Логотип exploitDog
bind:CVE-2020-37086
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-37086

Количество 2

Количество 2

nvd логотип

CVE-2020-37086

5 дней назад

Easy Transfer 1.7 iOS mobile application contains a directory traversal vulnerability that allows remote attackers to access unauthorized file system paths without authentication. Attackers can exploit the vulnerability by manipulating path parameters in GET and POST requests to list or download sensitive system files and inject malicious scripts into application parameters.

CVSS3: 6.2
EPSS: Низкий
github логотип

GHSA-8w6w-rh48-3q53

5 дней назад

Easy Transfer 1.7 iOS mobile application contains a directory traversal vulnerability that allows remote attackers to access unauthorized file system paths without authentication. Attackers can exploit the vulnerability by manipulating path parameters in GET and POST requests to list or download sensitive system files and inject malicious scripts into application parameters.

CVSS3: 6.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-37086

Easy Transfer 1.7 iOS mobile application contains a directory traversal vulnerability that allows remote attackers to access unauthorized file system paths without authentication. Attackers can exploit the vulnerability by manipulating path parameters in GET and POST requests to list or download sensitive system files and inject malicious scripts into application parameters.

CVSS3: 6.2
1%
Низкий
5 дней назад
github логотип
GHSA-8w6w-rh48-3q53

Easy Transfer 1.7 iOS mobile application contains a directory traversal vulnerability that allows remote attackers to access unauthorized file system paths without authentication. Attackers can exploit the vulnerability by manipulating path parameters in GET and POST requests to list or download sensitive system files and inject malicious scripts into application parameters.

CVSS3: 6.2
1%
Низкий
5 дней назад

Уязвимостей на страницу