Easy Chat Server 2.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download certain files via direct requests to files such as (1) ServerKey.pem and (2) AcceptIP.txt. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
References
Link | Resource |
---|---|
http://secunia.com/advisories/22739 | Exploit Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30075 | |
http://secunia.com/advisories/22739 | Exploit Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30075 |
Configurations
History
21 Nov 2024, 00:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/22739 - Exploit, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30075 - |
Information
Published : 2007-01-16 23:28
Updated : 2024-11-21 00:23
NVD link : CVE-2006-6933
Mitre link : CVE-2006-6933
CVE.ORG link : CVE-2006-6933
JSON object : View
Products Affected
efs_software
- easy_chat_server
CWE