CVE-2008-3728

N/A Unknown
Published: August 20, 2008 Modified: April 23, 2026
View on NVD

Description

Web Based Administration in MicroWorld Technologies MailScan 5.6.a espatch 1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to determine the installation path, IP addresses, and error messages via direct requests to files under LOG/.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/31534
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/30700
Source: cve@mitre.org
Exploit
http://marc.info/?l=bugtraq&m=121881329424635&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/31534
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securityreason.com/securityalert/4172
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.oliverkarow.de/research/mailscan.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/bid/30700
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/44518
Source: af854a3a-2127-422b-91ae-364da2661108

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microworld_technologies