Описание
Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").
Ссылки
- Patch
- Patch
- Patch
- PatchVendor Advisory
- Patch
- Patch
- Patch
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.00763
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").
EPSS
Процентиль: 73%
0.00763
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other