Логотип exploitDog
bind:CVE-2020-36565
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36565

Количество 4

Количество 4

ubuntu логотип

CVE-2020-36565

около 3 лет назад

Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2020-36565

около 3 лет назад

Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2020-36565

около 3 лет назад

Due to improper sanitization of user input on Windows, the static file ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-j453-hm5x-c46w

около 3 лет назад

Echo vulnerable to directory traversal

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-36565

Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.

CVSS3: 5.3
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2020-36565

Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.

CVSS3: 5.3
0%
Низкий
около 3 лет назад
debian логотип
CVE-2020-36565

Due to improper sanitization of user input on Windows, the static file ...

CVSS3: 5.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-j453-hm5x-c46w

Echo vulnerable to directory traversal

CVSS3: 5.3
0%
Низкий
около 3 лет назад

Уязвимостей на страницу