diff --git a/Nexus/CVE-2019-7238/CVE-2019-7238.gif b/Nexus/CVE-2019-7238/CVE-2019-7238.gif new file mode 100644 index 0000000..2581823 Binary files /dev/null and b/Nexus/CVE-2019-7238/CVE-2019-7238.gif differ diff --git a/Seeyon/htmlofficeservlet_uploadfile_getshell/zhiyuan_htmlofficeservlet_getshell.gif b/Seeyon/htmlofficeservlet_uploadfile_getshell/zhiyuan_htmlofficeservlet_getshell.gif new file mode 100644 index 0000000..93d02df Binary files /dev/null and b/Seeyon/htmlofficeservlet_uploadfile_getshell/zhiyuan_htmlofficeservlet_getshell.gif differ diff --git a/Unraid/CVE-2020-5847/CVE-2020-5847.gif b/Unraid/CVE-2020-5847/CVE-2020-5847.gif new file mode 100644 index 0000000..b10e278 Binary files /dev/null and b/Unraid/CVE-2020-5847/CVE-2020-5847.gif differ diff --git a/Unraid/CVE-2020-5847/README.md b/Unraid/CVE-2020-5847/README.md index 34e5491..ea4bb59 100644 --- a/Unraid/CVE-2020-5847/README.md +++ b/Unraid/CVE-2020-5847/README.md @@ -1,11 +1,11 @@ -# CVE-2020-24571 NexusDB path traversal +# CVE-2020-5847 Unraid 6.8.0 authenticate bypass remote code execution -NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal. +Unraid是一套主要用于个人和小型企业的操作系统。Unraid 6.8.0及之前版本中存在安全漏洞。攻击者可利用该漏洞绕过访问控制并执行代码,从而获取服务器权限。 -**Affected version**: nexusdb < 4.50.23 +**Affected version**: Unraid <= 6.8.0 -**[FOFA](https://fofa.so/result?q=header%3D%22Server%3A+NexusDB%22&qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5leHVzREIi&file=&file=) query rule**: header="Server: NexusDB" +**[FOFA](https://fofa.so/result?qbase64=Ym9keT0iL3dlYkd1aS9pbWFnZXMvZ3JlZW4tb24ucG5nIg) query rule**: body="/webGui/images/green-on.png" # Demo -![](CVE-2020-24571.gif) \ No newline at end of file +![](CVE-2020-5847.gif) \ No newline at end of file diff --git a/WebSphere/CVE-2020-4450/README.md b/WebSphere/CVE-2020-4450/README.md deleted file mode 100644 index 34e5491..0000000 --- a/WebSphere/CVE-2020-4450/README.md +++ /dev/null @@ -1,11 +0,0 @@ -# CVE-2020-24571 NexusDB path traversal - -NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal. - -**Affected version**: nexusdb < 4.50.23 - -**[FOFA](https://fofa.so/result?q=header%3D%22Server%3A+NexusDB%22&qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5leHVzREIi&file=&file=) query rule**: header="Server: NexusDB" - -# Demo - -![](CVE-2020-24571.gif) \ No newline at end of file