2 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

Default configuration in Matt Wright FormHandler.cgi script allows arbitrary directories to be used for attachments, and only restricts access to the /etc/ directory, which allows remote attackers to read arbitrary files via the reply_message_attach attachment parameter. • http://www.securityfocus.com/archive/1/34939 •

CVSS: 5.0EPSS: 2%CPEs: 3EXPL: 4

Directory traversal vulnerability in Matt Wright FormHandler.cgi script allows remote attackers to read arbitrary files via (1) a .. (dot dot) in the reply_message_attach attachment parameter, or (2) by specifying the filename as a template. • https://www.exploit-db.com/exploits/19620 http://www.securityfocus.com/archive/1/34600 http://www.securityfocus.com/archive/1/34939 http://www.securityfocus.com/bid/798 http://www.securityfocus.com/bid/799 https://exchange.xforce.ibmcloud.com/vulnerabilities/3550 •