[随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
序号 Website Type Title Value Writeup Competition Id
1 bugku Crypto strange curve flag{b7f209df-1284-4bdf-b030-28197483c47b} ... 巅峰极客2022 1423
2 XCTF Web babyweb cyberpeace{add9262aadfefef43f74bc1315c441aa} https://www.cnblogs.com/Antoniiiia/p/18868884 国赛华东北 9280
3 BUUCTF Real [struts2]s2-012 验证后的网址 %{#a=(new... struts2 7452
4 BUUCTF Misc [WUSTCTF2020]girlfriend flag{youaremygirlfriends} https://cloud.tencent.com/developer/a... WUSTCTF2020 7728
5 qsnctf WEB YWB_Web_命令执行 echo base64_encode(file_get_contents("fl"."ag.p"."hp")); https://blog.csdn.net/wyjcxyyy/articl... 2025御网杯线下 5548
6 vulfocus WEB nagiosxi SQL注入 (CVE-2018-10737) NagiosXI <= 5.4.12 存在 SQL 注入漏洞(CVE-2018-10737),攻击者可通过 admin/logbook.php 的 txtSearch 参数执行任意 SQL 命令。受影响版本为 5.2.x 和 5.4.x(<5.4.13),修复方法为升级至 5.4.13 或以上版本。漏洞 PoC 示例为: POST /nagiosql/admin/logbook.php txtSearch=-1%' and (select 1 from(select count(*),concat((select (select (select concat(0x7e,version(),0x7e))) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)# 验证后的网址为:https://www.seebug.org/vuldb/ssvid-97267 https://www.seebug.org/vuldb/ssvid-97267 - 16622
7 NSSCTF CRYPTO [HNCTF 2022 WEEK2]S1mple_ECB NSSCTF{ECB_m0de_qu1te_s1mple} https://blog.csdn.net/Guang_Shi/artic... HNCTF 12388
8 bugku Crypto 强网先锋辅助 flag{i_am_very_sad_233333333333} https://hx1997.github.io/2019/05/28/q... 强网杯2019 230
9 NSSCTF SSTI [LitCTF 2024]一个....池子? NSSCTF{0ee42dc2-e44b-49b8-b92b-c309306127bd} https://blog.csdn.net/2301_80243833/a... LitCTF 10647
10 ctfshow WEB入门.Laravel专题 web628 https://fallingskies22.github.io/post... Laravel专题 4182