随笔分类 - 漏洞报告
摘要:Article 2: Vulnerability 1 – Unauthenticated Code Generation Endpoint Title: Unauthenticated Code Generation Interface Allows Arbitrary Table manupula
阅读全文
摘要:Article 7: Unauthorized system log read Details: File: nnovel-admin/src/main/java/com/java2nb/common/controller/LogController.java Endpoint: GET /comm
阅读全文
摘要:Article 5: Vulnerability 4 – Unauthorized Crawler Source Control & SSRF (CVE-3) Title: Unauthenticated Crawl Interfaces Lead to Configuration Tamperin
阅读全文
摘要:Article 4: Vulnerability 3 – User Session Leak (CVE-2) Title: User Session Information Disclosed via Unauthenticated Endpoint Details: File: novel-sys
阅读全文
摘要:Article 3: Vulnerability 2 – Configuration Exposure (CVE-1 part2) Title: Sensitive Configuration Information Disclosed Without Authentication Details:
阅读全文
摘要:## intro Any user can update the number of questions they are allowed to ask. ## PoC There is no access limitation for users to charge their question
阅读全文
摘要:## intro Create a new user while specifying a nonexistent expire field to gain membership privileges. You can learn about the existing fields in the d
阅读全文

浙公网安备 33010602011771号