizing<br />

the default administrative credentials (e.g. admin/admin). An attacker exploiting this flaw<br />

would be able to log into the application and gain information regarding the network,<br />

change the configuration of the device, and run arbitrary administrative commands on the<br />

WhatsUp application.<br />

Solution: Change the default passwords for the application.<br />

CVE Not available<br />

FCKeditor with PHPNuke < 2.3 Beta upload.php Arbitrary File Upload<br />

<strong>PVS</strong> ID: 3626 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21573<br />

Family Internet Services 934

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!