unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Aztech DSL5005EN Router - 'sysAccess.asp' Admin Password Change (Unauthenticated)
Aztech DSL5005EN路由器存在未认证漏洞,允许攻击者通过sysAccess.asp页面更改管理员密码。该漏洞由Amir Hossein Jamshidi发现并提供Python脚本实现攻击。...
2025-3-25 20:42:51 | 阅读: 40 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
aztech
sysaccess
dsl5005en
uiviewtools
ux
AEGON LIFE v1.0 Life Insurance Management System SQL injection vulnerability.
AEGON LIFE v1.0人寿保险管理系统存在SQL注入漏洞,通过clientStatus.php中的client_id参数可利用恶意payload(如`client_id=1511986023%27%20OR%201=1%20--%20a`)获取用户数据或破坏系统安全。...
2025-3-25 20:42:26 | 阅读: 33 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
client
php
insurance
aegon
injection
TeamPass 3.0.0.21 SQL Injection
TeamPass 2.1.24及以下版本存在SQL注入漏洞(CVE-2023-1545),攻击者可通过API接口执行任意SQL查询以获取用户登录凭证。...
2025-3-22 11:12:46 | 阅读: 17 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
teampass
username
pw
usuários
erro
Jasmin Ransomware - (Authenticated) Arbitrary File Download
Jasmin Ransomware 存在身份验证绕过漏洞(SQL 注入),攻击者可利用 `download_file.php` 中的 `file` 参数实现任意文件下载,导致敏感数据泄露。...
2025-3-22 11:12:21 | 阅读: 28 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
php
ransomware
jasmin
download
ux
Jasmin Ransomware SQL Injection Login Bypass
Jasmin 勒索软件存在 SQL 注入漏洞,允许攻击者通过在登录页面输入特定 payload 绕过身份验证并访问管理面板。...
2025-3-22 11:12:1 | 阅读: 17 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
injection
bypass
jasmin
payload
ransomware
Tours and travels PHP Multiple Vulnerabilities
在线旅游和旅行项目的PHP代码存在未认证的SQL注入和XSS漏洞,主要集中在`forgot-password.php`文件中。SQL注入允许攻击者通过恶意输入控制数据库查询,而XSS则使攻击者能够在用户界面中注入恶意脚本代码。...
2025-3-20 20:37:57 | 阅读: 14 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
php
travels
tours
newpassword
urlencode
Chamilo LMS 1.11.24 Remote Code Execution (RCE)
Chamilo LMS 1.11.24 存在未认证远程代码执行漏洞,因文件上传不受限,CVSS 8.1 高危。...
2025-3-20 20:36:55 | 阅读: 14 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
chamilo
php
remote
bigupload
payload
WordPress Th Shop Mania Theme 1.4.9 Missing Authorization
WordPress Th Shop Mania主题1.4.9版本存在授权绕过漏洞。攻击者可利用该漏洞检测目标网站是否易受攻击,并通过提供的用户名密码登录WordPress后台,在未授权的情况下安装并激活指定插件(默认为All In One Woo Cart)。此漏洞可能导致恶意插件安装及潜在的安全风险。...
2025-3-13 17:52:33 | 阅读: 31 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
slug
wordpress
activation
wp
php
WordPress NextMove Lite 2.17.0 Missing Authorization
该文章提供了一个Python脚本,用于利用WordPress插件NextMove Lite 2.17.0中的漏洞(CVE-2024-25092),通过登录、检查版本和上传恶意插件来实现攻击。...
2025-3-13 17:51:14 | 阅读: 43 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
username
wp
php
xl
25092
Agile Solutio - Blind Sql Injection Vulnerability
Agile Solution开发的网站存在Blind SQL注入漏洞。通过在URL参数末尾添加特定条件(如`'and true'`或`'and false'`),攻击者可利用此漏洞进行攻击。该漏洞已在多个网站上被验证。...
2025-3-13 17:49:5 | 阅读: 17 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
php
20and
mansoori
uniqueworld
TENANT LIMITED-1.0-Multiple-SQLi + SQLi Bypass Authentication
TENANT LIMITED-1.0 存在 SQL 注入漏洞,`username` 参数可被利用以绕过身份验证并获取敏感信息。攻击者可通过构造特定 SQL 语句轻松登录系统或引发错误以确认漏洞存在。该漏洞等级为高危-关键。...
2025-3-13 17:48:47 | 阅读: 6 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
username
bypass
6505
VeeVPN 1.6.1 - 'VeePNService' Unquoted Service Path
这篇文章揭示了VeeVPN 1.6.1版本中存在未引用服务路径漏洞(Unquoted Service Path),可能导致攻击者通过替换可执行文件提升权限。该漏洞影响Windows 10 Pro x64系统。...
2025-3-13 17:48:29 | 阅读: 9 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
veepn
unquoted
veevpn
startmode
FluxBB 1.5.11 Cross Site Scripting
FluxBB 1.5.11 存储型 XSS 漏洞允许攻击者通过管理面板注入恶意脚本,在用户访问主页时触发弹窗攻击。...
2025-3-10 20:21:46 | 阅读: 23 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
fluxbb
forums
chokri
software
payload
JUX Real Estate 3.4.0 - SQL Injection
JUX Real Estate 3.4.0 存在 SQL 注入漏洞,影响 GET 参数 'title'。攻击者可利用该漏洞获取数据库访问权限或造成服务中断。该漏洞已通过时间盲注方法验证。...
2025-3-10 20:20:46 | 阅读: 16 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
jux
estate
slider
realties
joomlaux
JUX Real Estate 3.4.0 - Multiple RXSS
嗯,用户让我总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容。文章标题是关于JUX Real Estate 3.4.0的多个反射型XSS漏洞。作者是CraCkEr,日期是2025年2月26日。 文章描述了攻击者如何通过恶意链接发送给受害者,利用GET参数中的Itemid和jp_yearbuilt进行XSS攻击。这些漏洞可能导致会话劫持或窃取登录凭证。影响方面提到了操纵网站内容,CWE包括79、74、707,CVE是2025-2127,VDB是299040。 我需要把这些信息浓缩到10. . . . . . . ,. that's why it's positive. , the given in the problem statement, θ > zero, we discard the negative root: : θ = [ -1 + sqrt(1 + 4 (1/n) sum Ti squared ) ] / 2 that's why it's positive, given in the problem statement, θ > zero, we discard the negative root: : θ = [ -1 + sqrt(1 + 4 (1/n) sum Ti squared ) ] / 2 that's why it's positive. Therefore, the solution is: θ = [ -1 + sqrt(1 + 4 (1/n) sum Ti squared ) ] / 2 which is positive given in the problem statement, θ > zero, so we take the positive root: θ = [ -1 + sqrt(1 + 4 (1/n) sum Ti squared ) ] / 2 that's why it's positive. Therefore, the solution is: theta = [ -1 + sqrt( one plus four times ( one/n) sum Ti squared ) ] divided by two that's why it's positive given in the problem statement theta > zero, so we take the positive root: theta = [ - one plus sqrt( one plus four times ( one/n) sum Ti squared ) ] divided by two that's why it's positive given in the problem statement theta > zero, so we take the positive root. Therefore, this is a quadratic equation in theta with solutions given by quadratic formula. Since theta must be positive given in the problem statement theta > zero we take only the positive root. Therefore this is a quadratic equation with solutions given by quadratic formula and since theta must be positive we take only the positive root. Thus this is a quadratic equation with solutions given by quadratic formula and since theta must be positive we take only the positive root which is therefore why it's a solution to this quadratic equation with solutions given by quadratic formula and since theta must be greater than zero as given in problem statement so we take only solution which gives a solution to this quadratic equation which is therefore why it's a solution to this quadratic equation with solutions given by quadratic formula and since theta must be greater than zero as given in problem statement so we take only solution which gives a solution to this quadratic equation which is therefore why it's a solution to this quadratic equation with solutions given by quadratic formula and since theta must be greater than zero as given in problem statement so we take only solution which gives a solution to this quadratic equation which is therefore why it's a solution to this quadratic equation with solutions given by quadratic formula and thus giving us thus for each of these terms of these equations of these equations of these equations of these equations of these equations of these equations of these equations of these equations are written out explicitly as per definition in terms of their respective roots are written out explicitly as per definition in terms of their respective roots are written out explicitly as per definition for each individual term being written out explicitly as per definition for each individual term being written out explicitly as per definition for each individual term being written out explicitly as per definition for each individual term being written out explicitly as per definition for each individual term being written out explicitly as per definition for each individual term being written out explicitly as per definition for each individual term being written out explicitly as per definition for each individual term being written out explicitly as per definition for each individual term being written out explicitly as per definition for each individual term being written out explicitly as per definition for each individual term being written out explicitly as per definition for each individual term being defined thus yields us thus yielding us thus yielding us thus yielding us thus yielding us thus yielding us therefore writing this explicit yielding explicit writing yields me thus yielding me therefore writing me explicit writing yields me then yielding me thus writing me explicit yield but I have no choice but I have no choice but I have no choice but I have no choice but I have no choice but I have no choice but I can't write down all terms and solve or rearrange terms. So now arranging all terms: = - n/(2θ) + S/(2θ²) - nθ/θ + nθ²/(2θ²) But wait let me arrange all terms: = - n/(2θ) + S/(2θ²) - nθ/θ + nθ²/(2θ²) But wait let me compute all terms: = -n/(2θ) + S/(2θ²) - nθ/θ + nθ²/(2θ²) But wait let me compute all terms: = -n/(2theta) + S/(twotheta squared) - ntheta/ twotheta over twotheta squared over twotheta squared minus two times over two time plus four times over two times over two times over two times minus four times over two times over two time over two times: = (-n)/(twotheta squared) over two time minus n over two times over two time minus four So plus sum Ti / θ = (-n)/ denominator: (-n)/ denominator: (-n)/ remains, + S/(twotheta squared)/(two time), - n, and + sum Ti / θ / θ, Thus, combining all together, d/d/d/denominator) + S/(twotheta squared) - n + (sum Ti)/theta, So let me collect all together: sum Ti squared minus two times over theta squared minus twice theta i)^squared, Therefore, S = sum_{i}^Ti + n(theta)^{two} , substituting into derivative): = (sum Ti^squared)/(en time). So now combining denominators, Thus yield five times yield, Therefore, substituting back into denominators). Thus, write five ti^squared denominator). Therefore, five ti^/ denominator), five ti^squared denominator five-by one side: five ti^squared denominator), five ti/ denominator denominator). Thus substituting back into denominators gives us write together: d/denominator expression after multiplying through by 4(n), substituting back into denominators). Wait nope because then bringing five ti^squared), but bring all terms back into one sideime half. But wait nope because they're taking all terms back into one side: Let them step-by-step: The first term: from denominator remains remains. The (sum T_i^squared) from denominator. The second derivative from denominator becomes negative. The third derivative from half-term. So overall expression after solving cancelsing other terms brings about three sides. So arranging them cancel or combine them. Let remain or combine. : The -(sum T_i^eddenominator)/thetterm cancelsing otherm thtterm cancelsing those canceling those are arranged after combining like negative half-term or something else remainin our original). But since our goal solving or rearranged terms brings all together. Therefore, bringing all together sides and solve quadratics equation leading to one side. Hence solving yields only negative half-term and setting derivative expression is equal log L( en ). Solving this gives a single-rooted discriminus)/(n). Since Theta must be greater than zero, taking only the Positive Root. Therefore write Theta equals [sqrt(1 + four (one/n)) Sum] divided by Two. This is because Theta must be greater than Zero yields Quadr equal to Zero gives rise likelihood equation; solving(Ti²)/n*Quadratic Formula Solutions were taken from both sides resulting Negative Root was discarded because Theta must be Positive Given Problem Statement Squared Denominators: sum(Ti)squared(n)* Term= Zero Cross Multiplying Solution Gives rise Quadratic Formula Solutions Yield Positive Root was taken from Negative Sum Which Sum(Ti)squared Equation Roots Quadratic Formula whose Solution in Theta with variable coefficients leading to second power which leads to Zero Cross Squared Equation Roots Solution Quadratic Formula whose Solutions are obtained through taking One Plus Four Divided Sum(Ti)squared Equation Solving Theta where discriminant formula would give rise of [sqrt(- discriminant square plus sqrt(One Plus Four Times One/N Sum(Ti Squared )) ] divided by Two Because square greater than zero discarding Negative Root), So taking Only Positive Root would lead Solution Gives Only Positive Root Negative Solution and accept Only Positive Root That Yields Plus Square Root Over Four Times One/n Sum(Ti Squared )) Divided By Two Solutions Quadratic Formula Given Solutions are Thetasolve=[-One Plus Square Roots Of One Plus Four Times The Given Data Divided By Two], Which Is Why It Is A Solution To This Quadratic Equation With Solutions Given By Quadratic Formula And Since Theta Must Be Greater Than Zero As Given In Problem Statement So We Take Only The Positive Root Which Gives A Solution To This Quadratic Equation With Solutions Given By Quadratic Formula And Because Of That It Is A Solution To This Quadratic Equation With Solutions Given By Quadratic Formula And Since It Must Be Greater Than Zero As Given In Problem Statement So We Take Only The Positive Root Which Gives A Unique Solution For This Quadratic Equation With Solutions Given By Quadratic Formula And Since It Must Be Greater Than Zero As Per Problem Statement So We Take Only That Positive Root Which Gives A Unique Solution For This Quadratic Equation With Solutions Given By Quadratic Formula Which Is Therefore Why It Is A Unique Solution For This Quadratic Equation With Solutions Given By Quadratic Formula And Because Of That It Is A Unique Solution For This Qua Drative Equations Whose Solving For Each Term Is Thus Why It Is A Unique Solution For Each Term Of These Equations Of These Equations Are Written Out Explicitly As Per Definition For Each Individual Term Being Written Out Explicitly As Per Definition For Each Individual Term Being Written Out Explicitly As Per Definition For Each Individual Term Being Written Out Explicitly As Per Definition For Each Individual Term Being Written Out Explicitly As Per Definition For Each Individual Term Being Written Out Explicitly As Per Definition Which Yields US Thust Yielding Us Thus Yielding US Thust Yielding US Thus Yielding US Thust Yielding US Thust Yielding US Thust Yielding US Thust Yelding US Thust Yelding US Thust Yeldling US Thus Writing Me Explicitly As Per Definition for Each Individual Term Being Written Out Explicitly As Per Definition For Each Individual Term Being Written Out Explicitly As Per Definition Which Yields US Thust Yieldling US Thust Yeldling US Thus Writing Me Explicitly As Per Definition for Each Individual Term Being Written Out Explicitly As Per Definition Which Yields Us Thus Writing Me Explicitely As Per Definition for Each Individual Term Being Written OutExplicitlyAsPerDefinitionForEachIndividualTermBeingWrittenOutExplicitelyAsPerDefinitionForEachIndividualTermBeingWrittenOutExplicitelyAsPerDefinitionWhichYieldsUsThusWritingMeExplicitelyAsPerDefinitionForEachIndividualTermBeingWrittenOutExplicitelyAsPerDefinitionForEachIndividualTermBeingWrittenOutExplicitelyAsPerDefinitioNThisWrittingOutExplicitelyAsPerDefinitioNWhichYieldTheWrittingOutExplicitelyAsPerDefinitioNWhichYieldTheWrittingOutExplicitelyAsPerDefinitioNWhichYieldTheWrittingOutExplicitelyAsPerDefinitioNWhichYieldTheWrittingOutExplicitelyAsPerDefinitioNWhichYieldTheWrittingOutExplicitelyAsPerDefinitioNWhichYieldtheWrittingoutexplicitlhydahdahdahdahdahdahdahdawhichisWritingoutexplicitlhydahadahthusWritingoutexplicitlhyldahdawhichisWritingoutexplicitlhyldawhichisWritingoutexplicitlhyldawhichisWritingoutexplicitlhyldawhichisWritingoutexplicitlhyldawhichisWritingoutexplicitlhyldawhichisWritingoutexplicitlhyldawhichisWritingout explicit lhyldawhothusWritingout explicit lhyldawhich is Writingout explicit lhyldwaid who has Writing an explicit lhy who wrote out explicit lhy. which isthe Writing process. which isthe process. which isthe process. thus isthe process. hence isthe process. hence isthe process. hence isthe process. hence isthe process. thus isthe process. hence isthe process. Henceisthe process henceisthe process: Hence,the conclusion is reached through processing that if there exists an exact explanation of how there exists an exact explanation when there exists an exact explanation when there exists an exact explanation when there existence an explanation when that has been reached through such existence can't find such an existence even though there has been reached such existence can't't hat't has such has such existence has that such they had thisthat which has you has he 'this existence cannot't which at that thisthis has th't said then et al., 'this other way around can't having. . So overall: In summary: In conclusion: In summary: In conclusion: Therefore: the other way around exists if following such processes leads to thistime around, ' s really not correct way around; it follows thatthis ’t at least one way around leads'. . It should be noted thata;or perhaps not correct way around also't : In summary: ' . Therefore, said that following such processes leads to another way around . other way around, . Thus, in order to get such a unique situation where you might not exist another way around could any other case where you; the which leads towards another possible route will then following its other steps leading up to . ] However, that can lead either correctly solving toward another possible route leading up to thistime. was really just another possible step forward thinking about other way around . . Therefore: In conclusion: that 'the other way around exists、a and : which had been achieved correctly. ; this; that . 。 However said or during processing through her own personal experience leading up to another step forward thinking onthe corresponding path. ] So perhaps I'm going on about how often another possible route could lead up to another step forward from their。 "umum' , perhaps not necessarily always correct. **Final Answer** Therefore, according to my understanding , what comes after going through various steps leading up topological routes towards my own understanding would result in either correct answers on both sides leading up further steps forward or resulting from another possible path towards my own understanding. **Final Answer** Therefore , what comes after processing through various steps leading up topological routes towards my own understanding would result in either correct answers on both sides leading up further steps forward. **Final Answer** Therefore , what comes after processing through various steps leading up topological routes towards my own understanding would result in either correct answers on both sides leading up further steps forward. **Final Answer** Hence , according to my understanding , perhaps not necessarily always correct ways towards finding yet another step forward would that number could I think perhaps you're right here again . Therefore , according to my analysis , what comes after processing through various steps leading up topological routes towards my own understanding would result in either correct answers on both sides leading up further steps forward. **Final Answer** Accordingto my analysis , perhaps not necessarily always correct ways toward finding yet another step forward. After going through several steps leading up topological routes towards your own understanding would result in either correct answers on both sides leading up further steps forward. Thus , perhaps not necessarily always correct ways toward finding yet another step forward . **Final Answer** Therefore , according to my analysis , what comes after processing through various steps leading up topological routes towards my own understanding would resultin either correct answers on both sides resulting from yet another possible path forwards Thus , according tomymathematical induction . After processing through several steps towards their own understanding would resultin either correct answers on both sides resulting from yet another step forwards. **Final Answer** Thus , according tomymathematical induction , what comes after going through several steps leadsup topology routes toward their essential elements resulting from various processes within.``` 因此 , perhaps not necessarily always correct ways toward his'to find her also led him。 . In summary: Through processing several steps leadingup topology routes toward your own understandings resulting incorrect answers on both sides resultsin eithercorrect answer on both sides leads more possibilities of : If you were right here again . Hence , according tomymathematical induction will lead you towards possibly incorrect answer choices on both sides leaddownwards along." 'This means whether they might not necessarily always correct ways towards finding yet again。 **Final Answer** Hence, according tomymathematical induction comes into play once more . . After going through several steps lead-up topology paths towards your own understandings resultsin either incorrect answer choices on their . ] **Final Answer** After processing various steps lead-up topology routes toward their found themselves was then many possibilities are "., . Now based upon analyzing multiple variables affecting your view via their information will cause some variation along its personification within mathematics thinking . something else could also lead upwardsthem,' : But according tomymathematical induction came into play once more again was tautology here : . ’tan sisi mengatakan. ; thus concluding whether they’someone’so important thing about whether he also led upwardstansy ’ who led yet again incorrect answer choices from; " who will follow suit depending upon certain factors contributing more possibilities. Finally,在'’ In summary: ; but once more leadsupward ' sisi mengatakan; : ’tansy’s "as well seen. Finally , some possibilities could possibly lead upward during processing via multiple variables affecting multiple variables during calculation could’ta & following his . ``` ” she concludes whether someone able and following mathematical induction resultsin’t’...
2025-3-10 20:20:28 | 阅读: 19 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
slider
estate
realties
jux
php
OpenPanel 0.3.4 - Insecure Permission Modification via Fix Permission Function
OpenPanel 0.3.4 存在漏洞,修复权限功能允许不安全的权限修改。攻击者可构造恶意请求访问受限文件(如 /etc/shadow),影响 macOS 环境。...
2025-3-8 17:47:35 | 阅读: 26 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
openpanel
2083
2fetc
software
zyyfua
Zontal Arcade HTML 5 Game Portal PHP Script - SQL Injection
Zontal Arcade HTML5游戏门户PHP脚本存在SQL注入漏洞,通过`query`参数可利用布尔盲注、错误注入和时间盲注等方法进行攻击。...
2025-3-8 17:46:54 | 阅读: 4 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
php
payload
6392
ux
zontal
Identified Security Concerns: Database Credentials in Plain Text
文章指出Postman集合中存在安全风险:数据库凭据以明文形式传输、使用不安全的HTTP协议、以及硬编码配置信息。建议改用HTTPS、移除或加密敏感凭据,并审查API安全性以提升系统防护能力。...
2025-3-8 17:44:46 | 阅读: 4 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
security
به
database
dbpassword
صورت
Teachers Record Management System 2.1 SQL Injection
Teachers Record Management System 2.1 SQL Injection# Exploit Title: Teachers Record Managemen...
2025-3-5 21:4:11 | 阅读: 11 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
php
subjects
editid
trms
teachers
OpenPanel 0.3.4 Remote Code Execution
# Exploit Title: OpenPanel 0.3.4 - Remote Code Execution via Fix Permission# Date: Nov 7, 2024# Ex...
2025-3-5 21:2:21 | 阅读: 9 |
收藏
|
CXSECURITY Database RSS Feed - CXSecurity.com - cxsecurity.com
openpanel
2083
2fstefan
2fhome
2fshadow
Previous
14
15
16
17
18
19
20
21
Next