diff --git a/CVE-2020-24589.md b/CVE-2020-24589.md new file mode 100644 index 0000000..ae890ac --- /dev/null +++ b/CVE-2020-24589.md @@ -0,0 +1,12 @@ +## WSO2 API Manager save_artifact_ajaxprocessor.jsp XXE Vulnerability (CVE-2020-24589) + +| **Vulnerability** | **WSO2 API Manager save_artifact_ajaxprocessor.jsp XXE Vulnerability (CVE-2020-24589)** | +| :----: | :-----| +| **Chinese name** | WSO2 API Manager 系统 save_artifact_ajaxprocessor.jsp XXE 漏洞(CVE-2020-24589) | +| **CVSS core** | 9.1 | +| **FOFA Query** (click to view the results directly)| [title="WSO2" \|\| header="Server: WSO2 Carbon Server" \|\| banner="Server: WSO2 Carbon Server"](https://fofa.info/result?qbase64=dGl0bGU9IldTTzIiIHx8IGhlYWRlcj0iU2VydmVyOiBXU08yIENhcmJvbiBTZXJ2ZXIiIHx8IGJhbm5lcj0iU2VydmVyOiBXU08yIENhcmJvbiBTZXJ2ZXIi) | +| **Number of assets affected** | 15231 | +| **Description** | WSO2 API Manager is a set of API lifecycle management solutions from WSO2 in the United States. A vulnerability exists in WSO2 API Manager. The following products and versions are affected: WSO2 API Manager from version 3.1.0 and API Microgateway version 2.2.0, the attacker can read arbitrary files and detect intranet information, etc. | +| **Impact** | A vulnerability exists in WSO2 API Manager. The following products and versions are affected: WSO2 API Manager from version 3.1.0 and API Microgateway version 2.2.0, the attacker can read arbitrary files and detect intranet information, etc. | + +![](https://s3.bmp.ovh/imgs/2023/04/07/92ab16512332fe0c.gif) diff --git a/CVE-2020-7961.md b/CVE-2020-7961.md new file mode 100644 index 0000000..bd79465 --- /dev/null +++ b/CVE-2020-7961.md @@ -0,0 +1,12 @@ +## Liferay Portal Unauthenticated 7.2.1 RCE (CVE-2020-7961) + +| **Vulnerability** | **Liferay Portal Unauthenticated 7.2.1 RCE (CVE-2020-7961)** | +| :----: | :-----| +| **Chinese name** | Liferay Portal 7.2.1 版本 invoke 文件远程代码执行漏洞(CVE-2020-7961)) | +| **CVSS core** | 10.0 | +| **FOFA Query** (click to view the results directly)| [body="Powered by Liferay Portal" \|\| header="Liferay Portal" \|\| banner="Liferay Portal" \|\| header="guest_language_id=" \|\| banner="guest_language_id=" \|\| body="Liferay.AUI" \|\| body="Liferay.currentURL"](https://fofa.info/result?qbase64=Ym9keT0iUG93ZXJlZCBieSBMaWZlcmF5IFBvcnRhbCIgfHwgaGVhZGVyPSJMaWZlcmF5IFBvcnRhbCIgfHwgYmFubmVyPSJMaWZlcmF5IFBvcnRhbCIgfHwgaGVhZGVyPSJndWVzdF9sYW5ndWFnZV9pZD0iIHx8IGJhbm5lcj0iZ3Vlc3RfbGFuZ3VhZ2VfaWQ9IiB8fCBib2R5PSJMaWZlcmF5LkFVSSIgfHwgYm9keT0iTGlmZXJheS5jdXJyZW50VVJMIg%3D%3D) | +| **Number of assets affected** | 59885 | +| **Description** | Liferay Portal is a set of J2EE-based portal solutions of American Liferay Company. The program uses EJB and JMS and other technologies, and can be used as Web publishing and sharing workspace, enterprise collaboration platform, social network and so on. A code issue vulnerability exists in versions prior to Liferay Portal 7.2.1 CE GA2. A remote attacker could exploit this vulnerability to execute arbitrary code using JSON Web services. | +| **Impact** | A code issue vulnerability exists in versions prior to Liferay Portal 7.2.1 CE GA2. A remote attacker could exploit this vulnerability to execute arbitrary code using JSON Web services. | + +![](https://s3.bmp.ovh/imgs/2023/04/07/a16de9eefef6f8a5.gif) diff --git "a/CVE-2021-26857\\CVE-2021-26858.md" "b/CVE-2021-26857\\CVE-2021-26858.md" new file mode 100644 index 0000000..6335d98 --- /dev/null +++ "b/CVE-2021-26857\\CVE-2021-26858.md" @@ -0,0 +1,12 @@ +## Microsoft Exchange Server Remote Command Execution Vulnerability (CVE-2021-26857/CVE-2021-26858) + +| **Vulnerability** | **Microsoft Exchange Server Remote Command Execution Vulnerability (CVE-2021-26857/CVE-2021-26858)** | +| :----: | :-----| +| **Chinese name** | Microsoft Exchange Server 远程命令执行漏洞(CVE-2021-26857/CVE-2021-26858) | +| **CVSS core** | 7.8 | +| **FOFA Query** (click to view the results directly)| [banner="Microsoft ESMTP MAIL Service" \|\| banner="Microsoft Exchange Server" \|\| banner="Microsoft Exchange Internet Mail Service" \|\| banner="Microsoft SMTP MAIL" \|\| banner="Microsoft Exchange" \|\| (banner="owa" && banner="Location" && cert!="Technicolor") \|\| banner="Set-Cookie: OutlookSession" \|\| (((header="owa" && (header="Location" \|\| header="X-Owa-Version" \|\| header="Set-Cookie: OWA-COOKIE")) \|\| (body="href=\\\"/owa/auth/" && (title="Outlook" \|\| title="Exchange " \|\| body="var a_sLgn" \|\| body="aria-label=\\\"Outlook Web App\\\" class=\\\"signInImageHeader"))) && header!="WordPress" && body!="wp-content" && body!="wp-includes") \|\| body="\