CVE-2001-1138

Directory traversal vulnerability in r.pl (aka r.cgi) of Randy Parker Power Up HTML 0.8033beta allows remote attackers to read arbitrary files and possibly execute arbitrary code via a .. (dot dot) in the FILE parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:randy_parker:power_up_html:0.8033_beta:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () http://www.securityfocus.com/archive/1/212679 - Vendor Advisory () http://www.securityfocus.com/archive/1/212679 - Vendor Advisory
References () http://www.securityfocus.com/bid/3304 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/3304 - Exploit, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/7092 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/7092 -

Information

Published : 2001-09-07 04:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-1138

Mitre link : CVE-2001-1138

CVE.ORG link : CVE-2001-1138


JSON object : View

Products Affected

randy_parker

  • power_up_html