Vulnerabilities > CVE-2001-0272 - Unspecified vulnerability in W3.Org Sendtemp.Pl
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Directory traversal vulnerability in sendtemp.pl in W3.org Anaya Web development server allows remote attackers to read arbitrary files via a .. (dot dot) attack in the templ parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | sendtemp.pl Read Access to Files. CVE-2001-0272. Webapps exploit for cgi platform |
id | EDB-ID:289 |
last seen | 2016-01-31 |
modified | 2001-03-04 |
published | 2001-03-04 |
reporter | Tom Parker |
source | https://www.exploit-db.com/download/289/ |
title | sendtemp.pl Read Access to Files |
Nessus
NASL family | CGI abuses |
NASL id | SENDTEMP.NASL |
description | The |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10614 |
published | 2001-02-15 |
reporter | This script is Copyright (C) 2001-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10614 |
title | W3.org Anaya Web sendtemp.pl 'templ' Parameter Traversal Arbitrary File Access |
code |
|