[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | xuenixiang.com | Misc | 路飞 | - | https://www.xuenixiang.com/forum.php?... | 吉林CTF省赛-安全Core协会选拔赛 | 15045 |
| 2 | bugku | CTF-2020 | RACHELL | 无 | https://www.sohu.com/a/802589805_1216... | TSG | 1770 |
| 3 | BUUCTF | Crypto | [NewStarCTF 2023 公开赛道]halfcandecode | flag{cd5ff82d-989c-4fbf-9543-3f98ab567546} | https://www.cnblogs.com/mumuhhh/p/177... | NewStarCTF 2023 公开赛道 | 7084 |
| 4 | ctfshow | VIP题目限免 | 敏感信息公布 | ctfshow{f7c5236b-8724-4f57-908d-28fb456c4e41} | https://cloud.tencent.com/developer/a... | - | 3753 |
| 5 | BUUCTF | Misc | [HBNIS2018]低个头 | flag{CTF} | https://blog.csdn.net/m0_63613326/art... | HBNIS2018 | 6838 |
| 6 | vulfocus | WEB | Jira 信息泄露 (CVE-2020-36289) | CVE-2020-36289漏洞的利用方法是:通过向/secure/QueryComponentRendererValue!Default.jspa端点发送包含用户名参数(如assignee=user:admin)的HTTP请求,根据返回结果差异(如状态码、响应内容等)来判断目标用户名是否存在,从而实现未授权用户枚举。 3 | https://cloud.tencent.com/developer/a... | - | 16523 |
| 7 | 封神台 | CRYPTO | JSFUCK2(考点:JSFUCK解密) | - | https://bbs.zkaq.cn/t/6183.html | - | 14895 |
| 8 | XCTF | Pwn | format2 | 无 | https://blog.csdn.net/weixin_43868725... | - | 9153 |
| 9 | CTFHUB | Pwn | pwn10 | 无 | https://www.bilibili.com/opus/9814107... | CISCN | 10020 |
| 10 | NSSCTF | MISC | [BSidesSF 2020]mini-matroyshka | flag{delat_iz_muhi_slona} | https://blog.csdn.net/mochu7777777/ar... | BSidesSF | 13352 |