Логотип exploitDog
bind:CVE-2019-6500
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-6500

Количество 2

Количество 2

nvd логотип

CVE-2019-6500

около 7 лет назад

In Axway File Transfer Direct 2.7.1, an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request with %2e instead of '.' characters, as demonstrated by an initial /h2hdocumentation//%2e%2e/ substring.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2j6j-jq9g-r65r

больше 3 лет назад

In Axway File Transfer Direct 2.7.1, an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request with %2e instead of '.' characters, as demonstrated by an initial /h2hdocumentation//%2e%2e/ substring.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-6500

In Axway File Transfer Direct 2.7.1, an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request with %2e instead of '.' characters, as demonstrated by an initial /h2hdocumentation//%2e%2e/ substring.

CVSS3: 7.5
8%
Низкий
около 7 лет назад
github логотип
GHSA-2j6j-jq9g-r65r

In Axway File Transfer Direct 2.7.1, an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request with %2e instead of '.' characters, as demonstrated by an initial /h2hdocumentation//%2e%2e/ substring.

CVSS3: 7.5
8%
Низкий
больше 3 лет назад

Уязвимостей на страницу