5
CVSSv2

CVE-2004-0302

Published: 23/11/2004 Updated: 11/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 515
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in OWLS 1.0 allows remote malicious users to read arbitrary files via a .. (dot dot) in the (1) file parameter in index.php, (2) editfile in glossary.php, or (3) editfile in newmultiplechoice.php.

Vulnerable Product Search on Vulmon Subscribe to Product

fools workshop owls workshop 1.0

Exploits

source: wwwsecurityfocuscom/bid/9689/info Owl's Workshop is reported prone to multiple remote file-disclosure vulnerabilities because the application fails to validate user-supplied input passed via a URI parameter Upon successful exploitation of these issues, an attacker may be able to gain access to sensitive system files, potentiall ...
source: wwwsecurityfocuscom/bid/9689/info Owl's Workshop is reported prone to multiple remote file-disclosure vulnerabilities because the application fails to validate user-supplied input passed via a URI parameter Upon successful exploitation of these issues, an attacker may be able to gain access to sensitive system files, potenti ...
source: wwwsecurityfocuscom/bid/9689/info Owl's Workshop is reported prone to multiple remote file-disclosure vulnerabilities because the application fails to validate user-supplied input passed via a URI parameter Upon successful exploitation of these issues, an attacker may be able to gain access to sensitive system files, potential ...