SQLQHit.asp sample file in Microsoft Index Server 2.0 allows remote attackers to obtain sensitive information such as the physical path, file attributes, or portions of source code by directly calling sqlqhit.asp with a CiScope parameter set to (1) webinfo, (2) extended_fileinfo, (3) extended_webinfo, or (4) fileinfo.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/214217 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/3339 | Exploit Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7125 | |
http://www.securityfocus.com/archive/1/214217 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/3339 | Exploit Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7125 |
Configurations
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/214217 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/3339 - Exploit, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/7125 - |
Information
Published : 2001-09-14 04:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-0986
Mitre link : CVE-2001-0986
CVE.ORG link : CVE-2001-0986
JSON object : View
Products Affected
microsoft
- index_server
CWE