Количество 6
Количество 6
CVE-2022-4244
A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.
CVE-2022-4244
A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.
CVE-2022-4244
A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.
CVE-2022-4244
A flaw was found in codeplex-codehaus. A directory traversal attack (a ...
GHSA-g6ph-x5wf-g337
plexus-codehaus vulnerable to directory traversal
BDU:2024-01536
Уязвимость библиотеки codeplex-codehaus фреймворка Apache Maven, позволяющая нарушителю получить несанкционированный доступ к произвольным файлам и каталогам
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-4244 A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files. | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
CVE-2022-4244 A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files. | CVSS3: 7.5 | 0% Низкий | около 3 лет назад | |
CVE-2022-4244 A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files. | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
CVE-2022-4244 A flaw was found in codeplex-codehaus. A directory traversal attack (a ... | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
GHSA-g6ph-x5wf-g337 plexus-codehaus vulnerable to directory traversal | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
BDU:2024-01536 Уязвимость библиотеки codeplex-codehaus фреймворка Apache Maven, позволяющая нарушителю получить несанкционированный доступ к произвольным файлам и каталогам | CVSS3: 7.5 | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу