CVE-2001-1138

Randy Parker Power Up HTML 0.8033beta - Path Traversal

Title source: llm
STIX 2.1

Description

Directory traversal vulnerability in r.pl (aka r.cgi) of Randy Parker Power Up HTML 0.8033beta allows remote attackers to read arbitrary files and possibly execute arbitrary code via a .. (dot dot) in the FILE parameter.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Steve Shepherd · textremotecgi
https://www.exploit-db.com/exploits/21102

References (3)

Core 3
Core References
Vendor Advisory mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/212679
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/7092
Exploit, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/3304

Scores

EPSS 0.0546
EPSS Percentile 90.3%

Details

Status published
Products (1)
randy_parker/power_up_html 0.8033_beta
Published Sep 07, 2001
Tracked Since Feb 18, 2026