|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Firewalls >> Usable remote proxy on any port Vulnerability Assessment Details
|
Usable remote proxy on any port |
||
Acertains if we can use the remote web proxy against any port Detailed Explanation for this Vulnerability Assessment The proxy, permits everyone to perform requests against arbitrary ports, like 'GET http://cvs.nessus.org:110'. This problem may permit attackers to go through your firewall, by connecting to sensitive ports like 25 (sendmail) using your proxy. In addition to that, your proxy may be used to perform attacks against other networks. Solution: reconfigure your proxy so that it only accepts connections against non-dangerous ports (> 1024). Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison |
||
Cables, Connectors |
Commodore Amiga 4000 desktop computer
$2800.00
Commodore Amiga 500 Untested no power cord with mouse
$249.99
Terrible Fire Accelerator TF534 For AMIGA 500 2000 2500
$140.00
DEALER DEMO DISK --- COMMODORE AMIGA Computers - VERY RARE --- MICRO-ED INC
$75.00
Mini External OLED AMIGA Gotek Floppy Drive Emulator For Amiga 500/500+/600/1200
$37.50
Commodore Amiga 2000 A2000 Slot Covers
$25.00
Amiga 500 Gotek Custom Mount USB Floppy Emulator - Complete Kit with Gotek
$65.00
Amiga 2000 2500 Video Toaster - Card Only
$90.00
TeensyROM Cartridge for Commodore 64/128: MIDI, Fastload, Emulation, and Network
$65.00
Commodore Amiga Stereo Sound Sampler Techno Sound Turbo Rare Limited US Seller
$50.99
|
||
No Discussions have been posted on this vulnerability. |