mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-06-20 09:50:49 +00:00
ADD drupal_6340
This commit is contained in:
parent
0c9b6a34ed
commit
e4fcb65e0b
BIN
Nexus/CVE-2019-7238/CVE-2019-7238.gif
Normal file
BIN
Nexus/CVE-2019-7238/CVE-2019-7238.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 250 KiB |
Binary file not shown.
After Width: | Height: | Size: 220 KiB |
BIN
Unraid/CVE-2020-5847/CVE-2020-5847.gif
Normal file
BIN
Unraid/CVE-2020-5847/CVE-2020-5847.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 333 KiB |
@ -1,11 +1,11 @@
|
|||||||
# CVE-2020-24571 NexusDB path traversal
|
# CVE-2020-5847 Unraid 6.8.0 authenticate bypass remote code execution
|
||||||
|
|
||||||
NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal.
|
Unraid是一套主要用于个人和小型企业的操作系统。Unraid 6.8.0及之前版本中存在安全漏洞。攻击者可利用该漏洞绕过访问控制并执行代码,从而获取服务器权限。
|
||||||
|
|
||||||
**Affected version**: nexusdb < 4.50.23
|
**Affected version**: Unraid <= 6.8.0
|
||||||
|
|
||||||
**[FOFA](https://fofa.so/result?q=header%3D%22Server%3A+NexusDB%22&qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5leHVzREIi&file=&file=) query rule**: header="Server: NexusDB"
|
**[FOFA](https://fofa.so/result?qbase64=Ym9keT0iL3dlYkd1aS9pbWFnZXMvZ3JlZW4tb24ucG5nIg) query rule**: body="/webGui/images/green-on.png"
|
||||||
|
|
||||||
# Demo
|
# Demo
|
||||||
|
|
||||||

|

|
@ -1,11 +0,0 @@
|
|||||||
# CVE-2020-24571 NexusDB path traversal
|
|
||||||
|
|
||||||
NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal.
|
|
||||||
|
|
||||||
**Affected version**: nexusdb < 4.50.23
|
|
||||||
|
|
||||||
**[FOFA](https://fofa.so/result?q=header%3D%22Server%3A+NexusDB%22&qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5leHVzREIi&file=&file=) query rule**: header="Server: NexusDB"
|
|
||||||
|
|
||||||
# Demo
|
|
||||||
|
|
||||||

|
|
Loading…
x
Reference in New Issue
Block a user