MailPost 5.1.1sv, and possibly earlier versions, when debug mode is enabled, allows remote attackers to gain sensitive information via the debug parameter, which reveals information such as the path to the web root and the web server version.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/858726 | Third Party Advisory US Government Resource |
http://www.procheckup.com/security_info/vuln_pr0409.html | |
http://www.securityfocus.com/bid/11595 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17952 | |
http://www.kb.cert.org/vuls/id/858726 | Third Party Advisory US Government Resource |
http://www.procheckup.com/security_info/vuln_pr0409.html | |
http://www.securityfocus.com/bid/11595 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17952 |
Configurations
History
20 Nov 2024, 23:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/858726 - Third Party Advisory, US Government Resource | |
References | () http://www.procheckup.com/security_info/vuln_pr0409.html - | |
References | () http://www.securityfocus.com/bid/11595 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17952 - |
Information
Published : 2005-01-10 05:00
Updated : 2024-11-20 23:50
NVD link : CVE-2004-1103
Mitre link : CVE-2004-1103
CVE.ORG link : CVE-2004-1103
JSON object : View
Products Affected
tips
- mailpost
CWE