TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
82
representation of the front panel on the switch. It can allow users to interactively configure the switch, monitor its
status, and view statistical information. An attacker can use this vulnerability to gain information.
Signature ID: 568
AirConnect Default Password vulnerability
Threat Level: Warning
Industry ID: CVE-1999-0508
CVE-1999-0508 Nessus: 10961,10747
Signature Description: AirConnect was created as a test bed for aspiring web designers and new companies that cannot
yet afford to finance their own hosting. AirConnect wireless access point installs with a default password. The
comcomcom account has a password of comcomcom which is publicly known and documented. This allows attackers
to gain full control over the wireless network settings.
Signature ID: 569
HTTP dangerous PUT method vulnerability
Threat Level: Critical
Bugtraq: 12141 Nessus: 10498
Signature Description: PUT is an HTTP(HTTP(Hypertext Transfer Protocol) is a communication protocol for the
transfer of information on the Internet) method. This method allows a client to upload new files on the web server. An
attacker can exploit this vulnerability to upload arbitrary web pages on the server and execute arbitrary code with the
privileges of the web server.
Signature ID: 570
IIS SHTML Cross Site vulnerability
Threat Level: Information
Nessus: 10624
Signature Description: IIS server vulnerability is caused when the server parses files with SHTML extension. Using
specially designed URLs, IIS 5.0 may return user specified content to the browser. <br>This poses great security risk,
especially if the browser is JavaScript enabled and the problem is greater in IE. The following
URL:<br>http://iis5server/<SCRIPT>alert('document.domain='+document.domain)</SCRIPT>.shtml <br>executes in
the browser javascript provided by "iis5server" but defined by a (malicous) user.<br>
Signature ID: 572
Lotus Domino information disclosure vulnerability
Threat Level: Severe
Nessus: 10057
Signature Description: Lotus Domino is an IBM server product that provides enterprise-grade e-mail, collaboration
capabilities, and custom application platform. Lotus Domino 5.0 to 5.0.8(inclusive) contains a flaw that may lead to an
unauthorized information disclosure. The issue is triggered when a user attempts to browse a directory, which will
disclose the names and locations of the Notes databases resulting in a loss of confidentiality.It is possible to browse the
remote web server directories by appending ?open at the end of the URL.
Signature ID: 574
BEA Systems WebLogic Server Directory Traversal %5c Vulnerability
Threat Level: Warning
Bugtraq: 2513 Nessus: 10698
Signature Description: BEA System WebLogic Server is an enterprise level web and wireless application server. It
provides easily surfaced diagnostics information, a GUI administration console, and command-line scripting. BEA
WebLogic Server(BEA WebLogic Server version 6.0) could allow an attacker to browse directories on the Web server.
An attacker can request a URL followed by a specific ASCII representation, such as "%5c". This vulnerability could