Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wrgv-ph75-892c

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").

Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").

EPSS

Процентиль: 73%
0.00763
Низкий

Связанные уязвимости

nvd
около 23 лет назад

Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").

EPSS

Процентиль: 73%
0.00763
Низкий