Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Tries to read /etc/passwd using ACal
Detailed Explanation for this Vulnerability Assessment
The remote web server contains a PHP script that is affected by a
remote file include issue.
The remote host is running ACal, an open-source, web-based event
calendar written in PHP.
The version of ACal installed on the remote host fails to sanitize
user-supplied input to the 'path' parameter of the 'embed/day.php'
script before using it in PHP 'include()' functions. Provided PHP's
'register_globals' setting is enabled, an unauthenticated attacker may
be able to exploit this issue to view arbitrary files on the remote
host or to execute arbitrary PHP code, possibly taken from third-party
See also :
Unknown at this time.
Network Security Threat Level:
High / CVSS Base Score : 7.0
Networks Security ID: 17886
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
Warning: mysql_connect() [function.mysql-connect]: Too many connections in /home/vscan/public_html/store/select.php on line 4
Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 5
Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 13
|PMC-SIERRA PM8003 SCC Rev:5.0 PCI-E RAID CONTROLLER CARD
|HP ProLiant DL360 G7 VMware Server 2x 2.80GHz X5660 Hexa Core 144Gb 4x 72Gb Raid
|Dell Precision T1650 (Win 10, Core i7, 16GB RAM, NVS 510, 500GB RAID)
|LSI MR SAS 8888ELP 8-Channel SAS RAID Controller L3-01119-14B 370-2048-00 PCIex8
Warning: mysql_connect() [function.mysql-connect]: Too many connections in /home/vscan/public_html/comments.php on line 3
Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/comments.php on line 4
Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/comments.php on line 16
No Discussions have been posted on this vulnerability.