http://planet.mozilla.org/ateam/atom.xml Vulnerability description One or more fully qualified path names were found on this page. From this information the attacker may learn the file system structure from the web server. This information can be used to conduct further attacks. Pattern found: /etc/init.d/xvfb http://planet.mozilla.org/interns/atom.xml Pattern found: /usr/local/bin/mvim http://planet.mozilla.org/research/rss10.xml Pattern found: /usr/local/lib/LLVMgold.so
Very much invalid. Please double-check your results before posting what some automated scanner says.
Assignee: server-ops-devservices → nobody
Status: UNCONFIRMED → RESOLVED
Last Resolved: 6 years ago
Component: CVS: Administration → planet.mozilla.org
OS: Windows 7 → All
Product: mozilla.org → Websites
QA Contact: shyam
Hardware: x86 → All
Resolution: --- → INVALID
You need to log in before you can comment on or make changes to this bug.