Absolute path traversal vulnerability in MLDonkey 2.8.4 through 2.9.7 allows remote attackers to read arbitrary files via a leading "//" (double slash) in the filename.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://www.exploit-db.com/exploits/8097 | exploit x_refsource_EXPLOIT-DB |
| https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00542.html | vendor-advisory x_refsource_FEDORA |
| http://secunia.com/advisories/34008 | third-party-advisory x_refsource_SECUNIA |
| https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00617.html | vendor-advisory x_refsource_FEDORA |
| http://secunia.com/advisories/34436 | third-party-advisory x_refsource_SECUNIA |
| http://www.openwall.com/lists/oss-security/2009/02/23/1 | mailing-list x_refsource_MLIST |
| http://savannah.nongnu.org/bugs/?25667 | x_refsource_CONFIRM |
| http://www.gentoo.org/security/en/glsa/glsa-200903-36.xml | vendor-advisory x_refsource_GENTOO |
| http://www.securityfocus.com/bid/33865 | vdb-entry x_refsource_BID |
| http://secunia.com/advisories/34345 | third-party-advisory x_refsource_SECUNIA |
| http://www.debian.org/security/2009/dsa-1739 | vendor-advisory x_refsource_DEBIAN |
| http://secunia.com/advisories/34306 | third-party-advisory x_refsource_SECUNIA |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|