漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
pulverizr through 0.7.0 allows execution of arbitrary commands. Within "lib/job.js", the variable "filename" can be controlled by the attacker. This function uses the variable "filename" to construct the argument of the exec call without any sanitization. In order to successfully exploit this vulnerability, an attacker will need to create a new file with the same name as the attack command.
漏洞信息
N/A
漏洞
N/A
漏洞
pulverizr 注入漏洞
漏洞信息
pulverizr是一款图片压缩器。 pulverizr 0.7.0及之前版本存在安全漏洞,该漏洞源于没有对‘filename’参数进行任何清理,函数便直接使用了该参数。攻击者可利用该漏洞执行任意命令。
漏洞信息
N/A
漏洞
N/A