Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xc79-9vgp-q8cm

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

GoAhead Web Server 2.1.7 and earlier allows remote attackers to obtain the source code of ASP files via a URL terminated with a /, , %2f (encoded /), %20 (encoded space), or %00 (encoded null) character, which returns the ASP source code unparsed.

GoAhead Web Server 2.1.7 and earlier allows remote attackers to obtain the source code of ASP files via a URL terminated with a /, , %2f (encoded /), %20 (encoded space), or %00 (encoded null) character, which returns the ASP source code unparsed.

EPSS

Процентиль: 97%
0.35746
Средний

Связанные уязвимости

nvd
почти 24 года назад

GoAhead Web Server 2.1.7 and earlier allows remote attackers to obtain the source code of ASP files via a URL terminated with a /, \, %2f (encoded /), %20 (encoded space), or %00 (encoded null) character, which returns the ASP source code unparsed.

EPSS

Процентиль: 97%
0.35746
Средний