Логотип exploitDog
bind:CVE-2004-1227
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2004-1227

Количество 3

Количество 3

nvd логотип

CVE-2004-1227

больше 20 лет назад

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts.

CVSS2: 10
EPSS: Низкий
debian логотип

CVE-2004-1227

больше 20 лет назад

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and e ...

CVSS2: 10
EPSS: Низкий
github логотип

GHSA-gfv8-v4p2-qcf9

больше 3 лет назад

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2004-1227

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts.

CVSS2: 10
4%
Низкий
больше 20 лет назад
debian логотип
CVE-2004-1227

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and e ...

CVSS2: 10
4%
Низкий
больше 20 лет назад
github логотип
GHSA-gfv8-v4p2-qcf9

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts.

4%
Низкий
больше 3 лет назад

Уязвимостей на страницу