You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
报错日志:
2024/03/14 15:28:59 127.0.0.1:50612 POST /api/v1/debugPoc
2024/03/14 15:28:59 reload go poc D:\goby-win-x64-2.7.5\golib\exploits\user\Apache_2.4.49_Path_Traversal_CVE_2021_41773.go
2024/03/14 15:28:59 load poc D:\goby-win-x64-2.7.5\golib\exploits\user\Panabit_Panalog_cmdhandle.php_backstage_RCE.go error: 99:12: not enough arguments in call to
在写 Apache 2.4.49 路径遍历 (CVE-2021-41773)漏洞的脚本时,使用了/icons/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/etc/passwd payload,插件会运行失败。
报错日志:
2024/03/14 15:28:59 127.0.0.1:50612 POST /api/v1/debugPoc
2024/03/14 15:28:59 reload go poc D:\goby-win-x64-2.7.5\golib\exploits\user\Apache_2.4.49_Path_Traversal_CVE_2021_41773.go
2024/03/14 15:28:59 load poc D:\goby-win-x64-2.7.5\golib\exploits\user\Panabit_Panalog_cmdhandle.php_backstage_RCE.go error: 99:12: not enough arguments in call to
2024/03/14 15:28:59 [WARNING] check Vulnerable failed: runtime error: invalid memory address or nil pointer dereference name: Apache 2.4.49 Path Traversal (CVE-2021-41773)
The text was updated successfully, but these errors were encountered: