Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j8pg-cxx4-5c4x

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple directory traversal vulnerabilities in the Zidget/HTTP embedded HTTP server in ExtremeZ-IP File and Print Server 5.1.2x15 and earlier allow remote attackers to read arbitrary (1) gif, (2) png, (3) jpg, (4) xml, (5) ico, (6) zip, and (7) html files via a ".." (dot dot backslash) sequence in the filename.

Multiple directory traversal vulnerabilities in the Zidget/HTTP embedded HTTP server in ExtremeZ-IP File and Print Server 5.1.2x15 and earlier allow remote attackers to read arbitrary (1) gif, (2) png, (3) jpg, (4) xml, (5) ico, (6) zip, and (7) html files via a ".." (dot dot backslash) sequence in the filename.

EPSS

Процентиль: 43%
0.00209
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
почти 18 лет назад

Multiple directory traversal vulnerabilities in the Zidget/HTTP embedded HTTP server in ExtremeZ-IP File and Print Server 5.1.2x15 and earlier allow remote attackers to read arbitrary (1) gif, (2) png, (3) jpg, (4) xml, (5) ico, (6) zip, and (7) html files via a "..\" (dot dot backslash) sequence in the filename.

EPSS

Процентиль: 43%
0.00209
Низкий

Дефекты

CWE-22