Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wqwx-hvg4-2wh9

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A flaw was found in Wildfly before wildfly-embedded-13.0.0.Final, where the embedded managed process API has an exposed setting of the Thread Context Classloader (TCCL). This setting is exposed as a public method, which can bypass the security manager. The highest threat from this vulnerability is to confidentiality.

A flaw was found in Wildfly before wildfly-embedded-13.0.0.Final, where the embedded managed process API has an exposed setting of the Thread Context Classloader (TCCL). This setting is exposed as a public method, which can bypass the security manager. The highest threat from this vulnerability is to confidentiality.

EPSS

Процентиль: 50%
0.0027
Низкий

Связанные уязвимости

CVSS3: 5.9
redhat
больше 5 лет назад

A flaw was found in Wildfly before wildfly-embedded-13.0.0.Final, where the embedded managed process API has an exposed setting of the Thread Context Classloader (TCCL). This setting is exposed as a public method, which can bypass the security manager. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.5
nvd
больше 5 лет назад

A flaw was found in Wildfly before wildfly-embedded-13.0.0.Final, where the embedded managed process API has an exposed setting of the Thread Context Classloader (TCCL). This setting is exposed as a public method, which can bypass the security manager. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.5
debian
больше 5 лет назад

A flaw was found in Wildfly before wildfly-embedded-13.0.0.Final, wher ...

EPSS

Процентиль: 50%
0.0027
Низкий