Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4qm6-3vx6-hg5q

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that occurs when a script (child process) cannot be invoked.

Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that occurs when a script (child process) cannot be invoked.

Ссылки

EPSS

Процентиль: 99%
0.75041
Высокий

Связанные уязвимости

nvd
больше 23 лет назад

Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that occurs when a script (child process) cannot be invoked.

debian
больше 23 лет назад

Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote a ...

EPSS

Процентиль: 99%
0.75041
Высокий