Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mj37-xm24-6549

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa.

The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa.

EPSS

Процентиль: 86%
0.02916
Низкий

Связанные уязвимости

nvd
около 23 лет назад

The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa.

EPSS

Процентиль: 86%
0.02916
Низкий