![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.10963 |
Categoría: | Web application abuses |
Título: | Compaq Web Based Management Agent Proxy Vulnerability |
Resumen: | This host is running the Compaq Web Management Agent.; This service can be used as a HTTP proxy. An attacker can use this; to bypass firewall rules or hide the source of web-based attacks. |
Descripción: | Summary: This host is running the Compaq Web Management Agent. This service can be used as a HTTP proxy. An attacker can use this to bypass firewall rules or hide the source of web-based attacks. Solution: Due to the information leak associated with this service, we recommend that you disable the Compaq Management Agent or filter access to TCP ports 2301 and 280. If this service is required, installing the appropriate upgrade from Compaq will fix this issue. The software update for the operating system and hardware can be found via Compaq's support download page. For more information, please see the referenced vendor advisory. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2001-0374 Bugtraq: 20010322 Compaq Insight Manager Proxy Vuln (Google Search) http://archives.neohapsis.com/archives/vuln-dev/2001-q1/0779.html COMPAQ Service Security Patch: SSRT0715 http://www.compaq.com/products/servers/management/mgtsw-advisory.html XForce ISS Database: compaq-wbm-bypass-proxy(6264) https://exchange.xforce.ibmcloud.com/vulnerabilities/6264 |
Copyright | Copyright (C) 2002 Digital Defense Inc. |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |