1 results (0.023 seconds)

CVSS: 5.0EPSS: 1%CPEs: 7EXPL: 1

Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228. Vulnerabilidad de atravesamiento de directorios en GoAhead Web Server 2.1 permite a atacantes remotos mediante una URL con una "/" (carácter barra) codificada (%5C) en una secuencia .. (punto punto) • https://www.exploit-db.com/exploits/21607 http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0013.html http://freecode.com/projects/embedthis-goahead-webserver/releases/343539 http://marc.info/?l=bugtraq&m=102631742711795&w=2 http://marc.info/?l=bugtraq&m=102709382714597&w=2 http://osvdb.org/81099 •