Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pchm-v2q2-6vm7

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The web application of some Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was vulnerable to path traversal, allowing an unauthenticated user to retrieve arbitrary files, or check if files or folders existed within the file system.

The web application of some Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was vulnerable to path traversal, allowing an unauthenticated user to retrieve arbitrary files, or check if files or folders existed within the file system.

EPSS

Процентиль: 40%
0.00186
Низкий

Связанные уязвимости

CVSS3: 7.5
nvd
почти 6 лет назад

The web application of some Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was vulnerable to path traversal, allowing an unauthenticated user to retrieve arbitrary files, or check if files or folders existed within the file system.

EPSS

Процентиль: 40%
0.00186
Низкий