Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v5gw-6wv6-2mj2

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in the com.endymion.sake.servlet.mail.MailServlet servlet for Endymion SakeMail 1.0.36 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) and a null character in the param_name parameter.

Directory traversal vulnerability in the com.endymion.sake.servlet.mail.MailServlet servlet for Endymion SakeMail 1.0.36 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) and a null character in the param_name parameter.

EPSS

Процентиль: 49%
0.00263
Низкий

Связанные уязвимости

nvd
больше 23 лет назад

Directory traversal vulnerability in the com.endymion.sake.servlet.mail.MailServlet servlet for Endymion SakeMail 1.0.36 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) and a null character in the param_name parameter.

EPSS

Процентиль: 49%
0.00263
Низкий