Dwarf HTTP Server 1.3.2 allows remote attackers to obtain the source code of JSP files via (1) dot, (2) space, (3) slash, or (4) NULL characters in the filename extension of an HTTP request.
References
Configurations
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18962 - Patch, Vendor Advisory | |
References | () http://secunia.com/secunia_research/2006-13/advisory - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/576 - | |
References | () http://securitytracker.com/id?1015779 - | |
References | () http://www.osvdb.org/23836 - | |
References | () http://www.securityfocus.com/archive/1/427478/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17123 - | |
References | () http://www.vupen.com/english/advisories/2006/0937 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25178 - |
Information
Published : 2006-03-13 19:34
Updated : 2024-11-21 00:07
NVD link : CVE-2006-0819
Mitre link : CVE-2006-0819
CVE.ORG link : CVE-2006-0819
JSON object : View
Products Affected
gnome
- dwarf_http_server
CWE