Security for everyone

CVE-2017-17736 Scanner

Detects 'Privilege Escalation' vulnerability in Kentico affects v. 9.0 before 9.0.51 and 10.0 before 10.0.48.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one




Kentico is a content management system (CMS) that is used to build websites, online stores, and digital experiences. It is a web-based platform that offers a range of features to manage website content, create digital experiences, and customize websites. Kentico is a popular CMS and is used by businesses, organizations, and individuals around the world.

CVE-2017-17736 is a vulnerability that was detected in Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48. This vulnerability allows remote attackers to gain Global Administrator access to the CMS by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard. This vulnerability can be exploited by attackers to gain access to sensitive data stored in the CMS and to take control of the website or online store.

When CVE-2017-17736 is exploited, it can lead to serious consequences for website owners and organizations. Attackers can gain access to sensitive data such as customer information, payment information, and other confidential data. They can also take control of the website or online store and carry out phishing attacks, distribute malware, and perform other malicious actions. This can result in reputation damage, financial losses, and legal liabilities.

Thanks to the pro features of the platform, readers of this article can easily and quickly learn about vulnerabilities in their digital assets. provides comprehensive vulnerability scanning and monitoring services that help businesses and individuals detect and protect against vulnerabilities on their websites, online stores, and other digital assets. By using, readers can ensure that their digital assets are secure and protected against cyber threats.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture