|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> get32.exe vulnerability Vulnerability Assessment Details
|
get32.exe vulnerability |
||
Searches for the existence of /cgi-bin/get32.exe Detailed Explanation for this Vulnerability Assessment The 'get32.exe' CGI script is installed on this machine. This CGI has a well documented security flaw that permits an attacker to execute arbitrary commands on the remote system with the rights of the HTTP daemon (typically root or nobody). Solution : Remove the 'get32.exe' script from your web server's CGI directory (usually cgi-bin/).. Network Security Threat Level: High Networks Security ID: 770 Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison |
||
Cables, Connectors |
Juniper QFX5120-32C-AFI 32x100GbE Switch Airflow-Warranty
$4959.00
Juniper MX204 +JUNOS and Dual Power Supply + Rack Mount-LIFETIME WARRANTY
$8959.00
Juniper 48-Port GbE PoE+ & 4-Port 10GB SFP+ Network Switch EX3300-48P w/ License
$49.99
Juniper Networks EX2300-24P 24 Port Gigabit PoE 4 SFP 1/10G Network Switch
$119.00
Juniper EX3300-48P, 48 Port PoE+ Gigabit Network Switch w/ Power cord
$54.99
Juniper EX4300-48T 48 Port 1G 4 QSFP 40G Dual PSU AFO w/ Rails, EX-UM-4X4SFP Mod
$169.00
Juniper 48-Port PoE GbE Network Switch w/ Dual Power Supplies F B EX4300-48P
$178.99
Juniper EX4600-40F-AFO 24x SFP+/SFP & 4x QSFP+ Ports Switch 2XPSU TESTED
$749.95
Juniper QFX5100-48S 48-Port 10GbE SFP+ 6x40GbE QSFP Network Switch w/Ears Tested
$599.99
Juniper Networks EX3300-48T 48 Port Gigabit 4x 10 GbE SPF+ Ports Switch - Tested
$50.00
|
||
No Discussions have been posted on this vulnerability. |