2 results (0.013 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

IOBit IOTransfer V4 is vulnerable to Unquoted Service Path. IOBit IOTransfer V4 es vulnerable a la ruta de servicio sin comillas. • https://www.exploit-db.com/exploits/51029 • CWE-428: Unquoted Search Path or Element •

CVSS: 10.0EPSS: 39%CPEs: 1EXPL: 2

In IOBit IOTransfer 4.3.1.1561, an unauthenticated attacker can send GET and POST requests to Airserv and gain arbitrary read/write access to the entire file-system (with admin privileges) on the victim's endpoint, which can result in data theft and remote code execution. En IOBit IOTransfer versión 4.3.1.1561, un atacante no autenticado puede enviar peticiones GET y POST a Airserv y conseguir acceso arbitrario de lectura/escritura a todo el sistema de archivos (con privilegios de administrador) en el endpoint de la víctima, lo que puede resultar en el robo de datos y una ejecución de código remota IOTransfer version 4.0 suffers from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/50974 http://iobit.com http://iotransfer.com http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html https://medium.com/%40tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d • CWE-306: Missing Authentication for Critical Function •