Логотип exploitDog
bind:CVE-2020-36970
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36970

Количество 2

Количество 2

nvd логотип

CVE-2020-36970

12 дней назад

PMB 5.6 contains a local file disclosure vulnerability in getgif.php that allows attackers to read arbitrary system files by manipulating the 'chemin' parameter. Attackers can exploit the unsanitized file path input to access sensitive files like /etc/passwd by sending crafted requests to the getgif.php endpoint.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-mc39-mcp7-82wg

12 дней назад

PMB 5.6 contains a local file disclosure vulnerability in getgif.php that allows attackers to read arbitrary system files by manipulating the 'chemin' parameter. Attackers can exploit the unsanitized file path input to access sensitive files like /etc/passwd by sending crafted requests to the getgif.php endpoint.

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-36970

PMB 5.6 contains a local file disclosure vulnerability in getgif.php that allows attackers to read arbitrary system files by manipulating the 'chemin' parameter. Attackers can exploit the unsanitized file path input to access sensitive files like /etc/passwd by sending crafted requests to the getgif.php endpoint.

CVSS3: 8.4
0%
Низкий
12 дней назад
github логотип
GHSA-mc39-mcp7-82wg

PMB 5.6 contains a local file disclosure vulnerability in getgif.php that allows attackers to read arbitrary system files by manipulating the 'chemin' parameter. Attackers can exploit the unsanitized file path input to access sensitive files like /etc/passwd by sending crafted requests to the getgif.php endpoint.

CVSS3: 8.4
0%
Низкий
12 дней назад

Уязвимостей на страницу