CVE-2020-29666
MEDIUM
5,3
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
MEDIUM
5,0
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: partial
Integrity: none
Availability: none
Description
AI Translation Available
In Lan ATMService M3 ATM Monitoring System 6.1.0, due to a directory-listing vulnerability, a remote attacker can view log files, located in /websocket/logs/, that contain a user's cookie values and the predefined developer's cookie value.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0045
Percentile
0,6th
Updated
EPSS Score Trend (Last 91 Days)
Application
M3 Atm Monitoring System by Lanatmservice
CPE Identifier
View Detailed Analysis
cpe:2.3:a:lanatmservice:m3_atm_monitoring_system:6.1.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://lanatmservice.ru/
https://github.com/jet-pentest/CVE-2020-29666
http://lanatmservice.ru/
https://github.com/jet-pentest/CVE-2020-29666