Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Turbo Seek files reading


Vulnerability Assessment Details

Turbo Seek files reading

Vulnerability Assessment Summary
Searches for the existence of tseekdir.cgi

Detailed Explanation for this Vulnerability Assessment

The remote host is running Turbo Seek.

Turbo Seek is a search engine and directory tool.

The remote version of this software contains a file content disclosure
flaw which may permit a malicious user to read arbitrary files on the remote
server with the rights the remote web server is running with (usually
root or nobody).


Solution : Upgrade at least to version 1.7.2 of this software
Network Security Threat Level: High

Networks Security ID: 11163

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak

Cables, Connectors

SonicWall 02-SSC-1843 Total Secure Advanced Edition Firewall - 1 Year
$832.48
SonicWall 02-SSC-1843 Total Secure Advanced Edition Firewall - 1 Year pictureSonicWall Secure Upgrade Plus - SonicWALL SOHO Network Security Firewall - Subsc
$558.83
SonicWall Secure Upgrade Plus - SonicWALL SOHO Network Security Firewall - Subsc pictureSonicWALL TZ300 Network Security/Firewall Appliance with 1 Year TotalSecure - In
$799.0
SonicWALL TZ300 Network Security/Firewall Appliance with 1 Year TotalSecure - In pictureSONICWALL - HARDWARE 01-SSC-0439 SONICWALL TZ500 HIGH
$836.96
SONICWALL - HARDWARE 01-SSC-0439 SONICWALL TZ500 HIGH picture


Discussions

No Discussions have been posted on this vulnerability.