English | Deutsch | Español | Português
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
    Search 123947 CVE descriptions
and 58962 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:10077
Category:CGI abuses
Title:Microsoft Frontpage exploits
Summary:Checks for the presence of Microsoft Frontpage extensions

The remote web server appears to be running with the Frontpage extensions.
Frontpage allows remote web developers and administrators to modify web
content from a remote location. While this is a fairly typical scenario
on an internal Local Area Network, the Frontpage extensions should not
be available to anonymous users via the Internet (or any other untrusted
3rd party network).

You should double check the configuration since a lot of security problems
have been found with FrontPage when the configuration file is not well set up.

Risk factor : High if your configuration file is not well set up

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2000-0114
Bugtraq: 20000203 2 MS Frontpage issues Cerberus Information Security Advisory (CISADV000203) (Google Search)
CopyrightThis script is Copyright (C) 1999 Renaud Deraison

This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
Registered User Login

 Forgot userid or passwd?

Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2018 E-Soft Inc. All rights reserved.