漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple unrestricted file upload vulnerabilities in Kusaba 1.0.4 and earlier allow remote authenticated users to execute arbitrary code by uploading a file with an executable extension using (1) load_receiver.php or (2) a shipainter action to paint_save.php, then accessing the uploaded file via a direct request to this file in their user directory.
漏洞信息
N/A
漏洞
N/A
漏洞
Kusaba 'paint_save.php' 远程代码执行漏洞
漏洞信息
Kusaba 1.0.4 及其早期版本中存在多个无限制上传漏洞。远程验证用户通过上传一个具有可执行扩展名的文件,该文件扩展名使用(1)load_receiver.php或(2)对paint_save.php的一个shipainter操作,并对用户目录的文件提交一个直接请求来访问该文件,以执行任意代码。
漏洞信息
N/A
漏洞
N/A