Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> ping.asp


Vulnerability Assessment Details

ping.asp

Vulnerability Assessment Summary
Searches for the existence of ping.asp

Detailed Explanation for this Vulnerability Assessment
The 'ping.asp' CGI is installed. Some versions
permits a cracker to launch a ping flood against your
machine or another by entering
'127.0.0.1 -l 65000 -t' in the Address field.

Solution : remove it.

Reference : http://online.securityfocus.com/archive/82/275088

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Michel Arboi

Cables, Connectors

LOT of 50 8GB PC3-12800U DDR3 Memory Ram MIX Brands/Speed *Tested and Working*
$1199.99
LOT of 50 8GB PC3-12800U DDR3 Memory Ram MIX Brands/Speed *Tested and Working* pictureLOT of 50 8GB PC3L-10600R DDR3 Server Memory Ram MIX Brands/Speed *Tested
$814.99
LOT of 50 8GB PC3L-10600R DDR3 Server Memory Ram MIX Brands/Speed *Tested pictureHP Folio 13-2000 i5-2467M 1.6 GHz 4GB RAM 128GB SSD 13" Win7 Prof LED Ultrabook
$99.0
HP Folio 13-2000 i5-2467M 1.6 GHz 4GB RAM 128GB SSD 13


Discussions

No Discussions have been posted on this vulnerability.