Microsoft : Security Vulnerabilities Published In 2004 (Directory traversal)
Directory traversal vulnerability in Microsoft cabarc allows remote attackers to overwrite files via "../" sequences in file names in a CAB archive.
Max Base Score | 3.7 |
Published | 2004-12-31 |
Updated | 2017-07-20 |
EPSS | 0.37% |
Directory traversal vulnerability in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious FTP servers to overwrite arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command.
Max Base Score | 5.0 |
Published | 2004-12-30 |
Updated | 2021-07-23 |
EPSS | 96.01% |
The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability."
Max Base Score | 9.8 |
Published | 2004-11-03 |
Updated | 2018-10-12 |
EPSS | 93.98% |
Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
Max Base Score | 7.5 |
Published | 2004-08-06 |
Updated | 2018-10-12 |
EPSS | 96.42% |
Internet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475.
Max Base Score | 7.5 |
Published | 2004-06-14 |
Updated | 2021-07-23 |
EPSS | 30.78% |
Microsoft Internet Explorer allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Internet Explorer to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.
Max Base Score | 7.5 |
Published | 2004-04-15 |
Updated | 2021-07-23 |
EPSS | 1.22% |
6 vulnerabilities found