![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.15711 |
Categoría: | Web application abuses |
Título: | PhpGroupWare arbitrary command execution |
Resumen: | The remote host seems to be running PhpGroupWare, is a multi-user groupware; suite written in PHP. |
Descripción: | Summary: The remote host seems to be running PhpGroupWare, is a multi-user groupware suite written in PHP. Vulnerability Insight: This version is prone to a vulnerability that may permit remote attackers to execute arbitrary commands by triggering phpgw_info parameter of the phpgw.inc.php script, resulting in a loss of integrity. Solution: Update to version 0.9.7 of this software or newer CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2001-0043 BugTraq ID: 2069 http://www.securityfocus.com/bid/2069 Bugtraq: 20001206 (SRADV00006) Remote command execution vulnerabilities in phpGroupWare (Google Search) http://archives.neohapsis.com/archives/bugtraq/2000-12/0053.html http://sourceforge.net/project/shownotes.php?release_id=17604 http://www.osvdb.org/1682 XForce ISS Database: phpgroupware-include-files(5650) https://exchange.xforce.ibmcloud.com/vulnerabilities/5650 |
Copyright | Copyright (C) 2004 David Maciejak |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |