AN HTTPD 1.42n, and possibly other versions before 1.42p, allows remote attackers to obtain source code of scripts via crafted requests with (1) dot and (2) space characters in the file extension.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/19326 - Patch, Vendor Advisory | |
References | () http://secunia.com/secunia_research/2006-21/advisory - Vendor Advisory | |
References | () http://securitytracker.com/id?1015858 - | |
References | () http://www.osvdb.org/24323 - | |
References | () http://www.securityfocus.com/archive/1/429667/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17350 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/1200 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25591 - |
Information
Published : 2006-04-03 17:04
Updated : 2024-11-21 00:09
NVD link : CVE-2006-1598
Mitre link : CVE-2006-1598
CVE.ORG link : CVE-2006-1598
JSON object : View
Products Affected
an
- an-httpd
CWE