Логотип exploitDog
bind:CVE-2020-10457
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-10457

Количество 2

Количество 2

nvd логотип

CVE-2020-10457

почти 6 лет назад

Path Traversal in admin/imagepaster/image-renaming.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to rename any file on the webserver using a dot-dot-slash sequence (../) via the POST parameter imgName (for the new name) and imgUrl (for the current file to be renamed).

CVSS3: 2.7
EPSS: Низкий
github логотип

GHSA-pc58-jh86-xjm9

больше 3 лет назад

Path Traversal in admin/imagepaster/image-renaming.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to rename any file on the webserver using a dot-dot-slash sequence (../) via the POST parameter imgName (for the new name) and imgUrl (for the current file to be renamed).

CVSS3: 2.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-10457

Path Traversal in admin/imagepaster/image-renaming.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to rename any file on the webserver using a dot-dot-slash sequence (../) via the POST parameter imgName (for the new name) and imgUrl (for the current file to be renamed).

CVSS3: 2.7
0%
Низкий
почти 6 лет назад
github логотип
GHSA-pc58-jh86-xjm9

Path Traversal in admin/imagepaster/image-renaming.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to rename any file on the webserver using a dot-dot-slash sequence (../) via the POST parameter imgName (for the new name) and imgUrl (for the current file to be renamed).

CVSS3: 2.7
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу