Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Talentsoft Web+ reveals install path


Vulnerability Assessment Details

Talentsoft Web+ reveals install path

Vulnerability Assessment Summary
Checks for Webplus install path disclosure

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server is affected by an information disclosure flaw.

Description :

The remote host appears to be running Web+ Application Server.

The version of Web+ installed on the remote host reveals the physical
path of the application when it receives a script file error.

See also :

http://www.talentsoft.com/Issues/IssueDetail.wml?ID=WP197

Solution :

Apply the vendor-supplied patch.

Network Security Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Kyger

Cables, Connectors

Western Digital My Book Duo 20TB 2-Bay External Hard Drive w/ RAID WDBFBE0200JBK
$575.0
Western Digital My Book Duo 20TB 2-Bay External Hard Drive w/ RAID WDBFBE0200JBK pictureMaxed Out MacBook Pro 17” 2011 2.3 i7 Quad core + 16GB + 1TB SSD RAID 0 FAST
$1049.99
Maxed Out MacBook Pro 17” 2011 2.3 i7 Quad core + 16GB + 1TB SSD RAID 0 FAST pictureLSI SAS 9361-8i MegaRAID 12Gb/s PCI-E 3.0 SATA + SAS RAID CONTROLLER CARD
$249.99
LSI SAS 9361-8i MegaRAID 12Gb/s PCI-E 3.0 SATA + SAS RAID CONTROLLER CARD pictureLSI Logic MegaRAID SAS 9271-8i 6Gb/s SAS SATA RAID Controller Card w/ Battery
$149.99
LSI Logic MegaRAID SAS 9271-8i 6Gb/s SAS SATA RAID Controller Card w/ Battery picture


Discussions

No Discussions have been posted on this vulnerability.