![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10773 |
Category: | Web application abuses |
Title: | MacOS X Finder '.FBCIndex' Information Disclosure |
Summary: | MacOS X creates a hidden file, '.FBCIndex' in each directory that has been; viewed with the Finder. This file contains the content of the files present; in the directory, giving an attacker information on the HTML tags, JavaScript,; passwords, or any other sensitive word used inside those files. |
Description: | Summary: MacOS X creates a hidden file, '.FBCIndex' in each directory that has been viewed with the Finder. This file contains the content of the files present in the directory, giving an attacker information on the HTML tags, JavaScript, passwords, or any other sensitive word used inside those files. Solution: Block access to hidden files (starting with a dot) within your webservers configuration CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2001-1446 BugTraq ID: 3325 http://www.securityfocus.com/bid/3325 Bugtraq: 20010910 Re: More security problems in Apache on Mac OS X (Google Search) http://archives.neohapsis.com/archives/bugtraq/2001-09/0085.html CERT/CC vulnerability note: VU#177243 http://www.kb.cert.org/vuls/id/177243 XForce ISS Database: macos-apache-directory-disclosure(7103) https://exchange.xforce.ibmcloud.com/vulnerabilities/7103 |
Copyright | Copyright (C) 2001 Matt Moore, Modified by Noam Rathaus |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |