Логотип exploitDog
bind:CVE-2013-5688
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-5688

Количество 3

Количество 3

nvd логотип

CVE-2013-5688

больше 12 лет назад

Multiple directory traversal vulnerabilities in index.php in AjaXplorer 5.0.2 and earlier allow remote authenticated users to read arbitrary files via a ../%00 (dot dot backslash encoded null byte) in the file parameter in a (1) download or (2) get_content action, or (3) upload arbitrary files via a ../%00 (dot dot backslash encoded null byte) in the dir parameter in an upload action.

CVSS2: 5.5
EPSS: Низкий
debian логотип

CVE-2013-5688

больше 12 лет назад

Multiple directory traversal vulnerabilities in index.php in AjaXplore ...

CVSS2: 5.5
EPSS: Низкий
github логотип

GHSA-cjh4-mhqp-h65f

больше 3 лет назад

Multiple directory traversal vulnerabilities in index.php in AjaXplorer 5.0.2 and earlier allow remote authenticated users to read arbitrary files via a ../%00 (dot dot backslash encoded null byte) in the file parameter in a (1) download or (2) get_content action, or (3) upload arbitrary files via a ../%00 (dot dot backslash encoded null byte) in the dir parameter in an upload action.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-5688

Multiple directory traversal vulnerabilities in index.php in AjaXplorer 5.0.2 and earlier allow remote authenticated users to read arbitrary files via a ../%00 (dot dot backslash encoded null byte) in the file parameter in a (1) download or (2) get_content action, or (3) upload arbitrary files via a ../%00 (dot dot backslash encoded null byte) in the dir parameter in an upload action.

CVSS2: 5.5
3%
Низкий
больше 12 лет назад
debian логотип
CVE-2013-5688

Multiple directory traversal vulnerabilities in index.php in AjaXplore ...

CVSS2: 5.5
3%
Низкий
больше 12 лет назад
github логотип
GHSA-cjh4-mhqp-h65f

Multiple directory traversal vulnerabilities in index.php in AjaXplorer 5.0.2 and earlier allow remote authenticated users to read arbitrary files via a ../%00 (dot dot backslash encoded null byte) in the file parameter in a (1) download or (2) get_content action, or (3) upload arbitrary files via a ../%00 (dot dot backslash encoded null byte) in the dir parameter in an upload action.

3%
Низкий
больше 3 лет назад

Уязвимостей на страницу