Логотип exploitDog
bind:CVE-2023-46307
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-46307

Количество 2

Количество 2

nvd логотип

CVE-2023-46307

около 2 лет назад

An issue was discovered in server.js in etcd-browser 87ae63d75260. By supplying a /../../../ Directory Traversal input to the URL's GET request while connecting to the remote server port specified during setup, an attacker can retrieve local operating system files from the remote system.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-8x58-2qjg-xr22

около 2 лет назад

An issue was discovered in server.js in etcd-browser 87ae63d75260. By supplying a /../../../ Directory Traversal input to the URL's GET request while connecting to the remote server port specified during setup, an attacker can retrieve local operating system files from the remote system.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-46307

An issue was discovered in server.js in etcd-browser 87ae63d75260. By supplying a /../../../ Directory Traversal input to the URL's GET request while connecting to the remote server port specified during setup, an attacker can retrieve local operating system files from the remote system.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-8x58-2qjg-xr22

An issue was discovered in server.js in etcd-browser 87ae63d75260. By supplying a /../../../ Directory Traversal input to the URL's GET request while connecting to the remote server port specified during setup, an attacker can retrieve local operating system files from the remote system.

CVSS3: 7.5
0%
Низкий
около 2 лет назад

Уязвимостей на страницу