Логотип exploitDog
bind:CVE-2020-15712
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-15712

Количество 2

Количество 2

nvd логотип

CVE-2020-15712

больше 5 лет назад

rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-5rg6-44mc-c264

больше 3 лет назад

rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-15712

rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.

CVSS3: 4.3
0%
Низкий
больше 5 лет назад
github логотип
GHSA-5rg6-44mc-c264

rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу