|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Databases >> Oracle 9iAS web admin Vulnerability Assessment Details
|
Oracle 9iAS web admin |
||
Oracle 9iAS mod_plsql admin page Detailed Explanation for this Vulnerability Assessment Oracle 9i Application Server uses Apache as it's web server with an Apache module for PL/SQL support. By default, no authentication is required to access the DAD configuration page. A possible hacker may use this flaw to modify PL/SQL applications or prevent the remote host from working properly. Solution: Access to the relevant page can be restricted by editing the file /Apache/modplsql/cfg/wdbsvr.app Network Security Threat Level: High Networks Security ID: 4292 Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison |
||
Cables, Connectors |
Amiga A2000 Keyboard (plastic key array only) original nice color Read Desc.
$89.99
Mini External OLED AMIGA Gotek Floppy Drive Emulator For Amiga 500/500+/600/1200
$36.00
Amiga Eyetech EZCD 4 device EIDE Interface for the A1200 Untested
$49.99
Commodore A590 SCSI Western Digital XT 20MB Disk Drive Amiga 500 Computer Untest
$399.99
Vintage Amiga ICD ADSpeed 14mhz 68000 accelerator with 32kb SRAM, 16kb cache
$117.00
(Rare) Commodore Amiga 3000 w/Monitor and Keyboard
$2000.00
Amiga A1200 Power-Tower (mod ready and fast) Read Technical Notes & Decription
$1300.00
Amiga 500 512KB Trapdoor Memory Expansion
$15.15
PiStorm 68k CPU Accelerator/Expansion/Replacement Amiga 500 2000
$65.00
' Nam 1965-1975 Commodore Amiga on 3.5" disks W Box Manuals US Seller See Pics
$30.00
|
||
No Discussions have been posted on this vulnerability. |