Логотип exploitDog
bind:CVE-2018-17836
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-17836

Количество 2

Количество 2

nvd логотип

CVE-2018-17836

больше 7 лет назад

An issue was discovered in JTBC(PHP) 3.0.1.6. It allows remote attackers to execute arbitrary PHP code by using a /console/file/manage.php?type=action&action=addfile&path=..%2F substring to upload, in conjunction with a multipart/form-data PHP payload.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-r975-467j-wrpw

больше 3 лет назад

An issue was discovered in JTBC(PHP) 3.0.1.6. It allows remote attackers to execute arbitrary PHP code by using a /console/file/manage.php?type=action&action=addfile&path=..%2F substring to upload, in conjunction with a multipart/form-data PHP payload.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-17836

An issue was discovered in JTBC(PHP) 3.0.1.6. It allows remote attackers to execute arbitrary PHP code by using a /console/file/manage.php?type=action&action=addfile&path=..%2F substring to upload, in conjunction with a multipart/form-data PHP payload.

CVSS3: 8.8
1%
Низкий
больше 7 лет назад
github логотип
GHSA-r975-467j-wrpw

An issue was discovered in JTBC(PHP) 3.0.1.6. It allows remote attackers to execute arbitrary PHP code by using a /console/file/manage.php?type=action&action=addfile&path=..%2F substring to upload, in conjunction with a multipart/form-data PHP payload.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу