Executive Summary

Informations
NameCVE-2019-3816First vendor Publication2019-03-14
VendorCveLast vendor Modification2019-03-21

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3816

CWE : Common Weakness Enumeration

%idName
100 %CWE-200Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/107368
http://www.securityfocus.com/bid/107409
CONFIRM http://bugzilla.suse.com/show_bug.cgi?id=1122623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3816

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2019-03-21 21:19:22
  • Multiple Updates
2019-03-15 21:19:24
  • Multiple Updates
2019-03-15 13:19:28
  • Multiple Updates
2019-03-15 05:19:22
  • First insertion