CVE-2024-7693 – Team Johnlong software Raiden MAILD Remote Management System - Arbitrary File Reading through Path Traversal
https://notcve.org/view.php?id=CVE-2024-7693
Raiden MAILD Remote Management System from Team Johnlong Software has a Relative Path Traversal vulnerability, allowing unauthenticated remote attackers to read arbitrary file on the remote server. • https://www.twcert.org.tw/en/cp-139-7999-208bf-2.html https://www.twcert.org.tw/tw/cp-132-7997-31bef-1.html • CWE-23: Relative Path Traversal •
CVE-2004-0789
https://notcve.org/view.php?id=CVE-2004-0789
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. • http://secunia.com/advisories/13145 http://securitytracker.com/id?1012157 http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf http://www.posadis.org/advisories/pos_adv_006.txt http://www.securityfocus.com/bid/11642 https://exchange.xforce.ibmcloud.com/vulnerabilities/17997 •
CVE-2001-0491 – RaidenFTPd 2.1 - Directory Traversal
https://notcve.org/view.php?id=CVE-2001-0491
Directory traversal vulnerability in RaidenFTPD Server 2.1 before build 952 allows attackers to access files outside the ftp root via dot dot attacks, such as (1) .... in CWD, (2) .. in NLST, or (3) ... in NLST. • https://www.exploit-db.com/exploits/20803 http://archives.neohapsis.com/archives/bugtraq/2001-04/0465.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6455 •