Description
Absolute path traversal vulnerability in the FTP server in MicroWorld eScan Corporate Edition 9.0.742.98 and eScan Management Console (aka eScan Server) 9.0.742.1 allows remote attackers to read arbitrary files via an absolute pathname in the RETR (get) command.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Luigi Auriemma · textremotewindows
https://www.exploit-db.com/exploits/31345
References (6)
Core 6
Core References
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3723
Exploit, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29246
Exploit x_refsource_misc
http://aluigi.altervista.org/adv/escaz-adv.txt
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/28127
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/489228/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41033
Scores
EPSS
0.0528
EPSS Percentile
90.0%
Details
CWE
CWE-22
Status
published
Products (3)
microworld_technologies/escan
9.0.742.98
microworld_technologies/escan_management_console
9.0.742.1
microworld_technologies/escan_server
9.0.742.1
Published
Mar 10, 2008
Tracked Since
Feb 18, 2026