Description
Directory traversal vulnerability in FastStone 4in1 Browser 1.2 allows remote attackers to read arbitrary files via a (1) ... (triple dot) or (2) ..\ (dot dot backslash) in the URL.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Donato Ferrante · textremotewindows
https://www.exploit-db.com/exploits/25319
References (6)
Core 6
Core References
Patch, Vendor Advisory vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1013596
Patch, Vendor Advisory x_refsource_misc
http://www.autistici.org/fdonato/advisory/FastStone4in1Browser1.2-adv.txt
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111213034206802&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/19900
Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/12937
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/14743
Scores
EPSS
0.0777
EPSS Percentile
92.0%
Details
Status
published
Products (1)
faststone/4in1_browser
1.2
Published
Mar 29, 2005
Tracked Since
Feb 18, 2026