Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xj8q-rww9-p266

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in index.php in Sava's GuestBook 2.0 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Directory traversal vulnerability in index.php in Sava's GuestBook 2.0 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

EPSS

Процентиль: 36%
0.00152
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
почти 18 лет назад

Directory traversal vulnerability in index.php in Sava's GuestBook 2.0 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

EPSS

Процентиль: 36%
0.00152
Низкий

Дефекты

CWE-22