|
Family: CGI abuses --> Category: attack
Snapstream PVS web directory traversal Vulnerability Scan
Vulnerability Scan Summary Snapstream web directory traversal
Detailed Explanation for this Vulnerability Test
It is possible to read arbitrary files on the remote
Snapstream PVS server by prepending ../../ in front on the
file name.
It may also be possible to read ../ssd.ini which contains
many informations on the system (base directory, usernames &
passwords).
Solution : Upgrade your software or change it!
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|