|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Web Servers >> Ipswitch Imail WebCalendar Directory Traversal Vulnerability Vulnerability Assessment Details
|
Ipswitch Imail WebCalendar Directory Traversal Vulnerability |
||
Ipswitch Imail WebCalendar Directory Traversal Vulnerability Detailed Explanation for this Vulnerability Assessment The remote server is running Ipswitch IMail Web calendaring. The remote version of this software is vulnerable to a directory traversal vulnerability. A possible hacker, exploiting this vulnerability, may be able to retrieve sensitive files present on the server. Solution: Apply IMail Server 8.2 Hotfix 2 Network Security Threat Level: High Networks Security ID: 13727 Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
H261-Z61 2U 24SFF AMD Server 8x EPYC 7702 512-Cores 2048GB RAM 8x25G NIC 2x2200W
$13292.18
HP ProLiant Xeon E3-1220L V2 MicroServer Gen8 2.30 GHz 16 GB RAM NO DRIVES
$199.99
HPE ProLiant MicroServer Gen8 Intel Xeon E3-1265L 16GB ECC PCIe x16 4x1TB HDD
$249.99
SuperMicro Server 505-2 Intel Atom 2.4GHz 8GB RAM SYS-5018A-FTN4 1U Rackmount
$202.49
acer AC100 MicroServer, Xeon E3-1260L 2.40GHz, 16GB RAM, No HDD
$87.54
Supermicro 5018A-FTN4 Rack Server - Black
$125.00
Supermicro E300-8D Xeon D-1518 2.20GHz Mini Server
$574.99
Supermicro CSE 823-6 2U 6 Bay Chassis ,1xPWS 653-2H 650Wsold as in the photo,
$119.75
UNRAID Supermicro 4U 36 Bay Storage Server Xeon 20 Core 3Ghz 256GB X540 10GBaseT
$588.00
1U Supermicro Pro Server X10DRU-i+ 2x Xeon E5-2620 V3 32GB DDR4 RAM 4x 10GE RAIL
$190.00
|
||
No Discussions have been posted on this vulnerability. |