Mongoose 2.8.0 and earlier allows remote attackers to obtain the source code for a web page by appending a / (slash) character to the URI.
References
Link | Resource |
---|---|
http://freetexthost.com/0lcsrgt3vw | Exploit URL Repurposed |
http://pocoftheday.blogspot.com/2009/10/mongoose-web-server-v280-remote-source_22.html | Exploit |
http://secunia.com/advisories/36934 | Vendor Advisory |
http://freetexthost.com/0lcsrgt3vw | Exploit URL Repurposed |
http://pocoftheday.blogspot.com/2009/10/mongoose-web-server-v280-remote-source_22.html | Exploit |
http://secunia.com/advisories/36934 | Vendor Advisory |
Configurations
History
21 Nov 2024, 01:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://freetexthost.com/0lcsrgt3vw - Exploit, URL Repurposed | |
References | () http://pocoftheday.blogspot.com/2009/10/mongoose-web-server-v280-remote-source_22.html - Exploit | |
References | () http://secunia.com/advisories/36934 - Vendor Advisory |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://freetexthost.com/0lcsrgt3vw - Exploit, URL Repurposed |
Information
Published : 2009-12-31 19:30
Updated : 2024-11-21 01:09
NVD link : CVE-2009-4535
Mitre link : CVE-2009-4535
CVE.ORG link : CVE-2009-4535
JSON object : View
Products Affected
valenok
- mongoose
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor