Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> icat


Vulnerability Assessment Details

icat

Vulnerability Assessment Summary
Acertains the presence of the 'icat' cgi

Detailed Explanation for this Vulnerability Assessment
Several versions of the 'icat' CGI permit a remote
user to read arbitrary file on the target system. Make sure you
are running the latest version of icat.

Solution : Upgrade to the latest version of icat
Network Security Threat Level: High


Networks Security ID: 2126

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

UNIVAC IBM 701 650 Apple 1, II Apple Lisa DEC PDP-8 Altair 8800 Computer History
$24.99
UNIVAC IBM 701 650 Apple 1, II Apple Lisa DEC PDP-8 Altair 8800 Computer History pictureMITS ALTAIR 8800 Theory of Operation Manual & Schematics
$30.41
MITS ALTAIR 8800 Theory of Operation Manual & Schematics picturealtair 8800 basic reference manual from mits tvi albuquerque 1st printing 1977
$99.0
altair 8800 basic reference manual from mits tvi  albuquerque 1st printing 1977 pictureComputer Photo History DDP-116 IBM SAGE Altair 8800 Cray-1 ILLIAC IV PDP-8 ENIAC
$45.0
Computer Photo History DDP-116 IBM SAGE Altair 8800 Cray-1 ILLIAC IV PDP-8 ENIAC picture


Discussions

No Discussions have been posted on this vulnerability.