![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.12034 |
Category: | CGI abuses |
Title: | phpGedView arbitrary file reading |
Summary: | NOSUMMARY |
Description: | Description: The remote host is running phpGedView - a set of CGIs written in PHP designed to do web-based genealogy. There is a bug in this software which may allow an attacker to read arbitary files on the remote web server with the privileges of the web user. Another bug may also allow an attacker to include arbitrary PHP files hosted on a third-party web site. Solution : Upgrade to the latest version of phpGedView or disable this software Risk factor : High |
Cross-Ref: |
BugTraq ID: 9529 BugTraq ID: 9531 |
Copyright | This script is Copyright (C) 2004 Tenable Network Security |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |