Логотип exploitDog
bind:CVE-2022-50890
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-50890

Количество 2

Количество 2

nvd логотип

CVE-2022-50890

26 дней назад

Owlfiles File Manager 12.0.1 contains a path traversal vulnerability in its built-in HTTP server that allows attackers to access system directories. Attackers can exploit the vulnerability by crafting GET requests with directory traversal sequences to access restricted system directories on the device.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-4vcc-776r-83h7

26 дней назад

Owlfiles File Manager 12.0.1 contains a path traversal vulnerability in its built-in HTTP server that allows attackers to access system directories. Attackers can exploit the vulnerability by crafting GET requests with directory traversal sequences to access restricted system directories on the device.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-50890

Owlfiles File Manager 12.0.1 contains a path traversal vulnerability in its built-in HTTP server that allows attackers to access system directories. Attackers can exploit the vulnerability by crafting GET requests with directory traversal sequences to access restricted system directories on the device.

CVSS3: 7.5
0%
Низкий
26 дней назад
github логотип
GHSA-4vcc-776r-83h7

Owlfiles File Manager 12.0.1 contains a path traversal vulnerability in its built-in HTTP server that allows attackers to access system directories. Attackers can exploit the vulnerability by crafting GET requests with directory traversal sequences to access restricted system directories on the device.

CVSS3: 7.5
0%
Низкий
26 дней назад

Уязвимостей на страницу