Directory traversal vulnerability in Carello 1.3 allows remote attackers to execute programs on the server via a .. (dot dot) in the VBEXE parameter.
Max CVSS
7.5
EPSS Score
0.84%
Published
2002-07-23
Updated
2016-10-18
Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228.
Max CVSS
5.0
EPSS Score
1.95%
Published
2002-07-23
Updated
2017-12-20
Directory traversal vulnerability in TYPSoft FTP server 0.97.1 and earlier allows a remote authenticated user (possibly anonymous) to list arbitrary directories via a .. in a LIST (ls) command ending in wildcard *.* characters.
Max CVSS
5.0
EPSS Score
0.59%
Published
2002-07-03
Updated
2008-09-05
Directory traversal vulnerability in Quik-Serv HTTP server 1.1B allows remote attackers to read arbitrary files via a .. (dot dot) in a URL.
Max CVSS
5.0
EPSS Score
2.08%
Published
2002-07-03
Updated
2008-09-05
Directory traversal vulnerability in Aprelium Abyss Web Server (abyssws) before 1.0.0.2 allows remote attackers to read files outside the web root, including the abyss.conf file, via URL-encoded .. (dot dot) sequences in the HTTP request.
Max CVSS
5.0
EPSS Score
0.29%
Published
2002-07-03
Updated
2008-09-05
Directory traversal vulnerability in Xerver Free Web Server 2.10 and earlier allows remote attackers to list arbitrary directories via a .. (dot dot) in an HTTP GET request.
Max CVSS
5.0
EPSS Score
0.47%
Published
2002-07-26
Updated
2008-09-05
Directory traversal vulnerability in imlist.php for Php Imglist allows remote attackers to read arbitrary code via a .. (dot dot) in the cwd parameter.
Max CVSS
5.0
EPSS Score
0.91%
Published
2002-07-26
Updated
2008-09-05
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!