Directory traversal vulnerability in Digicraft Yak! server 2.0 through 2.1.2 allows remote attackers to read or write arbitrary files via "../" or "..\" sequences in commands such as (1) dir or (2) put.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/yak-adv.txt - Exploit | |
References | () http://marc.info/?l=full-disclosure&m=109788315103778&w=2 - | |
References | () http://secunia.com/advisories/12849 - | |
References | () http://securitytracker.com/id?1011708 - | |
References | () http://www.osvdb.org/10763 - | |
References | () http://www.securityfocus.com/archive/1/378533 - Exploit | |
References | () http://www.securityfocus.com/bid/11433 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17740 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:52
NVD link : CVE-2004-2184
Mitre link : CVE-2004-2184
CVE.ORG link : CVE-2004-2184
JSON object : View
Products Affected
digicraft_software
- yak
CWE