mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-05 18:27:13 +00:00
ADD drupal_6340
This commit is contained in:
parent
099ff419ff
commit
bcbc91b5b6
BIN
Drupal/CVE-2019-6340/CVE-2019-6340.gif
Normal file
BIN
Drupal/CVE-2019-6340/CVE-2019-6340.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 441 KiB |
13
Drupal/CVE-2019-6340/README.md
Normal file
13
Drupal/CVE-2019-6340/README.md
Normal file
@ -0,0 +1,13 @@
|
||||
# CVE-2019-6340 Drupal Core Arbitrary PHP Code Execution Vulnerability
|
||||
|
||||
Drupal is an open source content management framework (CMF) written in PHP. It consists of a content management system (CMS) and a PHP development framework.
|
||||
|
||||
Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.
|
||||
|
||||
**Affected version**: 8.5.x before 8.5.11、8.6.x before 8.6.10
|
||||
|
||||
**[FOFA](https://fofa.so/result?qbase64=YXBwPSJEcnVwYWwi) query rule**: app="Drupal"
|
||||
|
||||
# Demo
|
||||
|
||||

|
11
Nexus/CVE-2019-7238/README.md
Normal file
11
Nexus/CVE-2019-7238/README.md
Normal file
@ -0,0 +1,11 @@
|
||||
# CVE-2020-24571 NexusDB path traversal
|
||||
|
||||
NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal.
|
||||
|
||||
**Affected version**: nexusdb < 4.50.23
|
||||
|
||||
**[FOFA](https://fofa.so/result?q=header%3D%22Server%3A+NexusDB%22&qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5leHVzREIi&file=&file=) query rule**: header="Server: NexusDB"
|
||||
|
||||
# Demo
|
||||
|
||||

|
11
Seeyon/htmlofficeservlet_uploadfile_getshell/README.md
Normal file
11
Seeyon/htmlofficeservlet_uploadfile_getshell/README.md
Normal file
@ -0,0 +1,11 @@
|
||||
# CVE-2020-24571 NexusDB path traversal
|
||||
|
||||
NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal.
|
||||
|
||||
**Affected version**: nexusdb < 4.50.23
|
||||
|
||||
**[FOFA](https://fofa.so/result?q=header%3D%22Server%3A+NexusDB%22&qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5leHVzREIi&file=&file=) query rule**: header="Server: NexusDB"
|
||||
|
||||
# Demo
|
||||
|
||||

|
11
Unraid/CVE-2020-5847/README.md
Normal file
11
Unraid/CVE-2020-5847/README.md
Normal file
@ -0,0 +1,11 @@
|
||||
# CVE-2020-24571 NexusDB path traversal
|
||||
|
||||
NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal.
|
||||
|
||||
**Affected version**: nexusdb < 4.50.23
|
||||
|
||||
**[FOFA](https://fofa.so/result?q=header%3D%22Server%3A+NexusDB%22&qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5leHVzREIi&file=&file=) query rule**: header="Server: NexusDB"
|
||||
|
||||
# Demo
|
||||
|
||||

|
11
WebSphere/CVE-2020-4450/README.md
Normal file
11
WebSphere/CVE-2020-4450/README.md
Normal file
@ -0,0 +1,11 @@
|
||||
# CVE-2020-24571 NexusDB path traversal
|
||||
|
||||
NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal.
|
||||
|
||||
**Affected version**: nexusdb < 4.50.23
|
||||
|
||||
**[FOFA](https://fofa.so/result?q=header%3D%22Server%3A+NexusDB%22&qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5leHVzREIi&file=&file=) query rule**: header="Server: NexusDB"
|
||||
|
||||
# Demo
|
||||
|
||||

|
Binary file not shown.
After Width: | Height: | Size: 641 KiB |
Loading…
x
Reference in New Issue
Block a user