Логотип exploitDog
bind:CVE-2020-1745
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-1745

Количество 6

Количество 6

ubuntu логотип

CVE-2020-1745

больше 5 лет назад

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

CVSS3: 8.6
EPSS: Низкий
redhat логотип

CVE-2020-1745

больше 5 лет назад

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

CVSS3: 7.6
EPSS: Низкий
nvd логотип

CVE-2020-1745

больше 5 лет назад

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

CVSS3: 8.6
EPSS: Низкий
debian логотип

CVE-2020-1745

больше 5 лет назад

A file inclusion vulnerability was found in the AJP connector enabled ...

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-gv2w-88hx-8m9r

больше 3 лет назад

Improper Authorization in Undertoe

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2020-02853

больше 5 лет назад

Уязвимость сервиса AJP Connector сервера приложений Apache Tomcat, позволяющая нарушителю получить несанкционированный доступ на чтения файлов веб-приложений

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-1745

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

CVSS3: 8.6
1%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-1745

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

CVSS3: 7.6
1%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-1745

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

CVSS3: 8.6
1%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-1745

A file inclusion vulnerability was found in the AJP connector enabled ...

CVSS3: 8.6
1%
Низкий
больше 5 лет назад
github логотип
GHSA-gv2w-88hx-8m9r

Improper Authorization in Undertoe

CVSS3: 8.6
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02853

Уязвимость сервиса AJP Connector сервера приложений Apache Tomcat, позволяющая нарушителю получить несанкционированный доступ на чтения файлов веб-приложений

CVSS3: 7.5
1%
Низкий
больше 5 лет назад

Уязвимостей на страницу