First published: Fri Nov 04 2005(Updated: )
Directory traversal vulnerability in the web server in Asus Video Security 3.5.0.0 and earlier allows remote attackers to read arbitrary files via "../" or "..\" sequences in the URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Video Security Online | <=3.5.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3490 is considered a moderate severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2005-3490, upgrade Asus Video Security to version 3.5.0.1 or later where the vulnerability has been patched.
CVE-2005-3490 can allow remote attackers to read sensitive files on the server, leading to potential data exposure.
CVE-2005-3490 remains exploitable in versions 3.5.0.0 and earlier of Asus Video Security, making older installations vulnerable.
Users of Asus Video Security version 3.5.0.0 and earlier are affected by CVE-2005-3490.