Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-4885

Опубликовано: 26 окт. 2013
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8

Описание

The http-domino-enum-passwords.nse script in NMap before 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences.

РелизСтатусПримечание
devel

released

6.40-0.1
esm-infra-legacy/trusty

released

6.40-0.1
lucid

ignored

end of life
precise

not-affected

code-not-present
quantal

ignored

end of life
raring

ignored

end of life
saucy

released

6.40-0.1
trusty

released

6.40-0.1
trusty/esm

released

6.40-0.1
upstream

released

6.40

Показывать по

EPSS

Процентиль: 91%
0.06429
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

The http-domino-enum-passwords.nse script in NMap before 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences.

nvd
больше 12 лет назад

The http-domino-enum-passwords.nse script in NMap before 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences.

debian
больше 12 лет назад

The http-domino-enum-passwords.nse script in NMap before 6.40, when do ...

github
больше 3 лет назад

The http-domino-enum-passwords.nse script in NMap before 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences.

EPSS

Процентиль: 91%
0.06429
Низкий

6.8 Medium

CVSS2