First published: Fri Dec 31 2004(Updated: )
NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to obtain sensitive information via HTTP requests that (a) specify the / URI, (b) specify the /scripts/ URI, or (c) specify a non-existent file, which reveal the path in an error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetWin SurgeMail | =1.3d | |
NetWin SurgeMail | =1.1a | |
NetWin SurgeMail | =1.8e | |
NetWin SurgeMail | =1.6e2 | |
NetWin SurgeMail | =1.3i | |
NetWin SurgeMail | =1.3c | |
NetWin SurgeMail | =1.3b | |
NetWin SurgeMail | =1.1d | |
NetWin SurgeMail | =1.3l | |
NetWin SurgeMail | =1.7b3 | |
NetWin SurgeMail | =1.5f | |
NetWin SurgeMail | =1.6e | |
NetWin SurgeMail | =1.6d | |
NetWin SurgeMail | =1.4c | |
NetWin SurgeMail | =1.3k | |
NetWin SurgeMail | =1.3a_rc1 | |
NetWin SurgeMail | =1.5d2 | |
NetWin SurgeMail | =1.2a | |
NetWin SurgeMail | =1.6a | |
NetWin Webmail | =3.1d | |
NetWin SurgeMail | =1.5a | |
NetWin SurgeMail | =1.3g | |
NetWin SurgeMail | =1.5c | |
NetWin SurgeMail | =1.0d | |
NetWin SurgeMail | =1.3f | |
NetWin SurgeMail | =1.3h | |
NetWin SurgeMail | =1.1c | |
NetWin SurgeMail | =1.2b | |
NetWin SurgeMail | =1.5b | |
NetWin SurgeMail | =1.4b | |
NetWin SurgeMail | =1.1b | |
NetWin SurgeMail | =1.0c | |
NetWin SurgeMail | =1.8d | |
NetWin SurgeMail | =1.8b3 | |
NetWin SurgeMail | =1.7a | |
NetWin SurgeMail | =1.3a | |
NetWin SurgeMail | =1.4a | |
NetWin SurgeMail | =1.8g3 | |
NetWin SurgeMail | =1.8a | |
NetWin SurgeMail | =2.0a2 | |
NetWin SurgeMail | =1.3j | |
NetWin SurgeMail | =1.6b | |
NetWin SurgeMail | =1.3e | |
NetWin SurgeMail | =1.9b2 | |
NetWin SurgeMail | =1.5d | |
NetWin SurgeMail | =1.2c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.