JaguarEditControl (JEdit) ActiveX Control 1.1.0.20 and earlier allows remote attackers to obtain sensitive information, such as the username and MAC and IP addresses, by setting the test field to certain values such as 2404 or 2790, then reading the information from the .JText field.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20759 - Exploit, Vendor Advisory | |
References | () http://securityreason.com/securityalert/1145 - | |
References | () http://www.securityfocus.com/archive/1/437937/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18576 - Exploit | |
References | () http://www.srlabs.net/bulten/JaguarEdit_2.htm - Exploit, Vendor Advisory | |
References | () http://www.srlabs.net/bulten/source/Jaguar.htm - | |
References | () http://www.vupen.com/english/advisories/2006/2489 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27290 - |
Information
Published : 2006-06-24 01:06
Updated : 2025-04-03 01:03
NVD link : CVE-2006-3217
Mitre link : CVE-2006-3217
CVE.ORG link : CVE-2006-3217
JSON object : View
Products Affected
jaguarsoft
- jaguaredit
CWE