|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> inserter.cgi File Inclusion and Command Execution Vulnerabilities Vulnerability Assessment Details
|
inserter.cgi File Inclusion and Command Execution Vulnerabilities |
||
Searches for the existence of a file inclusion vulnerability Detailed Explanation for this Vulnerability Assessment The remote web server contains the 'inserter' CGI. The inserter.cgi contains a vulnerability that permits remote attackers to cause the CGI to execute arbitrary commands with the rights of the web server by supplying it with a piped instruction or to include arbitrary files by providing an absolute path to the location of the file. Solution : Delete this file Risk factor: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Noam Rathaus |
||
Cables, Connectors |
Cisco (SG100D-05-UK) 5-Ports External Ethernet Switch
$40.00
Cisco SG110 24 Port Gigabit Ethernet Switch w/ 2 x SFP SG110-24
$117.00
HP Procurve 2824 24 Gigabit Ports 10/100/1000 External Managed Switch J4903A
$74.99
8 Ports Unmanaged Industrial Ethernet Switch Network Gigabit Ethernet Switch
$85.00
Juniper Networks EX3300-48P 48-Port PoE+ 4x SFP+ Network Switch w/ Power Cord
$43.95
New Linksys SE3005 5-port Gigabit Ethernet Switch
$18.99
New 10/100 Mbps 8 Ports Fast Ethernet LAN Desktop RJ45 Network Switch Hub
$11.49
Linksys SE3008 8 Ports Rack Mountable Gigabit Ethernet Switch
$21.99
Fortinet FortiSwitch FS-124D-POE 24 Port Gigabit Ethernet Switch UNREGISTERED
$99.97
ARUBA J9772A 2530-48G PoE+ 48 PORT ETHERNET SWITCH W/ RACK EARS J9772-60301
$132.30
|
||
No Discussions have been posted on this vulnerability. |