Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p79v-mj8v-c6p4

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

TellMe 1.2 and earlier, when the Server (o_Server) and HEAD (o_Head) options are enabled, allows remote attackers to obtain sensitive information via an invalid q_Host parameter, which reveals the full pathname of the application in an fsockopen error message.

TellMe 1.2 and earlier, when the Server (o_Server) and HEAD (o_Head) options are enabled, allows remote attackers to obtain sensitive information via an invalid q_Host parameter, which reveals the full pathname of the application in an fsockopen error message.

EPSS

Процентиль: 69%
0.0059
Низкий

Связанные уязвимости

nvd
около 20 лет назад

TellMe 1.2 and earlier, when the Server (o_Server) and HEAD (o_Head) options are enabled, allows remote attackers to obtain sensitive information via an invalid q_Host parameter, which reveals the full pathname of the application in an fsockopen error message.

EPSS

Процентиль: 69%
0.0059
Низкий