Логотип exploitDog
bind:CVE-2021-36582
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-36582

Количество 2

Количество 2

nvd логотип

CVE-2021-36582

больше 4 лет назад

In Kooboo CMS 2.1.1.0, it is possible to upload a remote shell (e.g., aspx) to the server and then call upon it to receive a reverse shell from the victim server. The files are uploaded to /Content/Template/root/reverse-shell.aspx and can be simply triggered by browsing that URL.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-3prf-q3vf-746c

больше 3 лет назад

In Kooboo CMS 2.1.1.0, it is possible to upload a remote shell (e.g., aspx) to the server and then call upon it to receive a reverse shell from the victim server. The files are uploaded to /Content/Template/root/reverse-shell.aspx and can be simply triggered by browsing that URL.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-36582

In Kooboo CMS 2.1.1.0, it is possible to upload a remote shell (e.g., aspx) to the server and then call upon it to receive a reverse shell from the victim server. The files are uploaded to /Content/Template/root/reverse-shell.aspx and can be simply triggered by browsing that URL.

CVSS3: 9.8
1%
Низкий
больше 4 лет назад
github логотип
GHSA-3prf-q3vf-746c

In Kooboo CMS 2.1.1.0, it is possible to upload a remote shell (e.g., aspx) to the server and then call upon it to receive a reverse shell from the victim server. The files are uploaded to /Content/Template/root/reverse-shell.aspx and can be simply triggered by browsing that URL.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу