The (1) function.php or (2) function.view.php scripts in Merak Mail Server 5.2.7 allow remote attackers to read arbitrary PHP files via a direct HTTP request to port 32000.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=109279057326044&w=2 | |
http://packetstormsecurity.nl/0408-exploits/merak527.txt | Patch Vendor Advisory |
http://secunia.com/advisories/12269 | Patch Vendor Advisory |
http://securitytracker.com/id?1010969 | |
http://www.osvdb.org/9045 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/10966 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17029 | |
http://marc.info/?l=bugtraq&m=109279057326044&w=2 | |
http://packetstormsecurity.nl/0408-exploits/merak527.txt | Patch Vendor Advisory |
http://secunia.com/advisories/12269 | Patch Vendor Advisory |
http://securitytracker.com/id?1010969 | |
http://www.osvdb.org/9045 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/10966 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17029 |
Configurations
History
20 Nov 2024, 23:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=109279057326044&w=2 - | |
References | () http://packetstormsecurity.nl/0408-exploits/merak527.txt - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/12269 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1010969 - | |
References | () http://www.osvdb.org/9045 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/10966 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17029 - |
Information
Published : 2004-08-17 04:00
Updated : 2024-11-20 23:51
NVD link : CVE-2004-1721
Mitre link : CVE-2004-1721
CVE.ORG link : CVE-2004-1721
JSON object : View
Products Affected
merak
- mail_server
CWE