漏洞_@2014-03-18

本文深入探讨了JS漏洞和SQL注入的基本概念、常见类型及危害,并提供了实用的防御策略。同时,文章还介绍了esapi、diff等工具在实际场景中的应用案例,为开发者提供了一套全面的安全防护指南。

li.sun teacher, teach~

JS 漏洞

SQL 注入漏洞
 esapi
WIKI : 坑
 小乌龟diff : 不行
 
tomcat标准配置是200个并发
 
Matching Modules ================ # Name Disclosure Date Rank Check Description - ---- --------------- ---- ----- ----------- 0 exploit/android/fileformat/adobe_reader_pdf_js_interface 2014-04-13 good No Adobe Reader for Android addJavascriptInterface Exploit 1 \_ target: Android ARM . . . . 2 \_ target: Android MIPSLE . . . . 3 \_ target: Android X86 . . . . 4 exploit/multi/local/allwinner_backdoor 2016-04-30 excellent Yes Allwinner 3.4 Legacy Kernel Local Privilege Escalation 5 exploit/android/local/futex_requeue 2014-05-03 excellent Yes Android 'Towelroot' Futex Requeue Kernel Exploit 6 \_ target: Automatic Targeting . . . . 7 \_ target: Default . . . . 8 \_ target: New Samsung . . . . 9 \_ target: Old Samsung . . . . 10 \_ target: Samsung Grand . . . . 11 exploit/android/local/su_exec 2017-08-31 manual No Android 'su' Privilege Escalation 12 \_ target: aarch64 . . . . 13 \_ target: armle . . . . 14 \_ target: x86 . . . . 15 \_ target: x64 . . . . 16 \_ target: mipsle . . . . 17 exploit/android/adb/adb_server_exec 2016-01-01 excellent Yes Android ADB Debug Server Remote Payload Execution 18 \_ target: armle . . . . 19 \_ target: x86 . . . . 20 \_ target: x64 . . . . 21 \_ target: mipsle . . . . 22 exploit/android/local/binder_uaf 2019-09-26 excellent No Android Binder Use-After-Free Exploit 23 auxiliary/gather/android_browser_new_tab_cookie_theft . normal No Android Browser "Open in New Tab" Cookie Theft 24 auxiliary/gather/android_browser_file_theft . normal No Android Browser File Theft 25 auxiliary/admin/android/google_play_store_uxss_xframe_rce . normal No Android Browser RCE Through Google Play Store XFO 26 exploit/android/browser/webview_addjavascriptinterface 2012-12-21 excellent No Android Browser and WebView addJavascriptInterface Code Execution 27 auxiliary/gather/android_htmlfileprovider . normal No Android Content Provider File Disclosure 28 post/android/gather/hashdump . normal No Android Gather Dump Password Hashes for Android Systems 29 exploit/android/local/janus 2017-07-31 manual Yes Android Janus APK Signature bypass 30 auxiliary/server/android_mercury_parseuri . normal No Android Mercury Browser Intent URI Scheme and Directory Traversal Vulnerability 31 auxiliary/server/android_browsable_msf_launch . normal No Android Meterpreter Browsable Launcher 32 payload/android/meterpreter_reverse_http . normal No Android Meterpreter Shell, Reverse HTTP Inline 33 payload/android/meterpreter_reverse_https . normal No Android Meterpreter Shell, Reverse HTTPS Inline 34 payload/android/meterpreter_reverse_tcp . normal No Android Meterpreter Shell, Reverse TCP Inline 35 payload/android/meterpreter/reverse_http . normal No Android Meterpreter, Android Reverse HTTP Stager 36 payload/android/meterpreter/reverse_https . normal No Android Meterpreter, Android Reverse HTTPS Stager 37 payload/android/meterpreter/reverse_tcp . normal No Android Meterpreter, Android Reverse TCP Stager 38 auxiliary/gather/android_object_tag_webview_uxss 2014-10-04 normal No Android Open Source Platform (AOSP) Browser UXSS 39 auxiliary/gather/android_stock_browser_uxss . normal No Android Open Source Platform (AOSP) Browser UXSS 40 post/android/manage/remove_lock_root . normal No Android Root Remove Device Locks (root) 41 post/android/capture/screen . normal No Android Screen Capture 42 post/android/manage/remove_lock 2013-10-11 normal No Android Settings Remove Device Locks (4.0-4.3) 43 exploit/android/browser/stagefright_mp4_tx3g_64bit 2015-08-13 normal No Android Stagefright MP4 tx3g Integer Overflow 44 \_ target: Automatic . . . . 45 \_ target: Nexus 7 (Wi-Fi) (razor) with Android 5.0 (LRX21P) . . . . 46 \_ target: Nexus 7 (Wi-Fi) (razor) with Android 5.0.1 (LRX22C) . . . . 47 \_ target: Nexus 7 (Wi-Fi) (razor) with Android 5.0.2 (LRX22G) . . . . 48 \_ target: Nexus 7 (Wi-Fi) (razor) with Android 5.1 (LMY47O) . . . . 49 \_ target: Nexus 7 (Wi-Fi) (razor) with Android 5.1.1 (LMY47V) . . . . 50 \_ target: Nexus 7 (Wi-Fi) (razor) with Android 5.1.1 (LMY48G) . . . . 51 \_ target: Nexus 7 (Wi-Fi) (razor) with Android 5.1.1 (LMY48I) . . . . 52 \_ target: Nexus 7 (Mobile) (razorg) with Android 5.0.2 (LRX22G) . . . . 53 \_ target: Nexus 7 (Mobile) (razorg) with Android 5.1 (LMY47O) . . . . 54 \_ target: Nexus 7 (Mobile) (razorg) with Android 5.1.1 (LMY47V) . . . . 55 \_ target: Nexus 5 (hammerhead) with Android 5.0 (LRX21O) . . . . 56 \_ target: Nexus 5 (hammerhead) with Android 5.0.1 (LRX22C) . . . . 57 \_ target: Nexus 5 (hammerhead) with Android 5.1 (LMY47D) . . . . 58 \_ target: Nexus 5 (hammerhead) with Android 5.1 (LMY47I) . . . . 59 \_ target: Nexus 5 (hammerhead) with Android 5.1.1 (LMY48B) . . . . 60 \_ target: Nexus 5 (hammerhead) with Android 5.1.1 (LMY48I) . . . . 61 \_ target: Nexus 6 (shamu) with Android 5.0 (LRX21O) . . . . 62 \_ target: Nexus 6 (shamu) with Android 5.0.1 (LRX22C) . . . . 63 \_ target: Nexus 6 (shamu) with Android 5.1 (LMY47D) . . . . 64 \_ target: Nexus 6 (shamu) with Android 5.1 (LMY47E) . . . . 65 \_ target: Nexus 6 (shamu) with Android 5.1 (LMY47I) . . . . 66 \_ target: Nexus 6 (shamu) with Android 5.1.1 (LYZ28E) . . . . 67 \_ target: Nexus 6 (shamu) with Android 5.1 (LMY47M) . . . . 68 \_ target: Nexus 6 (shamu) with Android 5.1.1 (LMY47Z) . . . . 69 \_ target: Nexus 6 (shamu) with Android 5.1.1 (LVY48C) . . . . 70 \_ target: Nexus 6 (shamu) with Android 5.1.1 (LMY48I) . . . . 71 \_ target: Nexus 6 (shamu) with Android 5.1.1 (LYZ28J) . . . . 72 \_ target: Nexus 6 (shamu) with Android 5.1.1 (LVY48E) . . . . 73 \_ target: Samsung Galaxy S5 (VZW SM-G900V) with Android 5.0 (LRX21T) . . . . 74 auxiliary/dos/android/android_stock_browser_iframe 2012-12-01 normal No Android Stock Browser Iframe DOS 75 exploit/android/local/put_user_vroot 2013-09-06 excellent No Android get_user/put_user Exploit 76 payload/android/shell/reverse_http . normal No Command Shell, Android Reverse HTTP Stager 77 payload/android/shell/reverse_https . normal No Command Shell, Android Reverse HTTPS Stager 78 payload/android/shell/reverse_tcp . normal No Command Shell, Android Reverse TCP Stager 79 post/android/gather/sub_info . normal No Extract Subscriber Info 80 auxiliary/gather/firefox_pdfjs_file_theft . normal No Firefox PDF.js Browser File Theft 81 post/android/gather/wireless_ap . normal No Gather Wireless SSIDs and PSKs 82 post/android/local/koffee 2020-12-02 normal No KOFFEE - Kia OFFensivE Exploit 83 \_ action: CAMERA_REVERSE_OFF . . . It hides the parking camera video stream 84 \_ action: CAMERA_REVERSE_ON . . . It shows the parking camera video stream 85 \_ action: CLUSTER_CHANGE_LANGUAGE . . . It changes the cluster language 86 \_ action: CLUSTER_RADIO_INFO . . . It shows radio info in the instrument cluster 87 \_ action: CLUSTER_RANDOM_NAVIGATION . . . It shows navigation signals in the instrument cluster 88 \_ action: CLUSTER_ROUNDABOUT_FARAWAY . . . It shows a round about signal with variable distance in the instrument cluster 89 \_ action: CLUSTER_SPEED_LIMIT . . . It changes the speed limit shown in the instrument cluster 90 \_ action: HIGH_SCREEN_BRIGHTNESS . . . It increases the head unit screen brightness 91 \_ action: INJECT_CUSTOM . . . It injects custom micom payloads 92 \_ action: LOW_FUEL_WARNING . . . It pops up a low fuel message on the head unit 93 \_ action: LOW_SCREEN_BRIGHTNESS . . . It decreases the head unit screen brightness 94 \_ action: MAX_RADIO_VOLUME . . . It sets the radio volume to the max 95 \_ action: NAVIGATION_FULL_SCREEN . . . It pops up the navigation app window 96 \_ action: REDUCE_RADIO_VOLUME . . . It decreases the radio volume 97 \_ action: SEEK_DOWN_SEARCH . . . It triggers the seek down radio frequency search 98 \_ action: SEEK_UP_SEARCH . . . It triggers the seek up radio frequency search 99 \_ action: SET_NAVIGATION_ADDRESS . . . It pops up the navigation address window 100 \_ action: SWITCH_OFF_HU . . . It switches off the head unit 101 \_ action: SWITCH_ON_HU . . . It switches on the head unit 102 \_ action: TOGGLE_RADIO_MUTE . . . It mutes/umutes the radio 103 auxiliary/analyze/crack_mobile . normal No Password Cracker: Mobile 104 exploit/unix/fileformat/metasploit_msfvenom_apk_template_cmd_injection 2020-10-29 excellent No Rapid7 Metasploit Framework msfvenom APK Template Command Injection 105 auxiliary/scanner/sip/sipdroid_ext_enum . normal No SIPDroid Extension Grabber 106 exploit/android/browser/samsung_knox_smdm_url 2014-11-12 excellent No Samsung Galaxy KNOX Android Browser RCE 107 auxiliary/gather/samsung_browser_sop_bypass 2017-11-08 normal No Samsung Internet Browser SOP Bypass Interact with a module by name or index. For example info 107, use 107 or use auxiliary/gather/samsung_browser_sop_bypass msf >
最新发布
11-09
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值