Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cr2c-jcf8-w3xq

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

WebCalendar 1.2.3, and other versions before 1.2.5, allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by ws/user_mod.php and certain other files.

WebCalendar 1.2.3, and other versions before 1.2.5, allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by ws/user_mod.php and certain other files.

EPSS

Процентиль: 52%
0.00294
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
больше 14 лет назад

WebCalendar 1.2.3, and other versions before 1.2.5, allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by ws/user_mod.php and certain other files.

EPSS

Процентиль: 52%
0.00294
Низкий

Дефекты

CWE-200