27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 20040811 or higher.<br />

CVE-2006-6652<br />

Python Urllib Version Detection<br />

<strong>PVS</strong> ID: 3837 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Python's urllib version %L<br />

Solution: N/A<br />

CVE Not available<br />

Kaspersky Antivirus Client Detection<br />

<strong>PVS</strong> ID: 3838 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Kaspersky antivirus client version %L<br />

Solution: N/A<br />

CVE Not available<br />

Policy - .ogg File Detection<br />

<strong>PVS</strong> ID: 3839 FAMILY: CGI RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .ogg files. As an example, consider the following file<br />

%P\nThe webmaster should make sure that these files are in compliance with corporate<br />

policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

Policy - .wma File Detection<br />

<strong>PVS</strong> ID: 3840 FAMILY: CGI RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .wma files. As an example, consider the following file<br />

%P\nThe webmaster should make sure that these files are in compliance with corporate<br />

policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Kaspersky Antivirus Client MIME-encoded Scan Bypass<br />

<strong>PVS</strong> ID: 3841 FAMILY: FTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 993

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!