Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r55j-v6v6-hc9m

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.

nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.

EPSS

Процентиль: 54%
0.0031
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.

nvd
больше 13 лет назад

nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.

debian
больше 13 лет назад

nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote ...

EPSS

Процентиль: 54%
0.0031
Низкий