192.168.123.123 soap-http (7627/tcp) Security hole(s)
192.168.123.123 nfs (2049/udp) Security hole(s)
Vulnerability soap-http (7627/tcp) The remote HTTP server
allows an attacker to read arbitrary files
on the remote web server, by employing a
weakness in an included ssi package, by
prepending pathnames with %2e%2e/ (hex-
encoded ../) to the pathname.
will return /etc/passwd.
Solution: upgrade to version 2.20 of thttpd.
Risk factor : High
CVE : CVE-2000-0900
BID : 1737
OID : 220.127.116.11.4.1.25618.104.22.16823
Vulnerability nfs (2049/udp)
It is possible to access the remote NFS shares without having root privileges.
Some of the NFS shares exported by the remote server could be
mounted by the scanning host. An attacker may exploit this problem
to gain read (and possibly write) access to files on remote host.
Note that root privileges were not required to mount the remote shares. That is,
the source port to mount the shares was bigger than 1024.
Configure NFS on the remote host so that only authorized hosts can mount
the remote shares.
The remote NFS server should prevent mount requests originating from a non-privileged port.
Risk factor :