Directory traversal vulnerability in NeroNET 1.2.0.2 and earlier allows remote attackers to read arbitrary files with certain file extensions (such as ZIP, AVI, JPG, TXT, and HTML) via ".." and hex-encoded (1) slash "/" ("%2f") or (2) backslash "\" ("%5c") sequences.
References
Configurations
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/neronet-adv.txt - Exploit, Vendor Advisory | |
References | () http://marc.info/?l=full-disclosure&m=113096009930152&w=2 - | |
References | () http://secunia.com/advisories/17421 - | |
References | () http://www.securityfocus.com/bid/15288 - | |
References | () http://www.vupen.com/english/advisories/2005/2287 - |
Information
Published : 2005-11-03 22:02
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3484
Mitre link : CVE-2005-3484
CVE.ORG link : CVE-2005-3484
JSON object : View
Products Affected
nero
- neronet
CWE