From e94b33a1a1b4cac2d30dc3a38b792f82416c56b0 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Mon, 7 Aug 2023 22:59:22 +0530 Subject: [PATCH] updated info --- http/vulnerabilities/other/sangfor-cphp-rce.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/http/vulnerabilities/other/sangfor-cphp-rce.yaml b/http/vulnerabilities/other/sangfor-cphp-rce.yaml index 1f3319fe2c..82bbf2c6cc 100644 --- a/http/vulnerabilities/other/sangfor-cphp-rce.yaml +++ b/http/vulnerabilities/other/sangfor-cphp-rce.yaml @@ -1,16 +1,16 @@ id: sangfor-cphp-rce info: - name: Sangfor Behavior Perception System c.php - Remote Command Execution Vulnerability + name: Sangfor Log Center - Remote Command Execution author: DhiyaneshDk severity: critical reference: - https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%B7%B1%E4%BF%A1%E6%9C%8D%20%E6%97%A5%E5%BF%97%E4%B8%AD%E5%BF%83%20c.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md?plain=1 metadata: max-request: 1 - fofa-query: "isHighPerformance : !!SFIsHighPerformance" verified: true - tags: lfi,sangfor + fofa-query: "isHighPerformance : !!SFIsHighPerformance" + tags: sangfor,rce http: - method: GET