mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-05 10:16:59 +00:00
Update GobyVuls-Document.md
This commit is contained in:
parent
b27d068d93
commit
c506b92a39
@ -1,6 +1,19 @@
|
||||
# Goby History Update Vulnerability Total Document (Continuously Update)
|
||||
The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing.
|
||||
|
||||
**Updated document date: November 20, 2024**
|
||||
|
||||
## palo-alto-panos /php/utils/createRemoteAppwebSession.php Command Execution Vulnerability (CVE-2024-0012/CVE-2024-9474)
|
||||
| **Vulnerability** | palo-alto-panos /php/utils/createRemoteAppwebSession.php Command Execution Vulnerability (CVE-2024-0012/CVE-2024-9474)|
|
||||
| :----: | :-----|
|
||||
| **Chinese name** | palo-alto-panos /php/utils/createRemoteAppwebSession.php 命令执行漏洞(CVE-2024-0012/CVE-2024-9474) |
|
||||
| **CVSS core** | 9.50 |
|
||||
| **FOFA Query** (click to view the results directly)| [body="Panos.browser.cookie.set" && body="Panos.browser.param"]
|
||||
| **Number of assets affected** | 27,397 |
|
||||
| **Description** |A command execution vulnerability exists in palo-alto-panos, allowing attackers to execute arbitrary commands via the /php/utils/createRemoteAppwebSession.php/.js.map path without authorization, potentially leading to full system control. |
|
||||
|
||||

|
||||
|
||||
**Updated document date: October 31, 2024**
|
||||
|
||||
## Apache Solr /solr/admin/info/properties:/admin/info/key Permission Bypass Vulnerability(CVE-2024-45216)
|
||||
|
Loading…
x
Reference in New Issue
Block a user