Family: CGI abuses --> Category: attack
Sambar /sysadmin directory 2 Vulnerability Scan
Vulnerability Scan Summary
Sambar webserver installed ?
Detailed Explanation for this Vulnerability Test
The Sambar webserver is running.
It provides a web interface for configuration purposes.
The admin user has no password and there are some other default users without
Everyone could set the HTTP-Root to c:\ and delete your files!
*** this may be a false positive - go to http://the_server/sysadmin/ and
have a look at it by yourself
Solution : Change the passwords via the webinterface or use a real webserver
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.