Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> ht://Dig's htsearch reveals web server path


Vulnerability Assessment Details

ht://Dig's htsearch reveals web server path

Vulnerability Assessment Summary
Retrieve the real path using htsearch

Detailed Explanation for this Vulnerability Assessment
ht://Dig's htsearch CGI can be
used to reveal the path location of the its configuration files.
This permits attacker to gather sensitive information about the remote host.
For more information see:
http://www.securiteam.com/exploits/htDig_reveals_web_server_configuration_paths.html

Network Security Threat Level: Low

Networks Security ID: 4366

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 SecuriTeam

Cables, Connectors

Intel DX58SO X58 Motherboard w/ i7-920 CPU (mobo WORKING AS-IS)
$37.64
Intel DX58SO X58 Motherboard w/ i7-920 CPU (mobo WORKING AS-IS) pictureHP H-RS880 UAtx Motherboard, w CPU 4GB Ram, Seagate 250G HDD and PSU Windows 10
$25.0
HP H-RS880 UAtx Motherboard, w CPU 4GB Ram, Seagate 250G HDD and PSU Windows 10 pictureGateway SX2110 Motherboard w/ AMD E1-1500 1.48GHz CPU DB.GE511.001
$49.95
Gateway SX2110 Motherboard w/ AMD E1-1500 1.48GHz CPU DB.GE511.001 picture


Discussions

No Discussions have been posted on this vulnerability.