![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.11052 |
Category: | Firewalls |
Title: | BenHur Firewall active FTP firewall leak |
Summary: | NOSUMMARY |
Description: | Description: It is possible to connect on firewall-protected ports on the remote host by setting one's source port to 20. An attacker may use this flaw to access services that should not be accessible to outsiders on this host. Solution: Reconfigure your firewall to *not* accept anything coming from port 20. Risk factor : High |
Cross-Ref: |
BugTraq ID: 5279 |
Copyright | This script is Copyright (C) 2002 by Renaud Deraison |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |