This CPE summary could be partial or incomplete. Please contact us for a detailed listing.
Summary
Detail | |||
---|---|---|---|
Vendor | Wpitchoune | First view | 2018-04-20 |
Product | Psensor | Last view | 2018-04-20 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:wpitchoune:psensor:*:*:*:*:*:*:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2018-04-20 | CVE-2014-10073 | The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-04-25 | Name: The remote Debian host is missing a security update. File: debian_DLA-1361.nasl - Type: ACT_GATHER_INFO |