Логотип exploitDog
bind:CVE-2002-0169
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2002-0169

Количество 3

Количество 3

redhat логотип

CVE-2002-0169

почти 24 года назад

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

EPSS: Низкий
nvd логотип

CVE-2002-0169

больше 23 лет назад

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-hj7j-4p8c-xgw6

почти 4 года назад

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2002-0169

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

0%
Низкий
почти 24 года назад
nvd логотип
CVE-2002-0169

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

CVSS2: 4.6
0%
Низкий
больше 23 лет назад
github логотип
GHSA-hj7j-4p8c-xgw6

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

0%
Низкий
почти 4 года назад

Уязвимостей на страницу