First published: Tue Mar 31 2015(Updated: )
EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Embedthis GoAhead | =3.0.0 | |
Embedthis GoAhead | =3.3.1 | |
Embedthis GoAhead | =3.3.2 | |
Embedthis GoAhead | =3.3.3 | |
Embedthis GoAhead | =3.3.4 | |
Embedthis GoAhead | =3.3.5 | |
Embedthis GoAhead | =3.3.6 | |
Embedthis GoAhead | =3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.