![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.12040 |
Category: | CGI abuses |
Title: | Qualiteam X-Cart remote command execution |
Summary: | NOSUMMARY |
Description: | Description: The remote host is running Qualiteam X-Cart - a shopping cart software written in PHP. There is a bug in this software which may allow an attacker to execute arbitrary commands on the remote web server with the privileges of the web user. In addition to this, there are some flaws which may allow an attacker to obtain more information about the remote server, like the physical location of the remote web root. Solution : Upgrade to the latest version of blog.cgi or disable this software Risk factor : High |
Cross-Ref: |
BugTraq ID: 9560 Common Vulnerability Exposure (CVE) ID: CVE-2004-0241 http://www.securityfocus.com/bid/9560 Bugtraq: 20040203 X-Cart vulnerability (Google Search) http://marc.info/?l=bugtraq&m=107582648326448&w=2 XForce ISS Database: xcart-perlbinary-execute-commands(15034) https://exchange.xforce.ibmcloud.com/vulnerabilities/15034 |
Copyright | This script is Copyright (C) 2004 Tenable Network Security |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |