Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p2w2-23x5-7r9p

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

index.php in EZDatabase before 2.1.2 does not properly cleanse the p parameter before constructing and including a .php filename, which allows remote attackers to conduct directory traversal attacks, and produces resultant cross-site scripting (XSS) and path disclosure.

index.php in EZDatabase before 2.1.2 does not properly cleanse the p parameter before constructing and including a .php filename, which allows remote attackers to conduct directory traversal attacks, and produces resultant cross-site scripting (XSS) and path disclosure.

EPSS

Процентиль: 88%
0.04026
Низкий

Связанные уязвимости

nvd
около 20 лет назад

index.php in EZDatabase before 2.1.2 does not properly cleanse the p parameter before constructing and including a .php filename, which allows remote attackers to conduct directory traversal attacks, and produces resultant cross-site scripting (XSS) and path disclosure.

EPSS

Процентиль: 88%
0.04026
Низкий