|
|
CVE-ID | ||
---|---|---|
CVE-2001-0562 |
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
|
Description | ||
a1disp.cgi program in Drummond Miles A1Stats prior to 1.6 allows a remote attacker to execute commands via a specially crafted URL which includes shell metacharacters. | ||
References | ||
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete. | ||
|
||
Assigning CNA | ||
MITRE Corporation | ||
Date Record Created | ||
20010727 | Disclaimer: The record creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE. | |
Phase (Legacy) | ||
Proposed (20010727) | ||
Votes (Legacy) | ||
ACCEPT(3) Cole, Frech, Ziese NOOP(4) Bishop, Christey, Foat, Wall |
||
Comments (Legacy) | ||
Frech> CONFIRM:http://www.gadnet.com/cgi-bin/ultimatebb.cgi?ubb=get_topic&f=1 5&t=000008 Statement of fix is ambiguous: A major security flaw in the scripts has now been fixed. For obvious reasons the details of the flaw will not be posted here. Site lists their product as A1-Stats, not A1Stats as in description. CHANGE> [Bishop changed vote from REVIEWING to NOOP] Christey> The URL recommended by Andre is *probably* addressing this problem, but it's not quite certain. There is insufficient detail to determine if the vendor has truly acknowledged the problem. I have an email to a1stats@gadnet.com to see if I can confirm. This is affected by CD:SF-EXEC since multiple executables in the same package are affected (a1disp.cgi, a1disp2.cgi, a1disp4.cgi, and a1disp3.cgi). Christey> Received confirmation via email, 2/26/2002. |
||
Proposed (Legacy) | ||
20010727 | ||
This is an record on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. | ||
You can also search by reference using the CVE Reference Maps.
|
||
For More Information: CVE Request Web Form (select "Other" from dropdown) |