Логотип exploitDog
bind:CVE-2017-14979
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-14979

Количество 2

Количество 2

nvd логотип

CVE-2017-14979

больше 8 лет назад

Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-8gc3-r22g-xgpq

больше 3 лет назад

Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-14979

Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.

CVSS3: 7.5
0%
Низкий
больше 8 лет назад
github логотип
GHSA-8gc3-r22g-xgpq

Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу