nessus
via4
|
NASL family | FreeBSD Local Security Checks | NASL id | FREEBSD_PKG_AB2575D639F011DCB8CC000FEA449B8A.NASL | description | The Apache Project reports :
The JSP and Servlet included in the sample application within the
Tomcat documentation webapp did not escape user provided data before
including it in the output. This enabled a XSS attack. These pages
have been simplified not to use any user provided data in the output. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 25785 | published | 2007-07-27 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=25785 | title | FreeBSD : tomcat -- XSS vulnerability in sample applications (ab2575d6-39f0-11dc-b8cc-000fea449b8a) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2008-0630.NASL | description | Red Hat Network Satellite Server version 5.1.1 is now available. This
update includes fixes for a number of security issues in Red Hat
Network Satellite Server components.
This update has been rated as having low security impact by the Red
Hat Security Response Team.
During an internal security audit, it was discovered that Red Hat
Network Satellite Server shipped with an XML-RPC script, manzier.pxt,
which had a single hard-coded authentication key. A remote attacker
who is able to connect to the Satellite Server XML-RPC service could
use this flaw to obtain limited information about Satellite Server
users, such as login names, associated email addresses, internal user
IDs, and partial information about entitlements. (CVE-2008-2369)
This release also corrects several security vulnerabilities in various
components shipped as part of Red Hat Network Satellite Server 5.1. In
a typical operating environment, these components are not exposed to
users of Satellite Server in a vulnerable manner. These security
updates will reduce risk in unique Satellite Server environments.
A denial-of-service flaw was fixed in mod_perl. (CVE-2007-1349)
Multiple cross-site scripting flaws were fixed in the image map
feature in the JFreeChart package. (CVE-2007-6306)
A flaw which could result in weak encryption was fixed in the
perl-Crypt-CBC package. (CVE-2006-0898)
Multiple flaws were fixed in the Apache Tomcat package.
(CVE-2005-4838, CVE-2006-0254, CVE-2007-1355, CVE-2007-1358,
CVE-2007-2449, CVE-2007-5461, CVE-2008-0128)
Users of Red Hat Network Satellite Server 5.1 are advised to upgrade
to 5.1.1, which resolves these issues. | last seen | 2019-01-16 | modified | 2018-11-27 | plugin id | 43840 | published | 2010-01-10 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=43840 | title | RHEL 4 : Satellite Server (RHSA-2008:0630) |
NASL family | MacOS X Local Security Checks | NASL id | MACOSX_SECUPD2008-004.NASL | description | The remote host is running a version of Mac OS X 10.4 that does not
have the security update 2008-004 applied.
This update contains security fixes for a number of programs. | last seen | 2019-01-16 | modified | 2018-07-14 | plugin id | 33282 | published | 2008-07-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=33282 | title | Mac OS X Multiple Vulnerabilities (Security Update 2008-004) |
NASL family | MacOS X Local Security Checks | NASL id | MACOSX_10_5_4.NASL | description | The remote host is running a version of Mac OS X 10.5.x that is prior
to 10.5.4.
Mac OS X 10.5.4 contains security fixes for multiple components. | last seen | 2019-01-16 | modified | 2018-07-14 | plugin id | 33281 | published | 2008-07-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=33281 | title | Mac OS X 10.5.x < 10.5.4 Multiple Vulnerabilities |
NASL family | Fedora Local Security Checks | NASL id | FEDORA_2007-3474.NASL | description | Updated Tomcat5 packages that fix several security bugs are now
available for Fedora Core 8.
This update includes fixes to the following :
- CVE-2007-1355
- CVE-2007-3386
- CVE-2007-3385
- CVE-2007-3382
- CVE-2007-2450
- CVE-2007-2449
- CVE-2007-5461
- CVE-2007-1358
All users of tomcat are advised to update to these packages.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2016-12-08 | plugin id | 28258 | published | 2007-11-20 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=28258 | title | Fedora 8 : tomcat5-5.5.25-1jpp.1.fc8 (2007-3474) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2008-0261.NASL | description | Red Hat Network Satellite Server version 5.0.2 is now available. This
update includes fixes for a number of security issues in Red Hat
Network Satellite Server components.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
During an internal security review, a cross-site scripting flaw was
found that affected the Red Hat Network channel search feature.
(CVE-2007-5961)
This release also corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server. In
a typical operating environment, these components are not exposed to
users of Satellite Server in a vulnerable manner. These security
updates will reduce risk in unique Satellite Server environments.
Multiple flaws were fixed in the Apache HTTPD server. These flaws
could result in a cross-site scripting, denial-of-service, or
information disclosure attacks. (CVE-2004-0885, CVE-2006-5752,
CVE-2006-7197, CVE-2007-1860, CVE-2007-3304, CVE-2007-4465,
CVE-2007-5000, CVE-2007-6388)
A denial-of-service flaw was fixed in mod_perl. (CVE-2007-1349)
A denial-of-service flaw was fixed in the jabberd server.
(CVE-2006-1329)
Multiple cross-site scripting flaws were fixed in the image map
feature in the JFreeChart package. (CVE-2007-6306)
Multiple flaws were fixed in the IBM Java 1.4.2 Runtime.
(CVE-2007-0243, CVE-2007-2435, CVE-2007-2788, CVE-2007-2789)
Two arbitrary code execution flaws were fixed in the OpenMotif
package. (CVE-2005-3964, CVE-2005-0605)
A flaw which could result in weak encryption was fixed in the
perl-Crypt-CBC package. (CVE-2006-0898)
Multiple flaws were fixed in the Tomcat package. (CVE-2008-0128,
CVE-2007-5461, CVE-2007-3385, CVE-2007-3382, CVE-2007-1358,
CVE-2007-1355, CVE-2007-2450, CVE-2007-2449, CVE-2007-0450,
CVE-2006-7196, CVE-2006-7195, CVE-2006-3835, CVE-2006-0254,
CVE-2005-2090, CVE-2005-4838, CVE-2005-3510)
Users of Red Hat Network Satellite Server 5.0 are advised to upgrade
to 5.0.2, which resolves these issues. | last seen | 2019-01-16 | modified | 2018-11-27 | plugin id | 43835 | published | 2010-01-10 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=43835 | title | RHEL 4 : Satellite Server (RHSA-2008:0261) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2008-0524.NASL | description | Red Hat Network Satellite Server version 4.2.3 is now available. This
update includes fixes for a number of security issues in Red Hat
Network Satellite Server components.
This update has been rated as having low security impact by the Red
Hat Security Response Team.
This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server
4.2. In a typical operating environment, these components are not
exposed to users of Satellite Server in a vulnerable manner. These
security updates will reduce risk in unique Satellite Server
environments.
Multiple flaws were fixed in the Apache HTTPD server. These flaws
could result in a cross-site scripting, denial-of-service, or
information disclosure attacks. (CVE-2004-0885, CVE-2006-5752,
CVE-2006-7197, CVE-2007-1860, CVE-2007-3304, CVE-2007-4465,
CVE-2007-5000, CVE-2007-6388)
A denial-of-service flaw was fixed in mod_perl. (CVE-2007-1349)
A denial-of-service flaw was fixed in the jabberd server.
(CVE-2006-1329)
Multiple cross-site scripting flaws were fixed in the image map
feature in the JFreeChart package. (CVE-2007-6306)
Multiple flaws were fixed in the IBM Java 1.4.2 Runtime.
(CVE-2007-0243, CVE-2007-2435, CVE-2007-2788, CVE-2007-2789)
Multiple flaws were fixed in the OpenMotif package. (CVE-2004-0687,
CVE-2004-0688, CVE-2004-0914, CVE-2005-3964, CVE-2005-0605)
A flaw which could result in weak encryption was fixed in the
perl-Crypt-CBC package. (CVE-2006-0898)
Multiple flaws were fixed in the Tomcat package. (CVE-2008-0128,
CVE-2007-5461, CVE-2007-3385, CVE-2007-3382, CVE-2007-1358,
CVE-2007-1355, CVE-2007-2450, CVE-2007-2449, CVE-2007-0450,
CVE-2006-7196, CVE-2006-7195, CVE-2006-3835, CVE-2006-0254,
CVE-2005-2090, CVE-2005-4838, CVE-2005-3510)
Users of Red Hat Network Satellite Server 4.2 are advised to upgrade
to 4.2.3, which resolves these issues. | last seen | 2019-01-16 | modified | 2018-11-27 | plugin id | 43837 | published | 2010-01-10 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=43837 | title | RHEL 3 / 4 : Satellite Server (RHSA-2008:0524) |
NASL family | Web Servers | NASL id | TOMCAT_4_1_37.NASL | description | According to its self-reported version number, the instance of Apache
Tomcat 4.x listening on the remote host is prior to 4.1.37. It is,
therefore, affected by the following vulnerabilities :
- The remote Apache Tomcat install may be vulnerable to an
information disclosure attack if the deprecated AJP
connector processes a client request having a non-zero
Content-Length and the client disconnects before
sending the request body. (CVE-2005-3164)
- The remote Apache Tomcat install may be vulnerable to
a cross-site scripting attack if the JSP and Servlet
examples are enabled. Several of these examples do
not properly validate user input.
(CVE-2007-1355, CVE-2007-2449)
- The remote Apache Tomcat install may be vulnerable to
a cross-site scripting attack if the Manager web
application is enabled as it fails to escape input
data. (CVE-2007-2450)
- The remote Apache Tomcat install may be vulnerable to an
information disclosure attack via cookies. Apache Tomcat
treats the single quote character in a cookie as a
delimiter which can lead to information, such as session
ID, to be disclosed. (CVE-2007-3382)
- The remote Apache Tomcat install may be vulnerable to
a cross-site scripting attack if the SendMailServlet is
enabled. The SendMailServlet is a part of the examples
web application and, when reporting error messages,
fails to escape user provided data. (CVE-2007-3383)
- The remote Apache Tomcat install may be vulnerable to an
information disclosure attack via cookies. The previous
fix for CVE-2007-3385 was incomplete and did not account
for the use of quotes or '%5C' in cookie values.
(CVE-2007-3385, CVE-2007-5333)
- The remote Apache Tomcat install may be vulnerable to an
information disclosure attack via the WebDAV servlet.
Certain WebDAV requests, containing an entity with a
SYSTEM tag, can result in the disclosure of arbitrary
file contents. (CVE-2007-5461)
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.. | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 47030 | published | 2010-06-16 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=47030 | title | Apache Tomcat 4.x < 4.1.37 Multiple Vulnerabilities |
NASL family | Web Servers | NASL id | TOMCAT_6_0_13.NASL | description | According to its self-reported version number, the Apache Tomcat
instance listening on the remote host is prior to 6.0.13. It is,
therefore, affected by the following vulnerabilities :
- Requests containing multiple 'content-length' headers
are not rejected as invalid. This error can allow
web-cache poisoning, cross-site scripting attacks and
information disclosure. (CVE-2005-2090)
- The remote Apache Tomcat install may be vulnerable to
a cross-site scripting attack if the JSP and Servlet
examples are enabled. Several of these examples do
not properly validate user input. (CVE-2007-1355)
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number. | last seen | 2019-01-16 | modified | 2018-08-01 | plugin id | 17728 | published | 2011-11-18 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=17728 | title | Apache Tomcat < 6.0.13 Multiple Vulnerabilities |
NASL family | CGI abuses : XSS | NASL id | TOMCAT_SAMPLE_HELLO_XSS.NASL | description | The remote web server includes an example JSP application that fails
to sanitize user-supplied input before using it to generate dynamic
content in an error page. An unauthenticated, remote attacker can
exploit this issue to inject arbitrary HTML or script code into a
user's browser to be executed within the security context of the
affected site. | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 25289 | published | 2007-05-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=25289 | title | Tomcat Sample App hello.jsp 'test' Parameter XSS |
NASL family | Fedora Local Security Checks | NASL id | FEDORA_2007-3456.NASL | description | Updated Tomcat5 packages that fix several security bugs are now
available for Fedora Core 7.
This update includes fixes to the following :
- CVE-2007-1355
- CVE-2007-3386
- CVE-2007-3385
- CVE-2007-3382
- CVE-2007-2450
- CVE-2007-2449
- CVE-2007-5461
- CVE-2007-1358
All users of tomcat are advised to update to these packages.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2016-12-08 | plugin id | 28257 | published | 2007-11-20 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=28257 | title | Fedora 7 : tomcat5-5.5.25-1jpp.1.fc7 (2007-3456) |
|