Логотип exploitDog
bind:CVE-2019-11879
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-11879

Количество 2

Количество 2

nvd логотип

CVE-2019-11879

больше 6 лет назад

The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-jwh5-q83f-2jjc

больше 3 лет назад

** DISPUTED ** The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem."

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-11879

The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem.

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-jwh5-q83f-2jjc

** DISPUTED ** The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem."

CVSS3: 5.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу