Vulnerabilities > CVE-1999-0196 - Unspecified vulnerability in Webgais Development Team Webgais 1.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
websendmail in Webgais 1.0 allows a remote user to access arbitrary files and execute arbitrary code via the receiver parameter ($VAR_receiver variable).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | WEBgais 1.0 websendmail Remote Command Execution Vulnerability. CVE-1999-0196. Remote exploit for cgi platform |
id | EDB-ID:20483 |
last seen | 2016-02-02 |
modified | 1997-07-04 |
published | 1997-07-04 |
reporter | Razvan Dragomirescu |
source | https://www.exploit-db.com/download/20483/ |
title | WEBgais 1.0 websendmail Remote Command Execution Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | WEBSENDMAIL.NASL |
description | The |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10301 |
published | 1999-06-22 |
reporter | This script is Copyright (C) 1999-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10301 |
title | WebGais websendmail CGI Arbitrary Command Execution |
code |
|