CVE-2005-4622

Directory traversal vulnerability in eFileGo 3.01 allows remote attackers to execute arbitrary code, read arbitrary files, and upload arbitrary files via a ... (triple dot) in (1) the URL on port 608 and (2) the argument to upload.exe.
Configurations

Configuration 1 (hide)

cpe:2.3:a:efilego:efilego:3.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:04

Type Values Removed Values Added
References () http://secunia.com/advisories/18279 - Exploit, Vendor Advisory () http://secunia.com/advisories/18279 - Exploit, Vendor Advisory
References () http://securitytracker.com/id?1015430 - Exploit () http://securitytracker.com/id?1015430 - Exploit
References () http://www.ipomonis.com/advisories/PaQFile_Share.txt - Exploit, Vendor Advisory () http://www.ipomonis.com/advisories/PaQFile_Share.txt - Exploit, Vendor Advisory
References () http://www.osvdb.org/22151 - Exploit () http://www.osvdb.org/22151 - Exploit
References () http://www.securityfocus.com/bid/16124 - Exploit () http://www.securityfocus.com/bid/16124 - Exploit

Information

Published : 2005-12-31 05:00

Updated : 2024-11-21 00:04


NVD link : CVE-2005-4622

Mitre link : CVE-2005-4622

CVE.ORG link : CVE-2005-4622


JSON object : View

Products Affected

efilego

  • efilego