From 7d9aea369381ac8cbf768ba15bd683bc9afccbf0 Mon Sep 17 00:00:00 2001 From: Goby <50955360+gobysec@users.noreply.github.com> Date: Wed, 3 Jul 2024 19:02:24 +0800 Subject: [PATCH] Update and rename GeoServer Code Execution Vulnerability to GeoServer Code Execution Vulnerability.md --- ...n Vulnerability => GeoServer Code Execution Vulnerability.md | 2 ++ 1 file changed, 2 insertions(+) rename GeoServer Code Execution Vulnerability => GeoServer Code Execution Vulnerability.md (99%) diff --git a/GeoServer Code Execution Vulnerability b/GeoServer Code Execution Vulnerability.md similarity index 99% rename from GeoServer Code Execution Vulnerability rename to GeoServer Code Execution Vulnerability.md index 766d1d3..292e24c 100644 --- a/GeoServer Code Execution Vulnerability +++ b/GeoServer Code Execution Vulnerability.md @@ -1,3 +1,4 @@ + **Updated document date: July 3, 2024** ## GeoServer /geoserver/wfs Code Execution Vulnerability(CVE-2024-36401) @@ -12,3 +13,4 @@ | **Impact** | The attacker can inject malicious parameters through a specific query string to execute arbitrary code to take over the server.| ![](https://s3.bmp.ovh/imgs/2024/07/03/6095c50407de1221.gif) +