Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> DBMan CGI server information leakage


Vulnerability Assessment Details

DBMan CGI server information leakage

Vulnerability Assessment Summary
Checks if webplus reads local files

Detailed Explanation for this Vulnerability Assessment
It is possible to cause the DBMan
CGI to reveal sensitive information, by requesting a URL such as:

GET /scripts/dbman/db.cgi?db=no-db

Network Security Threat Level: Medium
Solution : Upgrade to the latest version

Networks Security ID: 1178

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 SecuriTeam

Cables, Connectors

Intel SR02L Core i5-2320 3.0GHz LGA 1155 Socket CPU Processor
$41.99
Intel SR02L Core i5-2320 3.0GHz LGA 1155 Socket CPU Processor pictureIntel Core i3-4160 SR1PK Dual Core 3.60GHz Socket LGA 1150 CPU Processor
$112.0
Intel Core i3-4160 SR1PK Dual Core 3.60GHz Socket LGA 1150 CPU Processor pictureIntel Celeron 430 1.8GHz (BX80557430) Processor
$16.05
Intel Celeron 430 1.8GHz (BX80557430) Processor pictureMotorola MC68030RC50B 68030 50MHz, C74N vintage CPU, for AMIGA Blizzard GOLD
$17.9
Motorola MC68030RC50B 68030 50MHz, C74N vintage CPU, for AMIGA Blizzard GOLD picture


Discussions

No Discussions have been posted on this vulnerability.