Логотип exploitDog
bind:CVE-2021-47751
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-47751

Количество 3

Количество 3

nvd логотип

CVE-2021-47751

26 дней назад

CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. Attackers can exploit the ServerMapPath() function by renaming uploaded HTML files using directory traversal sequences to write files outside the intended template directory.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-47751

26 дней назад

CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-7jgq-pvpg-hqwq

26 дней назад

CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. Attackers can exploit the ServerMapPath() function by renaming uploaded HTML files using directory traversal sequences to write files outside the intended template directory.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-47751

CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. Attackers can exploit the ServerMapPath() function by renaming uploaded HTML files using directory traversal sequences to write files outside the intended template directory.

CVSS3: 7.5
0%
Низкий
26 дней назад
debian логотип
CVE-2021-47751

CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains ...

CVSS3: 7.5
0%
Низкий
26 дней назад
github логотип
GHSA-7jgq-pvpg-hqwq

CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. Attackers can exploit the ServerMapPath() function by renaming uploaded HTML files using directory traversal sequences to write files outside the intended template directory.

CVSS3: 7.5
0%
Низкий
26 дней назад

Уязвимостей на страницу