Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Post-Nuke Rating System Denial Of Service


Vulnerability Assessment Details

Post-Nuke Rating System Denial Of Service

Vulnerability Assessment Summary
Determine if a remote host is vulnerable to the postnuke rating dos vulnerability

Detailed Explanation for this Vulnerability Assessment

The remote host is running post-nuke. PostNuke Phoenix 0.721,
0.722 and 0.723 permits a remote attacker causes a denial of service
to legitmate users, by submitting a string to its rating system.
Solution : Add vendor supplied patch.
Network Security Threat Level: High

Networks Security ID: 7702

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Tenable Network Security

Cables, Connectors

HP ProLiant DL160 G6 1U Server 2×Xeon Six-Core 2.26GHz + 48GB RAM + 8×500GB SATA
$549.0
HP ProLiant DL160 G6 1U Server 2×Xeon Six-Core 2.26GHz + 48GB RAM + 8×500GB SATA pictureHP ProLiant ML350 Gen9 2x E5-2620v4 64GB 800GB SSD Win Server 2012 R2 Datacenter
$6367.73
HP ProLiant ML350 Gen9 2x E5-2620v4 64GB 800GB SSD Win Server 2012 R2 Datacenter pictureDELL PowerEdge R620 2x 2.90Ghz E5-2690 8 Core 384GB 8x NEW 900GB 10K SAS SED
$5046.8
DELL PowerEdge R620 2x 2.90Ghz E5-2690 8 Core 384GB 8x NEW 900GB 10K SAS SED pictureDELL PowerEdge R620 2x 2.90Ghz E5-2667 Six Core 288GB 2x 146GB 10K SAS
$2299.0
DELL PowerEdge R620 2x 2.90Ghz E5-2667 Six Core 288GB 2x 146GB 10K SAS picture


Discussions

No Discussions have been posted on this vulnerability.