Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-3273

Опубликовано: 05 авг. 2008
Источник: redhat
CVSS2: 5
EPSS Средний

Описание

JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string.

Дополнительная информация

Статус:

Low

EPSS

Процентиль: 97%
0.414
Средний

5 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 17 лет назад

JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string.

nvd
больше 17 лет назад

JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string.

debian
больше 17 лет назад

JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2 ...

github
больше 3 лет назад

JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string.

EPSS

Процентиль: 97%
0.414
Средний

5 Medium

CVSS2

Уязвимость CVE-2008-3273