[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | bugku | PWN | favorite-color | flag{KJGvE9bzO3xCwF6UHLQjPq1ASVfR5moN} | https://blog.csdn.net/qq_43007452/art... | TJCTF2022 | 1941 |
| 2 | bugku | Crypto | Weird base message | flag{554a5058c9021c76} | https://blog.csdn.net/ | MidnightFlag2022 | 1487 |
| 3 | BUUCTF | Real | [Jboss]CVE-2017-7504 | JBoss AS 4.x及之前版本的JbossMQ实现中,JMS over HTTP Invocation Layer的HTTPServerILServlet.java文件存在反序列化漏洞(CVE-2017-7504)。攻击者可通过发送特制的序列化数据执行任意代码。影响范围为JBoss AS 4.x及之前版本。复现步骤包括使用ysoserial生成payload(如CommonsCollections5链),通过curl向/jbossmq-httpil/HTTPServerILServlet路径发送二进制数据,成功后可反弹shell或执行命令。修复方法包括升级至JBoss AS 5.x及以上版本、禁用JMS over HTTP Invocation Layer或限制HTTPServerILServlet的访问权限 4 5。 | https://blog.csdn.net/YouthBelief/art... | Jboss | 6954 |
| 4 | NSSCTF | Rabin | [NSSRound#11 Basic]ez_signin | NSSCTF{ab4e6712-c303-49bf-bf69-15b63852f0fb} | https://blog.csdn.net/2302_80322812/a... | NSSRound#11 | 11403 |
| 5 | NSSCTF | 文件上传 | [NISACTF 2022]bingdundun~ | NSSCTF{b98408b0-69f4-4ede-87a6-c2e9190b451b} | https://www.cnblogs.com/bkofyZ/p/1762... | NISACTF | 10433 |
| 6 | bugku | Reverse | zistel | DASCTF{014c6e74-0c4a-48fa-8b33-ced16f847e39} | https://blog.csdn.net/CLAY0011/articl... | 楚彗杯2024 | 2284 |
| 7 | 春秋云境 | WEB | CVE-2023-6019 | 无 | https://blog.csdn.net/m0_61155226/art... | 春秋云境 | 14558 |
| 8 | XCTF | Reverse | bad_python | flag{Sn0w_M@n!!!!!!!} | ... | 江苏工匠杯 | 9320 |
| 9 | BUUCTF | Web | [DASCTF Apr.2023 X SU战队2023开局之战]【中等】ezjxpath | DASCTF{5rOV562J5Y5pu+5amn6Zuv2B5aSa5Liq} | https://boogipop.com/2023/04/24/DASCT... | DASCTF Apr.2023 X SU战队2023开局之战 | 6257 |
| 10 | XCTF | Reverse | reverse_re3 | flag{md5(your input)} | https://blog.csdn.net/liKeQing1027520... | CTF | 9315 |