Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Michalc
Michalc pdw File Browser |
|
| Vendors & Products |
Michalc
Michalc pdw File Browser |
Wed, 28 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PDW File Browser 1.3 contains a remote code execution vulnerability that allows authenticated users to upload and rename webshell files to arbitrary web server locations. Attackers can upload a .txt webshell, rename it to .php, and move it to accessible directories using double-encoded path traversal techniques. | |
| Title | PDW File Browser 1.3 - Remote Code Execution | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-28T21:12:47.261Z
Reserved: 2026-01-27T15:47:07.998Z
Link: CVE-2020-36973
Updated: 2026-01-28T18:58:15.249Z
Status : Deferred
Published: 2026-01-28T18:16:48.017
Modified: 2026-04-15T00:35:42.020
Link: CVE-2020-36973
No data.
OpenCVE Enrichment
Updated: 2026-01-29T09:09:19Z