Логотип exploitDog
bind:CVE-2025-40629
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-40629

Количество 2

Количество 2

nvd логотип

CVE-2025-40629

3 месяца назад

PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.

EPSS: Низкий
github логотип

GHSA-xwfw-xfh4-73wv

3 месяца назад

PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-40629

PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.

1%
Низкий
3 месяца назад
github логотип
GHSA-xwfw-xfh4-73wv

PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.

1%
Низкий
3 месяца назад

Уязвимостей на страницу