Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2001-0308
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
UploadServlet in Bajie HTTP JServer 0.78, and possibly other versions before 0.80, allows remote attackers to execute arbitrary commands by calling the servlet to upload a program, then using a ... (modified ..) to access the file that was created for the program.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Bajie Webserver远程命令执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Bajie Http JServer是一个用Java写的Web服务器,可以从 http://go.to/bajie 和 http://java.tucows.com 这两个站点获得。 Bajie Http JServer存在漏洞,有可能在运行Bajie Webserver的主机上远程执行任意的命令。 远程用户可以利用Bajie内置的上传特性把恶意脚本放在Bajie Webserver上。可以把这些上传脚本取名为已知的文件名,并且放在已知的目录位置上。一旦这些文件被上传,它们就可以作为CGI 脚本在服务器上
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2001-0308
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2001-0308
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2001-0308

No comments yet


Leave a comment