CVE-2002-0463

N/A Unknown
Published: August 12, 2002 Modified: April 16, 2026
View on NVD

Description

home.php in ARSC (Really Simple Chat) 1.0.1 and earlier allows remote attackers to determine the full pathname of the web server via an invalid language in the arsc_language parameter, which leaks the pathname in an error message.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.securityfocus.com/archive/1/262652
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/archive/1/262802
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/4307
Source: cve@mitre.org
Patch Vendor Advisory
http://www.iss.net/security_center/static/8472.php
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/262652
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/262802
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/4307
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.8%
75th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

arsc_really_simple_chat