Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4qm6-3vx6-hg5q

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that occurs when a script (child process) cannot be invoked.

Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that occurs when a script (child process) cannot be invoked.

Ссылки

EPSS

Процентиль: 99%
0.74248
Высокий

Связанные уязвимости

nvd
почти 23 года назад

Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that occurs when a script (child process) cannot be invoked.

debian
почти 23 года назад

Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote a ...

EPSS

Процентиль: 99%
0.74248
Высокий