The HTTP service in EServ/3 3.25 allows remote attackers to obtain sensitive information via crafted HTTP requests containing dot, space, and slash characters, which reveals the source code of script files.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 00:11
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/20059 - Patch, Vendor Advisory | |
| References | () http://secunia.com/secunia_research/2006-37/advisory/ - Vendor Advisory | |
| References | () http://securityreason.com/securityalert/1006 - | |
| References | () http://www.eserv.ru/ru/news/news_detail.php?ID=235 - Patch | |
| References | () http://www.securityfocus.com/archive/1/435415/100/0/threaded - | |
| References | () http://www.securityfocus.com/bid/18179 - Patch | |
| References | () http://www.vupen.com/english/advisories/2006/2066 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26741 - | 
Information
                Published : 2006-06-02 00:02
Updated : 2025-04-03 01:03
NVD link : CVE-2006-2309
Mitre link : CVE-2006-2309
CVE.ORG link : CVE-2006-2309
JSON object : View
Products Affected
                etype
- eserv
 
CWE
                