CVE-2006-0949
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/03/2006
Last modified:
03/04/2025
Description
RaidenHTTPD 1.1.47 allows remote attackers to obtain source code of script files, including PHP, via crafted requests involving (1) "." (dot), (2) space, and (3) "/" (slash) characters.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:raidenhttpd:raidenhttpd:1.1.47:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/19032
- http://secunia.com/secunia_research/2006-15/advisory/
- http://www.osvdb.org/23616
- http://www.securityfocus.com/bid/16934
- http://www.vupen.com/english/advisories/2006/0807
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25037
- http://secunia.com/advisories/19032
- http://secunia.com/secunia_research/2006-15/advisory/
- http://www.osvdb.org/23616
- http://www.securityfocus.com/bid/16934
- http://www.vupen.com/english/advisories/2006/0807
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25037