Description
EmuLive Server4 Commerce Edition Build 7560 allows remote attackers to bypass authentication for the remote administration feature via a URL that contains an extra leading / (slash).
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by GulfTech Security · textdoscgi
https://www.exploit-db.com/exploits/24619
References (5)
Core 5
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=109577497718374&w=2
Vendor Advisory x_refsource_misc
http://www.gulftech.org/?node=research&article_id=00051-09202004
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/12616
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/17450
Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/11226
Scores
EPSS
0.0827
EPSS Percentile
92.3%
Details
Status
published
Products (1)
emulive/server4
commerce_build_7560
Published
Sep 20, 2004
Tracked Since
Feb 18, 2026