Логотип exploitDog
bind:CVE-2020-36893
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36893

Количество 2

Количество 2

nvd логотип

CVE-2020-36893

2 месяца назад

Eibiz i-Media Server Digital Signage 3.8.0 contains a directory traversal vulnerability that allows unauthenticated remote attackers to access files outside the server's root directory. Attackers can exploit the 'oldfile' GET parameter to view sensitive configuration files like web.xml and system files such as win.ini.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-g9gr-q7gp-4q6p

2 месяца назад

Eibiz i-Media Server Digital Signage 3.8.0 contains a directory traversal vulnerability that allows unauthenticated remote attackers to access files outside the server's root directory. Attackers can exploit the 'oldfile' GET parameter to view sensitive configuration files like web.xml and system files such as win.ini.

CVSS3: 7.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-36893

Eibiz i-Media Server Digital Signage 3.8.0 contains a directory traversal vulnerability that allows unauthenticated remote attackers to access files outside the server's root directory. Attackers can exploit the 'oldfile' GET parameter to view sensitive configuration files like web.xml and system files such as win.ini.

CVSS3: 7.5
10%
Средний
2 месяца назад
github логотип
GHSA-g9gr-q7gp-4q6p

Eibiz i-Media Server Digital Signage 3.8.0 contains a directory traversal vulnerability that allows unauthenticated remote attackers to access files outside the server's root directory. Attackers can exploit the 'oldfile' GET parameter to view sensitive configuration files like web.xml and system files such as win.ini.

CVSS3: 7.5
10%
Средний
2 месяца назад

Уязвимостей на страницу