Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
real time logic barracudadrive web server 3.7.2 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2007-6314
BarracudaDrive Web Server prior to 3.8 allows remote malicious users to read the source code for web scripts by appending a (1) + (plus), (2) . (dot), or (3) %80 and similar characters to the file name in the URL.
Real Time Logic Barracudadrive Web Server Home Server 3.7.2
Real Time Logic Barracudadrive Web Server 3.7.2
1 EDB exploit
4
CVSSv2
CVE-2007-6315
Group Chat in BarracudaDrive Web Server prior to 3.8 allows remote authenticated users to cause a denial of service (crash) via a HTTP request to /eh/chat.ehintf/C. that does not contain a Connection ID, which results in a NULL pointer dereference.
Real Time Logic Barracudadrive Web Server 3.7.2
Real Time Logic Barracudadrive Web Server Home Server 3.7.2
1 EDB exploit
4.3
CVSSv2
CVE-2007-6316
Cross-site scripting (XSS) vulnerability in BarracudaDrive Web Server prior to 3.8 allows remote malicious users to inject arbitrary web script or HTML via the URI path in an HTTP GET request, which is activated by administrators viewing log files via the Trace page.
Real Time Logic Barracudadrive Web Server 3.7.2
Real Time Logic Barracudadrive Web Server Home Server 3.7.2
1 EDB exploit
5.5
CVSSv2
CVE-2007-6317
Multiple directory traversal vulnerabilities in BarracudaDrive Web Server prior to 3.8 allow (1) remote malicious users to read arbitrary files via certain ..\ (dot dot backslash) sequences in the URL path, or (2) remote authenticated users to delete arbitrary files or create arb...
Real Time Logic Barracudadrive Web Server Home Server 3.7.2
Real Time Logic Barracudadrive Web Server 3.7.2
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started