aurora 漏洞列表
共找到 7 个与 aurora 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2021-26292: AfterLogic Aurora and WebMail Pro < 7.7.9 - Full Path Disclosure POC
AfterLogic Aurora and WebMail Pro products with 7.7.9 and all lower versions are affected by this vulnerability, simply sending an HTTP DELETE request to WebDAV EndPoint with built-in “caldav_public_user@localhost” and it’s the predefined password “caldav_public_user” allows the attacker to obtain web root path. -
CVE-2021-26294: AfterLogic Aurora and WebMail Pro < 7.7.9 - Information Disclosure POC
AfterLogic Aurora and WebMail Pro products with 7.7.9 and all lower versions are affected by this vulnerability, simply sending an HTTP GET request to WebDAV EndPoint with built-in “caldav_public_user@localhost” and it’s the predefined password “caldav_public_user” allows the attacker to read all files under the web root. -
aurora-copy-tags-snap: Aurora Snapshot Tag Copy POC
Ensures Amazon Aurora clusters have Copy Tags to Snapshots feature enabled to automatically copy tags from clusters to snapshots. -
aurora-delete-protect: Aurora Cluster Deletion Protection POC
Ensure Amazon Aurora clusters have Deletion Protection enabled to prevent accidental data loss. -
CVE-2021-26292: AfterLogic Aurora and WebMail Pro < 7.7.9 - Full Path Disclosure POC
AfterLogic Aurora and WebMail Pro products with 7.7.9 and all lower versions are affected by this vulnerability, simply sending an HTTP DELETE request to WebDAV EndPoint with built-in “caldav_public_user@localhost” and it’s the predefined password “caldav_public_user” allows the attacker to obtain web root path. -
CVE-2021-26294: AfterLogic Aurora and WebMail Pro < 7.7.9 - Information Disclosure POC
AfterLogic Aurora and WebMail Pro products with 7.7.9 and all lower versions are affected by this vulnerability, simply sending an HTTP GET request to WebDAV EndPoint with built-in “caldav_public_user@localhost” and it’s the predefined password “caldav_public_user” allows the attacker to read all files under the web root. -
Afterlogic Aurora & WebMail Pro 任意文件读取(CVE-2021-26294) 无POC
AfterLogic WebMail Pro 是一个基于浏览器WebEmail客户端,能够很是方便的和现有的消息系统(邮件系统)集成。攻击者可以通过caldav_public_user@localhost用户登录,不需要其它用户信息就可以读取配置文件从而获得敏感信息。