CVE-2006-1771

SAXoTECH SAXoPRESS - Path Traversal

Title source: llm
STIX 2.1

Description

Directory traversal vulnerability in misc in pbcs.dll in SAXoTECH SAXoPRESS, aka Saxotech Online (formerly Publicus) allows remote attackers to read arbitrary files and possibly execute arbitrary programs via a .. (dot dot) in the url parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by SecuriTeam · textremotewindows
https://www.exploit-db.com/exploits/27627

References (6)

Core 6
Core References
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1327
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/431037/30/5580/threaded
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/17474
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19566
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25768
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/430707/100/0/threaded

Scores

EPSS 0.0466
EPSS Percentile 89.4%

Details

Status published
Products (1)
saxotech/saxopress
Published Apr 13, 2006
Tracked Since Feb 18, 2026