Richard-Tang

Results 8 issues of Richard-Tang

The plugin function allows you to execute arbitrary code to obtain server permissions Detail: https://github.com/Richard-Tang/SSCMS-PluginShell/blob/main/Detail.md The corresponding CVE number CVE-2022-28118 has been applied It is hoped that corresponding restrictions can...

```java package com.funnysec.richardtang.androidkiller4j; import javafx.application.Application; import javafx.scene.Scene; import javafx.scene.control.Button; import javafx.scene.layout.StackPane; import javafx.stage.Stage; import org.controlsfx.glyphfont.Glyph; import org.controlsfx.glyphfont.GlyphFont; import org.controlsfx.glyphfont.GlyphFontRegistry; public class Demo extends Application { static { GlyphFontRegistry.register("FaSolide", "file:///Users/richardtang/Desktop/GitProject/AndroidKiller4J/css/fa-solid.ttf", 20);...

https://www.ossec.net/docs/docs/manual/monitoring/process-monitoring.html#detecting-usb-storage-usage The USB example Command is used in this file ![image](https://user-images.githubusercontent.com/30547741/84212294-091d2780-aaf0-11ea-9f84-ac6da246b9af.png) https://www.ossec.net/docs/docs/syntax/head_ossec_config.localfile.html?highlight=localfile#element-localfile But I'm told here that it's not allowed ![image](https://user-images.githubusercontent.com/30547741/84212432-5e593900-aaf0-11ea-8952-992ce6f4414b.png)

搭了个环境试了一下,版本如下。 ![image](https://github.com/NS-Sp4ce/CVE-2021-21972/assets/30547741/01c4ea7a-7658-4739-b85a-6a501bab168f) 看了一下vCenterServer,文件是有上传成功的。 ![image](https://github.com/NS-Sp4ce/CVE-2021-21972/assets/30547741/490829cf-6d6b-4910-b10a-0351ece1ded5) 重启vCenterServer后等待一段时间还是访问不到这个文件。 ![image](https://github.com/NS-Sp4ce/CVE-2021-21972/assets/30547741/19e07c84-9ca5-4cb0-a226-5113e904a7ae) 时版本对不上吗?还是哪里操作有误 o.0?

I want to output log information generated during Java running to JGaf-UILogger! ![image](https://user-images.githubusercontent.com/30547741/142754320-7fe13181-34d2-4468-9afe-d8eaefafedac.png) Like the console in IntelliJ Idea

错误代码 [31] 获取预爬行网址失败,然后就一直提示这个信息!

e 感觉老哥写的挺好的 正好需要 不过年代久远了 有的好多看不到了 不知道老哥还能提供下不?

这里docker-compose构建的话会将33306端口对外开放,然后root密码是123。 因为是默认配置,一般可能不会注意到去修改这个密码。 ![image](https://user-images.githubusercontent.com/30547741/149657001-f49d7b4b-eff0-472a-86b6-43700d952f57.png) 在fofa上搜了一圈`title="QingScan"`,发现基本上都有这个问题 ![image](https://user-images.githubusercontent.com/30547741/149657054-35a88665-904c-4d1f-aeba-e7bb068dec98.png) 建议README.md上提示用户修改`/root/QingScan/docker/latest/docker-compose.yaml`文件下的`MYSQL_ROOT_PASSWORD=`选项值。 或者限制端口的对外访问之类的。