Описание
Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228.
Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2002-0680
- http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0013.html
- http://freecode.com/projects/embedthis-goahead-webserver/releases/343539
- http://marc.info/?l=bugtraq&m=102631742711795&w=2
- http://marc.info/?l=bugtraq&m=102709382714597&w=2
- http://osvdb.org/81099
EPSS
CVE ID
Связанные уязвимости
Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228.
EPSS