File Upload vulnerability in BoidCMS v.2.0.0 allows remote code execution
Reporter | Title | Published | Views | Family All 13 |
---|---|---|---|---|
![]() | BoidCMS Command Injection | 12 Feb 202423:44 | – | metasploit |
![]() | CVE-2023-38836 | 21 Aug 202300:00 | – | cvelist |
![]() | BoidCMS 2.0.0 Command Injection Exploit | 2 Mar 202400:00 | – | zdt |
![]() | BoidCMS v2.0.0 - authenticated file upload Exploit | 9 Oct 202300:00 | – | zdt |
![]() | Exploit for Unrestricted Upload of File with Dangerous Type in Boidcms | 16 Aug 202314:30 | – | githubexploit |
![]() | CVE-2023-38836 | 21 Aug 202317:15 | – | osv |
![]() | CVE-2023-38836 | 21 Aug 202300:00 | – | vulnrichment |
![]() | CVE-2023-38836 | 21 Aug 202317:15 | – | cve |
![]() | BoidCMS v2.0.0 - authenticated file upload vulnerability | 9 Oct 202300:00 | – | exploitdb |
![]() | Unrestricted file upload | 21 Aug 202317:15 | – | prion |
Source | Link |
---|---|
packetstormsecurity | www.packetstormsecurity.com/files/175026/BoidCMS-2.0.0-Shell-Upload.html |
boidcms | www.boidcms.com/ |
github | www.github.com/BoidCMS/BoidCMS/issues/27 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo