Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q4g2-rhrf-wvj6

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The default configuration for the Command Line Interface in Red Hat Enterprise Application Platform before 6.4.0 and WildFly (formerly JBoss Application Server) uses weak permissions for .jboss-cli-history, which allows local users to obtain sensitive information via unspecified vectors.

The default configuration for the Command Line Interface in Red Hat Enterprise Application Platform before 6.4.0 and WildFly (formerly JBoss Application Server) uses weak permissions for .jboss-cli-history, which allows local users to obtain sensitive information via unspecified vectors.

EPSS

Процентиль: 24%
0.0008
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The default configuration for the Command Line Interface in Red Hat Enterprise Application Platform before 6.4.0 and WildFly (formerly JBoss Application Server) uses weak permissions for .jboss-cli-history, which allows local users to obtain sensitive information via unspecified vectors.

redhat
почти 11 лет назад

The default configuration for the Command Line Interface in Red Hat Enterprise Application Platform before 6.4.0 and WildFly (formerly JBoss Application Server) uses weak permissions for .jboss-cli-history, which allows local users to obtain sensitive information via unspecified vectors.

nvd
почти 11 лет назад

The default configuration for the Command Line Interface in Red Hat Enterprise Application Platform before 6.4.0 and WildFly (formerly JBoss Application Server) uses weak permissions for .jboss-cli-history, which allows local users to obtain sensitive information via unspecified vectors.

debian
почти 11 лет назад

The default configuration for the Command Line Interface in Red Hat En ...

EPSS

Процентиль: 24%
0.0008
Низкий