Vulnerabilities > CVE-2000-0975 - Unspecified vulnerability in Anaconda Partners Foundation Directory
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
Directory traversal vulnerability in apexec.pl in Anaconda Foundation Directory allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Anaconda Foundation 1.4-1.9 Directory Traversal Vulnerability. CVE-2000-0975 . Remote exploit for cgi platform |
id | EDB-ID:20611 |
last seen | 2016-02-02 |
modified | 2000-10-13 |
published | 2000-10-13 |
reporter | pestilence |
source | https://www.exploit-db.com/download/20611/ |
title | anaconda foundation 1.4-1.9 - Directory Traversal Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | ANACONDA.NASL |
description | The remote Anaconda Foundation Directory contains a flaw that allows anyone to read arbitrary files with root (super-user) privileges, by embedding a null byte in a URL. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10536 |
published | 2000-10-14 |
reporter | This script is Copyright (C) 2000-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10536 |
title | Anaconda Foundation Directory apexec.pl template Parameter Traversal Arbitrary File Retrieval |
code |
|