NetworkActiv Web Server 3.5.15 allows remote attackers to read script source code via a crafted URL with a "/" (forward slash) after the file extension.
References
Configurations
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18947 - Patch, Vendor Advisory | |
References | () http://secunia.com/secunia_research/2006-10/advisory - Patch, Vendor Advisory | |
References | () http://www.networkactiv.com/WebServer.html - | |
References | () http://www.securityfocus.com/archive/1/426461/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16895 - | |
References | () http://www.vupen.com/english/advisories/2006/0783 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24979 - |
Information
Published : 2006-03-06 23:02
Updated : 2025-04-03 01:03
NVD link : CVE-2006-0815
Mitre link : CVE-2006-0815
CVE.ORG link : CVE-2006-0815
JSON object : View
Products Affected
networkactiv
- networkactiv_web_server
CWE