CVE-2010-4181

Yaws - Path Traversal

Title source: rule
STIX 2.1

Description

Directory traversal vulnerability in Yaws 1.89 allows remote attackers to read arbitrary files via ..\ (dot dot backslash) and other sequences.

Exploits (1)

exploitdb WORKING POC
by nitr0us · textremotewindows
https://www.exploit-db.com/exploits/15371

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/62917
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/42066
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/15371
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/68962
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2010/2858
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/44564

Scores

EPSS 0.0830
EPSS Percentile 92.3%

Details

CWE
CWE-22
Status published
Products (1)
yaws/yaws 1.89
Published Nov 04, 2010
Tracked Since Feb 18, 2026