![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.11948 |
Category: | Remote file access |
Title: | Avotus CDR mm File Retrieval Attempt |
Summary: | The script attempts to force the remote Avotus CDR mm service to; include the file /etc/passwd across the network. |
Description: | Summary: The script attempts to force the remote Avotus CDR mm service to include the file /etc/passwd across the network. Solution: The vendor has provided a fix for this issue to all customers. The fix will be included in future shipments and future versions of the product. If an Avotus customer has any questions about this problem, they should contact support@avotus.com. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Copyright | Copyright (C) 2004 Anonymous |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |