Vulnerability Name: | CVE-2002-1523 (CCN-10366) | ||||||||
Assigned: | 2002-10-13 | ||||||||
Published: | 2002-10-13 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | Directory traversal vulnerability in Daniel Arenz Mini Server 2.1.6 allows remote attackers to read arbitrary files via (1) ../ (dot-dot slash) or (2) ..\ (dot-dot backslash) sequences. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: BUGTRAQ Type: Exploit, Vendor Advisory 20021013 Directory traversal in Daniel Arenz' Mini Server Source: CCN Type: BugTraq Mailing List, Sun Oct 13 2002 - 03:29:53 CDT Directory traversal in Daniel Arenz' Mini Server Source: MITRE Type: CNA CVE-2002-1523 Source: CONFIRM Type: UNKNOWN http://www.da-home.de/miniserver/update.html Source: CCN Type: Freeware Web site Freeware!de - Mini Server - Kostenlose Software-Downloads Source: XF Type: Vendor Advisory mini-server-directory-traversal(10366) Source: CCN Type: OSVDB ID: 8933 Mini Server Multiple Traversal Arbitrary File Access Source: XF Type: UNKNOWN mini-server-directory-traversal(10366) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |