Description
Directory traversal vulnerability in BremsServer 1.2.4 allows remote attackers to read arbitrary files via ".." (dot dot) sequences in the URL.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Donato Ferrante · pythonremotewindows
https://www.exploit-db.com/exploits/23603
References (6)
Core 6
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107513747107031&w=2
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/9493
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/14954
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/3755
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10731
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1008853
Scores
EPSS
0.0476
EPSS Percentile
89.5%
Details
Status
published
Products (1)
herberlin/bremsserver
1.2.4
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026