MDaemon 8.0 – Content Filter Directory Traversal

MDaemon 8.0 – Content Filter Directory Traversal

漏洞ID 1055291 漏洞类型
发布时间 2005-07-27 更新时间 2005-07-27
图片[1]-MDaemon 8.0 – Content Filter Directory Traversal-安全小百科CVE编号 N/A
图片[2]-MDaemon 8.0 – Content Filter Directory Traversal-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/26044
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/14400/info

MDaemon server is prone to a directory traversal vulnerability due to improper sanitization of user input.

Failure to sanitize the filename and path may result in compromise of the file system outside of the application's quarantine directory. 

The following email attachment filename example was provided:

'../../../../../file.exe'

相关推荐: Legato NetWorker NSR_Shutdown脚本临时文件符号链接攻击漏洞

Legato NetWorker NSR_Shutdown脚本临时文件符号链接攻击漏洞 漏洞ID 1202205 漏洞类型 后置链接 发布时间 2003-12-31 更新时间 2003-12-31 CVE编号 CVE-2003-1528 CNNVD-ID CN…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享