Vulnerabilities > CVE-2005-0481 - Remote vulnerability in TrackerCam
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
TrackerCam 5.12 and earlier allows remote attackers to read log files via the fn parameter in a direct request to the ComGetLogFile.php3 script.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | TRACKERCAM_MULTIPLE_VULNERABILITIES.NASL |
description | The remote host is running TrackerCam, a HTTP software that allows a user to publish a webcam feed thru a website. The remote version of this software is affected by multiple vulnerabilities : - Buffer overflows which may allow an attacker to execute arbitrary code on the remote host. - A directory traversal bug that may allow an attacker to read arbitrary files on the remote host with the privileges of the web server daemon. - A cross-site scripting issue that may allow an attacker to use the remote host to perform a cross-site scripting attack. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 17160 |
published | 2005-02-21 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/17160 |
title | TrackerCam Multiple Remote Vulnerabilities |