27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running OpenCms, an<br />

open-source content management system. This version of OpenCms ( %L ) is<br />

vulnerable to a remote flaw where attackers can bypass authentication and gain<br />

administrative access to accounts and confidential data. An attacker exploiting<br />

this flaw would just need to have knowledge of where administrative forms are<br />

stored within the web directory (trivial to find). Successful exploitation leads to<br />

the user gaining administrative access to the application.<br />

Solution: Upgrade to version 6.2.2 or higher.<br />

CVE Not available<br />

Mozilla Thunderbird < 1.5.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3694 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:22096<br />

Description: The remote Windows host contains a mail client that is affected by multiple vulnerabilities.<br />

The remote version of Mozilla Thunderbird suffers from various security issues, at least<br />

one of which may lead to execution of arbitrary code on the affected host subject to the<br />

user's privileges.<br />

Solution: Upgrade to version 1.5.0.5 or higher.<br />

CVE-2006-3811<br />

Firefox < 1.5.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3695 FAMILY: Web Clients RISK: HIGH NESSUS ID:22095<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues, some of which may lead to execution of arbitrary code on the affected host subject<br />

to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.5 or higher.<br />

Help Center Live <<br />

CVE-2006-3812<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3696 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Directory Traversal flaw.\n\nThe remote<br />

web server is running Help Center Live, a help desk application written in PHP. The remote<br />

version of this software is vulnerable to a Directory Traversal flaw. An attacker exploiting<br />

this flaw would send a malformed HTTP request which included '../' (or similar) directory<br />

traversal strings. Successful exploitation would result in the attacker gaining access to<br />

confidential data.<br />

Family Internet Services 955

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!