Directory traversal vulnerability in r.pl (aka r.cgi) of Randy Parker Power Up HTML 0.8033beta allows remote attackers to read arbitrary files and possibly execute arbitrary code via a .. (dot dot) in the FILE parameter.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/archive/1/212679 | Vendor Advisory |
| http://www.securityfocus.com/bid/3304 | Exploit Vendor Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/7092 |
Configurations
Information
Published : 2001-09-06 21:00
Updated : 2017-12-18 18:29
NVD link : CVE-2001-1138
Mitre link : CVE-2001-1138
JSON object : View
CWE
Products Affected
randy_parker
- power_up_html


