Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2x5r-8r9r-74wv

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

BEA WebLogic Server 6.1 through 6.1 SP7, 7.0 through 7.0 SP7, and 8.1 through 8.1 SP5 allows remote attackers to read arbitrary files inside the class-path property via .ear or exploded .ear files that use the manifest class-path property to point to utility jar files.

BEA WebLogic Server 6.1 through 6.1 SP7, 7.0 through 7.0 SP7, and 8.1 through 8.1 SP5 allows remote attackers to read arbitrary files inside the class-path property via .ear or exploded .ear files that use the manifest class-path property to point to utility jar files.

EPSS

Процентиль: 74%
0.0081
Низкий

Связанные уязвимости

nvd
около 19 лет назад

BEA WebLogic Server 6.1 through 6.1 SP7, 7.0 through 7.0 SP7, and 8.1 through 8.1 SP5 allows remote attackers to read arbitrary files inside the class-path property via .ear or exploded .ear files that use the manifest class-path property to point to utility jar files.

EPSS

Процентиль: 74%
0.0081
Низкий