eyeOS 2.2.0.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by apps/rmail/webmail/program/lib/Net/SMTP.php and certain other files.
References
Configurations
Information
Published : 2011-09-23 16:55
Updated : 2012-03-11 21:00
NVD link : CVE-2011-3737
Mitre link : CVE-2011-3737
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
eyeos
- eyeos