Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-0466
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Hosting Controller 1.4.1 and earlier allows remote attackers to browse arbitrary directories via a full C: style pathname in the filepath arguments to (1) Statsbrowse.asp, (2) servubrowse.asp, (3) browsedisk.asp, (4) browsewebalizerexe.asp, or (5) sqlbrowse.asp.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Hosting Controller目录可浏览漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Hosting Controller是一个Windows平台下的一体化的虚拟主机管理软件。它可以使所有网站管理活动自动化,并且给予每个Web托管的用户所需要的权限,以管理他们自己的Web网站。 Hosting Controller设计上存在漏洞,可以使远程攻击者浏览主机上任意目录,查看目录下有哪些文件。 如果向发往Hosting Controller的某些ASP程序的请求中加入"filepath=驱动器号:\",攻击者就可以列出那个驱动器下的目录和文件信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-0466
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-0466
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2002-0466

No comments yet


Leave a comment