Easy Chat Server 2.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download certain files via direct requests to files such as (1) ServerKey.pem and (2) AcceptIP.txt.  NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
                
            References
                    | Link | Resource | 
|---|---|
| http://secunia.com/advisories/22739 | Exploit Vendor Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/30075 | |
| http://secunia.com/advisories/22739 | Exploit Vendor Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/30075 | 
Configurations
                    History
                    21 Nov 2024, 00:23
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/22739 - Exploit, Vendor Advisory | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30075 - | 
Information
                Published : 2007-01-16 23:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6933
Mitre link : CVE-2006-6933
CVE.ORG link : CVE-2006-6933
JSON object : View
Products Affected
                efs_software
- easy_chat_server
 
CWE
                