7.5
CVSSv2

CVE-2022-23167

Published: 13/06/2022 Updated: 27/06/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Attacker crafts a GET request to: /mobile/downloadfile.aspx? Filename =../.. /windows/boot.ini the LFI is UNAUTHENTICATED.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

amodat amodat

Github Repositories

test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC

CVE-2022-XXXX 反向辣鸡数据投放 CVE订阅 工具 利用 教程 Exploit POC RCE LOG4j 反序列化 JNDI Payload CVE-2022-20550 CVE-2022-20551 CVE-2022-20552 CVE-2022-20553 CVE-2022-20554 CVE-2022-20555 CVE-2022-20556 CVE-2022-20557 CVE-2022-20558 CVE-2022-20559 CVE-2022-20560 CVE-2022-20561 CVE-2022-20562 CVE-2022-20563 CVE-2022-20564 CVE-2022-20565 CVE-2022-20566 CVE-2

test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC

CVE-2022-XXXX 反向辣鸡数据投放 CVE订阅 工具 利用 教程 Exploit POC RCE LOG4j 反序列化 JNDI Payload CVE-2022-20550 CVE-2022-20551 CVE-2022-20552 CVE-2022-20553 CVE-2022-20554 CVE-2022-20555 CVE-2022-20556 CVE-2022-20557 CVE-2022-20558 CVE-2022-20559 CVE-2022-20560 CVE-2022-20561 CVE-2022-20562 CVE-2022-20563 CVE-2022-20564 CVE-2022-20565 CVE-2022-20566 CVE-2