// For flags

CVE-2007-6314

barracudadrive 3.7.2 - Multiple Vulnerabilities

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

BarracudaDrive Web Server before 3.8 allows remote attackers to read the source code for web scripts by appending a (1) + (plus), (2) . (dot), or (3) %80 and similar characters to the file name in the URL.

El servidor web BarracudaDrive anterior 3.8 permite a atacantes remotos leer el código fuente para secuencias de comandos web para añadir una (1) + (suma), (2) . (punto), o (3) %80 y caracteres similares al nombre de archivo en la URL.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-12-10 First Exploit
  • 2007-12-11 CVE Reserved
  • 2007-12-12 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-11-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Real Time Logic
Search vendor "Real Time Logic"
Barracudadrive Web Server
Search vendor "Real Time Logic" for product "Barracudadrive Web Server"
3.7.2
Search vendor "Real Time Logic" for product "Barracudadrive Web Server" and version "3.7.2"
-
Affected
Real Time Logic
Search vendor "Real Time Logic"
Barracudadrive Web Server Home Server
Search vendor "Real Time Logic" for product "Barracudadrive Web Server Home Server"
3.7.2
Search vendor "Real Time Logic" for product "Barracudadrive Web Server Home Server" and version "3.7.2"
-
Affected