Описание
Open WorkFlow Engine (OpenWFE) 1.4.x allows remote attackers to conduct port scans of remote hosts by specifying the target in an rmi:// Worklist URL, then using the response times to infer the results.
Ссылки
- Vendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:openwfe:work_flow_engine:1.4:*:*:*:*:*:*:*
cpe:2.3:a:openwfe:work_flow_engine:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:openwfe:work_flow_engine:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:openwfe:work_flow_engine:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:openwfe:work_flow_engine:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:openwfe:work_flow_engine:1.4.5:*:*:*:*:*:*:*
EPSS
Процентиль: 62%
0.00438
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
Open WorkFlow Engine (OpenWFE) 1.4.x allows remote attackers to conduct port scans of remote hosts by specifying the target in an rmi:// Worklist URL, then using the response times to infer the results.
EPSS
Процентиль: 62%
0.00438
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other