CVE-2004-1103

MailPost 5.1.1sv, and possibly earlier versions, when debug mode is enabled, allows remote attackers to gain sensitive information via the debug parameter, which reveals information such as the path to the web root and the web server version.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tips:mailpost:5.1.1_sv:*:*:*:*:*:*:*

History

20 Nov 2024, 23:50

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/858726 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/858726 - Third Party Advisory, US Government Resource
References () http://www.procheckup.com/security_info/vuln_pr0409.html - () http://www.procheckup.com/security_info/vuln_pr0409.html -
References () http://www.securityfocus.com/bid/11595 - Vendor Advisory () http://www.securityfocus.com/bid/11595 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17952 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17952 -

Information

Published : 2005-01-10 05:00

Updated : 2024-11-20 23:50


NVD link : CVE-2004-1103

Mitre link : CVE-2004-1103

CVE.ORG link : CVE-2004-1103


JSON object : View

Products Affected

tips

  • mailpost