Vulnerability Details CVE-2018-0525
Directory traversal vulnerability in Jubatus 1.0.2 and earlier allows remote attackers to read arbitrary files via unspecified vectors.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 69.2%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2018-0525
-
cpe:2.3:a:jubat:jubatus:0.1.0
-
cpe:2.3:a:jubat:jubatus:0.1.1
-
cpe:2.3:a:jubat:jubatus:0.2.0
-
cpe:2.3:a:jubat:jubatus:0.2.1
-
cpe:2.3:a:jubat:jubatus:0.2.2
-
cpe:2.3:a:jubat:jubatus:0.2.3
-
cpe:2.3:a:jubat:jubatus:0.3.0
-
cpe:2.3:a:jubat:jubatus:0.3.1
-
cpe:2.3:a:jubat:jubatus:0.3.2
-
cpe:2.3:a:jubat:jubatus:0.3.3
-
cpe:2.3:a:jubat:jubatus:0.3.4
-
cpe:2.3:a:jubat:jubatus:0.4.0
-
cpe:2.3:a:jubat:jubatus:0.4.1
-
cpe:2.3:a:jubat:jubatus:0.4.2
-
cpe:2.3:a:jubat:jubatus:0.4.3
-
cpe:2.3:a:jubat:jubatus:0.4.4
-
cpe:2.3:a:jubat:jubatus:0.4.5
-
cpe:2.3:a:jubat:jubatus:0.5.0
-
cpe:2.3:a:jubat:jubatus:0.5.1
-
cpe:2.3:a:jubat:jubatus:0.5.2
-
cpe:2.3:a:jubat:jubatus:0.5.3
-
cpe:2.3:a:jubat:jubatus:0.5.4
-
cpe:2.3:a:jubat:jubatus:0.6.0
-
cpe:2.3:a:jubat:jubatus:0.6.1
-
cpe:2.3:a:jubat:jubatus:0.6.2
-
cpe:2.3:a:jubat:jubatus:0.6.3
-
cpe:2.3:a:jubat:jubatus:0.6.4
-
cpe:2.3:a:jubat:jubatus:0.6.5
-
cpe:2.3:a:jubat:jubatus:0.6.6
-
cpe:2.3:a:jubat:jubatus:0.7.0
-
cpe:2.3:a:jubat:jubatus:0.7.1
-
cpe:2.3:a:jubat:jubatus:0.7.2
-
cpe:2.3:a:jubat:jubatus:0.8.0
-
cpe:2.3:a:jubat:jubatus:0.8.1
-
cpe:2.3:a:jubat:jubatus:0.8.2
-
cpe:2.3:a:jubat:jubatus:0.8.3
-
cpe:2.3:a:jubat:jubatus:0.8.4
-
cpe:2.3:a:jubat:jubatus:0.8.5
-
cpe:2.3:a:jubat:jubatus:0.8.6
-
cpe:2.3:a:jubat:jubatus:0.8.7
-
cpe:2.3:a:jubat:jubatus:0.8.8
-
cpe:2.3:a:jubat:jubatus:0.8.9
-
cpe:2.3:a:jubat:jubatus:0.9.0
-
cpe:2.3:a:jubat:jubatus:0.9.1
-
cpe:2.3:a:jubat:jubatus:0.9.2
-
cpe:2.3:a:jubat:jubatus:0.9.3
-
cpe:2.3:a:jubat:jubatus:0.9.4
-
cpe:2.3:a:jubat:jubatus:1.0.0
-
cpe:2.3:a:jubat:jubatus:1.0.1
-
cpe:2.3:a:jubat:jubatus:1.0.2