Description
Directory traversal vulnerability in SEDUM HTTP Server 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) attack in the HTTP GET request.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Joe Testa · textremotewindows
https://www.exploit-db.com/exploits/20608
References (5)
Core 5
Core References
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/2335
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/14797
US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/651994
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/6063
Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2001-02/0064.html
Scores
EPSS
0.0840
EPSS Percentile
92.3%
Details
Status
published
Products (1)
guido_frassetto/sedum
2.0
Published
May 03, 2001
Tracked Since
Feb 18, 2026