Orion Application Server before 2.0.7, when running on Windows, allows remote attackers to obtain the source code of JSP files via (1) . (dot) and (2) space characters in the extension of a URL.
References
Configurations
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1455.html - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/18950 - Third Party Advisory | |
References | () http://secunia.com/secunia_research/2006-11/advisory/ - Third Party Advisory | |
References | () http://securitytracker.com/id?1015823 - Third Party Advisory, VDB Entry | |
References | () http://www.osvdb.org/24053 - Broken Link | |
References | () http://www.securityfocus.com/archive/1/428601/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17204 - Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2006/1055 - Broken Link, Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25405 - Third Party Advisory, VDB Entry |
Information
Published : 2006-03-24 11:02
Updated : 2024-11-21 00:07
NVD link : CVE-2006-0816
Mitre link : CVE-2006-0816
CVE.ORG link : CVE-2006-0816
JSON object : View
Products Affected
orionserver
- orion_application_server
CWE