Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:10365
Category:CGI abuses
Title:Windmail.exe allows any user to execute arbitrary commands
The 'windmail.exe' CGI is installed.

Some versions of this CGI script have a security flaw that lets
an attacker execute arbitrary commands on the remote server.

To test this, make the following request :

GET /cgi-bin/windmail.exe?-n%20c:\

(replace by your real email address).

If you receive the content of the file boot.ini,
then your server is vulnerable.

Solution : remove it from /cgi-bin. See
for a new version.

Risk factor : High

Cross-Ref: BugTraq ID: 1073
Common Vulnerability Exposure (CVE) ID: CVE-2000-0242
Bugtraq: 20000325 Windmail allow web user get any file (Google Search)
XForce ISS Database: windmail-fileread
XForce ISS Database: windmail-pipe-command
CopyrightThis script is Copyright (C) 2000 Renaud Deraison

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2024 E-Soft Inc. All rights reserved.