Логотип exploitDog
bind:CVE-2002-0169
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2002-0169

Количество 3

Количество 3

redhat логотип

CVE-2002-0169

около 23 лет назад

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

EPSS: Низкий
nvd логотип

CVE-2002-0169

около 23 лет назад

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-hj7j-4p8c-xgw6

около 3 лет назад

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2002-0169

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

0%
Низкий
около 23 лет назад
nvd логотип
CVE-2002-0169

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

CVSS2: 4.6
0%
Низкий
около 23 лет назад
github логотип
GHSA-hj7j-4p8c-xgw6

The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.

0%
Низкий
около 3 лет назад

Уязвимостей на страницу