Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j9vh-w3pf-6mgg

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in phpMyFAQ 1.3.12 allows remote attackers to read arbitrary files, and possibly execute local PHP files, via the action variable, which is used as part of a template filename.

Directory traversal vulnerability in phpMyFAQ 1.3.12 allows remote attackers to read arbitrary files, and possibly execute local PHP files, via the action variable, which is used as part of a template filename.

EPSS

Процентиль: 89%
0.04746
Низкий

Связанные уязвимости

nvd
около 21 года назад

Directory traversal vulnerability in phpMyFAQ 1.3.12 allows remote attackers to read arbitrary files, and possibly execute local PHP files, via the action variable, which is used as part of a template filename.

EPSS

Процентиль: 89%
0.04746
Низкий