Directory traversal vulnerability in Webster HTTP Server allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.
Max CVSS
9.4
EPSS Score
0.32%
Published
2002-12-31
Updated
2017-07-29
Directory traversal vulnerability in Enceladus Server Suite 3.9 allows remote attackers to list arbitrary directories and possibly cause a denial of service via "@" (at) characters in a CD (CWD) command, such as (1) "@/....\", (2) "@@@/..c:\", or (3) "@/..@/..".
Max CVSS
8.3
EPSS Score
0.29%
Published
2002-12-31
Updated
2017-07-29
Directory traversal vulnerability in WorldClient.cgi in WorldClient for Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to delete arbitrary files via a ".." (dot dot) in the Attachments parameter.
Max CVSS
7.2
EPSS Score
0.04%
Published
2002-12-31
Updated
2017-07-11
Directory traversal vulnerability in priocntl system call in Solaris does allows local users to execute arbitrary code via ".." sequences in the pc_clname field of a pcinfo_t structure, which cause priocntl to load a malicious kernel module.
Max CVSS
7.2
EPSS Score
0.06%
Published
2002-12-23
Updated
2018-10-30
Directory traversal vulnerability in splashAdmin.php for Cobalt Qube 3.0 allows local users and remote attackers, to gain privileges as the Qube Admin via .. (dot dot) sequences in the sessionId cookie that point to an alternate session file.
Max CVSS
10.0
EPSS Score
1.83%
Published
2002-10-04
Updated
2008-09-05
Directory traversal vulnerability in Carello 1.3 allows remote attackers to execute programs on the server via a .. (dot dot) in the VBEXE parameter.
Max CVSS
7.5
EPSS Score
0.84%
Published
2002-07-23
Updated
2016-10-18
Directory traversal vulnerability in Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to read arbitrary files and execute commands via .. (dot dot) sequences containing \ (backslash) characters.
Max CVSS
7.5
EPSS Score
95.96%
Published
2002-08-12
Updated
2021-06-06
Directory traversal vulnerability in filemanager.asp for Hosting Controller 1.4.1 and earlier allows remote attackers to read and modify arbitrary files, and execute commands, via a .. (dot dot) in the OpenPath parameter.
Max CVSS
10.0
EPSS Score
0.85%
Published
2002-08-12
Updated
2017-12-19
Directory traversal vulnerability in ans.pl in Avenger's News System (ANS) 2.11 and earlier allows remote attackers to determine the existence of arbitrary files or execute any Perl program on the system via a .. (dot dot) in the p parameter, which reads the target file and attempts to execute the line using Perl's eval function.
Max CVSS
7.5
EPSS Score
4.65%
Published
2002-05-31
Updated
2016-10-18
Directory traversal vulnerability in Add2it Mailman Free 1.73 and earlier allows remote attackers to modify arbitrary files via a .. (dot dot) in the list parameter.
Max CVSS
7.5
EPSS Score
0.82%
Published
2002-05-31
Updated
2016-10-18
Directory traversal vulnerability in InstantServers MiniPortal 1.1.5 and earlier allows remote authenticated users to read arbitrary files via a ... (modified dot dot) in the GET command.
Max CVSS
7.5
EPSS Score
0.47%
Published
2002-05-29
Updated
2016-10-18
Directory traversal vulnerability in chroot function in AtheOS 0.3.7 allows attackers to escape the jail via a .. (dot dot) in the pathname argument to chdir.
Max CVSS
7.5
EPSS Score
1.88%
Published
2002-05-29
Updated
2017-07-11
Directory traversal vulnerability in chuid 1.2 and earlier allows remote attackers to change the ownership of files outside of the upload directory via a .. (dot dot) attack.
Max CVSS
7.5
EPSS Score
0.71%
Published
2002-03-25
Updated
2008-09-10
Directory traversal vulnerability in Funsoft Dino's Webserver 1.2 and earlier allows remote attackers to read files or execute arbitrary commands via a .. (dot dot) in the URL.
Max CVSS
7.5
EPSS Score
2.62%
Published
2002-03-25
Updated
2016-10-18
14 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!