mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-05 10:16:59 +00:00
Update GobyVuls-Document.md
This commit is contained in:
parent
3139a30f58
commit
a070ffa1c4
@ -3,6 +3,20 @@ The following content is an updated vulnerability from Goby. Some of the vulnera
|
||||
|
||||
**Updated document date: October 11, 2024**
|
||||
|
||||
## CyberPanel /dataBases/upgrademysqlstatus Command Execution Vulnerability
|
||||
| **Vulnerability** | GCyberPanel /dataBases/upgrademysqlstatus Command Execution Vulnerability|
|
||||
| :----: | :-----|
|
||||
| **Chinese name** | CyberPanel /dataBases/upgrademysqlstatus 命令执行漏洞 |
|
||||
| **CVSS core** | 9.80 |
|
||||
| **FOFA Query** (click to view the results directly)| [app="GCyberPanel"]
|
||||
| **Number of assets affected** | 199,633 |
|
||||
| **Description** |CyberPanel is an open source web control panel that provides a user-friendly interface for managing websites,emails, databases, FTP accounts, etc. |
|
||||
| **Impact** | CyberPanel is designed to simplify website management tasks, allowing non-technical users to easily manage their online resources. The /dataBases/upgrademysqlstatus interface has a command execution vulnerability. Unauthorized attackers can execute arbitrary commands through this interface to obtain server permissions, resulting in serious consequences such as data leakage and server takeover.
|
||||
| **Affected versions** |2.3.6
|
||||
|
||||

|
||||
|
||||
|
||||
## GiveWP WordPress Plugin /admin-ajax.php Command Execution Vulnerability (CVE-2024-8353)
|
||||
| **Vulnerability** | GiveWP WordPress Plugin /admin-ajax.php Command Execution Vulnerability (CVE-2024-8353)|
|
||||
| :----: | :-----|
|
||||
|
Loading…
x
Reference in New Issue
Block a user