Логотип exploitDog
bind:CVE-2025-40629
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-40629

Количество 2

Количество 2

nvd логотип

CVE-2025-40629

11 месяцев назад

PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.

EPSS: Низкий
github логотип

GHSA-xwfw-xfh4-73wv

11 месяцев назад

PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-40629

PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.

2%
Низкий
11 месяцев назад
github логотип
GHSA-xwfw-xfh4-73wv

PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.

2%
Низкий
11 месяцев назад

Уязвимостей на страницу