296,147
Total vulnerabilities in the database
Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.
Software | From | Fixed in |
---|---|---|
openwsman_project / openwsman | - | 2.6.9.x |
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / enterprise_linux_server_tus | 7.6 | 7.6.x |
redhat / enterprise_linux_server_eus | 7.6 | 7.6.x |
redhat / enterprise_linux_server_aus | 7.6 | 7.6.x |
redhat / enterprise_linux | 8.0 | 8.0.x |
redhat / enterprise_linux_eus | 8.1 | 8.1.x |
redhat / enterprise_linux_eus | 8.2 | 8.2.x |
redhat / enterprise_linux_server_tus | 8.2 | 8.2.x |
redhat / enterprise_linux_server_aus | 8.2 | 8.2.x |
redhat / enterprise_linux_server_tus | 8.4 | 8.4.x |
redhat / enterprise_linux_eus | 8.4 | 8.4.x |
redhat / enterprise_linux_server_aus | 8.4 | 8.4.x |
fedoraproject / fedora | 28 | 28.x |
fedoraproject / fedora | 29 | 29.x |
fedoraproject / fedora | 30 | 30.x |
opensuse / leap | 42.3 | 42.3.x |
opensuse / leap | 15.0 | 15.0.x |