![]() The exploit has been disclosed to the public and may be used. The manipulation of the argument oldName leads to path traversal: './filedir'. Affected by this vulnerability is an unknown functionality of the file /file-manager/rename.php. VDB-248690 is the identifier assigned to this vulnerability.Ī vulnerability classified as problematic was found in codelyfe Stupid Simple CMS up to 1.2.4. The manipulation of the argument newName leads to path traversal: './filedir'. Affected by this issue is some unknown functionality of the file /file-manager/rename.php. The identifier VDB-248749 was assigned to this vulnerability.Ī vulnerability, which was classified as critical, has been found in codelyfe Stupid Simple CMS up to 1.2.4. The manipulation of the argument page leads to path traversal: './filedir'. Affected by this vulnerability is an unknown functionality. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.Ī vulnerability was found in SourceCodester Simple Student Attendance System 1.0. VDB-248950 is the identifier assigned to this vulnerability. The exploitation appears to be difficult. The complexity of an attack is rather high. The manipulation of the argument key leads to path traversal: './filedir'. ![]() This vulnerability affects unknown code of the file app/hide.php. ![]() ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in icret EasyImages 2.8.3. The identifier VDB-249137 was assigned to this vulnerability. This issue affects some unknown processing. A vulnerability was found in SourceCodester Medicine Tracking System 1.0. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |