Логотип exploitDog
bind:CVE-2020-37002
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-37002

Количество 3

Количество 3

nvd логотип

CVE-2020-37002

10 дней назад

Ajenti 2.1.36 contains an authentication bypass vulnerability that allows remote attackers to execute arbitrary commands after successful login. Attackers can leverage the /api/terminal/create endpoint to send a netcat reverse shell payload targeting a specified IP and port.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2020-37002

10 дней назад

Ajenti 2.1.36 contains an authentication bypass vulnerability that all ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-g2h7-7vxw-6v9j

10 дней назад

Ajenti 2.1.36 contains an authentication bypass vulnerability that allows remote attackers to execute arbitrary commands after successful login. Attackers can leverage the /api/terminal/create endpoint to send a netcat reverse shell payload targeting a specified IP and port.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-37002

Ajenti 2.1.36 contains an authentication bypass vulnerability that allows remote attackers to execute arbitrary commands after successful login. Attackers can leverage the /api/terminal/create endpoint to send a netcat reverse shell payload targeting a specified IP and port.

CVSS3: 9.8
1%
Низкий
10 дней назад
debian логотип
CVE-2020-37002

Ajenti 2.1.36 contains an authentication bypass vulnerability that all ...

CVSS3: 9.8
1%
Низкий
10 дней назад
github логотип
GHSA-g2h7-7vxw-6v9j

Ajenti 2.1.36 contains an authentication bypass vulnerability that allows remote attackers to execute arbitrary commands after successful login. Attackers can leverage the /api/terminal/create endpoint to send a netcat reverse shell payload targeting a specified IP and port.

CVSS3: 9.8
1%
Низкий
10 дней назад

Уязвимостей на страницу