Логотип exploitDog
bind:CVE-2019-19834
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-19834

Количество 2

Количество 2

nvd логотип

CVE-2019-19834

около 6 лет назад

Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-j2jr-49q4-g8xh

больше 3 лет назад

Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-19834

Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.

CVSS3: 7.2
1%
Низкий
около 6 лет назад
github логотип
GHSA-j2jr-49q4-g8xh

Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу