Odoo 12.0.20190101 – ‘nssm.exe’ Unquoted Service Path
pwnwiki.com , EXP # Exploit Title: Odoo 12.0.20190101 - 'nssm.exe' Unquoted Service Path # Exploit Author: 1F98D # Vendo ...
pwnwiki.com , EXP # Exploit Title: Odoo 12.0.20190101 - 'nssm.exe' Unquoted Service Path # Exploit Author: 1F98D # Vendo ...
PWNWIK.COM==免费、自由、人人可编辑的漏洞库 , 漏洞影响 MKCMS v5.0 POC POST /ucenter/reg.php HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 ...
PWNWIK.COM==免费、自由、人人可编辑的漏洞库 , EXP <-- Leica Geosystems GR10/GR25/GR30/GR50 GNSS 4.30.063 JS/HTML Code Injection Vendo ...
PWNWIK.COM , 第一处注入存在于login.php文件的username参数处: POST /php/login.php HTTP/1.1 Host: www.0-sec.org Content-Length: 98 Cache- ...
PWNWIK.COM , EXP #!/usr/bin/env python import requests target = 'http://x.x.x.x:8088/' lhost = 'x.x.x.x' #把本地主机ip放在这里,在9 ...
免费、自由、人人可编辑的漏洞库--pwnwiki.com , XSS # Exploit Title: PHP Timeclock 1.04 - 'Multiple' Cross Site Scripting (XSS) # Date: M ...
PWNWIK.COM , FOFA body="/imc/javax.faces.resource/images/login_help.png.jsf?ln=primefaces-imc-new-webui" Request POST /i ...
PWNWIK.COM , EXP # Exploit Title: Grocery crud 1.6.4 - 'order_by' SQL Injection # Date: 11/06/1963 # Exploit Author: Ton ...
pwnwiki.com , POC POST /example/tree/a/search HTTP/1.1 Host: www.0-sec.org:8080 Content-Type: application/x-www-form-url ...
PWNWIK.COM==免费、自由、人人可编辑的漏洞库 , # Exploit Title: Privilege Escalation (Manipulation of User Group) Vulnerability on Fiyo C ...