Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FTP >> NiteServer FTP directory traversal


Vulnerability Assessment Details

NiteServer FTP directory traversal

Vulnerability Assessment Summary
Attempts to set the current directory to the root of the disk

Detailed Explanation for this Vulnerability Assessment

The remote FTP server permits anybody to switch to the
root directory and read potentialy sensitive files.

Solution: Upgrade your FTP server
Risk factor: High

Networks Security ID: 6648

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Michel Arboi

Cables, Connectors

Crucial MX300 2.5" 1TB SATA III 3-D Vertical Internal Solid State Drive (SSD) CT
$48.77
Crucial MX300 2.5Solid State External Hard Drive 500 GB Storage Expansion USB Plug And Play SSD
$240.03
Solid State External Hard Drive 500 GB Storage Expansion USB Plug And Play SSD pictureUSB 2.0 External Enclosure Case Box With Cable For SATA 2.5" SSD Hard Disk Drive
$0.99
USB 2.0 External Enclosure Case Box With Cable For SATA 2.5mSATA SSD To SATA3 2.5" Drive Disk Adapter Card 7mm Thickness Shell Mini Pcie
$3.38
mSATA SSD To SATA3 2.5


Discussions

No Discussions have been posted on this vulnerability.