SecuritySpace - CVE-2002-1717
Microsoft Internet Information Server (IIS) 5.1 allows remote attackers to view path information via a GET request to (1) /_vti_pvt/access.cnf, (2) /_vti_pvt/botinfs. . ->
Web Servers : Check for IIS .cnf file leakage
suitable access control lists to ensure that the .cnf files are not . Common Vulnerability Exposure (CVE) ID: CVE-2002-1717 . ->
17146: IIS .cnf File Disclosure Vulnerability
IIS .cnf File Disclosure Vulnerability. Go to Vulnerabilities List. General Info. TC: . may allow remote users to access .cnf files, which can give confidential . ->
National Vulnerability Database (NVD)National Vulnerability Database .
Comprehensive CVE vulnerability database that integrates all U.S. Government . _vti_pvt/access.cnf, (2) /_vti_pvt/botinfs.cnf, (3) /_vti_pvt/bots.cnf, or (4) . ->
Microsoft IIS Multiple .cnf File Information Disclosure
installation path via GET requests to the files 'access.cnf' . This is the web site for the Nessus Vulnerability Scanner from Tenable Network Security. . ->
Microsoft IIS 5.1 Frontpage Extensions Path Disclosure Information .
Search: Home Bugtraq Vulnerabilities Mailing Lists Jobs Tools Beta . problematic files are 'access.cnf', 'botinfs.cnf', 'bots.cnf' and 'linkinfo.cnf' . ->
Microsoft Word - 20-1215-C-_??-__??__???-Copyright Accepted_ 1206 .
vulnerability into a general access control model in a way that . Most vulnerability analysis . (usually in Conjunctive Normal Form (CNF).) 3-SAT is a . ->
IEEE Xplore# Wrapper Result
Towards automatic generation of vulnerability-based signatures . IEEE CNF. IEEE Conference Proceeding. IEE CNF. IEE Conference Proceeding. IEEE STD. IEEE Standard . ->
SecuritySeer - Security Web Site
High risk vulnerabilities are those that may allow access to the . Set permissions on all .cnf files to disallow general read access. Remote System Output . ->
Ask the Experts " Blog Archive " How can I change openssl.cnf property?
You are already pointing to a custom cnf why not just change it there under . Malware ? Network Access Control ? Vulnerability Scanning ? Security Audit ? VPN . ->