CVE-2001-0199

Guido Frassetto Sedum - Path Traversal

Title source: rule
STIX 2.1

Description

Directory traversal vulnerability in SEDUM HTTP Server 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) attack in the HTTP GET request.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Joe Testa · textremotewindows
https://www.exploit-db.com/exploits/20608

References (5)

Core 5
Core References
Exploit, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/2335
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/14797
US Government Resource third-party-advisory x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/651994
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/6063
Vendor Advisory mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2001-02/0064.html

Scores

EPSS 0.0840
EPSS Percentile 92.3%

Details

Status published
Products (1)
guido_frassetto/sedum 2.0
Published May 03, 2001
Tracked Since Feb 18, 2026