ID CVE-2006-0949
Summary RaidenHTTPD 1.1.47 allows remote attackers to obtain source code of script files, including PHP, via crafted requests involving (1) "." (dot), (2) space, and (3) "/" (slash) characters. This vulnerability affects RaidenHTTPD, RaidenHTTPD version 1.1.47 and may affect all previous versions.
References
Vulnerable Configurations
  • cpe:2.3:a:raidenhttpd:raidenhttpd:1.1.47:*:*:*:*:*:*:*
    cpe:2.3:a:raidenhttpd:raidenhttpd:1.1.47:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 20-07-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 16934
misc http://secunia.com/secunia_research/2006-15/advisory/
osvdb 23616
secunia 19032
vupen ADV-2006-0807
xf raidenhttpd-extension-obtain-information(25037)
Last major update 20-07-2017 - 01:30
Published 06-03-2006 - 21:02
Last modified 20-07-2017 - 01:30
Back to Top