CVE-2002-0418
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Directory traversal vulnerability in the com.endymion.sake.servlet.mail.MailServlet servlet for Endymion SakeMail 1.0.36 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) and a null character in the param_name parameter..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- Partial
- Availability Impact
- None
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:endymion:sake_mail:1.0.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.21:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.22:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.23:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.29:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.30:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.31:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.33:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.34:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.24:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.27:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.35:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.26:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.28:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:endymion:sake_mail:1.0.36:*:*:*:*:*:*:* |
Yes
|
- | - |
References
Get started for free to scan for vulnerabilites.
Download Mageni. It is free to get started and can be installed in Windows, macOS and Linux.