CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS
Percentile
49.0%
Versions of send
prior to 0.11.2 are affected by an information leakage vulnerability which may allow an attacker to enumerate paths on the server filesystem.
Update to version 0.11.1 or later.
Vendor | Product | Version | CPE |
---|---|---|---|
send_project | send | * | cpe:2.3:a:send_project:send:*:*:*:*:*:node.js:*:* |
www.openwall.com/lists/oss-security/2016/04/20/11
github.com/advisories/GHSA-jgqf-hwc5-hh37
github.com/expressjs/serve-static/blob/master/HISTORY.md#181--2015-01-20
github.com/pillarjs/send/commit/98a5b89982b38e79db684177cf94730ce7fc7aed
github.com/pillarjs/send/pull/70
nvd.nist.gov/vuln/detail/CVE-2015-8859
web.archive.org/web/20200227192016/https://www.securityfocus.com/bid/96435/
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS
Percentile
49.0%