Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cmmg-wrhw-3xv2

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \ (backslash) characters in the URL to certain directories under the web root, such as the image directory.

Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \ (backslash) characters in the URL to certain directories under the web root, such as the image directory.

EPSS

Процентиль: 78%
0.01243
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \ (backslash) characters in the URL to certain directories under the web root, such as the image directory.

nvd
больше 19 лет назад

Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \ (backslash) characters in the URL to certain directories under the web root, such as the image directory.

debian
больше 19 лет назад

Directory traversal vulnerability in Webmin before 1.280, when run on ...

EPSS

Процентиль: 78%
0.01243
Низкий