Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Misc. >> Webserver 4D Cleartext Passwords


Vulnerability Assessment Details

Webserver 4D Cleartext Passwords

Vulnerability Assessment Summary
Checks for Webserver 4D

Detailed Explanation for this Vulnerability Assessment

The remote host is running Webserver 4D 3.6 or lower.

Version 3.6 of this service stores all usernames and passwords in cleartext.
File: C:\Program Files\MDG\Web Server 4D 3.6.0\Ws4d.4DD

A local attacker may use this flaw to gain unauthorized rights
on this host.


Solution: Contact http://www.mdg.com for an update.
Risk Factor: Low

Networks Security ID: 5803

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Jason Lidow

Cables, Connectors

Juniper Networks Junos Pulse Gateway MAG2600 VPN Appliance without Power Adapter
$159.42
Juniper Networks Junos Pulse Gateway MAG2600 VPN Appliance without Power Adapter pictureJuniper J4350 J-Series 2U Service Router J-4350-JB
$99.99
Juniper J4350 J-Series 2U Service Router J-4350-JB pictureLot of 27 Juniper WLA532-US Wireless Access Points
$199.99
Lot of 27 Juniper WLA532-US Wireless Access Points pictureLOT OF 100 - NEW Juniper SRX210HE2-POE - New, Factory Sealed
$4999.0
LOT OF 100 - NEW Juniper SRX210HE2-POE - New, Factory Sealed picture


Discussions

No Discussions have been posted on this vulnerability.