CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5470 | CVE-2002-1083 | Candidate | Directory traversal vulnerabilities in ezContents 1.41 and earlier allow remote attackers to cause ezContents to (1) create directories using the Maintain Images:Add New:Create Subdirectory item, or (2) list directories using the Maintain Images file listing, via .. (dot dot) sequences. | Proposed (20020830) | ACCEPT(1) Foat | NOOP(3) Cole, Cox, Wall | View | |
5469 | CVE-2002-1082 | Candidate | The Image Upload capability for ezContents 1.40 and earlier allows remote attackers to cause ezContents to perform operations on local files as if they were uploaded. | Proposed (20020830) | NOOP(4) Cole, Cox, Foat, Wall | View | |
5468 | CVE-2002-1081 | Entry | The Administration console for Abyss Web Server 1.0.3 allows remote attackers to read files without providing login credentials via an HTTP request to a target file that ends in a "+" character. | View | |||
5467 | CVE-2002-1080 | Candidate | The Administration console for Abyss Web Server 1.0.3 before Patch 2 allows remote attackers to gain privileges and modify server configuration via direct requests to CHL files such as (1) srvstatus.chl, (2) consport.chl, (3) general.chl, (4) srvparam.chl, and (5) advanced.chl. | Modified (20071016) | ACCEPT(1) Frech | NOOP(6) Armstrong, Christey, Cole, Cox, Foat, Wall | Frech> CONFIRM:http://www.aprelium.com/news/patch1033.html | Christey> CONFIRM:http://www.aprelium.com/news/patch1033.html | View |
5466 | CVE-2002-1079 | Entry | Directory traversal vulnerability in Abyss Web Server 1.0.3 allows remote attackers to read arbitrary files via .. (dot-dot backslash) sequences in an HTTP GET request. | View |
Page 19850 of 20943, showing 5 records out of 104715 total, starting on record 99246, ending on 99250