Vulnerabilities > CVE-2004-1646 - Multiple vulnerability in Jerod Moemeka Xedus 1.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
Directory traversal vulnerability in Xedus 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Xedus Web Server 1.0 Traversal Arbitrary File Access. CVE-2004-1646. Remote exploit for windows platform |
id | EDB-ID:24419 |
last seen | 2016-02-02 |
modified | 2004-09-30 |
published | 2004-09-30 |
reporter | James Bercegay |
source | https://www.exploit-db.com/download/24419/ |
title | Xedus Web Server 1.0 Traversal Arbitrary File Access |
Nessus
NASL family | Peer-To-Peer File Sharing |
NASL id | XEDUS_DIR_TRAVERSAL.NASL |
description | The remote host runs Xedus Peer-to-Peer web server. This version is vulnerable to directory traversal. An attacker could send a specially crafted URL to view arbitrary files on the system. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14645 |
published | 2004-09-03 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14645 |
title | Xedus Web Server Traversal Arbitrary File Access |
code |
|