CVE-2004-0072

Accipiter Direct Server - Path Traversal

Title source: rule
STIX 2.1

Description

Directory traversal vulnerability in Accipiter Direct Server 6.0 allows remote attackers to read arbitrary files via encoded \.. (backslash .., "%5c%2e%2e") sequences in an HTTP request.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Mark Bassett · textremotewindows
https://www.exploit-db.com/exploits/23533

References (6)

Core 6
Core References
Exploit, Patch, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/9389
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/14198
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107392576215418&w=2
Third Party Advisory mailing-list x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0274.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/3433
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/10600

Scores

EPSS 0.0466
EPSS Percentile 89.4%

Details

Status published
Products (1)
accipiter/accipiter_direct_server 6.0
Published Feb 17, 2004
Tracked Since Feb 18, 2026