- Struts2 method call Remote Code execution Vulnerability (S2-032)
- GlassFish arbitrary file Read vulnerability
- FortiGate OS (Flight tower System) 4.0-5.0.7 SSH Backdoor
- Juniper Networks (Juniper Networks) remote management access Backdoor
- JOOMLA 1.5-3.4 Version remote command execution vulnerability
- Redis unauthorized access defects can easily cause the system to be hacked
- WebSphere "Java deserialization" procedure remote Command Execution vulnerability
- Jenkins "Java deserialization" procedure remote Command Execution vulnerability
- WebLogic "Java deserialization" procedure remote Command Execution vulnerability
- JBoss "Java deserialization" procedure remote Command Execution vulnerability
- IIS latest high-risk Vulnerability (CVE-2015-1635/MS15-034)
- Juniper Networks (Juniper Networks) remote management access Backdoor
Online verification: Seebug Demon Mirror Vulnerability Box
Tool Party: 1,K8 Struts2 Exploit2, Weblogic_exp.jar3, Deserializeexploit.jar
Recent leaks of fire