# 七、实战篇

* CVE
  * [7.1.1 CVE-2017-11543 tcpdump sliplink\_print 栈溢出漏洞](/ctf-all-in-one/7_exploit/cve/7.1.1_tcpdump_2017-11543.md)
  * [7.1.2 CVE-2015-0235 glibc \_\_nss\_hostname\_digits\_dots 堆溢出漏洞](/ctf-all-in-one/7_exploit/cve/7.1.2_glibc_2015-0235.md)
  * [7.1.3 CVE-2016-4971 wget 任意文件上传漏洞](/ctf-all-in-one/7_exploit/cve/7.1.3_wget_2016-4971.md)
  * [7.1.4 CVE-2017-13089 wget skip\_short\_body 栈溢出漏洞](/ctf-all-in-one/7_exploit/cve/7.1.4_wget_2017-13089.md)
  * [7.1.5 CVE–2018-1000001 glibc realpath 缓冲区下溢漏洞](/ctf-all-in-one/7_exploit/cve/7.1.5_glibc_2018-1000001.md)
  * [7.1.6 CVE-2017-9430 DNSTracer 栈溢出漏洞](/ctf-all-in-one/7_exploit/cve/7.1.6_dnstracer_2017-9430.md)
  * [7.1.7 CVE-2018-6323 GNU binutils elf\_object\_p 整型溢出漏洞](/ctf-all-in-one/7_exploit/cve/7.1.7_binutils_2018-6323.md)
  * [7.1.8 CVE-2010-2883 Adobe CoolType SING 表栈溢出漏洞](/ctf-all-in-one/7_exploit/cve/7.1.8_adobe_reader_2010-2883.md)
  * [7.1.9 CVE-2010-3333 Microsoft Word RTF pFragments 栈溢出漏洞](/ctf-all-in-one/7_exploit/cve/7.1.9_ms_word_2010-3333.md)
* Malware


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://firmianay.gitbook.io/ctf-all-in-one/7_exploit.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
