Family: CGI abuses --> Category: infos
PlusMail vulnerability Vulnerability Scan
Vulnerability Scan Summary
Searches for the existence of /cgi-bin/plusmail
Detailed Explanation for this Vulnerability Test
The 'plusmail' CGI is installed. Some
versions of this CGI have a well documented security flaw that
lets a possible hacker read arbitrary
file with the rights of the http daemon
(usually root or nobody).
Solution : remove it from /cgi-bin. No patch yet
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.