mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-06-20 09:50:49 +00:00
Update GobyVuls-Document.md
This commit is contained in:
parent
5c3b690194
commit
2f71aff036
@ -1,7 +1,20 @@
|
|||||||
[# Goby History Update Vulnerability Total Document (Continuously Update)
|
[# Goby History Update Vulnerability Total Document (Continuously Update)
|
||||||
The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing.
|
The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing.
|
||||||
|
|
||||||
**Updated document date: Jul 21, 2023**
|
**Updated document date: Jul 24, 2023**
|
||||||
|
|
||||||
|
## Adobe Coldfusion remote code execution vulnerability (CVE-2023-38203)
|
||||||
|
|
||||||
|
| **Vulnerability** | **Adobe Coldfusion remote code execution vulnerability (CVE-2023-38203)** |
|
||||||
|
| :----: | :-----|
|
||||||
|
| **Chinese name** | Adobe ColdFusion 远程代码执行漏洞(CVE-2023-38203) |
|
||||||
|
| **CVSS core** | 9.8 |
|
||||||
|
| **FOFA Query** (click to view the results directly)| [(body="crossdomain.xml" && body="CFIDE") \|\| (body="#000808" && body="#e7e7e7")](https://en.fofa.info/result?qbase64=IChib2R5PSJjcm9zc2RvbWFpbi54bWwiICYmIGJvZHk9IkNGSURFIikgfHwgKGJvZHk9IiMwMDA4MDgiICYmIGJvZHk9IiNlN2U3ZTciKQ%3D%3D) |
|
||||||
|
| **Number of assets affected** | 3740 |
|
||||||
|
| **Description** | Adobe Coldfusion is a commercial application server developed by Adobe for web applications.The attacker can send unbelievable serialized data and trigger derivativeization to the Coldfusion server, thereby executing any code. |
|
||||||
|
| **Impact** | The attacker can execute the code at the server through this vulnerability, obtain the server permissions, and then control the entire web server. |
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
## SANGFOR-IOMS catjs.php File Read Vulnerability
|
## SANGFOR-IOMS catjs.php File Read Vulnerability
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user