Логотип exploitDog
bind:CVE-2020-25881
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-25881

Количество 2

Количество 2

nvd логотип

CVE-2020-25881

больше 4 лет назад

A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-9rwq-2qv8-4jpv

больше 3 лет назад

A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-25881

A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file.

CVSS3: 5.5
1%
Низкий
больше 4 лет назад
github логотип
GHSA-9rwq-2qv8-4jpv

A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу