Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ggh7-8g84-pcwc

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

SAXON 5.4, with display_errors enabled, allows remote attackers to obtain sensitive information via (1) a direct request for news.php, (2) an invalid use of a newsid array parameter to admin/edit-item.php, and possibly unspecified vectors related to additional scripts in (3) admin/, (4) rss/, and (5) the root directory of the installation, which reveal the path in various error messages.

SAXON 5.4, with display_errors enabled, allows remote attackers to obtain sensitive information via (1) a direct request for news.php, (2) an invalid use of a newsid array parameter to admin/edit-item.php, and possibly unspecified vectors related to additional scripts in (3) admin/, (4) rss/, and (5) the root directory of the installation, which reveal the path in various error messages.

EPSS

Процентиль: 75%
0.00859
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
больше 18 лет назад

SAXON 5.4, with display_errors enabled, allows remote attackers to obtain sensitive information via (1) a direct request for news.php, (2) an invalid use of a newsid array parameter to admin/edit-item.php, and possibly unspecified vectors related to additional scripts in (3) admin/, (4) rss/, and (5) the root directory of the installation, which reveal the path in various error messages.

EPSS

Процентиль: 75%
0.00859
Низкий

Дефекты

CWE-200