Логотип exploitDog
bind:CVE-2013-5725
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-5725

Количество 2

Количество 2

nvd логотип

CVE-2013-5725

больше 12 лет назад

The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-qh36-5vfv-6xmm

больше 3 лет назад

The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-5725

The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.

CVSS2: 5
0%
Низкий
больше 12 лет назад
github логотип
GHSA-qh36-5vfv-6xmm

The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу