27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 7.1.3 or higher.<br />

CVE-2006-4382<br />

Moodle < 1.6.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3742 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Moodle, an open-source content-management system written in PHP. This<br />

version of Moodle is vulnerable to a SQL Injection flaw, a cross-site scripting flaw, and an<br />

information disclosure flaw. An attacker exploiting these flaws would only need to be able<br />

to send malformed HTTP requests to the server. Successful exploitation would result in<br />

arbitrary SQL command execution on the remote database server, code execution within<br />

client browsers, or gleaning of information useful in future attacks.<br />

Solution: Upgrade to version 1.6.2 or higher.<br />

CVE-2006-4785<br />

Firefox < 1.5.0.7 Multiple Viulnerabilities<br />

<strong>PVS</strong> ID: 3743 FAMILY: Web Clients RISK: HIGH NESSUS ID:22369<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by multiple security<br />

issues, some of which may lead to execution of arbitrary code on the affected host subject<br />

to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.7 or higher.<br />

CVE-2006-4566<br />

SeaMonkey < 1.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3744 FAMILY: Web Clients RISK: HIGH NESSUS ID:22371<br />

Description: Synopsis :\n\nA web browser on the remote host is prone to multiple flaws.\n\nThe<br />

installed version of SeaMonkey has various security issues, some of which may lead to<br />

execution of arbitrary code on the affected host subject to the user's privileges.<br />

Solution: Upgrade to version 1.0.5 or higher.<br />

CVE-2006-4566<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 1.5.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3745 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:22370<br />

Family Internet Services 967

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!