CVE-2005-3484

Directory traversal vulnerability in NeroNET 1.2.0.2 and earlier allows remote attackers to read arbitrary files with certain file extensions (such as ZIP, AVI, JPG, TXT, and HTML) via ".." and hex-encoded (1) slash "/" ("%2f") or (2) backslash "\" ("%5c") sequences.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nero:neronet:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:02

Type Values Removed Values Added
References () http://aluigi.altervista.org/adv/neronet-adv.txt - Exploit, Vendor Advisory () http://aluigi.altervista.org/adv/neronet-adv.txt - Exploit, Vendor Advisory
References () http://marc.info/?l=full-disclosure&m=113096009930152&w=2 - () http://marc.info/?l=full-disclosure&m=113096009930152&w=2 -
References () http://secunia.com/advisories/17421 - () http://secunia.com/advisories/17421 -
References () http://www.securityfocus.com/bid/15288 - () http://www.securityfocus.com/bid/15288 -
References () http://www.vupen.com/english/advisories/2005/2287 - () http://www.vupen.com/english/advisories/2005/2287 -

Information

Published : 2005-11-03 22:02

Updated : 2024-11-21 00:02


NVD link : CVE-2005-3484

Mitre link : CVE-2005-3484

CVE.ORG link : CVE-2005-3484


JSON object : View

Products Affected

nero

  • neronet