Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p633-cvx7-wpq8

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in Mathopd 1.4.x and 1.5.x before 1.5p7, when configured with the * construct for mass virtual hosting, allows remote attackers to read arbitrary files via a crafted Host header.

Directory traversal vulnerability in Mathopd 1.4.x and 1.5.x before 1.5p7, when configured with the * construct for mass virtual hosting, allows remote attackers to read arbitrary files via a crafted Host header.

EPSS

Процентиль: 74%
0.00794
Низкий

Дефекты

CWE-22

Связанные уязвимости

ubuntu
почти 14 лет назад

Directory traversal vulnerability in Mathopd 1.4.x and 1.5.x before 1.5p7, when configured with the * construct for mass virtual hosting, allows remote attackers to read arbitrary files via a crafted Host header.

nvd
почти 14 лет назад

Directory traversal vulnerability in Mathopd 1.4.x and 1.5.x before 1.5p7, when configured with the * construct for mass virtual hosting, allows remote attackers to read arbitrary files via a crafted Host header.

debian
почти 14 лет назад

Directory traversal vulnerability in Mathopd 1.4.x and 1.5.x before 1. ...

EPSS

Процентиль: 74%
0.00794
Низкий

Дефекты

CWE-22