Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m9vj-ghg6-qxqh

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple directory traversal vulnerabilities in playSMS 0.9.3 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) gateway_module parameter to plugin/gateway/gnokii/init.php and the (2) themes_module parameter to plugin/themes/default/init.php.

Multiple directory traversal vulnerabilities in playSMS 0.9.3 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) gateway_module parameter to plugin/gateway/gnokii/init.php and the (2) themes_module parameter to plugin/themes/default/init.php.

EPSS

Процентиль: 89%
0.0457
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
около 17 лет назад

Multiple directory traversal vulnerabilities in playSMS 0.9.3 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) gateway_module parameter to plugin/gateway/gnokii/init.php and the (2) themes_module parameter to plugin/themes/default/init.php.

EPSS

Процентиль: 89%
0.0457
Низкий

Дефекты

CWE-22