Description
Xerver 4.17 allows remote attackers to (1) obtain source code of scripts via a request with a trailing "." (dot) or (2) list directory contents via a trailing null character.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Ziv Kamir · textremotewindows
https://www.exploit-db.com/exploits/26374
exploitdb
WRITEUP
VERIFIED
by Ziv Kamir · textremotewindows
https://www.exploit-db.com/exploits/26375
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/20076
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22785
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/20075
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15135
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1015079
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22786
Exploit, Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17243
Scores
EPSS
0.1387
EPSS Percentile
94.3%
Details
Status
published
Products (1)
xerver/xerver
4.17h
Published
Oct 23, 2005
Tracked Since
Feb 18, 2026