CopyParty 漏洞列表
共找到 9 个与 CopyParty 相关的漏洞
📅 加载漏洞趋势中...
-
Copyparty1.8.6存在XSS漏洞(CVE-2025-54589) 无POC
Copyparty1.8.6存在XSS漏洞,攻击者可以获取用户敏感信息。 -
CVE-2023-37474: Copyparty <= 1.8.2 - Directory Traversal POC
Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. -
CVE-2023-38501: CopyParty v1.8.6 - Cross Site Scripting POC
Copyparty is a portable file server. Versions prior to 1.8.6 are subject to a reflected cross-site scripting (XSS) Attack.Vulnerability that exists in the web interface of the application could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link. -
CVE-2025-54589: Copyparty <=1.18.6 - Cross-Site Scripting POC
Copyparty before 1.18.7 is vulnerable to reflected cross-site scripting (XSS) via the 'filter' parameter in the '/?ru' endpoint. Unsanitized user input is reflected in the HTML response, allowing attackers to execute arbitrary JavaScript in the context of the victim's browser. -
CVE-2023-37474: Copyparty <= 1.8.2 - Directory Traversal POC
Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. -
CVE-2023-38501: CopyParty v1.8.6 - Cross Site Scripting POC
Copyparty is a portable file server. Versions prior to 1.8.6 are subject to a reflected cross-site scripting (XSS) Attack.Vulnerability that exists in the web interface of the application could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link. -
CVE-2025-54589: Copyparty <=1.18.6 - Cross-Site Scripting POC
Copyparty before 1.18.7 is vulnerable to reflected cross-site scripting (XSS) via the 'filter' parameter in the '/?ru' endpoint. Unsanitized user input is reflected in the HTML response, allowing attackers to execute arbitrary JavaScript in the context of the victim's browser. -
copyparty-xss: Copyparty v1.8.6 - Cross-Site Scripting POC
Copyparty is a portable file server. Versions prior to 1.8.6 are subject to a reflected cross-site scripting (XSS) Attack. The vulnerability in the application's web interface could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link. -
copyparty 低于1.8.2 版本存在任意文件读取漏洞(CVE-2023-37474) 无POC
Copyparty是一个便携式文件服务器,copyparty 低于1.8.2 版本存在任意文件读取漏洞