Логотип exploitDog
bind:CVE-2004-1227
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2004-1227

Количество 3

Количество 3

nvd логотип

CVE-2004-1227

почти 21 год назад

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts.

CVSS2: 10
EPSS: Низкий
debian логотип

CVE-2004-1227

почти 21 год назад

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and e ...

CVSS2: 10
EPSS: Низкий
github логотип

GHSA-gfv8-v4p2-qcf9

больше 3 лет назад

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2004-1227

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts.

CVSS2: 10
4%
Низкий
почти 21 год назад
debian логотип
CVE-2004-1227

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and e ...

CVSS2: 10
4%
Низкий
почти 21 год назад
github логотип
GHSA-gfv8-v4p2-qcf9

Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts.

4%
Низкий
больше 3 лет назад

Уязвимостей на страницу