This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Super-M First view 2003-06-30
Product Son Hserver Last view 2003-06-30
Version 0.2 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:super-m:son_hserver

Activity : Overall

Related : CVE

  Date Alert Description
5 2003-06-30 CVE-2003-0417

Directory traversal vulnerability in Son hServer 0.2 allows remote attackers to read arbitrary files via ".|." (modified dot-dot) sequences.

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-78 Using Escaped Slashes in Alternate Encoding
CAPEC-79 Using Slashes in Alternate Encoding
CAPEC-80 Using UTF-8 Encoding to Bypass Validation Logic

Open Source Vulnerability Database (OSVDB)

id Description
4662 Son hServer URI Traversal Arbitrary File/Directory Access

Nessus® Vulnerability Scanner

id Description
2003-06-02 Name: Super-M Son hServer is vulnerable to information disclosure.
File: superm_son_hserver_traversal.nasl - Type: ACT_GATHER_INFO