Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3w86-j9mv-8fpr

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

images/captcha.php in Raven Web Services RavenNuke 2.30, when register_globals and display_errors are enabled, allows remote attackers to determine the existence of local files by sending requests with full pathnames in the aFonts array parameter, and then observing the error messages, which differ between existing and nonexistent pathnames.

images/captcha.php in Raven Web Services RavenNuke 2.30, when register_globals and display_errors are enabled, allows remote attackers to determine the existence of local files by sending requests with full pathnames in the aFonts array parameter, and then observing the error messages, which differ between existing and nonexistent pathnames.

EPSS

Процентиль: 91%
0.06859
Низкий

Дефекты

CWE-94

Связанные уязвимости

nvd
почти 17 лет назад

images/captcha.php in Raven Web Services RavenNuke 2.30, when register_globals and display_errors are enabled, allows remote attackers to determine the existence of local files by sending requests with full pathnames in the aFonts array parameter, and then observing the error messages, which differ between existing and nonexistent pathnames.

EPSS

Процентиль: 91%
0.06859
Низкий

Дефекты

CWE-94