漏洞信息详情
Dream Catchers Post-It! CGI远程任意命令执行漏洞
- CNNVD编号:CNNVD-200112-070
- 危害等级: 高危
![图片[1]-Dream Catchers Post-It! CGI远程任意命令执行漏洞-一一网](https://www.proyy.com/skycj/data/images/2021-05-11/bbdd3e8868c10d22861b2275d65f4500.png)
- CVE编号:
CVE-2001-0844
- 漏洞类型:
输入验证
- 发布时间:
2001-12-06
- 威胁类型:
远程
- 更新时间:
2005-10-20
- 厂 商:
seth_leonard - 漏洞来源:
Discovered by Davi… -
漏洞简介
(1) Book of guests和(2) Post it!存在漏洞。远程攻击者可以借助email参数中的shell元字符执行任意代码。
漏洞公告
Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com
参考网址
来源: BUGTRAQ
名称: 20011030 cgi vulnerability
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=100446263601021&w=2
来源: BID
名称: 3485
链接:http://www.securityfocus.com/bid/3485
来源: BID
名称: 3483
链接:http://www.securityfocus.com/bid/3483
来源: XF
名称: postit-cgi-command-execution(7435)
链接:http://www.iss.net/security_center/static/7435.php
来源: XF
名称: bookofguests-cgi-command-execution(7434)
链接:http://www.iss.net/security_center/static/7434.php




















![[桜井宁宁]COS和泉纱雾超可爱写真福利集-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/4d3cf227a85d7e79f5d6b4efb6bde3e8.jpg)

![[桜井宁宁] 爆乳奶牛少女cos写真-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/d40483e126fcf567894e89c65eaca655.jpg)