4 results (0.003 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

18 Nov 2006 — Verity Ultraseek before 5.7 allows remote attackers to obtain sensitive information via direct requests with (1) a null ("%00") terminated url parameter to help/urlstatusgo.html; or missing parameters to (2) help/header.html, (3) help/footer.html, (4) spell.html, (5) coreforma.html, (6) daterange.html, (7) hits.html, (8) hitsnavbottom.html, (9) indexform.html, (10) indexforma.html, (11) languages.html, (12) nohits.html, (13) onehit1.html, (14) onehit2.html, (15) query.html, (16) queryform0.html, (17) queryf... • http://secunia.com/advisories/22892 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

18 Nov 2006 — Absolute path traversal vulnerability in admin/logfile.txt in Verity Ultraseek before 5.6.2 allows remote attackers to read arbitrary files via the name variable. Vulnerabilidad de salto de ruta absoluta en admin/logfile.txt en Verity Ultraseek anterior a 5.6.2 permite a un atacante remoto leer ficheros de su elección a través de la variable name. • http://secunia.com/advisories/22892 •

CVSS: 10.0EPSS: 6%CPEs: 5EXPL: 0

15 Nov 2006 — Verity Ultraseek before 5.7 allows remote attackers to use the server as a proxy for web attacks and host scanning via a direct request to the highlight/index.html script. Verity Ultraseek anterior a 5.7 permite a un atacante remoto usar el servidor como proxy para ataques web y escaneo de host a través de respuesta directa a la secuencia de comandos highlight/index.html. This vulnerability allows remote attackers to proxy web attacks and scan internal hosts through vulnerable installations of Verity Ultras... • http://securitytracker.com/id?1017235 •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

06 May 2004 — Verity Ultraseek before 5.2.2 allows remote attackers to obtain the full pathname of the document root via an MS-DOS device name in the web search option, such as (1) NUL, (2) CON, (3) AUX, (4) COM1, (5) COM2, and others. Verity Ultraseek anteriores a 5.2.2 permite a atacantes remotos obtener la ruta completa de la raíz de documentos mediante un nombre de dispositivo de MS-DOS en la opción de búsqueda web, como (1) NUL, (2) CON, (3) AUX, (4) COM1, (5) COM2, y otros. • http://archives.neohapsis.com/archives/vulnwatch/2004-q2/0024.html •