The HTTP service in EServ/3 3.25 allows remote attackers to obtain sensitive information via crafted HTTP requests containing dot, space, and slash characters, which reveals the source code of script files.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20059 - Patch, Vendor Advisory | |
References | () http://secunia.com/secunia_research/2006-37/advisory/ - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1006 - | |
References | () http://www.eserv.ru/ru/news/news_detail.php?ID=235 - Patch | |
References | () http://www.securityfocus.com/archive/1/435415/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18179 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/2066 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26741 - |
Information
Published : 2006-06-02 00:02
Updated : 2024-11-21 00:11
NVD link : CVE-2006-2309
Mitre link : CVE-2006-2309
CVE.ORG link : CVE-2006-2309
JSON object : View
Products Affected
etype
- eserv
CWE