5

CVE-2009-3452

WebCoreModule.ashx in RADactive I-Load before 2008.2.5.0 allows remote attackers to obtain sensitive information via unspecified requests that trigger responses containing the saved-image folder pathname.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
RadactiveI-load Version <= 2008.2.4.0
RadactiveI-load Version1.6.3
RadactiveI-load Version1.6.3.1
RadactiveI-load Version1.6.3.2
RadactiveI-load Version1.6.3.3
RadactiveI-load Version1.7.0.0
RadactiveI-load Version1.7.0.1
RadactiveI-load Version1.7.0.2
RadactiveI-load Version1.7.0.3
RadactiveI-load Version1.7.0.4
RadactiveI-load Version1.7.0.5
RadactiveI-load Version1.7.0.6
RadactiveI-load Version1.7.0.7
RadactiveI-load Version1.7.0.8
RadactiveI-load Version1.7.0.9
RadactiveI-load Version1.7.0.10
RadactiveI-load Version1.7.0.11
RadactiveI-load Version1.7.0.12
RadactiveI-load Version1.7.5.0
RadactiveI-load Version1.7.5.1
RadactiveI-load Version1.7.5.2
RadactiveI-load Version1.7.6.0
RadactiveI-load Version1.7.6.1
RadactiveI-load Version1.7.7.0
RadactiveI-load Version1.7.7.1
RadactiveI-load Version1.7.7.2
RadactiveI-load Version1.7.7.3
RadactiveI-load Version1.7.7.4
RadactiveI-load Version1.7.7.5
RadactiveI-load Version1.7.7.6
RadactiveI-load Version1.7.7.8
RadactiveI-load Version1.7.7.9
RadactiveI-load Version1.7.7.11
RadactiveI-load Version2008.1.0.0
RadactiveI-load Version2008.1.0.1
RadactiveI-load Version2008.1.0.2
RadactiveI-load Version2008.1.1.0
RadactiveI-load Version2008.1.2.0
RadactiveI-load Version2008.1.2.1
RadactiveI-load Version2008.1.3.0
RadactiveI-load Version2008.2.1.0
RadactiveI-load Version2008.2.1.1
RadactiveI-load Version2008.2.2.0
RadactiveI-load Version2008.2.3.0
RadactiveI-load Version2008.2.3.1
RadactiveI-load Version2008.2.3.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.36% 0.549
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.