TOPo 1.43 allows remote attackers to obtain sensitive information by sending an HTTP request with an invalid parameter to (1) in.php or (2) out.php, which reveals the path to the TOPo directory in the error message.
References
Configurations
History
20 Nov 2024, 23:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2003-02/0049.html - Patch | |
References | () http://secunia.com/advisories/8008 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/6768 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/11248 - |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:47
NVD link : CVE-2003-1409
Mitre link : CVE-2003-1409
CVE.ORG link : CVE-2003-1409
JSON object : View
Products Affected
ej3
- topo
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor