|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> Multiple Overflows in WS_FTP client Vulnerability Assessment Details
|
Multiple Overflows in WS_FTP client |
||
IPSWITCH WS_FTP client overflow detection Detailed Explanation for this Vulnerability Assessment The remote host has a version of the WS_FTP client which is vulnerable to multiple remote exploits. A possible hacker, exploiting these bugs would be able to access confidential data on this system. To exploit this flaw, a possible hacker would need to lure a user of this host to visit a rogue FTP server, by inviting him by email, AIM or any other mean. Solution : Upgrade to the newest version of the WS_FTP client See also : http://www.ipswitch.com/ Network Security Threat Level: High Networks Security ID: 9872 Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
AT&T Vintage desktop computer PC PC6300 Keyboard-Monitor -Read Description
$3000.00
Vintage Compaq 141649-004 2 Button PS/2 Gray Mouse M-S34 - FAST SHIPPING - NEW
$8.99
$4.99
Drakware ADB2USB - vintage Apple ADB to USB keyboard adapter
$29.95
Vintage Apple Keyboard II M0487 Untested No ADB Cable
$19.99
Vintage 93073U6 MAXTOR 30GB 3.5" IDE Hard Drive
$24.95
Vintage Microsoft Wheel Mouse Optical Mouse Black (Factory Sealed Retail Box)
$49.99
NEW Manufacture OLD STYLE Oval 3 Prong Power Cord HP style 125V 7A 875W Vintage
$39.95
Vintage Digital Computer Controls DCC-116 Front Control Panel Console
$2799.00
Vintage Varian Data Machines Data 620/i Front Control Panel Console
$2996.00
|
||
No Discussions have been posted on this vulnerability. |