Mongoose 2.8.0 and earlier allows remote attackers to obtain the source code for a web page by appending a / (slash) character to the URI.
                
            References
                    | Link | Resource | 
|---|---|
| http://freetexthost.com/0lcsrgt3vw | Exploit URL Repurposed | 
| http://pocoftheday.blogspot.com/2009/10/mongoose-web-server-v280-remote-source_22.html | Exploit | 
| http://secunia.com/advisories/36934 | Vendor Advisory | 
| http://freetexthost.com/0lcsrgt3vw | Exploit URL Repurposed | 
| http://pocoftheday.blogspot.com/2009/10/mongoose-web-server-v280-remote-source_22.html | Exploit | 
| http://secunia.com/advisories/36934 | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 01:09
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://freetexthost.com/0lcsrgt3vw - Exploit, URL Repurposed | |
| References | () http://pocoftheday.blogspot.com/2009/10/mongoose-web-server-v280-remote-source_22.html - Exploit | |
| References | () http://secunia.com/advisories/36934 - Vendor Advisory | 
14 Feb 2024, 01:17
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) http://freetexthost.com/0lcsrgt3vw - Exploit, URL Repurposed | 
Information
                Published : 2009-12-31 19:30
Updated : 2025-04-09 00:30
NVD link : CVE-2009-4535
Mitre link : CVE-2009-4535
CVE.ORG link : CVE-2009-4535
JSON object : View
Products Affected
                valenok
- mongoose
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
