├── 1Panel └── 1Panel面板最新前台RCE漏洞(CVE-2024-39911).md ├── AEGON └── AEGON-LIFEv1.0存在SQL注入漏洞(CVE-2024-36597).md ├── AJ-Report └── AJ-Report开源数据大屏存在远程命令执行漏洞.md ├── AVCON ├── AVCON-系统管理平台download.action存在任意文件读取漏洞.md ├── AVCON-网络视频服务系统editusercommit.php存在任意用户重置密码漏洞.md └── avcon综合管理平台SQL注入漏洞.md ├── Adobe ColdFusion └── Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767.md ├── Apache ├── Apache ActiveMQ远程命令执行漏洞.md ├── Apache Dubbo 反序列化漏洞(CVE-2023-29234).md ├── Apache Dubbo-admin-authorized-bypass (CNVD-2023-96546).md ├── Apache OFBiz SSRF && 任意配置读取.md ├── Apache OFBiz 身份验证绕过漏洞 (CVE-2023-51467).md ├── Apache Ofbiz XML-RPC RCE漏洞-CVE-2023-49070.md ├── Apache Spark命令执行漏洞(CVE-2023-32007).md ├── Apache Struts2 CVE-2023-50164.md ├── Apache Tomcat存在信息泄露漏洞( CVE-2024-21733).md ├── Apache-ActiveMQ-Jolokia-远程代码执行漏洞-CVE-2022-41678.md ├── Apache-CloudStack中的SAML身份验证漏洞(CVE-2024-41107).md ├── Apache-HugeGraph-Server远程代码执行漏洞(CVE-2024-27348).md ├── Apache-Kafka的UI中的远程代码执行CVE-2023-52251.md ├── Apache-OFBiz存在路径遍历导致RCE漏洞(CVE-2024-36104).md ├── Apache-OFBiz授权不当致代码执行漏洞(CVE-2024-38856).md ├── Apache-OFBiz远程代码执行漏洞(CVE-2024-45195).md ├── Apache-Seata存在Hessian反序列化漏洞(CVE-2024-22399).md ├── Apache-ServiceComb存在SSRF漏洞(CVE-2023-44313).md ├── Apache-Submarine-SQL注入漏洞CVE-2023-37924.md └── Apache_Solr环境变量信息泄漏漏洞(CVE-2023-50290).md ├── Appium Desktop └── Appium Desktop CVE-2023-2479漏洞.md ├── Array VPN └── Array VPN任意文件读取漏洞.md ├── Array-APV └── Array-APV应用交付系统ping_hosts存在任意命令执行漏洞.md ├── Aruba └── ArubaOS-RCE漏洞(CVE-2024-26304).md ├── AspCMS └── AspCMS系统commentList.asp存在SQL注入漏洞.md ├── Atmail └── Atmail存在SQL注入漏洞.md ├── Bazarr └── Bazarr任意文件读取(CVE-2024-40348).md ├── CRMEB └── CRMEB开源商城v5.2.2存在sql注入漏洞.md ├── Calibre ├── Calibre任意文件读取漏洞(CVE-2024-6781).md └── Calibre远程代码执行漏洞(CVE-2024-6782).md ├── Check Point安全网关 └── Check-Point安全网关任意文件读取漏洞(CVE-2024-24919).md ├── Chrome └── CVE-2023-4357-Chrome-XXE漏洞.md ├── Cisco └── Cisco IOS XE CVE-2023-20198权限提升漏洞.md ├── CloudPanel └── CloudPanel RCE漏洞 CVE-2023-35885.md ├── ClusterControl └── ClusterControl存在任意文件读取漏洞.md ├── Cobbler └── Cobbler存在远程命令执行漏洞(CVE-2021-40323).md ├── Confluence ├── Atlassian Confluence 远程代码执行漏洞(CVE-2023-22527).md ├── Confluence 未授权提权访问漏洞.md ├── Confluence身份认证绕过(CVE-2023-22518).md └── Confluence远程命令执行漏洞(CVE-2024-21683).md ├── Coremail邮件系统 └── Coremail邮件系统未授权访问获取管理员账密.md ├── Craft └── Craft CMS远程代码执行漏洞CVE-2023-41892.md ├── CrushFTP └── CrushFTP服务器端模板注入(CVE-2024-4040).md ├── D-Link ├── D-LINK-DIR-845L接口bsc_sms_inbox.php存在信息泄露漏洞.md ├── D-LINK-DIR-X4860未授权RCE漏洞.md ├── D-LINK-Go-RT-AC750 GORTAC750_A1_FW_v101b03存在硬编码漏洞(CVE-2024-22853).md ├── D-Link-NAS(CVE-2024-3272&&CVE-2024-3273).md ├── D-Link_DAR-8000-10上网行为审计网关任意文件上传漏洞(CVE-2023-5154).md └── D-Link_DAR-8000操作系统命令注入漏洞(CVE-2023-4542).md ├── DCN ├── DCN有线无线智能一体化控制器WEB管理系统.md └── DCN防火墙ping.php存在命令执行漏洞.md ├── DT └── DT高清车牌识别摄像机存在任意文件读取漏洞.md ├── DataEase └── DataEase存在数据库配置信息暴露漏洞(CVE-2024-30269).md ├── DataGear └── DataGear数据可视化分析平台存在SpEL表达式注入漏洞(CVE-2024-37759).md ├── Docassemble └── Docassemble任意文件读取漏洞(CVE-2024-27292).md ├── EDU ├── EDU智慧平台PersonalDayInOutSchoolData存在SQL注入漏洞.md ├── EDU某智慧平台ExpDownloadService.aspx任意文件读取漏洞.md └── 中新天达系统存在任意文件读取漏洞.md ├── ELADMIN └── ELADMIN后台管理系统存在SSRF漏洞.md ├── EOVA └── EOVA未授权doInit接口存在反序列化漏洞.md ├── EasyCVR视频管理平台 ├── EasyCVR 视频管理平台存在用户信息泄露.md └── EasyCVR视频管理平台存在任意用户添加漏洞.md ├── EduSoho └── EduSoho教培系统classropm-course-statistics存在任意文件读取漏洞.md ├── Elgg └── elgg-sqli.md ├── Emlog └── emlog后台插件任意文件上传(CVE-2024-33752).md ├── EnjoyRMIS └── EnjoyRMIS-GetOAById存在SQL注入漏洞.md ├── Exam └── Exam在线考试系统存在前台任意文件上传漏洞.md ├── F logic DataCube3 ├── F-logic_DataCube3存在SQL注入漏洞(CVE-2024-31750).md └── F-logic_DataCube3存在任意文件上传漏洞.md ├── F5-BIG-IP ├── F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md └── F5-BIG-IP存在SQL注入漏洞(CVE-2024-26026)&(CVE-2024-21793).md ├── FLIR ├── FLIR-AX8热成像仪applyfirmware存在远程命令执行漏洞.md ├── FLIR-AX8热成像仪download.php存在任意文件读取漏洞.md ├── FLIR-AX8热成像仪palette.php存在远程命令执行漏洞.md └── FLIR-AX8热成像仪res.php存在远程命令执行漏洞.md ├── Fastadmin └── Fastadmin框架存在任意文件读取漏洞.md ├── Fortinet └── Fortinet-SSL-VPN-CVE-2024-21762.md ├── Fortra └── Fortra FileCatalyst Workflow远程代码执行漏漏洞(CVE-2024-25153).md ├── GeoServer ├── GeoServer属性名表达式前台代码执行漏洞(CVE-2024-36401).md └── GeoServer系统wms接口存在远程命令执行漏洞.md ├── Git └── Git远程代码执行漏洞(CVE-2024-32002).md ├── GitLab └── GitLab任意用户密码重置漏洞(CVE-2023-7028).md ├── Gradio └── Gradio存在任意文件读取漏洞(CVE-2024-1561).md ├── H3C ├── H3C Magic B1STV100R012 RCE.md ├── H3C 用户自助服务平台 dynamiccontent.properties.xhtml存在RCE漏洞.md ├── H3C-CVM-upload接口前台任意文件上传漏洞复现.md ├── H3C-SecParh堡垒机任意用户登录漏洞.md ├── H3C-SecPath下一代防火墙local_cert_delete_both存在任意文件上传漏洞.md ├── H3C-iMC智能管理中心autoDeploy.xhtml存在远程代码执行漏洞.md ├── H3C-iMC智能管理中心存在远程代码执行漏洞(XVE-2024-4567).md ├── H3C-校园网自助服务系统flexfileupload任意文件上传漏洞.md ├── H3C_magic_R100路由器的UDPserver中存在命令执行漏洞(CVE-2022-34598).md ├── H3C网络管理系统任意文件读取漏洞.md └── H3C路由器userLogin.asp信息泄漏漏洞.md ├── HSC └── HSC-Mailinspector-loader.php存在任意文件读取漏洞(CVE-2024-34470).md ├── HSF ├── HFS2.3未经身份验证的远程代码执行(CVE-2024-23692).md └── rejetto-HFS-3存在远程命令执行漏洞(CVE-2024-39943).md ├── Hoverfly └── Hoverfly系统接口simulation任意文件读取漏洞复现(CVE-2024-45388).md ├── Hytec └── Hytec Inter HWL-2511-SS popen.cgi命令注入漏洞.md ├── IP guard WebServer ├── IP-guard WebServer 远程命令执行漏洞.md └── IP-guard-WebServer存在权限绕过漏洞(QVD-2024-14103).md ├── IP网络广播服务平台 └── IP网络广播服务平台upload存在任意文件上传漏洞.md ├── Imo云办公 └── imo云办公室接口Imo_DownLoadUI.php任意文件下载漏洞.md ├── Ivanti ├── CVE-2024-22024.md ├── CVE-2024-8190.md ├── Ivanti-EPM存在SQL注入漏洞(CVE-2024-29824).md ├── Ivanti-Virtual-Traffic-Manager存在身份验证绕过漏洞(CVE-2024-7593).md └── Ivanti_Connect_Secure远程命令注入漏洞(CVE-2024-21887).md ├── JEEVMS仓库管理系统 └── JEEVMS仓库管理系统任意文件读取漏洞.md ├── JEPaaS低代码平台 ├── JEPaaS低代码平台document存在文件上传致RCE漏洞.md └── JEPaaS低代码平台j_spring_security_check存在SQL注入漏洞.md ├── JFinalCMS └── JFinalCMS 任意文件读取漏洞(CVE-2023-41599).md ├── Jan └── Jan任意文件上传漏洞.md ├── JeePlus低代码开发平台 └── JeePlus低代码开发平台存在SQL注入漏洞.md ├── JeecgBoot ├── Jeecg-jeecgFormDemoController存在JNDI代码执行漏洞.md ├── JeecgBoot反射型XSS漏洞.md ├── JeecgBoot漏洞.md ├── JeecgBoot系统AviatorScript表达式注入漏洞.md ├── Jeecg任意文件上传漏洞.md └── jeecg-boot系统接口jmLink权限绕过漏洞.md ├── Jenkins ├── Jenkins-Remoting任意文件读取漏洞(CVE-2024-43044).md └── Jenkins任意文件读取漏洞(CVE-2024-23897).md ├── JetBrains └── JetBrains TeamCity 身份验证绕过漏洞(CVE-2024-27198).md ├── JieLink ├── JieLink+智能终端操作平台多个接口处存在敏感信息泄露漏洞.md └── JieLink+智能终端操作平台存在sql注入漏洞.md ├── Joomla └── Joomla 未授权漏洞CVE-2023-23752.md ├── Journyx └── Journyx存在未经身份验证的XML外部实体注入.md ├── JumpServer ├── JumpServer(CVE-2024-29201)远程代码执行漏洞&(CVE-2024-29202)Jinin2模板注入漏洞.md └── JumpServer未授权漏洞.md ├── KubePi └── KubePi存在JWT验证绕过漏洞(CVE-2024-36111).md ├── Kuboard └── Kuboard默认口令.md ├── LVS精益价值管理系统 ├── LVS精益价值管理系统DownLoad.aspx存在任意文件读取漏洞.md └── LVS精益价值管理系统LVS.Web.ashx存在SQL注入漏洞.md ├── Laykefu客服系统 └── Laykefu客服系统任意文件上传漏洞.md ├── Likeshop └── Likeshop-formimage任意文件上传.md ├── LinkWeChat └── LinkWeChat任意文件读取漏洞.md ├── Linksys └── Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852).md ├── LiveBOS ├── 灵动业务架构平台(LiveBOS)系统UploadFile.do接口文件上传漏洞(XVE-2023-21708).md └── 灵动业务架构平台(LiveBOS)系统UploadImage.do接口文件上传漏洞(XVE-2024-18835).md ├── LiveGBS ├── LiveGBS任意用户密码重置漏洞.md └── LiveGBS存在逻辑缺陷漏洞(CNVD-2023-72138).md ├── LiveNVR流媒体服务软件 └── LiveNVR流媒体服务软件接口存在未授权访问漏洞.md ├── MRCMS └── MRCMS3.0任意文件读取漏洞.md ├── MSService └── MSService服务init.do接口处存在SQL注入漏洞.md ├── Magento └── Magento开源电子商务平台接口estimate-shipping-methods存在XXE漏洞.md ├── MajorDoMo └── MajorDoMo-thumb.php未授权RCE漏洞复现(CNVD-2024-02175).md ├── MetaCRM └── MetaCRM客户关系管理系统任意文件上传漏洞.md ├── Metabase └── Metabase validate 远程命令执行漏洞(CVE-2023-38646).md ├── Mingsoft └── Mingsoft-MCMS前台查询文章列表接口SQL注入(CNVD-2024-06148).md ├── Minio └── Minio-verify信息泄露(CVE-2023-28432).md ├── Mtab书签导航程序 └── Mtab书签导航程序存在SQL注入漏洞.md ├── Mura └── Mura-CMS-processAsyncObject存在SQL注入漏洞(CVE-2024-32640).md ├── NUUO └── NUUO网络视频录像机css_parser.php任意文件读取漏洞.md ├── Nacos ├── Nacos任意文件读写漏洞.md ├── Nacos未授权下载配置信息.md └── Nacos远程代码执行漏洞.md ├── Ncast高清智能录播系统 ├── Ncast盈可视高清智能录播系统存在RCE漏洞(CVE-2024-0305).md └── Ncast高清智能录播系统存在任意文件读取漏洞.md ├── NextGen └── NextGen-Mirth-Connect-XStream反序列化远程代码执行漏洞(CVE-2023-43208).md ├── Nexus └── Nexus未授权目录穿越漏洞(CVE-2024-4956).md ├── O2OA └── O2OA远程命令执行(CVE-2022-22916).md ├── OfficeWeb365 ├── OfficeWeb365 文件上传漏洞.md └── OfficeWeb365_任意文件读取漏洞.md ├── OpenCart └── OpenCart开源电子商务平台divido.php存在SQL注入漏洞.md ├── OpenMetadata ├── OpenMetadata-SpEL注入(CVE-2024-28848).md ├── OpenMetadata命令执行(CVE-2024-28255).md └── OpenMetadata命令执行漏洞(CVE-2024-28253).md ├── OpenSSH └── OpenSSH ProxyCommand命令注入漏洞 (CVE-2023-51385).md ├── Openfire └── Openfire身份认证绕过漏洞(CVE-2023-32315).md ├── Oracle └── Oracle-JDEdwards-EnterpriseOne未授权获取管理员密码泄漏.md ├── OrangeHRM └── OrangeHRM-viewProjects接口存在SQL注入漏洞(CVE-2024-36428).md ├── PAN-OS └── PAN-OS安全设备存在命令执行漏洞(CVE-2024-3400).md ├── PEPM系统 └── PEPM系统Cookie存在远程代码执行漏洞(XVE-2024-16919).md ├── PHP Live Chat └── PHP-Live-Chat代码审计之组合拳GetShell.md ├── Panabit iXCache └── Panabit iXCache网关RCE漏洞CVE-2023-38646.md ├── Panalog ├── Panalog大数据日志审计系统libres_syn_delete.php存在命令执行.md └── 北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞.md ├── Panel └── Panel loadfile 后台文件读取漏洞.md ├── PbootCMS └── PbootCMS全版本后台通杀任意代码执行漏洞.md ├── Pear Admin Boot └── Pear-Admin-Boot存在SQL注入漏洞.md ├── PerkinElmer └── PerkinElmer-ProcessPlus存在文件读取漏洞(CVE-2024-6911).md ├── Pkpmbs建设工程质量监督系统 └── Pkpmbs建设工程质量监督系统FileUpOrDown.ashx存在文件上传漏洞.md ├── PowerCreator └── PowerCreator接口UploadResourcePic.ashx存在任意文件上传漏洞.md ├── Progress ├── Progress-Flowmon命令注入漏洞(CVE-2024-2389).md └── Progress-Telerik-Report-Server身份验证绕过(CVE-2024-4358).md ├── Public CMS └── JAVA Public CMS 后台RCE漏洞.md ├── Pyspider WebUI └── Pyspider-WebUI未授权访问致远程代码执行漏洞.md ├── QNAP └── QNAP-QTS溢出导致的未授权RCE漏洞(CVE-2024-27130).md ├── QQ └── QQ客户端存在远程命令执行漏洞.md ├── Qualitor └── Qualitor系统接口processVariavel.php未授权命令注入漏洞(CVE-2023-47253).md ├── Quicklancer └── Quicklancer系统接口listing存在SQL注入漏洞.md ├── RAISECOM网关设备 └── RAISECOM网关设备list_base_config.php存在远程命令执行漏洞.md ├── README.md ├── RuoYi ├── RUOYI-v4.7.8存在远程代码执行漏洞.md ├── RuoYi4.6.0 SQL注入漏洞CVE-2023-49371.md └── 若依后台定时任务存在SSRF漏洞.md ├── RuvarOA协同办公平台 └── RuvarOA协同办公平台多处存在SQL注入漏洞.md ├── SPIP └── SPIP-porte_plume插件存在任意PHP执行漏洞(CVE-2024-7954).md ├── Salia └── Salia PLCC cPH2 远程命令执行漏洞(CVE-2023-46359).md ├── Secnet安网智能AC管理系统 └── Secnet安网 智能AC管理系统 actpt_5g 信息泄露.md ├── ServiceNow UI └── ServiceNow-UI存在Jelly模板注入漏洞(CVE-2024-4879).md ├── Sharp └── Sharp多功能打印机未授权访问漏洞.md ├── ShokoServer └── ShokoServer系统withpath任意文件读取漏洞(CVE-2023-43662).md ├── Smart S85F └── Smart S85F 任意文件读取.md ├── Smartbi └── Smartbi 内置用户登陆绕过.md ├── SolarWinds Serv U └── SolarWinds-Serv-U目录遍历漏洞(CVE-2024-28995).md ├── SpiderFlow爬虫平台 └── SpiderFlow爬虫平台远程命令执行漏洞(CVE-2024-0195).md ├── Splunk Enterprise ├── Splunk-Enterprise任意文件读取漏洞.md └── Splunk-Enterprise远程代码执行漏洞(CVE-2023-46214).md ├── Spring └── Spring-Framework路径遍历漏洞(CVE-2024-38816).md ├── SpringBlade ├── SpringBlade blade-log存在SQL 注入漏洞.md ├── SpringBlade export-user SQL 注入漏洞.md ├── SpringBlade框架dict-biz接口存在sql注入漏洞.md ├── SpringBlade系统menu接口存在SQL注入漏洞.md ├── SpringBlade系统usual接口存在SQL注入漏洞.md └── Springblade默认密钥可伪造凭据.md ├── SuiteCRM └── SuiteCRM系统接口responseEntryPoint存在SQL注入漏洞(CVE-2024-36412).md ├── Symfony └── Symfony-app_dev.php信息泄露漏洞.md ├── SysAid └── SysAid远程命令执行漏洞(CVE-2023-47246).md ├── Tenda ├── Tenda-FH1201存在命令注入漏洞(CVE-2024-41468).md ├── Tenda-FH1201存在命令注入漏洞(CVE-2024-41473).md └── Tenda路由器账号密码泄露.md ├── Typora └── 基于Typora DOM的跨站点脚本导致远程代码执行(CVE-2023-2317).md ├── VICIdial └── VICIdial Unauthenticated SQLi to RCE (CVE-2024-8503 and CVE-2024-8504).md ├── VvvebJs └── VvvebJs Arbitrary File Upload - RCE (CVE-2024-29272).md ├── WAGO └── WAGO系统远程代码执行漏洞(CVE-2023-1698).md ├── WEBMAIL └── WEBMAIL存在任意用户登录漏洞.md ├── WVP视频平台 └── WVP视频平台(国标28181)未授权SQL注入漏洞.md ├── Weblogic ├── WebLogic远程代码执行漏洞(CVE-2024-21006).md └── Weblogic远程代码执行(CVE-2024-20931).md ├── WeiPHP └── WeiPHP存在SQL注入漏洞.md ├── WinRAR └── WinRAR CVE-2023-38831.md ├── WookTeam轻量级的团队在线协作系统 └── WookTeam轻量级的团队在线协作系统接口searchinfo存在SQL注入漏洞.md ├── WordPress ├── WordPress Automatic Plugin任意文件下载漏洞(CVE-2024-27954).md ├── WordPress-Automatic插件存在SQL注入漏洞(CVE-2024-27956).md ├── WordPress-Dropdown-CF7插件存在sql注入漏洞(CVE-2024-3495).md ├── WordPress-MasterStudy-LMS插件存在SQL注入漏洞(CVE-2024-1512).md ├── WordPress-WebDirectory插件存在sql注入(CVE-2024-3552).md ├── WordPress-js-support-ticket存在文件上传漏洞.md ├── WordPress-thimpress_hotel_booking存在代码执行漏洞.md ├── WordPress_LayerSlider插件SQL注入漏洞(CVE-2024-2879).md ├── WordPress_Wholesale_Market插件存在任意文件读取漏洞.md ├── WordPress插件Bricks Builder存在RCE漏洞(CVE-2024-25600).md ├── WordPress插件Dokan-Pro存在SQL注入漏洞.md ├── WordPress插件GiveWP存在反序列漏洞(CVE-2024-5932).md ├── WordPress插件NotificationX存在sql注入漏洞(CVE-2024-1698).md ├── WordPress插件Recall存在SQL注入漏洞(CVE-2024-32709).md ├── WordPress的Business-Directory插件存在sql注入漏洞(CVE-2024-4443).md ├── WordPress系统插件LearnPress存在SQL注入漏洞(CVE-2024-8522).md ├── Wordpress Backup Migration plugin 代码执行漏洞(CVE-2023-6553).md └── wordpress listingo 文件上传漏洞.md ├── X2Modbus └── X2Modbus网关GetUser接口存在信息泄漏漏洞.md ├── XWiki └── XWiki-Platform远程代码执行漏洞.md ├── XXL-JOB └── XXL-JOB默认accessToken身份绕过漏洞.md ├── Yearning └── Yearning_front任意文件读取.md ├── YzmCMS └── YzmCMS接口存在pay_callback远程命令执行.md ├── Zabbix └── Zabbix-Serve-SQL注入漏洞(CVE-2024-22120).md ├── ZenML └── ZenML服务器远程权限提升漏洞(CVE-2024-25723).md ├── Zimbra └── CVE-2024-45519.md ├── ZoneMinder └── ZoneMinder系统sort接口存在SQL注入漏洞.md ├── Zyxe NAS └── Zyxel-NAS设备setCookie未授权命令注入漏洞(CVE-2024-29973).md ├── aiohttp └── aiohttp存在目录遍历漏洞(CVE-2024-23334).md ├── cockpit └── cockpit系统upload接口存在文件上传漏洞.md ├── cups-browsed └── CVE-2024-47177.md ├── dede ├── DeDecms接口sys_verifies.php存在任意文件读取漏洞.md ├── DedeCMSV5.7.114后台article_template_rand.php存在远程代码执行漏洞.md ├── DedeCMSV5.7.114后台sys_verizes.php存在远程代码执行漏洞.md └── Dedecms v5.7.111前台tags.php SQL注入漏洞.md ├── eking管理易 └── eking管理易FileUpload接口存在任意文件上传漏洞.md ├── fogproject └── fogproject系统接口export.php存在远程命令执行漏洞(CVE-2024-39914).md ├── iDocView ├── I Doc View任意文件上传漏洞.md ├── IDocView_qJvqhFt接口任意文件读取.md └── iDocView upload接口任意文件读取.md ├── jshERP └── jshERP信息泄露漏洞.md ├── kkFileView └── kkFileView-v4.3.0-RCE.md ├── mysql2 └── mysql2原型污染漏洞(CVE-2024-21512).md ├── omfyUI └── omfyUI follow_symlinks文件读取漏洞.md ├── pgAdmin ├── CVE-2024-2044.md └── CVE-2024-9014.md ├── php └── PHP-CGI-Windows平台远程代码执行漏洞(CVE-2024-4577).md ├── pyLoad └── pyLoad远程代码执行漏洞.md ├── showdoc ├── ShowDoc3.2.5存在SQL注入漏洞.md ├── showDoc-uploadImg任意文件上传漏洞.md └── showdoc3.2.4-phar反序列漏洞复现.md ├── smanga └── smanga存在未授权远程代码执行漏洞.md ├── thinkphp └── thinkphp最新CVE-2024-44902反序列化漏洞.md ├── 万户OA ├── 万户 ezOFFICE DocumentEdit.jsp SQL注入.md ├── 万户-ezOFFICE-OA-officeserver.jsp文件上传漏洞.md ├── 万户-ezOFFICE-download_ftp.jsp任意文件下载漏洞.md ├── 万户OA text2Html接口存在任意文件读取漏洞.md ├── 万户OA-RhinoScriptEngineService命令执行漏洞.md ├── 万户OA-fileUpload.controller任意文件上传漏洞.md ├── 万户OA-upload任意文件上传漏洞.md ├── 万户OA系统接口GeneralWeb存在XXE漏洞.md ├── 万户ezEIP-success.aspx存在反序列化漏洞.md ├── 万户ezOFFICE-contract_gd.jsp存在SQL注入漏洞.md ├── 万户ezOFFICE-wf_printnum.jsp存在SQL注入漏洞.md ├── 万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749).md ├── 万户ezOFFICE协同管理平台receivefile_gd.jsp存在SQL注入漏洞.md ├── 万户ezOFFICE系统graph_include.jsp存在SQL注入漏洞.md ├── 万户ezOFFICE系统接口SendFileCheckTemplateEdit.jsp存在SQL注入漏洞.md ├── 万户ezOFFICE系统接口filesendcheck_gd.jsp存在SQL注入漏洞.md ├── 万户ezoffice wpsservlet任意文件上传漏洞.md ├── 万户协同办公平台存在未授权访问漏洞.md └── 万户协同办公平台接口存在文件上传漏洞.md ├── 三汇网关管理软件 └── 三汇网关管理软件debug.php远程命令执行漏洞.md ├── 上讯信息技术股份有限公司 └── 上讯信息技术股份有限公司运维管理系统RepeatSend存在命令执行漏洞.md ├── 世纪信通管理系统 └── 世纪信通管理系统DownLoadFiles.ashx存在任意文件读取.md ├── 世邦通信 ├── 世邦通信SPON-IP网络对讲广播系统addmediadata.php任意文件上传漏洞(XVE-2024-19281).md ├── 世邦通信SPON-IP网络对讲广播系统addscenedata.php任意文件上传漏洞.md └── 世邦通信SPON-IP网络对讲广播系统my_parser.php任意文件上传漏洞.md ├── 东华医疗协同办公系统 ├── 东华医疗协同办公系统templateFile存在任意文件下载漏洞.md ├── 东华医疗协同办公系统反序列化漏洞.md └── 东华医疗协同办公系统文件上传.md ├── 东方通 ├── 东方通TongWeb-selectApp.jsp存在任意文件上传.md └── 东方通upload接口存在任意文件上传漏洞.md ├── 东胜物流软件 └── 东胜物流软件GetProParentModuTreeList存在SQL注入漏洞.md ├── 中兴 └── 中兴ZTE-ZSR-V2系列多业务路由器存在任意文件读取漏洞.md ├── 中成科信票务管理系统 ├── 中成科信票务管理平台任意文件上传漏洞.md ├── 中成科信票务管理系统ReserveTicketManagerPlane.ashx存在SQL注入漏洞.md ├── 中成科信票务管理系统SeatMapHandler.ashx存在SQL注入漏洞.md └── 中成科信票务管理系统TicketManager.ashx存在SQL注入漏洞.md ├── 中科智远科技综合监管云平台 └── 中科智远科技-综合监管云平台DownFile存在任意文件读取漏洞.md ├── 中远麒麟堡垒机 └── 中远麒麟堡垒机SQL注入.md ├── 乐享智能运维管理平台 └── 乐享智能运维管理平台getToken存在SQL注入漏洞.md ├── 九思OA └── 九思OA接口WebServiceProxy存在XXE漏洞.md ├── 云匣子堡垒机 ├── 云匣子堡垒机fastjson漏洞.md └── 云匣子系统接口ssoToolReport存在远程代码执行漏洞.md ├── 云时空 ├── 云时空社会化商业ERP任意文件上传.md ├── 云时空社会化商业ERP系统online存在身份认证绕过漏洞.md ├── 云时空社会化商业ERP系统validateLoginName接口处存在SQL注入漏洞.md ├── 时空智友ERP系统updater.uploadStudioFile接口处存在任意文件上传漏洞.md └── 时空智友企业流程化管控系统formservice存在SQL注入漏洞.md ├── 云网OA └── 云网OA8.6存在fastjson反序列化漏洞.md ├── 云课网校系统 └── 云课网校系统文件上传漏洞(DVB-2024-6594).md ├── 交易所系统 └── 仿新浪外汇余额宝时间交易所任意文件读取.md ├── 亿华人力资源管理系统 └── 亿华人力资源管理系统unloadfile存在任意文件上传漏洞.md ├── 亿渡留言管理系统 └── 亿渡留言管理系统uploadimg存在任意文件上传漏洞.md ├── 亿赛通电子文档安全管理系统 ├── 亿赛通-dataSearch.jsp-SQL注入.md ├── 亿赛通-数据泄露防护(DLP)ClientAjax接口存在任意文件读取漏洞.md ├── 亿赛通-电子文档安全管理系统SaveCDGPermissionFromGFOA接口存在sql注入漏洞.md ├── 亿赛通DecryptApplicationService2接口任意文件上传.md ├── 亿赛通update接口sql注入.md ├── 亿赛通电子文档uploadFile接口文件上传漏洞.md ├── 亿赛通电子文档安全管理系统 UploadFileToCatalog SQL注入漏洞.md ├── 亿赛通电子文档安全管理系统-MailMessageLogServices反序列漏洞.md ├── 亿赛通电子文档安全管理系统-UploadFileManagerService-任意文件读取漏洞.md ├── 亿赛通电子文档安全管理系统-jlockseniordao-findbylockname-sql注入漏洞.md ├── 亿赛通电子文档安全管理系统CDGAuthoriseTempletService1存在SQL注入漏洞(XVE-2024-19611).md ├── 亿赛通电子文档安全管理系统DecryptApplication存在任意文件读取漏洞.md ├── 亿赛通电子文档安全管理系统DecryptionApp存在反序列化漏洞.md ├── 亿赛通电子文档安全管理系统GetValidateLoginUserService接口存在XStream反序列化漏洞.md ├── 亿赛通电子文档安全管理系统LogDownLoadService存在SQL注入漏洞.md ├── 亿赛通电子文档安全管理系统NavigationAjax接口存在SQL注入漏洞.md ├── 亿赛通电子文档安全管理系统NetSecConfigAjax接口存在SQL注入漏洞.md ├── 亿赛通电子文档安全管理系统NoticeAjax接口存在SQL注入漏洞.md ├── 亿赛通电子文档安全管理系统RestoreFiles任意文件读取漏洞.md ├── 亿赛通电子文档安全管理系统SecretKeyService存在SQL注入漏洞.md ├── 亿赛通电子文档安全管理系统SecureUsbConnection存在反序列化漏洞.md ├── 亿赛通电子文档安全管理系统UploadFileList任意文件读取漏洞.md ├── 亿赛通电子文档安全管理系统docRenewApp存在反序列化漏洞.md ├── 亿赛通电子文档安全管理系统downloadfromfile存在任意文件读取漏洞.md ├── 亿赛通电子文档安全管理系统dump接口存在任意文件读取漏洞.md ├── 亿赛通电子文档安全管理系统getAllUsers身份绕过漏洞.md ├── 亿赛通电子文档安全管理系统hiddenWatermark文件上传漏洞.md ├── 亿赛通电子文档安全管理系统logincontroller接口存在远程代码执行漏洞.md ├── 亿赛通电子文档安全管理系统远程命令执行漏洞.md └── 亿赛通电子文档平台文件上传漏洞.md ├── 任我行 ├── 任我行 CRM SmsDataList SQL注入漏洞.md └── 任我行协同CRM系统UploadFile存在反序列化漏洞.md ├── 企望制造 ERP └── 企望制造 ERP comboxstore.action 远程命令执行漏洞.md ├── 众诚软件 └── 众诚网上订单系统o_sa_order.ashx存在SQL注入漏洞.md ├── 会捷通云视讯平台 └── 会捷通云视讯平台fileDownload存在任意文件读取漏洞.md ├── 佑友防火墙 ├── 佑友防火墙后台接口download存在任意文件读取漏洞.md └── 佑友防火墙后台接口maintain存在命令执行漏洞.md ├── 佳会视频会议 └── 佳会视频会议attachment任意文件读取.md ├── 信呼OA └── 信呼OA系统index存在SQL注入漏洞.md ├── 先锋WEB燃气收费系统 └── 先锋WEB燃气收费系统文件上传漏洞.md ├── 全息AI网络运维平台 └── 全息AI网络运维平台ajax_cloud_router_config.php存在命令执行漏洞.md ├── 全程云OA ├── 全程云OA-svc.asmxSQL注入漏洞.md ├── 全程云OA__ajax.ashxSQL注入漏洞.md └── 全程云OA接口UploadFile存在任意文件上传漏洞.md ├── 全行业小程序运营系统 └── 全行业小程序运营系统接口Wxapps.php存在任意文件上传漏洞.md ├── 公交IC卡收单管理系统 ├── 公交IC卡收单管理系统bus存在SQL注入漏洞.md ├── 公交IC卡收单管理系统line存在SQL注入漏洞.md ├── 公交IC卡收单管理系统parametercard存在SQL注入漏洞.md ├── 公交IC卡收单管理系统role存在SQL注入漏洞.md └── 公交IC卡收单管理系统user存在SQL注入漏洞.md ├── 公众号无限回调系统 └── 公众号无限回调系统接口siteUrl存在SQL注入漏洞.md ├── 六零导航页 └── 六零导航页存在任意文件上传漏洞.md ├── 分发签名系统 ├── APP分发签名系统index-uplog.php存在任意文件上传漏洞.md └── 苹果IOS端IPA签名工具request_post任意文件读取漏洞.md ├── 创客13星零售商城系统 └── 创客13星零售商城系统前台任意文件上传漏洞.md ├── 北京中科聚网 ├── 北京中科聚网一体化运营平台catchByUrl存在文件上传漏洞.md └── 北京中科聚网一体化运营平台importVisualModuleImg接口存在文件上传漏洞.md ├── 北京亚控科技 └── 北京亚控科技KingPortal开发系统漏洞集合.md ├── 医药信息管理系统 └── 医药信息管理系统GetLshByTj存在SQL注入.md ├── 医院一站式后勤管理系统 └── 医院一站式后勤管理系统processApkUpload.upload存在任意文件上传漏洞.md ├── 医院挂号系统 └── 医院挂号系统SQL注入.md ├── 华为Auth-Http Serve └── 华为Auth-Http Serve任意文件读取.md ├── 华夏ERP └── 华夏ERPV3.3存在信息泄漏漏洞.md ├── 华天动力 └── 华天动力OA系统downloadWpsFile存在任意文件读取漏洞.md ├── 华望云 ├── 华望云会议管理平台checkDoubleUserNameForAdd存在SQL注入漏洞.md ├── 华望云会议管理平台conflog.inc存在SQL注入漏洞.md ├── 华望云会议管理平台confmanger.inc存在SQL注入漏洞.md ├── 华望云会议管理平台deptactionlist存在SQL注入漏洞.md ├── 华望云会议管理平台myconflist.in存在SQL注入漏洞.md ├── 华望云会议管理平台recodemanger.inc存在SQL注入漏洞.md ├── 华望云会议管理平台recodemangerForUser.inc存在SQL注入漏洞.md ├── 华望云会议管理平台syslog.inc存在SQL注入漏洞.md └── 华望云会议管理平台useractionlist存在SQL注入漏洞.md ├── 华测监测预警系统 └── 华测监测预警系统接口UserEdit.aspx存在SQL注入.md ├── 华磊科技物流 ├── 华磊科技物流getOrderTrackingNumber存在sql注入漏洞.md └── 华磊科技物流modifyInsurance存在sql注入漏洞.md ├── 协达OA └── 协达OA系统绕过登录认证登陆后台.md ├── 南京星源图科技 └── 南京星源图科技SparkShop存在任意文件上传漏洞.md ├── 卡车卫星定位系统 └── 卡车卫星定位系统create存在未授权密码重置漏洞.md ├── 厦门四信通信科技有限公司 └── 厦门四信通信科技有限公司视频监控管理系统存在逻辑缺陷漏洞.md ├── 友点建站系统 └── 友点建站系统image_upload.php存在文件上传漏洞.md ├── 发卡网系统 ├── HM发卡网反序列化漏洞.md ├── 某自动发卡网alipay_notify.php存在SQL注入漏洞.md └── 鲸发卡系统自动发卡网request_post存在任意文件读取漏洞.md ├── 同享人力管理管理平台 ├── 同享人力管理管理平台DownloadFile存在任意文件下载漏洞.md ├── 同享人力管理管理平台SFZService.asmx存在SQL注入漏洞.md ├── 同享人力管理管理平台UploadHandler存在任意文件上传漏洞.md └── 同享人力资源管理系统hdlUploadFile.ashx存在文件上传漏洞.md ├── 同鑫eHR └── 同鑫eHR人力资源管理系统GetFlowDropDownListItems存在SQL注入漏洞.md ├── 启明星辰 ├── 启明星辰-天清汉马VPN接口download任意文件读取.md └── 启明星辰天玥网络安全审计系统SQL注入漏洞.md ├── 和丰多媒体信息发布系统 └── 和丰多媒体信息发布系统QH.aspx存在文件上传漏洞.md ├── 哲霖机械ERP └── 哲霖机械ERP接口DownloadInpFile存在任意文件读取漏洞.md ├── 唯徳知识产权管理系统 ├── 唯徳知识产权管理系统DownloadFileWordTemplate接口存在文件读取漏洞.md └── 唯徳知识产权管理系统WSFM.asmx接口存在任意文件上传漏洞.md ├── 商混ERP ├── 商混ERP-DictionaryEdit.aspxSQL注入漏洞.md ├── 商混ERP系统接口Operater_Action.aspx存在SQL注入漏洞.md ├── 商混ERP系统接口StockreceiveEdit.aspx存在SQL注入漏洞.md └── 商混ERP系统接口TaskCarToQueue.aspx存在SQL注入漏洞.md ├── 喰星云-数字化餐饮服务系统 ├── 喰星云-数字化餐饮服务系统listuser信息泄露漏洞.md ├── 喰星云-数字化餐饮服务系统not_finish.php存在SQL注入漏洞.md ├── 喰星云-数字化餐饮服务系统shelflife.php存在SQL注入漏洞.md └── 喰星云-数字化餐饮服务系统stock.php存在SQL注入漏洞.md ├── 因酷教育软件 └── 因酷教育软件开源网校程序gok4任意文件上传漏洞.md ├── 地大信息 └── 地大信息-基础信息平台GetImg任意文件读取漏洞.md ├── 多客圈子论坛系统 ├── 多客圈子论坛前台SSRF漏洞.md └── 多客圈子论坛系统httpGet任意文件读取漏洞复现.md ├── 大华 ├── 大华DSS itcBulletin SQL 注入漏洞.md ├── 大华DSS城市安防监控平台Struct2-045命令执行漏洞.md ├── 大华DSS城市安防监控平台login_init.action接口存在Struct2-045命令执行漏洞.md ├── 大华DSS城市安防监控平台user_toLoginPage.action接口存在Struct2-045命令执行漏洞.md ├── 大华DSS数字监控系统attachment_clearTempFile.action存在SQL注入漏洞.md ├── 大华DSS系统group_saveGroup存在SQL注入漏洞.md ├── 大华EIMS-capture_handle接口远程命令执行漏洞.md ├── 大华ICC智能物联综合管理平台heapdump敏感信息泄露.md ├── 大华ICC智能物联综合管理平台存在fastjson漏洞.md ├── 大华城市安防监控系统平台管理存在user_edit.action信息泄露漏洞.md ├── 大华智慧园区clientServer接口SQL注入漏洞.md ├── 大华智慧园区getNewStaypointDetailQuery接口SQL注入漏洞.md ├── 大华智慧园区管理平台任意文件读取.md ├── 大华智慧园区系统updateOcx_updateCab.action存在任意文件上传漏洞.md ├── 大华智慧园区系统updateOcx_updateZip.action存在任意文件上传漏洞.md ├── 大华智慧园区综合管理平台 deleteFtp 远程命令执行漏洞.md ├── 大华智慧园区综合管理平台 searchJson SQL注入漏洞.md ├── 大华智慧园区综合管理平台 文件上传漏洞.md ├── 大华智慧园区综合管理平台bitmap接口存在任意文件上传漏洞.md ├── 大华智慧园区综合管理平台ipms接口存在远程代码执行漏洞.md ├── 大华智慧园区综合管理平台pageJson存在SQL注入漏洞.md ├── 大华智慧园区综合管理平台user_getUserInfoByUserName.action未授权任意用户密码读取.md ├── 大华智能物联ICC综合管理平台readpic任意文件读取漏洞.md └── 大华智能物联综合管理平台justForTest用户登录漏洞.md ├── 大唐电信 ├── 大唐电信AC集中管理平台敏感信息泄漏漏洞.md ├── 大唐电信NVS3000综合视频监控平台getDepResList存在SQL注入漏洞.md └── 大唐电信NVS3000综合视频监控平台getencoderlist存在未授权访问漏洞.md ├── 天喻软件数据安全平台 └── 天喻软件数据安全平台DownLoad.ashx存在SQL注入.md ├── 天擎 ├── 360 新天擎终端安全管理系统存在信息泄露漏洞.md ├── 360天擎 - 未授权与sql注入.md ├── 天擎终端安全管理系统YII_CSRF_TOKEN远程代码执行漏洞.md ├── 奇安信360天擎getsimilarlistSQL注入漏洞.md ├── 奇安信VPN任意用户密码重置.md ├── 奇安信天擎rptsvr任意文件上传.md └── 奇安信网康下一代防火墙directdata存在远程命令执行漏洞.md ├── 天智云 └── 天智云智造管理平台Usermanager.ashx存在SQL注入漏洞.md ├── 天翼应用虚拟化系统 └── 天翼应用虚拟化系统sql注入漏洞.md ├── 天融信 ├── 天融信TOPSEC_maincgi.cgi远程命令执行.md ├── 天融信TOPSEC_static_convert远程命令执行漏洞.md └── 天融信运维安全审计系统synRequest存在远程命令执行漏洞.md ├── 天钥网关入 └── 天钥网关前台SQL注入.md ├── 天问物业ERP系统 ├── 天问物业ERP系统AreaAvatarDownLoad.aspx任意文件读取漏洞.md ├── 天问物业ERP系统ContractDownLoad存在任意文件读取漏洞.md ├── 天问物业ERP系统OwnerVacantDownLoad存在任意文件读取漏洞.md ├── 天问物业ERP系统VacantDiscountDownLoad存在任意文件读取漏洞.md └── 天问物业ERP系统docfileDownLoad.aspx存在任意文件读取漏洞.md ├── 契约锁电子签章系统 ├── 契约锁电子签章平台add远程命令执行漏洞.md ├── 契约锁电子签章平台ukeysign存在远程命令执行漏洞.md └── 契约锁电子签章系统RCE.md ├── 奥威亚视频云平台 ├── 奥威亚云视频平台UploadFile.aspx存在文件上传漏洞.md └── 奥威亚视频云平台VideoCover.aspx接口存在任意文件上传漏洞.md ├── 好视通视频会议系统 └── 好视通视频会议系统 toDownload.do接口 任意文件读取漏洞.md ├── 孚盟云 └── 孚盟云系统接口ajaxsenddingdingmessage存在SQL注入漏洞.md ├── 学分制系统 └── 学分制系统GetCalendarContentById存在SQL注入漏洞.md ├── 安恒 ├── 安恒明御安全网关远程命令执行漏洞.md └── 某恒明御漏洞.md ├── 安美数字酒店宽带运营系统 ├── 安美数字酒店宽带运营系统SQL注入漏洞.md └── 安美数字酒店宽带运营系统weather.php任意文件读取漏洞.md ├── 安达通 └── 安达通TPN-2G安全网关远程代码执行.md ├── 宏景OA ├── 宏景 DisplayFiles任意文件读取.md ├── 宏景HCM-codesettree接口存在SQL注入漏洞.md ├── 宏景HCM-downlawbase接口存在SQL注入漏洞.md ├── 宏景HCM-pos_dept_post存在SQL注入漏洞.md ├── 宏景HCM系统fieldsettree接口存在SQL注入漏洞.md ├── 宏景HCM系统infoView处存在sql注入漏洞.md ├── 宏景OA文件上传.md ├── 宏景eHR-HCM-DisplayExcelCustomReport接口存在任意文件读取漏洞.md ├── 宏景eHR-OutputCode存在任意文件读取漏洞.md ├── 宏景eHR-report_org_collect_tree.jsp存在SQL注入漏洞.md ├── 宏景eHR-showmedia.jsp存在SQL注入漏洞.md ├── 宏景eHR人力资源管理系统接口DownLoadCourseware存在任意文件读取漏洞.md ├── 宏景eHR人力资源管理系统接口LoadOtherTreeServlet存在SQL注入漏洞.md ├── 宏景eHR人力资源管理系统接口getSdutyTree存在SQL注入漏洞.md ├── 宏景eHR人力资源管理系统接口loadtree存在SQL注入漏洞.md ├── 宏景eHR人力资源管理软件showmediainfo存在SQL注入漏洞.md └── 宏景eHR系统ajaxService接口处存在SQL注入漏洞.md ├── 宏脉医美行业管理系统 ├── 宏脉医美行业管理系统DownLoadServerFile任意文件读取下载漏洞.md └── 宏脉医美行业管理系统UEditor编辑器存在文件上传漏洞.md ├── 宝塔 └── 宝塔最新未授权访问漏洞及sql注入.md ├── 富通天下外贸ERP └── 富通天下外贸ERP任意文件上传漏洞.md ├── 小狐狸Chatgpt付费创作系统 └── 小狐狸Chatgpt付费创作系统存在任意文件上传漏洞.md ├── 山东聚恒网络技术有限公司 └── 山东聚恒网络技术有限公司聚恒中台data.ashx存在SQL注入漏洞.md ├── 山石网科云鉴 ├── 山石网科云鉴存在前台任意命令执行漏洞.md └── 山石网科应用防火墙WAF未授权命令注入漏洞.md ├── 帆软报表 ├── 帆软报表 V8 get_geo_json 任意文件读取漏洞.md └── 帆软系统ReportServer存在SQL注入漏洞导致RCE.md ├── 帮管客CRM └── 帮管客CRM-jiliyu接口存在SQL漏洞.md ├── 平升电子水库监管平台 ├── 平升水库水文监测系统默认密码.md └── 平升电子水库监管平台GetAllRechargeRecordsBySIMCardId接口处存在SQL注入漏洞.md ├── 广州图创图书馆集群管理系统 ├── 广州图书馆集群系统WebBookNew存在SQL注入漏洞.md ├── 广州图创图书馆集群管理系统updOpuserPw接口存在SQL注入漏洞.md └── 广州图创图书馆集群管理系统存在未授权访问.md ├── 广联达OA ├── 广联达-linkworks-gwgdwebservice存在SQL注入漏洞.md ├── 广联达OA任意用户登录.md ├── 广联达OA前台任意文件上传.md ├── 广联达OA接口ArchiveWebService存在XML实体注入漏洞.md ├── 广联达OA系统GetSSOStamp接口存在任意用户登录.md ├── 广联达OA系统接口ConfigService.asmx存在SQL注入漏洞.md ├── 广联达OA系统接口do.asmx存在任意文件写入漏洞.md ├── 广联达OA系统接口do.asmx存在任意文件读取漏洞.md ├── 广联达oa sql注入漏洞 .md ├── 广联达oa 后台文件上传漏洞.md └── 某联达oa 后台文件上传漏洞.md ├── 建文工程管理系统 ├── 建文工程管理系统BusinessManger.ashx存在SQL注入漏洞.md └── 建文工程管理系统desktop.ashx存在SQL注入漏洞.md ├── 微信广告任务平台 └── 微信广告任务平台存在任意文件上传漏洞.md ├── 微厦在线学习平台 └── 微厦在线学习平台OrganSetup存在任意文件上传漏洞.md ├── 微商城系统 ├── 微商城系统api.php存在文件上传漏洞.md └── 微商城系统goods.php存在SQL注入漏洞.md ├── 微擎 └── 微擎-AccountEdit-file-upload文件上传漏洞.md ├── 思福迪运维安全管理系统 └── 思福迪运维安全管理系统RCE漏洞.md ├── 悟空CRM └── 悟空CRM9.0-fastjson远程代码执行漏洞(CVE-2024-23052).md ├── 悦库企业网盘 └── 悦库企业网盘userlogin.html存在SQL注入漏洞.md ├── 惠尔顿-网络安全审计系统 └── 惠尔顿-网络安全审计系统存在任意文件读取漏洞.md ├── 慧学教育科技有限公司 └── 慧学教育科技有限公司Campuswit_uploadFiles存在任意文件上传漏洞.md ├── 懒人网址导航页 └── 懒人网址导航页search.html存在SQL注入漏洞.md ├── 抢单刷单系统 └── 某二开版海外抢单Shua单系统存在任意用户登录漏洞.md ├── 拓尔思TRS媒资管理系统 └── 拓尔思TRS媒资管理系统uploadThumb存在文件上传漏洞.md ├── 拼团零售商城系统 └── 拼团零售商城系统前台任意文件写入漏洞.md ├── 挖矿质押单语言系统 ├── 某U挖矿质押单语言系统imageupload后台任意文件上传漏洞.md ├── 某U挖矿质押单语言系统前台未授权修改管理员密码.md └── 某U挖矿质押单语言系统后台phar反序列漏洞.md ├── 捷诚管理信息系统 └── 捷诚管理信息系统sql注入漏洞.md ├── 数字通OA ├── 数字通OA-智慧政务接口payslip存在SQL注入漏洞.md ├── 数字通云平台智慧政务setting存在文件上传漏洞.md └── 数字通云平台智慧政务workflow存在SQL注入漏洞.md ├── 新中新中小学智慧校园信息管理系统 └── 新中新中小学智慧校园信息管理系统Upload接口存在任意文件上传漏洞.md ├── 新开普掌上校园服务管理平台 └── 新开普掌上校园服务管理平台service.action远程命令执行.md ├── 新视窗新一代物业管理系统 ├── 新视窗新一代物业管理系统GetCertificateInfoByStudentId存在SQL注入漏洞.md └── 新视窗新一代物业管理系统任意文件上传漏洞.md ├── 方天云智慧平台系统 ├── 方天云智慧平台系统GetCompanyItem存在sql注入漏洞.md ├── 方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞.md ├── 方天云智慧平台系统Upload.ashx存在任意文件上传漏洞.md └── 方天云智慧平台系统setImg.ashx存在文件上传漏洞.md ├── 方正全媒体 ├── 方正全媒体采编系统存在syn.do信息泄露漏洞.md └── 方正畅享全媒体新闻采编系统binary.do存在SQL注入漏洞.md ├── 昂捷ERP └── 昂捷ERP WebService接口 SQL注入漏洞(QVD-2023-45071).md ├── 明源云 └── 明源云ERP接口ApiUpdate.ashx文件上传漏洞.md ├── 易天智能eHR管理平台 └── 易天智能eHR管理平台任意用户添加漏洞.md ├── 易宝OA ├── 易宝OA ExecuteSqlForSingle SQL注入漏洞.md ├── 易宝OA-BasicService.asmx存在SQL注入漏洞.md ├── 易宝OA-BasicService.asmx存在任意文件上传漏洞.md └── 易宝OA系统DownloadFile接口存在文件读取漏洞.md ├── 易思智能物流无人值守系统 └── 易思智能物流无人值守系统5.0存在任意文件上传漏洞.md ├── 易捷OA └── 易捷OA协同办公软件ShowPic接口存在任意文件读取.md ├── 普元EOS-Platform ├── 普元EOS-Platform-eos.jmx存在远程代码执行漏洞.md └── 普元EOS-Platform-jmx.jmx存在远程代码执行漏洞(XVE-2023-24691).md ├── 智互联科技有限公司 ├── 智互联(深圳)科技有限公司SRM智联云采系统download存在任意文件读取漏洞.md └── 智联云采SRM2.0系统接口autologin身份认证绕过漏洞.md ├── 智慧校园(安校易)管理系统 ├── 智慧校园(安校易)管理系统FileUpAd.aspx任意文件上传漏洞.md └── 智慧校园(安校易)管理系统FileUpProductupdate.aspx任意文件上传漏洞.md ├── 智能停车管理系统 ├── 智能停车管理系统GetPasswayData存在SQL注入漏洞.md └── 智能停车管理系统ToLogin存在SQL注入漏洞.md ├── 智跃人力资源管理系统 └── 智跃人力资源管理系统GenerateEntityFromTable.aspx SQL漏洞.md ├── 智邦国际ERP └── 智邦国际ERP-GetPersonalSealData.ashx存在SQL注入漏洞.md ├── 朗新天霁人力资源管理系统 ├── 朗新天霁人力资源管理系统GetMessage存在sql注入漏洞.md └── 朗新天霁智能eHR人力资源管理系统GetE01ByDeptCode存在SQL注入漏洞.md ├── 杭州三一谦成科技车辆监控服务平台 └── 杭州三一谦成科技车辆监控服务平台接口platformSql存在SQL注入漏洞.md ├── 杭州雄威餐厅数字化综合管理平台 └── 杭州雄威餐厅数字化综合管理平台存在存在绕过认证导致任意密码重置漏洞.md ├── 极限OA └── 极限OA接口video_file.php存在任意文件读取漏洞.md ├── 某业务管理系统 └── 某业务管理系统LoginUser存在信息泄露漏洞.md ├── 某短视频直播打赏系统 ├── 某短视频直播打赏系统任意文件读取漏洞.md └── 某短视频直播打赏系统后台任意文件上传漏洞.md ├── 正方 ├── 正方教学管理信息服务平台ReportServer存在任意文件读取漏洞.md ├── 正方数字化校园平台RzptManage存在任意文件写入漏洞.md └── 正方移动信息服务管理系统oaMobile_fjUploadByType存在文件上传漏洞.md ├── 汇智ERP ├── 汇智ERP接口filehandle.aspx存在任意文件读取漏洞.md └── 汇智ERP系统Upload.aspx存在文件上传漏洞.md ├── 汉得SRM └── 汉得SRM tomcat.jsp 登录绕过漏洞.md ├── 泛微OA ├── 某微 E-Cology 某版本 SQL注入漏洞.md ├── 某微E-Office9文件上传漏洞 CVE-2023-2523.md ├── 某微E-Office9文件上传漏洞 CVE-2023-2648.md ├── 泛微 HrmCareerApplyPerView sql注入漏洞.md ├── 泛微-EMobile存在弱口令漏洞.md ├── 泛微-OA系统ResourceServlet接口任意文件读取漏洞.md ├── 泛微-eoffice-webservice-file-upload任意文件上传漏洞.md ├── 泛微E-Cology-KtreeUploadAction任意文件上传漏洞.md ├── 泛微E-Cology接口getFileViewUrl存在SSRF漏洞.md ├── 泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞.md ├── 泛微E-Cology系统接口SignatureDownLoad存在SQL注入漏洞.md ├── 泛微E-Cology系统接口deleteRequestInfoByXml存在XXE漏洞.md ├── 泛微E-Mobile-client.do存在命令执行漏洞.md ├── 泛微E-Mobile-messageType.do存在命令执行漏洞.md ├── 泛微E-MobileServer远程命令执行漏洞.md ├── 泛微E-Mobile硬编码口令漏洞(XVE-2024-28095).md ├── 泛微E-Mobile系统接口cdnfile存在任意文件读取漏洞.md ├── 泛微E-Mobile系统接口installOperate.do存在SSRF漏洞.md ├── 泛微E-Office-json_common.phpSQL注入漏洞.md ├── 泛微E-Office-jx2_config存在信息泄露漏洞.md ├── 泛微E-Office-uploadfile.php任意文件上传漏洞.md ├── 泛微E-Office10-OfficeServer任意文件上传漏洞.md ├── 泛微E-Office10版本小于v10.0_20240222存在远程代码执行漏洞.md ├── 泛微E-Office系统login_other.php存在sql注入漏洞.md ├── 泛微E-cology-LoginSSO.jsp存在QL注入漏洞(CNVD-2021-33202).md ├── 泛微E-office-10接口leave_record.php存在SQL注入漏洞.md ├── 泛微OA-E-Cology-FileDownload文件读取漏洞.md ├── 泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞.md ├── 泛微OA-E-Cology-JqueryFileTree.jsp目录遍历漏洞.md ├── 泛微OA-E-Cology接口WorkflowServiceXml存在SQL注入漏洞.md ├── 泛微OA-E-Mobile移动管理平台lang2sql任意文件上传漏洞.md ├── 泛微OA-E-cology8-SptmForPortalThumbnail.jsp任意文件读取漏洞.md ├── 泛微e-cology-ProcessOverRequestByXml接口存在任意文件读取漏洞.md ├── 泛微e-cology-v10远程代码执行漏洞.md ├── 泛微e-cology9_SQL注入-CNVD-2023-12632.md ├── 泛微e-cology9接口WorkPlanService前台SQL注入漏洞(XVE-2024-18112).md ├── 泛微e-cology9接口XmlRpcServlet存在任意文件读取漏洞.md ├── 泛微e-cology接口HrmService前台SQL注入漏洞.md ├── 泛微e-cology接口getLabelByModule存在sql注入漏洞.md ├── 泛微e-office 未授权访问.md ├── 泛微e-office-mobile_upload_save存在任意文件上传漏洞.md ├── 泛微e-office-uploadify.php存在任意文件上传漏洞.md ├── 泛微e-office10系统schema_mysql.sql敏感信息泄露漏洞.md ├── 泛微e-office系统UserSelect接口存在未授权访问漏洞.md ├── 泛微ecology9系统接口ModeDateService存在SQL漏洞.md ├── 泛微ecology系统setup接口存在信息泄露漏洞.md ├── 泛微ecology系统接口BlogService存在SQL注入漏洞.md ├── 泛微getE9DevelopAllNameValue2接口存在任意文件读取漏洞.md ├── 泛微云桥 e-Bridge addTaste接口SQL注入漏洞.md ├── 泛微云桥(e-Bridge)系统接口addResume存在任意文件上传漏洞.md └── 泛微移动管理平台lang2sql接口任意文件上传.md ├── 浙大恩特客户资源管理系统 ├── 浙大恩特客户资源管理系统 文件上传和sql注入漏洞.md ├── 浙大恩特客户资源管理系统-RegulatePriceAction存在SQL注入.md ├── 浙大恩特客户资源管理系统-purchaseaction.entphone接口存在SQL漏洞.md └── 浙大恩特客户资源管理系统crmbasicaction任意文件上传.md ├── 浙江宇视 └── 浙江宇视isc网络视频录像机LogReport.php存在远程命令执行漏洞.md ├── 浪潮云 ├── 浪潮云财务系统UploadListFile存在任意文件上传漏洞.md ├── 浪潮云财务系统bizintegrationwebservice.asmx存在命令执行漏洞.md └── 浪潮云财务系统xtdysrv.asmx存在命令执行漏洞.md ├── 海康威视 ├── HiKVISION 综合安防管理平台 任意文件上传漏洞.md ├── 海康威视-综合安防管理平台-files-文件读取.md ├── 海康威视CVE-2023-6895 IP网络对讲广播系统远程命令执行.md ├── 海康威视IP网络对讲广播系统任意文件下载漏洞CVE-2023-6893.md ├── 海康威视IVMS-8700 fastjson命令执行漏洞.md ├── 海康威视iVMS综合安防系统resourceOperations接口任意文件上传漏洞.md ├── 海康威视安全接入网关任意文件读取漏洞.md ├── 海康威视综合安防download存在任意文件读取漏洞.md ├── 海康威视综合安防管理平台applyAutoLoginTicket远程代码执行漏洞.md ├── 海康威视综合安防管理平台clusters接口存在任意文件上传漏洞.md ├── 海康威视综合安防管理平台keepAlive远程代码执行漏洞.md ├── 海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞.md ├── 海康威视综合安防管理平台productFile远程代码执行.md ├── 海康威视综合安防管理平台uploadAllPackage任意文件上传漏洞.md ├── 海康威视综合安防管理平台信息泄露.md ├── 海康威视综合安防系统detection接口存在RCE漏洞.md └── 海康威视运行管理中心fastjson漏洞.md ├── 海洋cms ├── SeaCMS海洋影视管理系统dmku存在SQL注入漏洞.md ├── SeaCMS海洋影视管理系统index.php存在SQL注入漏洞.md ├── 海洋CMS-admin_notify.php远程代码执行漏洞.md └── 海洋CMS后台admin_smtp.php存在远程代码执行漏洞.md ├── 海翔ERP └── 海翔ERP SQL注入漏洞.md ├── 润乾报表 ├── 润乾报表InputServlet接口存在文件上传漏洞.md ├── 润乾报表dataSphereServlet任意文件上传.md ├── 润乾报表dataSphereServlet接口存在任意文件读取漏洞.md └── 润乾报表平台InputServlet存在任意文件读取漏洞.md ├── 润申信息科技ERP系统 ├── 润申信息科技ERP系统CommentStandardHandler.ashx接口存在sql注入漏洞.md └── 润申信息科技ERP系统DefaultHandler.ashx接口存在sql注入漏洞.md ├── 深信服 ├── 某x服应用交付系统命令执行漏洞.md ├── 某服 sxf-报表系统命令执行漏洞.md ├── 深信服SANGFOR终端检测响应平台 - 任意用户免密登录,前台RCE.md ├── 深信服SG上网优化管理系统 catjs.php 任意文件读取漏洞.md ├── 深信服下一代防火墙NGAF RCE漏洞.md ├── 深信服下一代防火墙NGAF任意文件读取漏洞.md └── 深信服数据中心管理系统 XML 实体注入漏洞.md ├── 深澜计费管理系统 ├── 深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750).md ├── 深澜计费管理系统proxy存在任意文件读取漏洞.md └── 深澜计费管理系统strategy存在反序列化RCE漏洞.md ├── 湖南建研检测系统 ├── 湖南建研-检测系统 admintool 任意文件上传.md ├── 湖南建研检测系统存在DownLoad2.aspx任意文件读取漏洞.md └── 湖南建研质量监测系统upload.ashx文件上传漏洞.md ├── 满客宝智慧食堂系统 ├── 满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926).md └── 满客宝智慧食堂系统selectUserByOrgId存在未授权访问漏洞.md ├── 漫画系统 ├── 微信公众号小说漫画系统fileupload.php存在前台任意文件上传漏洞.md └── 微信公众号小说漫画系统前台任意文件写入漏洞.md ├── 潍微科技 └── 潍微科技-水务信息管理平台ChangePwd接口存在SQL注入漏洞.md ├── 灵当CRM ├── 灵当CRM系统接口getOrderList存在SQL注入漏洞.md └── 灵当CRM系统接口multipleUpload.php文件上传漏洞.md ├── 点企来客服系统 ├── 点企来客服系统getwaitnum存在sql注入漏洞.md └── 点企来客服系统存在硬编码漏洞.md ├── 热网无线监测系统 ├── 热网无线监测系统GetMenuItem存在SQL注入漏洞.md └── 热网无线监测系统SystemManager.asmx存在SQL注入漏洞.md ├── 物业专项维修资金管理系统 └── 物业专项维修资金管理系统漏洞.md ├── 环境自动监测监控系统 └── 3C环境自动监测监控系统ReadLog文件读取漏洞.md ├── 珠海新华通软件股份有限公司 └── 珠海新华通软件股份有限公司云平台存在登录绕过漏洞.md ├── 瑞友天翼应用虚拟化系统 ├── 瑞友天翼应用虚拟化系统appsave接口存在SQL注入漏洞.md └── 瑞友应用虚拟化系统-RAPAgent存在命令执行漏洞.md ├── 瑞斯康达 ├── 瑞斯康达-多业务智能网关-RCE.md └── 瑞斯康达多业务智能网关list_service_manage.php存在未授权命令注入漏洞.md ├── 瑞星EDR └── 瑞星EDR-XSS漏洞可打管理员cookie.md ├── 用友OA ├── 某友时空KSOA PayBill SQL注入漏洞.md ├── 用友 GRP U8 license_check.jsp 存在SQL注入.md ├── 用友 GRP-U8 bx_historyDataCheck.jsp SQL注入漏洞.md ├── 用友 NC Cloud jsinvoke 任意文件上传漏洞.md ├── 用友 NC uapws wsdl XXE漏洞.md ├── 用友-U9-PatchFile.asmx任意文件上传漏洞.md ├── 用友CRM 任意文件读取漏洞.md ├── 用友CRM客户关系管理系统import.php存在任意文件上传漏洞.md ├── 用友CRM系统reservationcomplete.php存在逻辑漏洞直接登录后台.md ├── 用友CRM系统uploadfile.php接口存在任意文件上传.md ├── 用友GRP-A-Cloud政府财务云系统接口selectGlaDatasourcePreview存在SQL注入漏洞.md ├── 用友GRP-U8-FileUpload任意文件上传.md ├── 用友GRP-U8-PayReturnForWcp接口存在XXE漏洞.md ├── 用友GRP-U8-Proxy存在SQL注入漏洞.md ├── 用友GRP-U8-SelectDMJE.jsp_SQL注入漏洞.md ├── 用友GRP-U8-UploadFileData任意文件上传.md ├── 用友GRP-U8-bx_dj_check.jsp存在SQL注入.md ├── 用友GRP-U8-dialog_moreUser_check.jsp前台SQL注入.md ├── 用友GRP-U8-listSelectDialogServlet存在SQL注入.md ├── 用友GRP-U8-obr_zdybxd_check.jsp存在SQL注入.md ├── 用友GRP-U8-obr_zdybxd_check存在sql注入漏洞.md ├── 用友GRP-U8-operOriztion存在SQL注入漏洞.md ├── 用友GRP-U8-slbmbygr.jsp存在SQL注入漏洞.md ├── 用友GRP-U8-sqcxIndex.jsp存在SQL注入漏洞.md ├── 用友GRP-U8-ufgovbank存在XXE漏洞.md ├── 用友GRP-U8-userInfoWeb存在SQL注入.md ├── 用友GRP-U8存在XML注入漏洞.md ├── 用友GRP-U8日志泄漏漏洞.md ├── 用友GRPA++Cloud政府财务云存在任意文件读取漏洞.md ├── 用友NC word.docx任意文件读取漏洞.md ├── 用友NC-ActionServlet存在SQL注入漏洞.md ├── 用友NC-Cloud uploadChunk 任意文件上传漏洞.md ├── 用友NC-Cloud_importhttpscer接口存在任意文件上传漏洞.md ├── 用友NC-Cloud接口blobRefClassSearch存在反序列化漏洞.md ├── 用友NC-Cloud文件服务器用户登陆绕过漏洞.md ├── 用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞.md ├── 用友NC-Cloud系统queryStaffByName存在SQL注入漏洞.md ├── 用友NC-Cloud系统show_download_content接口存在SQL注入漏洞.md ├── 用友NC-avatar接口存在文件上传漏洞.md ├── 用友NC-bill存在SQL注入漏洞.md ├── 用友NC-complainbilldetail存在SQL注入漏洞.md ├── 用友NC-downCourseWare任意文件读取.md ├── 用友NC-downTax存在SQL注入漏洞.md ├── 用友NC-oacoSchedulerEvents接口存在sql注入漏洞.md ├── 用友NC-pagesServlet存在SQL注入.md ├── 用友NC-runStateServlet接口存在SQL注入漏洞.md ├── 用友NC-saveDoc.ajax存在任意文件上传漏洞.md ├── 用友NC-showcontent接口存在sql注入漏洞.md ├── 用友NC-uploadControl接口存在文件上传漏洞.md ├── 用友NC-warningDetailInfo接口存在SQL注入漏洞.md ├── 用友NC-workflowImageServlet接口存在sql注入漏洞.md ├── 用友NCCloud系统runScript存在SQL注入漏洞.md ├── 用友NC_CLOUD_smartweb2.RPC.d_XML外部实体注入.md ├── 用友NC_Cloud_soapFormat.ajax接口存在XXE.md ├── 用友NC_grouptemplet文件上传漏洞.md ├── 用友NC_saveImageServlet接口存在文件上传漏洞.md ├── 用友NC及U8cloud系统接口LoggingConfigServlet存在反序列化漏洞(XVE-2024-18151).md ├── 用友NC接口ConfigResourceServlet存在反序列漏洞.md ├── 用友NC接口PaWfm存在sql注入漏洞.md ├── 用友NC接口download存在SQL注入漏洞.md ├── 用友NC接口saveXmlToFIleServlet存在文件上传.md ├── 用友NC的download文件存在任意文件读取漏洞.md ├── 用友NC系统FileManager接口存在任意文件上传漏洞.md ├── 用友NC系统complainjudge接口SQL注入漏洞(XVE-2024-19043).md ├── 用友NC系统linkVoucher存在sql注入漏洞.md ├── 用友NC系统printBill接口存在任意文件读取漏洞.md ├── 用友NC系统querygoodsgridbycode接口code参数存在SQL注入漏洞.md ├── 用友NC系统registerServlet接口存在JNDI注入漏洞.md ├── 用友NC系统接口UserAuthenticationServlet存在反序列化RCE漏洞(XVE-2024-18302).md ├── 用友NC系统接口link存在SQL注入漏洞.md ├── 用友U8 Cloud-ArchiveVerify存在SQL注入漏洞.md ├── 用友U8 Cloud-KeyWordReportQuery存在SQL注入漏洞.md ├── 用友U8+CRM系统leadconversion.php存在SQL注入漏洞.md ├── 用友U8-CRM客户关系管理系统downloadfile.php存在任意文件读取漏洞.md ├── 用友U8-CRM客户关系管理系统getemaildata.php任意文件上传漏洞.md ├── 用友U8-CRM接口exportdictionary.php存在SQL注入漏洞.md ├── 用友U8-CRM系统chkService.php存在SQL注入漏洞.md ├── 用友U8-CRM系统fillbacksetting.php存在SQL注入漏洞.md ├── 用友U8-CRM系统接口attrlist存在SQL注入漏洞.md ├── 用友U8-CRM系统接口reservationcomplete.php存在SQL注入漏洞.md ├── 用友U8-Cloud upload任意文件上传漏洞.md ├── 用友U8-Cloud-TableInputOperServlet存在反序列化漏洞.md ├── 用友U8-Cloud-linkntb.jsp存在SQL注入漏洞(CNVD-C-2023-708748).md ├── 用友U8-Cloud-smartweb2.showRPCLoadingTip.d存在XXE漏洞.md ├── 用友U8-Cloud接口FileManageServlet存在反序列漏洞.md ├── 用友U8-Cloud接口FileServlet存在任意文件读取漏洞.md ├── 用友U8-Cloud接口ServiceDispatcherServlet存在反序列漏洞.md ├── 用友U8-Cloud系统BusinessRefAction存在SQL注入漏洞.md ├── 用友U8-Cloud系统XChangeServlet接口存在XXE漏洞.md ├── 用友U8-Cloud系统接口AddTaskDataRightAction存在SQL注入漏洞.md ├── 用友U8-Cloud系统接口MeasQueryConditionFrameAction存在SQL注入漏洞.md ├── 用友U8-Cloud系统接口MultiRepChooseAction存在SQL注入漏洞.md ├── 用友U8-Cloud系统接口RepAddToTaskAction存在SQL注入漏洞.md ├── 用友U8-OA协同工作系统doUpload.jsp任意文件上传漏洞.md ├── 用友U8-cloud RegisterServlet接口存在SQL注入漏洞.md ├── 用友U8-nc.bs.sm.login2.RegisterServlet存在SQL注入漏洞.md ├── 用友U8CRM系统接口relobjreportlist.php存在SQL注入漏洞.md ├── 用友U8CRM系统接口setremindtoold.php存在SQL注入漏洞.md ├── 用友U8Cloud系统接口MeasureQResultAction存在SQL注入漏洞.md ├── 用友U8GRP-fastjson漏洞.md ├── 用友U8_Cloud-base64存在SQL注入漏洞.md ├── 用友U8_cloud_KeyWordDetailReportQuery_SQL注入漏洞.md ├── 用友U8cloud-ExportUfoFormatAction存在SQL注入漏洞.md ├── 用友U8cloud接口MeasureQueryByToolAction存在SQL注入漏洞.md ├── 用友U9-PatchFile.asmx接口存在任意文件上传漏洞.md ├── 用友U9-UMWebService.asmx存在文件读取漏洞.md ├── 用友U9系统DoQuery接口存在SQL注入.md ├── 用友Ufida-ELTextFile.load.d任意文件读取漏洞.md ├── 用友crm-swfupload接口存在任意文件上传漏洞.md ├── 用友crm客户关系管理help.php存在任意文件读取漏洞.md ├── 用友nc-cloud RCE.md ├── 用友nc电子采购信息系统securitycheck存在sql注入.md ├── 用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞.md ├── 用友u9系统接口GetConnectionString存在信息泄露漏洞.md ├── 用友政务财务系统FileDownload存在任意文件读取漏洞.md ├── 用友时空KSOA-imagefield接口存在SQL注入漏洞.md ├── 用友时空KSOA-linkadd.jsp存在SQL注入漏洞.md ├── 用友时空KSOA接口com.sksoft.bill.QueryService存在SQL注入漏洞.md ├── 用友时空KSOA系统接口PreviewKPQT.jsp存在SQL注入漏洞.md ├── 用友时空KSOA系统接口PrintZP.jsp存在SQL注入漏洞.md ├── 用友时空KSOA系统接口PrintZPFB.jsp存在SQL注入漏洞.md ├── 用友时空KSOA系统接口PrintZPYG.jsp存在SQL注入漏洞.md ├── 用友时空KSOA系统接口PrintZPZP.jsp存在SQL注入漏洞.md ├── 用友时空KSOA系统接口fillKP.jsp存在SQL注入漏洞.md ├── 用友智石开PLM-getWorkGroups存在信息泄露漏洞.md ├── 用友畅捷通-TPlus-CheckMutex存在sql注入漏洞.md ├── 用友畅捷通-TPlus系统接口FileUploadHandler.ashx存在任意文件上传漏洞.md ├── 用友畅捷通-TPlus系统接口ajaxpro存在ssrf漏洞.md ├── 用友畅捷通CRM-create_site.phpSQL注入漏洞.md ├── 用友畅捷通RRATableController存在反序列化漏洞.md ├── 用友畅捷通TPlus-DownloadProxy.aspx任意文件读取漏洞.md ├── 用友畅捷通TPlus-InitServerInfo存在SQL注入漏洞.md ├── 用友畅捷通TPlus-keyEdit.aspx接口存在SQL注入漏洞.md ├── 用友移动管理平台uploadIcon任意文件上传漏洞.md ├── 用友移动系统管理getFileLocal接口存在任意文件读取.md ├── 用友移动系统管理uploadApk接口存在任意文件上传.md ├── 用友系统-U9企业版存在任意文件上传漏洞.md ├── 畅捷通CRM系统newleadset.php接口存在SQL注入漏洞.md ├── 畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞.md └── 畅捷通TPlus-KeyInfoList.aspx存在SQL注入漏洞.md ├── 申瓯通信在线录音管理系统 ├── 申瓯通信在线录音管理系统Thinkphp远程代码执行漏洞.md └── 申瓯通信在线录音管理系统download任意文件读取漏洞.md ├── 电信网关配置管理 ├── 电信网关配置管理后台del_file.php接口存在命令执行漏洞.md ├── 电信网关配置管理后台ipping.php存在命令执行漏洞.md └── 电信网关配置管理后台rewrite.php接口存在文件上传漏洞.md ├── 电力系统控制软件 └── Altenergy电力系统控制软件set_timezone接口存在远程命令执行漏洞.md ├── 真内控国产化开发平台 └── 真内控国产化开发平台接口preview任意文件读取漏洞.md ├── 睿因Wavlink └── 睿因 Wavlink WL_WNJ575A3 远程命令执行.md ├── 短剧影视小程序 ├── 短剧影视小程序前台base64_image_content任意文件上传漏洞.md ├── 短剧影视小程序前台juhecurl任意文件读取漏洞.md └── 短剧影视小程序前台未授权漏洞.md ├── 碧海威 └── 碧海威L7产品confirm存在命令执行漏洞.md ├── 社交系统 └── 某仿soul欲音社交系统存在任意文件读取漏洞.md ├── 禅道 ├── 禅道 16.5 router.class.php SQL注入漏洞.md ├── 禅道 v18.0-v18.3 存在后台命令执行漏洞.md ├── 禅道18.5存在后台命令执行漏洞.md └── 禅道项目管理系统身份认证绕过漏洞.md ├── 福建科立讯通信 ├── 福建科立讯通信指挥调度平台get_extension_yl.php存在sql注入漏洞.md ├── 福建科立讯通信指挥调度管理平台ajax_users.php存在SQL注入漏洞.md ├── 福建科立讯通信有限公司指挥调度管理平台RCE.md └── 福建科立讯通信有限公司指挥调度管理平台uploadgps.php存在SQL注入漏洞.md ├── 私有云管理平台 └── 私有云管理平台存在登录绕过漏洞.md ├── 科拓全智能停车收费系统 ├── 科拓全智能停车收费系统DoubtCarNoListFrom.aspx存在SQL注入漏洞.md └── 科拓全智能停车收费系统Webservice.asmx存在任意文件上传.md ├── 科荣AIO ├── 科荣 AIO任意文件上传-目录遍历-任意文件读取漏洞.md ├── 科荣AIO-ReadFile存在任意文件读取漏洞.md ├── 科荣AIO-moffice接口存在SQL注入漏洞.md ├── 科荣AIO管理系统endTime参数存在SQL注入漏洞.md └── 科荣AIO系统接口UtilServlet存在代码执行漏洞.md ├── 科讯图书馆综合管理云平台 ├── 科讯一卡通管理系统DataService.asmx存在SQL注入漏洞.md ├── 科讯一卡通管理系统dormitoryHealthRanking存在SQL注入漏洞.md ├── 科讯一卡通管理系统get_kq_tj_today存在SQL注入漏洞.md └── 科讯图书馆综合管理云平台WebCloud.asmx存在SQL注入.md ├── 章管家-印章智慧管理平台 ├── 章管家list.htm存在SQL注入漏洞.md ├── 章管家listUploadIntelligent接口存在sql注入漏洞.md ├── 章管家updatePwd.htm存在任意账号密码重置漏洞.md └── 章管家前台任意文件上传漏洞(XVE-2024-19042).md ├── 紫光电子档案管理系统 └── 紫光电子档案管理系统selectFileRemote存在SQL注入漏洞.md ├── 红帆OA ├── 红帆OA iorepsavexml.aspx 文件上传漏洞.md ├── 红帆OA zyy_AttFile.asmx SQL注入漏洞.md └── 红帆ioffice-udfGetDocStep.asmx存在SQL注入漏洞.md ├── 红海云eHR ├── 红海云eHR-PtFjk.mob存在任意文件上传漏洞.md ├── 红海云eHR系统kgFile.mob存在任意文件上传漏洞.md └── 红海云eHR系统pc.mob存在sql注入漏洞.md ├── 绿盟 ├── 某盟 SAS堡垒机 local_user.php 任意用户登录漏洞.md ├── 某盟 SAS堡垒机 漏洞.md ├── 某盟sas安全审计系统任意文件读取漏洞.md ├── 绿盟 NF 下一代防火墙 任意文件上传漏洞.md └── 绿盟日志审计系统存在命令执行漏洞.md ├── 网动统一通信平台 └── 网动统一通信平台ActiveUC存在任意文件下载漏洞.md ├── 网康科技 ├── 网康NS-ASG应用安全网关singlelogin.php存在SQL注入漏洞.md ├── 网康科技 NS-ASG 应用安全网关 SQL注入漏洞(CVE-2024-2330).md ├── 网康科技NS-ASG应用安全网关add_ikev2.php存在SQL注入漏洞.md ├── 网康科技NS-ASG应用安全网关add_postlogin.php存在SQL注入漏洞.md ├── 网康科技NS-ASG应用安全网关config_Anticrack.php存在SQL注入漏洞.md ├── 网康科技NS-ASG应用安全网关config_ISCGroupNoCache.php存在SQL注入漏洞.md └── 网康科技NS-ASG应用安全网关list_ipAddressPolicy.php存在SQL注入漏洞(CVE-2024-2022).md ├── 网御星云 ├── 网御ACM上网行为管理系统bottomframe.cgi存在SQL注入漏洞.md └── 网御VPN安全网关存在任意文件下载漏洞(CNVD-2024-34014).md ├── 网神 ├── 某神 SecGate 3600 防火墙 obj_app_upfile 任意文件上传漏洞.md ├── 某神SecSSL3600安全接入网关系统任意密码修改漏洞.md ├── 网神SecGate 3600 防火墙sys_hand_upfile 任意文件上传漏洞.md ├── 网神SecGate3600未授权添加用户漏洞.md └── 网神防火墙 app_av_import_save文件上传漏洞.md ├── 网络验证系 └── 网络验证系统getInfo参数存在SQL注入漏洞.md ├── 网课交单平台 └── 29网课交单平台epay.php存在SQL注入漏洞.md ├── 美特CRM系统 └── 美特CRM系统接口anotherValue存在FastJson反序列化RCE.md ├── 群杰印章物联网管理平台 └── 群杰印章物联网管理平台rest密码重置漏洞(XVE-2024-18945).md ├── 翰智员工服务平台 └── 翰智员工服务平台loginByPassword存在SQL注入漏洞.md ├── 联奕统一身份认证平台 └── 联奕统一身份认证平台getDataSource存在信息泄露漏洞.md ├── 联想网盘 └── 联想网盘存在任意文件上传漏洞.md ├── 联软 ├── 联软安全数据交换系统任意文件读取.md ├── 联软安渡UniNXG安全数据交换系统poserver.zz存在任意文件读取漏洞.md └── 联软安渡系统接口queryLinklnfo存在SQL注入漏洞.md ├── 联达OA ├── 联达OA uploadLogo.aspx存在任意文件上传.md └── 联达OA-UpLoadFile.aspx存在任意文件上传漏洞.md ├── 脸爱云一脸通智慧管理平台 ├── 脸爱云 一脸通智慧管理平台任意用户添加漏洞.md ├── 脸爱云一脸通智慧平台SelOperators信息泄露漏洞.md ├── 脸爱云一脸通智慧管理平台存在UpLoadPic.ashx文件上传漏洞.md └── 脸爱云一脸通智慧管理平台存在downloads.aspx信息泄露漏洞.md ├── 致远OA ├── 致远M1 usertokenservice 反序列化RCE漏洞.md ├── 致远M3敏感信息泄露漏洞.md ├── 致远OA M3 Server 反序列化漏洞.md ├── 致远OA wpsAssistServlet任意文件读取漏洞.md ├── 致远OA-A8-V5接口officeservlet存在任意文件读取漏洞.md ├── 致远OA-ucpcLogin密码重置漏洞.md ├── 致远OAV52019系统properties信息泄露漏洞.md ├── 致远OA_V8.1SP2文件上传漏洞.md ├── 致远OA_getAjaxDataServlet接口存在任XXE漏洞.md ├── 致远OA任意管理员登录.md ├── 致远OA前台任意用户密码修改漏洞.md ├── 致远OA帆软组件ReportServer目录遍历漏洞.md ├── 致远OA系统constDef接口存在代码执行漏洞.md ├── 致远oa系统saveFormula4Cloud存在JNDI注入.md ├── 致远互联-OA前台fileUpload.do存在绕过文件上传漏洞.md ├── 致远互联AnalyticsCloud分析云存在任意文件读取漏洞.md ├── 致远互联FE协作办公平台apprvaddNew存在sql注入漏洞.md ├── 致远互联FE协作办公平台codeMoreWidget.js存在sql注入漏洞.md ├── 致远互联FE协作办公平台editflow_manager存在sql注入漏洞.md ├── 致远互联FE协作办公平台ncsubjass存在SQL注入.md └── 致远前台任意用户密码修改.md ├── 英飞达医学影像存档与通信系统 ├── 英飞达医学影像存档与通信系统Upload.asmx任意文件上传漏洞.md └── 英飞达医学影像存档与通信系统WebJobUpload任意文件上传漏洞.md ├── 菠菜 ├── 万豪娱乐存在任意文件读取漏洞.md └── 彩票系统存在任意文件preview.php上传漏洞.md ├── 蓝凌OA ├── 某凌OA前台代码执行.md ├── 蓝凌EIS智慧协同平台UniformEntry.aspx存在SQL注入漏洞(XVE-2024-19181).md ├── 蓝凌EIS智慧协同平台rpt_listreport_definefield.aspx接口存在SQL注入漏洞.md ├── 蓝凌EIS智慧协同平台saveImg接口存在任意文件上传漏洞.md ├── 蓝凌EIS智慧协同平台多个接口SQL注入.md ├── 蓝凌EKP前台授权绕过导致文件上传.md ├── 蓝凌EKP系统dataxml.tmpl存在命令执行漏洞.md ├── 蓝凌KEP前台RCE漏洞.md ├── 蓝凌OA treexml.tmpl 远程命令执行漏洞.md ├── 蓝凌OA-WechatLoginHelper.do存在SQL注入漏洞.md └── 蓝凌OAsysUiComponent 文件存在任意文件上传漏洞.md ├── 蓝海卓越计费管理系统 ├── 蓝海卓越计费管理系统SQL注入漏洞.md ├── 蓝海卓越计费管理系统存在debug.php远程命令执行漏洞.md └── 蓝海卓越计费管理系统存在download.php任意文件读取漏洞.md ├── 蓝网科技临床浏览系统 └── 蓝网科技临床浏览系统-deleteStudy-SQL注入漏洞复现(CVE-2024-4257).md ├── 虚拟仿真实验室系统 └── 虚拟仿真实验室系统FileUploadServlet存在任意文件上传漏洞.md ├── 蜂信物联 └── 蜂信物联(FastBee)物联网平台download存在任意文件下载漏洞.md ├── 西软云 ├── 西软云XMS-futurehotel-operate接口存在XXE漏洞.md ├── 西软云XMS-futurehotel-query接口存在XXE漏洞.md └── 西软云XMS反序列化漏洞.md ├── 誉龙数字 ├── 誉龙视音频综合管理平台FindById存在SQL注入漏洞.md └── 誉龙视音频综合管理平台TimeSyn存在远程命令执行漏洞.md ├── 资管云 ├── 百易云资产管理运营系统house.save.php存在SQL注入漏洞.md ├── 百易云资产管理运营系统ticket.edit.php存在SQL注入漏洞.md └── 资管云comfileup.php前台文件上传漏洞(XVE-2024-18154).md ├── 赛思 └── 赛思 SuccezBl前台任意文件上传.md ├── 赛蓝企业管理系统 ├── 赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞.md ├── 赛蓝企业管理系统DownloadBuilder任意文件读取漏洞.md ├── 赛蓝企业管理系统GetCssFile存在任意文件读取漏洞.md ├── 赛蓝企业管理系统GetExcellTemperature存在SQL注入漏洞.md ├── 赛蓝企业管理系统GetImportDetailJson存在SQL注入漏洞.md ├── 赛蓝企业管理系统GetJSFile存在任意文件读取漏洞.md ├── 赛蓝企业管理系统ReadTxtLog存在任意文件读取漏洞.md └── 赛蓝企业管理系统SubmitUploadify存在任意文件上传漏洞.md ├── 超易企业管理系统 └── 超易企业管理系统Login.ashx存在SQL注入漏洞.md ├── 超级猫签名APP分发平台 ├── 超级猫签名APP分发平台前台存在SQL注入漏洞.md └── 超级猫签名APP分发平台前台远程文件写入漏洞.md ├── 路由器 ├── AC集中管理平台未授权漏洞.md ├── ALR-F800存在命令执行漏洞.md ├── CERIO-DT系列路由器Save.cgi接口存在命令执行漏洞.md ├── Netgear-WN604接口downloadFile.php信息泄露漏洞(CVE-2024-6646).md ├── Netgear路由器boardDataWW.php存在RCE漏洞.md ├── T18-1TOTOLINK-A6000R-远程命令执行漏洞.md ├── TOTOLINK A3700R命令执行漏洞CVE-2023-46574.md ├── TP-LINKTL-WR940N 命令执行漏洞(CVE-2023-33538).md ├── TP-Link-ER7206存在命令注入漏洞.md ├── Telesquare路由器RCE(CVE-2024-29269).md ├── WIFISKY-7层流控路由器confirm.php接口处存在RCE漏洞.md ├── draytek路由器addrouting命令执行漏洞.md ├── 中移铁通禹路由器信息泄露漏洞.md └── 极企智能办公路由接口jumper.php存在RCE漏洞.md ├── 辰信景云终端安全管理系统 └── 某信景云终端安全管理系统存在loginSQL注入漏洞.md ├── 迈普多业务融合网关 └── 迈普多业务融合网关send_order.cgi存在命令执行漏洞.md ├── 远秋医学培训系统 └── 远秋医学培训系统未授权查看密码.md ├── 迪普 └── 迪普DPTech VPN 任意文件读取.md ├── 通天星 ├── 通天星-CMSV6-inspect_file-upload存在任意文件上传漏洞.md ├── 通天星CMSV6接口pointManage存在SQL注入.md ├── 通天星CMSV6车载定位监控平台SQL注入漏洞(XVE-2023-23744).md ├── 通天星CMSV6车载定位监控平台getAlarmAppealByGuid存在SQL注入漏洞.md ├── 通天星CMSV6车载视频监控平台SESSION伪造漏洞.md ├── 通天星CMSV6车载视频监控平台disable存在SQL注入.md ├── 通天星CMSV6车载视频监控平台downloadLogger接口任意文件读取漏洞.md ├── 通天星CMSV6车载视频监控平台getAlser.acion接口处存在信息泄露漏洞.md ├── 通天星CMSV6车载视频监控平台xz_center信息泄露漏洞.md └── 鸿运(通天星CMSV6车载)主动安全监控云平台存在任意文件读取漏洞.md ├── 通达OA ├── 通达OA down.php接口存在未授权访问漏洞.md ├── 通达OA get_datas.php前台sql注入.md ├── 通达OA header身份认证绕过漏洞.md ├── 通达OA sql注入漏洞 CVE-2023-4165.md ├── 通达OA sql注入漏洞 CVE-2023-4166.md ├── 通达OA-WHERE_STR存在前台SQL注入漏洞.md └── 通达OAV11.10接口login.php存在SQL注入漏洞.md ├── 速达软件 └── 速达软件全系产品存在任意文件上传漏洞.md ├── 邦永PM2项目管理系统 ├── 邦永PM2项目管理平台系统ExcelIn.aspx存在任意文件上传漏洞.md └── 邦永PM2项目管理系统Global_UserLogin.aspx存在SQL注入漏洞.md ├── 金万维-云联应用系统 └── 金万维-云联应用系统接入平台GNRemote.dll前台存在RCE漏洞.md ├── 金和OA ├── 金和OA jc6 clobfield SQL注入漏洞.md ├── 金和OA-C6-GeneralXmlhttpPage.aspx存在SQL注入漏洞.md ├── 金和OA-C6-IncentivePlanFulfill.aspx存在SQL注入漏洞.md ├── 金和OA-C6-download.jsp任意文件读取漏洞.md ├── 金和OA-C6协同管理平台DBModules.aspx存在SQL注入漏洞.md ├── 金和OA-C6接口DownLoadBgImage存在任意文件读取漏洞.md ├── 金和OA-C6系统接口jQueryUploadify.ashx存在SQL注入漏洞.md ├── 金和OAC6-FileDownLoad.aspx任意文件读取漏洞.md ├── 金和OAC6-GetSqlData.aspx存在SQL注入漏洞.md ├── 金和OA_C6_UploadFileDownLoadnew存在任意文件读取漏洞.md ├── 金和OA_CarCardInfo.aspx_SQL注入漏洞.md ├── 金和OA_HomeService.asmxSQL注入.md ├── 金和OA_MailTemplates.aspx_SQL注入漏洞.md ├── 金和OA_SAP_B1Config.aspx未授权访问漏洞.md ├── 金和OA_jc6_Upload任意文件上传.md ├── 金和OA_jc6_ntko-upload任意文件上传漏洞.md ├── 金和OA_jc6_viewConTemplate.action存在FreeMarker模板注入漏洞.md ├── 金和OA_upload_json.asp存在任意文件上传漏洞.md ├── 金和OA_uploadfileeditorsave接口存在任意文件上传漏洞.md ├── 金和OA任意文件读取漏洞.md └── 金和OA系统接口SignUpload.ashx存在SQL注入漏洞.md ├── 金山 ├── 金山EDR RCE漏洞.md ├── 金山WPS RCE.md ├── 金山云EDR任意文件上传漏洞.md ├── 金山终端安全系统V9.0 SQL注入漏洞.md └── 金山终端安全系统V9任意文件上传漏洞.md ├── 金慧 └── 金慧综合管理信息系统LoginBegin.aspx存在SQL注入漏洞.md ├── 金慧综合管理信息系统 └── 金慧综合管理信息系统LoginBegin.aspx存在SQL注入漏洞.md ├── 金斗云 ├── 金斗云-HKMP智慧商业软件download任意文件读取漏洞.md ├── 金斗云-HKMP智慧商业软件任意用户添加漏洞.md └── 金斗云HKMP智慧商业软件queryPrintTemplate存在SQL注入漏洞.md ├── 金盘移动图书馆系统 └── 金盘移动图书馆系统存在任意文件上传漏洞.md ├── 金石工程项目管理系统 └── 金石工程项目管理系统TianBaoJiLu.aspx存在SQL注入漏洞.md ├── 金蝶 ├── 金蝶Apusic应用服务器loadTree JNDI注入漏洞.md ├── 金蝶Apusic应用服务器任意文件上传.md ├── 金蝶EAS myUploadFile任意文件上传.md ├── 金蝶EAS_pdfviewlocal任意文件读取漏洞.md ├── 金蝶OA-EAS系统 uploadLogo.action 任意文件上传漏洞.md ├── 金蝶OA云星空 ScpSupRegHandler 任意文件上传漏洞.md ├── 金蝶云-星空ServiceGateway反序列化漏洞.md ├── 金蝶云星空 CommonFileserver 任意文件读取漏洞.md ├── 金蝶云星空UserService反序列化漏洞.md └── 金蝶星空云K3Cloud反序列化漏洞.md ├── 铭飞 ├── 铭飞CMS list接口存在SQL注入.md ├── 铭飞CMS-search接口存在sql注入漏洞.md └── 铭飞MCMS接口upload.do存在任意文件上传漏洞.md ├── 锐捷 ├── RG-UAC锐捷统一上网行为管理与审计系统存在远程代码执行漏洞.md ├── 锐捷 NBR 路由器 fileupload.php 任意文件上传漏洞.md ├── 锐捷-EG易网关存在RCE漏洞.md ├── 锐捷NBR系列路由器存在管理员密码重置漏洞.md ├── 锐捷RG-EW1200G无线路由器登录绕过.md ├── 锐捷RG-NBS2026G-P交换机WEB管理ping.htm未授权访问漏洞.md ├── 锐捷RG-UAC统一上网行为管理与审计系统管理员密码泄露.md ├── 锐捷RG-UAC统一上网行为管理审计系统online.php存在远程代码执行.md ├── 锐捷RG-UAC统一上网行为管理审计系统static_route_edit_ipv6.php存在远程代码执行.md ├── 锐捷RG-UAC统一上网行为管理审计系统sub_commit.php存在远程代码执行.md ├── 锐捷RG-UAC统一上网行为管理审计系统user_commit.php存在远程代码执行.md ├── 锐捷RG-UAC统一上网行为管理审计系统vlan_add_commit.php存在远程代码执行.md ├── 锐捷上网行为管理系统static_convert.php存在远程命令执行漏洞.md ├── 锐捷校园网自助服务系统login_judge.jsf任意文件读取漏洞(XVE-2024-2116).md ├── 锐捷校园网自助服务系统operatorReportorRoamService存在SQL注入漏洞.md ├── 锐捷网络flwo.control.php存在RCE漏洞.md └── 锐捷网络无线AC命令执行.md ├── 锐明技术Crocus系统 └── 锐明技术Crocus系统Service.do任意文件读取漏洞.md ├── 防火墙产品 └── 多个防火墙产品RCE.md ├── 青藤云 EDR └── 青藤云 EDR 权限提升漏洞.md ├── 顺景ERP └── 顺景ERP管理系统UploadInvtSpFile存在任意文件上传漏洞.md ├── 风速科技统一认证平台 └── 风速科技统一认证平台存在密码重置漏洞.md ├── 飞企互联 ├── ⻜企互联loginService任意登录.md ├── 飞企互联 FE 业务协作平台存在参数文件读取漏洞 .md ├── 飞企互联-FE企业运营管理平台ProxyServletUti存在任意文件读取漏洞.md ├── 飞企互联-FE企业运营管理平台_efficientCodewidget39接口SQL注入漏洞.md ├── 飞企互联-FE企业运营管理平台publicData.jsp存在SQL注入漏洞.md ├── 飞企互联-FE企业运营管理平台treeXml.jsp存在SQL注入漏洞.md ├── 飞企互联-FE企业运营管理平台uploadAttachmentServlet存在任意文件上传漏洞.md ├── 飞企互联-FE企业运营管理平台登录绕过漏洞.md ├── 飞企互联FE企业运营管理平台ajax_codewidget39.jsp接口存在SQL注入漏洞.md ├── 飞企互联FE企业运营管理平台checkGroupCode.js接口存在SQL注入漏洞.md └── 飞企互联Ognl表达式注入导致RCE.md ├── 飞讯云 └── 飞讯云MyImportData前台SQL注入(XVE-2024-18113).md ├── 飞鱼星 └── 飞鱼星上网行为管理系统企业版前台RCE.md ├── 驰骋BPM └── 驰骋BPM系统存在SQL注入漏洞.md ├── 魅思视频管理系统 └── 魅思视频管理系统getOrderStatus存在SQL注入漏洞.md └── 魔方网表 └── 魔方网表mailupdate.jsp接口存在任意文件上传漏洞.md /1Panel/1Panel面板最新前台RCE漏洞(CVE-2024-39911).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/1Panel/1Panel面板最新前台RCE漏洞(CVE-2024-39911).md -------------------------------------------------------------------------------- /AEGON/AEGON-LIFEv1.0存在SQL注入漏洞(CVE-2024-36597).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/AEGON/AEGON-LIFEv1.0存在SQL注入漏洞(CVE-2024-36597).md -------------------------------------------------------------------------------- /AJ-Report/AJ-Report开源数据大屏存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/AJ-Report/AJ-Report开源数据大屏存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /AVCON/AVCON-系统管理平台download.action存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/AVCON/AVCON-系统管理平台download.action存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /AVCON/avcon综合管理平台SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/AVCON/avcon综合管理平台SQL注入漏洞.md -------------------------------------------------------------------------------- /Apache/Apache ActiveMQ远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Apache/Apache ActiveMQ远程命令执行漏洞.md -------------------------------------------------------------------------------- /Apache/Apache Dubbo 反序列化漏洞(CVE-2023-29234).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Apache/Apache Dubbo 反序列化漏洞(CVE-2023-29234).md -------------------------------------------------------------------------------- /Apache/Apache OFBiz SSRF && 任意配置读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Apache/Apache OFBiz SSRF && 任意配置读取.md -------------------------------------------------------------------------------- /Apache/Apache OFBiz 身份验证绕过漏洞 (CVE-2023-51467).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Apache/Apache OFBiz 身份验证绕过漏洞 (CVE-2023-51467).md -------------------------------------------------------------------------------- /Apache/Apache Spark命令执行漏洞(CVE-2023-32007).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Apache/Apache Spark命令执行漏洞(CVE-2023-32007).md -------------------------------------------------------------------------------- /Apache/Apache Struts2 CVE-2023-50164.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Apache/Apache Struts2 CVE-2023-50164.md -------------------------------------------------------------------------------- /Apache/Apache Tomcat存在信息泄露漏洞( CVE-2024-21733).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Apache/Apache Tomcat存在信息泄露漏洞( CVE-2024-21733).md -------------------------------------------------------------------------------- /Apache/Apache-Kafka的UI中的远程代码执行CVE-2023-52251.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Apache/Apache-Kafka的UI中的远程代码执行CVE-2023-52251.md -------------------------------------------------------------------------------- /Apache/Apache-OFBiz远程代码执行漏洞(CVE-2024-45195).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Apache/Apache-OFBiz远程代码执行漏洞(CVE-2024-45195).md -------------------------------------------------------------------------------- /Apache/Apache-Submarine-SQL注入漏洞CVE-2023-37924.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Apache/Apache-Submarine-SQL注入漏洞CVE-2023-37924.md -------------------------------------------------------------------------------- /Apache/Apache_Solr环境变量信息泄漏漏洞(CVE-2023-50290).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Apache/Apache_Solr环境变量信息泄漏漏洞(CVE-2023-50290).md -------------------------------------------------------------------------------- /Appium Desktop/Appium Desktop CVE-2023-2479漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Appium Desktop/Appium Desktop CVE-2023-2479漏洞.md -------------------------------------------------------------------------------- /Array VPN/Array VPN任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Array VPN/Array VPN任意文件读取漏洞.md -------------------------------------------------------------------------------- /Array-APV/Array-APV应用交付系统ping_hosts存在任意命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Array-APV/Array-APV应用交付系统ping_hosts存在任意命令执行漏洞.md -------------------------------------------------------------------------------- /Aruba/ArubaOS-RCE漏洞(CVE-2024-26304).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Aruba/ArubaOS-RCE漏洞(CVE-2024-26304).md -------------------------------------------------------------------------------- /AspCMS/AspCMS系统commentList.asp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/AspCMS/AspCMS系统commentList.asp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /Atmail/Atmail存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Atmail/Atmail存在SQL注入漏洞.md -------------------------------------------------------------------------------- /Bazarr/Bazarr任意文件读取(CVE-2024-40348).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Bazarr/Bazarr任意文件读取(CVE-2024-40348).md -------------------------------------------------------------------------------- /CRMEB/CRMEB开源商城v5.2.2存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/CRMEB/CRMEB开源商城v5.2.2存在sql注入漏洞.md -------------------------------------------------------------------------------- /Calibre/Calibre任意文件读取漏洞(CVE-2024-6781).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Calibre/Calibre任意文件读取漏洞(CVE-2024-6781).md -------------------------------------------------------------------------------- /Calibre/Calibre远程代码执行漏洞(CVE-2024-6782).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Calibre/Calibre远程代码执行漏洞(CVE-2024-6782).md -------------------------------------------------------------------------------- /Chrome/CVE-2023-4357-Chrome-XXE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Chrome/CVE-2023-4357-Chrome-XXE漏洞.md -------------------------------------------------------------------------------- /Cisco/Cisco IOS XE CVE-2023-20198权限提升漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Cisco/Cisco IOS XE CVE-2023-20198权限提升漏洞.md -------------------------------------------------------------------------------- /CloudPanel/CloudPanel RCE漏洞 CVE-2023-35885.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/CloudPanel/CloudPanel RCE漏洞 CVE-2023-35885.md -------------------------------------------------------------------------------- /ClusterControl/ClusterControl存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/ClusterControl/ClusterControl存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /Cobbler/Cobbler存在远程命令执行漏洞(CVE-2021-40323).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Cobbler/Cobbler存在远程命令执行漏洞(CVE-2021-40323).md -------------------------------------------------------------------------------- /Confluence/Confluence 未授权提权访问漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Confluence/Confluence 未授权提权访问漏洞.md -------------------------------------------------------------------------------- /Confluence/Confluence身份认证绕过(CVE-2023-22518).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Confluence/Confluence身份认证绕过(CVE-2023-22518).md -------------------------------------------------------------------------------- /Confluence/Confluence远程命令执行漏洞(CVE-2024-21683).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Confluence/Confluence远程命令执行漏洞(CVE-2024-21683).md -------------------------------------------------------------------------------- /Coremail邮件系统/Coremail邮件系统未授权访问获取管理员账密.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Coremail邮件系统/Coremail邮件系统未授权访问获取管理员账密.md -------------------------------------------------------------------------------- /Craft/Craft CMS远程代码执行漏洞CVE-2023-41892.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Craft/Craft CMS远程代码执行漏洞CVE-2023-41892.md -------------------------------------------------------------------------------- /CrushFTP/CrushFTP服务器端模板注入(CVE-2024-4040).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/CrushFTP/CrushFTP服务器端模板注入(CVE-2024-4040).md -------------------------------------------------------------------------------- /D-Link/D-LINK-DIR-X4860未授权RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/D-Link/D-LINK-DIR-X4860未授权RCE漏洞.md -------------------------------------------------------------------------------- /DCN/DCN有线无线智能一体化控制器WEB管理系统.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/DCN/DCN有线无线智能一体化控制器WEB管理系统.md -------------------------------------------------------------------------------- /DCN/DCN防火墙ping.php存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/DCN/DCN防火墙ping.php存在命令执行漏洞.md -------------------------------------------------------------------------------- /DT/DT高清车牌识别摄像机存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/DT/DT高清车牌识别摄像机存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /EDU/EDU某智慧平台ExpDownloadService.aspx任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/EDU/EDU某智慧平台ExpDownloadService.aspx任意文件读取漏洞.md -------------------------------------------------------------------------------- /EDU/中新天达系统存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/EDU/中新天达系统存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /ELADMIN/ELADMIN后台管理系统存在SSRF漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/ELADMIN/ELADMIN后台管理系统存在SSRF漏洞.md -------------------------------------------------------------------------------- /EOVA/EOVA未授权doInit接口存在反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/EOVA/EOVA未授权doInit接口存在反序列化漏洞.md -------------------------------------------------------------------------------- /EasyCVR视频管理平台/EasyCVR 视频管理平台存在用户信息泄露.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/EasyCVR视频管理平台/EasyCVR 视频管理平台存在用户信息泄露.md -------------------------------------------------------------------------------- /EasyCVR视频管理平台/EasyCVR视频管理平台存在任意用户添加漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/EasyCVR视频管理平台/EasyCVR视频管理平台存在任意用户添加漏洞.md -------------------------------------------------------------------------------- /Elgg/elgg-sqli.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Elgg/elgg-sqli.md -------------------------------------------------------------------------------- /Emlog/emlog后台插件任意文件上传(CVE-2024-33752).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Emlog/emlog后台插件任意文件上传(CVE-2024-33752).md -------------------------------------------------------------------------------- /EnjoyRMIS/EnjoyRMIS-GetOAById存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/EnjoyRMIS/EnjoyRMIS-GetOAById存在SQL注入漏洞.md -------------------------------------------------------------------------------- /Exam/Exam在线考试系统存在前台任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Exam/Exam在线考试系统存在前台任意文件上传漏洞.md -------------------------------------------------------------------------------- /F logic DataCube3/F-logic_DataCube3存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/F logic DataCube3/F-logic_DataCube3存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /F5-BIG-IP/F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/F5-BIG-IP/F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).md -------------------------------------------------------------------------------- /FLIR/FLIR-AX8热成像仪applyfirmware存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/FLIR/FLIR-AX8热成像仪applyfirmware存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /FLIR/FLIR-AX8热成像仪download.php存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/FLIR/FLIR-AX8热成像仪download.php存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /FLIR/FLIR-AX8热成像仪palette.php存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/FLIR/FLIR-AX8热成像仪palette.php存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /FLIR/FLIR-AX8热成像仪res.php存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/FLIR/FLIR-AX8热成像仪res.php存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /Fastadmin/Fastadmin框架存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Fastadmin/Fastadmin框架存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /Fortinet/Fortinet-SSL-VPN-CVE-2024-21762.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Fortinet/Fortinet-SSL-VPN-CVE-2024-21762.md -------------------------------------------------------------------------------- /GeoServer/GeoServer系统wms接口存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/GeoServer/GeoServer系统wms接口存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /Git/Git远程代码执行漏洞(CVE-2024-32002).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Git/Git远程代码执行漏洞(CVE-2024-32002).md -------------------------------------------------------------------------------- /GitLab/GitLab任意用户密码重置漏洞(CVE-2023-7028).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/GitLab/GitLab任意用户密码重置漏洞(CVE-2023-7028).md -------------------------------------------------------------------------------- /Gradio/Gradio存在任意文件读取漏洞(CVE-2024-1561).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Gradio/Gradio存在任意文件读取漏洞(CVE-2024-1561).md -------------------------------------------------------------------------------- /H3C/H3C Magic B1STV100R012 RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/H3C/H3C Magic B1STV100R012 RCE.md -------------------------------------------------------------------------------- /H3C/H3C-CVM-upload接口前台任意文件上传漏洞复现.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/H3C/H3C-CVM-upload接口前台任意文件上传漏洞复现.md -------------------------------------------------------------------------------- /H3C/H3C-SecParh堡垒机任意用户登录漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/H3C/H3C-SecParh堡垒机任意用户登录漏洞.md -------------------------------------------------------------------------------- /H3C/H3C-iMC智能管理中心autoDeploy.xhtml存在远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/H3C/H3C-iMC智能管理中心autoDeploy.xhtml存在远程代码执行漏洞.md -------------------------------------------------------------------------------- /H3C/H3C-iMC智能管理中心存在远程代码执行漏洞(XVE-2024-4567).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/H3C/H3C-iMC智能管理中心存在远程代码执行漏洞(XVE-2024-4567).md -------------------------------------------------------------------------------- /H3C/H3C-校园网自助服务系统flexfileupload任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/H3C/H3C-校园网自助服务系统flexfileupload任意文件上传漏洞.md -------------------------------------------------------------------------------- /H3C/H3C网络管理系统任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/H3C/H3C网络管理系统任意文件读取漏洞.md -------------------------------------------------------------------------------- /H3C/H3C路由器userLogin.asp信息泄漏漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/H3C/H3C路由器userLogin.asp信息泄漏漏洞.md -------------------------------------------------------------------------------- /HSF/HFS2.3未经身份验证的远程代码执行(CVE-2024-23692).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/HSF/HFS2.3未经身份验证的远程代码执行(CVE-2024-23692).md -------------------------------------------------------------------------------- /HSF/rejetto-HFS-3存在远程命令执行漏洞(CVE-2024-39943).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/HSF/rejetto-HFS-3存在远程命令执行漏洞(CVE-2024-39943).md -------------------------------------------------------------------------------- /Hytec/Hytec Inter HWL-2511-SS popen.cgi命令注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Hytec/Hytec Inter HWL-2511-SS popen.cgi命令注入漏洞.md -------------------------------------------------------------------------------- /IP网络广播服务平台/IP网络广播服务平台upload存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/IP网络广播服务平台/IP网络广播服务平台upload存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /Imo云办公/imo云办公室接口Imo_DownLoadUI.php任意文件下载漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Imo云办公/imo云办公室接口Imo_DownLoadUI.php任意文件下载漏洞.md -------------------------------------------------------------------------------- /Ivanti/CVE-2024-22024.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Ivanti/CVE-2024-22024.md -------------------------------------------------------------------------------- /Ivanti/CVE-2024-8190.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Ivanti/CVE-2024-8190.md -------------------------------------------------------------------------------- /Ivanti/Ivanti-EPM存在SQL注入漏洞(CVE-2024-29824).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Ivanti/Ivanti-EPM存在SQL注入漏洞(CVE-2024-29824).md -------------------------------------------------------------------------------- /JEEVMS仓库管理系统/JEEVMS仓库管理系统任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JEEVMS仓库管理系统/JEEVMS仓库管理系统任意文件读取漏洞.md -------------------------------------------------------------------------------- /JEPaaS低代码平台/JEPaaS低代码平台document存在文件上传致RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JEPaaS低代码平台/JEPaaS低代码平台document存在文件上传致RCE漏洞.md -------------------------------------------------------------------------------- /JFinalCMS/JFinalCMS 任意文件读取漏洞(CVE-2023-41599).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JFinalCMS/JFinalCMS 任意文件读取漏洞(CVE-2023-41599).md -------------------------------------------------------------------------------- /Jan/Jan任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Jan/Jan任意文件上传漏洞.md -------------------------------------------------------------------------------- /JeePlus低代码开发平台/JeePlus低代码开发平台存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JeePlus低代码开发平台/JeePlus低代码开发平台存在SQL注入漏洞.md -------------------------------------------------------------------------------- /JeecgBoot/JeecgBoot反射型XSS漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JeecgBoot/JeecgBoot反射型XSS漏洞.md -------------------------------------------------------------------------------- /JeecgBoot/JeecgBoot漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JeecgBoot/JeecgBoot漏洞.md -------------------------------------------------------------------------------- /JeecgBoot/JeecgBoot系统AviatorScript表达式注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JeecgBoot/JeecgBoot系统AviatorScript表达式注入漏洞.md -------------------------------------------------------------------------------- /JeecgBoot/Jeecg任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JeecgBoot/Jeecg任意文件上传漏洞.md -------------------------------------------------------------------------------- /JeecgBoot/jeecg-boot系统接口jmLink权限绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JeecgBoot/jeecg-boot系统接口jmLink权限绕过漏洞.md -------------------------------------------------------------------------------- /Jenkins/Jenkins任意文件读取漏洞(CVE-2024-23897).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Jenkins/Jenkins任意文件读取漏洞(CVE-2024-23897).md -------------------------------------------------------------------------------- /JieLink/JieLink+智能终端操作平台多个接口处存在敏感信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JieLink/JieLink+智能终端操作平台多个接口处存在敏感信息泄露漏洞.md -------------------------------------------------------------------------------- /JieLink/JieLink+智能终端操作平台存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JieLink/JieLink+智能终端操作平台存在sql注入漏洞.md -------------------------------------------------------------------------------- /Joomla/Joomla 未授权漏洞CVE-2023-23752.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Joomla/Joomla 未授权漏洞CVE-2023-23752.md -------------------------------------------------------------------------------- /Journyx/Journyx存在未经身份验证的XML外部实体注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Journyx/Journyx存在未经身份验证的XML外部实体注入.md -------------------------------------------------------------------------------- /JumpServer/JumpServer未授权漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/JumpServer/JumpServer未授权漏洞.md -------------------------------------------------------------------------------- /KubePi/KubePi存在JWT验证绕过漏洞(CVE-2024-36111).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/KubePi/KubePi存在JWT验证绕过漏洞(CVE-2024-36111).md -------------------------------------------------------------------------------- /Kuboard/Kuboard默认口令.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Kuboard/Kuboard默认口令.md -------------------------------------------------------------------------------- /LVS精益价值管理系统/LVS精益价值管理系统LVS.Web.ashx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/LVS精益价值管理系统/LVS精益价值管理系统LVS.Web.ashx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /Laykefu客服系统/Laykefu客服系统任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Laykefu客服系统/Laykefu客服系统任意文件上传漏洞.md -------------------------------------------------------------------------------- /Likeshop/Likeshop-formimage任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Likeshop/Likeshop-formimage任意文件上传.md -------------------------------------------------------------------------------- /LinkWeChat/LinkWeChat任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/LinkWeChat/LinkWeChat任意文件读取漏洞.md -------------------------------------------------------------------------------- /LiveGBS/LiveGBS任意用户密码重置漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/LiveGBS/LiveGBS任意用户密码重置漏洞.md -------------------------------------------------------------------------------- /LiveGBS/LiveGBS存在逻辑缺陷漏洞(CNVD-2023-72138).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/LiveGBS/LiveGBS存在逻辑缺陷漏洞(CNVD-2023-72138).md -------------------------------------------------------------------------------- /LiveNVR流媒体服务软件/LiveNVR流媒体服务软件接口存在未授权访问漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/LiveNVR流媒体服务软件/LiveNVR流媒体服务软件接口存在未授权访问漏洞.md -------------------------------------------------------------------------------- /MRCMS/MRCMS3.0任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/MRCMS/MRCMS3.0任意文件读取漏洞.md -------------------------------------------------------------------------------- /MSService/MSService服务init.do接口处存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/MSService/MSService服务init.do接口处存在SQL注入漏洞.md -------------------------------------------------------------------------------- /MetaCRM/MetaCRM客户关系管理系统任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/MetaCRM/MetaCRM客户关系管理系统任意文件上传漏洞.md -------------------------------------------------------------------------------- /Minio/Minio-verify信息泄露(CVE-2023-28432).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Minio/Minio-verify信息泄露(CVE-2023-28432).md -------------------------------------------------------------------------------- /Mtab书签导航程序/Mtab书签导航程序存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Mtab书签导航程序/Mtab书签导航程序存在SQL注入漏洞.md -------------------------------------------------------------------------------- /NUUO/NUUO网络视频录像机css_parser.php任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/NUUO/NUUO网络视频录像机css_parser.php任意文件读取漏洞.md -------------------------------------------------------------------------------- /Nacos/Nacos任意文件读写漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Nacos/Nacos任意文件读写漏洞.md -------------------------------------------------------------------------------- /Nacos/Nacos未授权下载配置信息.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Nacos/Nacos未授权下载配置信息.md -------------------------------------------------------------------------------- /Nacos/Nacos远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Nacos/Nacos远程代码执行漏洞.md -------------------------------------------------------------------------------- /Ncast高清智能录播系统/Ncast高清智能录播系统存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Ncast高清智能录播系统/Ncast高清智能录播系统存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /Nexus/Nexus未授权目录穿越漏洞(CVE-2024-4956).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Nexus/Nexus未授权目录穿越漏洞(CVE-2024-4956).md -------------------------------------------------------------------------------- /O2OA/O2OA远程命令执行(CVE-2022-22916).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/O2OA/O2OA远程命令执行(CVE-2022-22916).md -------------------------------------------------------------------------------- /OfficeWeb365/OfficeWeb365 文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/OfficeWeb365/OfficeWeb365 文件上传漏洞.md -------------------------------------------------------------------------------- /OfficeWeb365/OfficeWeb365_任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/OfficeWeb365/OfficeWeb365_任意文件读取漏洞.md -------------------------------------------------------------------------------- /OpenCart/OpenCart开源电子商务平台divido.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/OpenCart/OpenCart开源电子商务平台divido.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /OpenMetadata/OpenMetadata命令执行(CVE-2024-28255).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/OpenMetadata/OpenMetadata命令执行(CVE-2024-28255).md -------------------------------------------------------------------------------- /Openfire/Openfire身份认证绕过漏洞(CVE-2023-32315).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Openfire/Openfire身份认证绕过漏洞(CVE-2023-32315).md -------------------------------------------------------------------------------- /PAN-OS/PAN-OS安全设备存在命令执行漏洞(CVE-2024-3400).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/PAN-OS/PAN-OS安全设备存在命令执行漏洞(CVE-2024-3400).md -------------------------------------------------------------------------------- /PEPM系统/PEPM系统Cookie存在远程代码执行漏洞(XVE-2024-16919).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/PEPM系统/PEPM系统Cookie存在远程代码执行漏洞(XVE-2024-16919).md -------------------------------------------------------------------------------- /PHP Live Chat/PHP-Live-Chat代码审计之组合拳GetShell.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/PHP Live Chat/PHP-Live-Chat代码审计之组合拳GetShell.md -------------------------------------------------------------------------------- /Panel/Panel loadfile 后台文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Panel/Panel loadfile 后台文件读取漏洞.md -------------------------------------------------------------------------------- /PbootCMS/PbootCMS全版本后台通杀任意代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/PbootCMS/PbootCMS全版本后台通杀任意代码执行漏洞.md -------------------------------------------------------------------------------- /Pear Admin Boot/Pear-Admin-Boot存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Pear Admin Boot/Pear-Admin-Boot存在SQL注入漏洞.md -------------------------------------------------------------------------------- /Public CMS/JAVA Public CMS 后台RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Public CMS/JAVA Public CMS 后台RCE漏洞.md -------------------------------------------------------------------------------- /Pyspider WebUI/Pyspider-WebUI未授权访问致远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Pyspider WebUI/Pyspider-WebUI未授权访问致远程代码执行漏洞.md -------------------------------------------------------------------------------- /QNAP/QNAP-QTS溢出导致的未授权RCE漏洞(CVE-2024-27130).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/QNAP/QNAP-QTS溢出导致的未授权RCE漏洞(CVE-2024-27130).md -------------------------------------------------------------------------------- /QQ/QQ客户端存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/QQ/QQ客户端存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /Quicklancer/Quicklancer系统接口listing存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Quicklancer/Quicklancer系统接口listing存在SQL注入漏洞.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/README.md -------------------------------------------------------------------------------- /RuoYi/RUOYI-v4.7.8存在远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/RuoYi/RUOYI-v4.7.8存在远程代码执行漏洞.md -------------------------------------------------------------------------------- /RuoYi/RuoYi4.6.0 SQL注入漏洞CVE-2023-49371.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/RuoYi/RuoYi4.6.0 SQL注入漏洞CVE-2023-49371.md -------------------------------------------------------------------------------- /RuoYi/若依后台定时任务存在SSRF漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/RuoYi/若依后台定时任务存在SSRF漏洞.md -------------------------------------------------------------------------------- /RuvarOA协同办公平台/RuvarOA协同办公平台多处存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/RuvarOA协同办公平台/RuvarOA协同办公平台多处存在SQL注入漏洞.md -------------------------------------------------------------------------------- /Smart S85F/Smart S85F 任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Smart S85F/Smart S85F 任意文件读取.md -------------------------------------------------------------------------------- /Smartbi/Smartbi 内置用户登陆绕过.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Smartbi/Smartbi 内置用户登陆绕过.md -------------------------------------------------------------------------------- /Splunk Enterprise/Splunk-Enterprise任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Splunk Enterprise/Splunk-Enterprise任意文件读取漏洞.md -------------------------------------------------------------------------------- /Spring/Spring-Framework路径遍历漏洞(CVE-2024-38816).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Spring/Spring-Framework路径遍历漏洞(CVE-2024-38816).md -------------------------------------------------------------------------------- /SpringBlade/SpringBlade blade-log存在SQL 注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/SpringBlade/SpringBlade blade-log存在SQL 注入漏洞.md -------------------------------------------------------------------------------- /SpringBlade/SpringBlade export-user SQL 注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/SpringBlade/SpringBlade export-user SQL 注入漏洞.md -------------------------------------------------------------------------------- /SpringBlade/SpringBlade框架dict-biz接口存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/SpringBlade/SpringBlade框架dict-biz接口存在sql注入漏洞.md -------------------------------------------------------------------------------- /SpringBlade/SpringBlade系统menu接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/SpringBlade/SpringBlade系统menu接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /SpringBlade/SpringBlade系统usual接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/SpringBlade/SpringBlade系统usual接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /SpringBlade/Springblade默认密钥可伪造凭据.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/SpringBlade/Springblade默认密钥可伪造凭据.md -------------------------------------------------------------------------------- /Symfony/Symfony-app_dev.php信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Symfony/Symfony-app_dev.php信息泄露漏洞.md -------------------------------------------------------------------------------- /SysAid/SysAid远程命令执行漏洞(CVE-2023-47246).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/SysAid/SysAid远程命令执行漏洞(CVE-2023-47246).md -------------------------------------------------------------------------------- /Tenda/Tenda-FH1201存在命令注入漏洞(CVE-2024-41468).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Tenda/Tenda-FH1201存在命令注入漏洞(CVE-2024-41468).md -------------------------------------------------------------------------------- /Tenda/Tenda-FH1201存在命令注入漏洞(CVE-2024-41473).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Tenda/Tenda-FH1201存在命令注入漏洞(CVE-2024-41473).md -------------------------------------------------------------------------------- /Tenda/Tenda路由器账号密码泄露.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Tenda/Tenda路由器账号密码泄露.md -------------------------------------------------------------------------------- /WAGO/WAGO系统远程代码执行漏洞(CVE-2023-1698).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/WAGO/WAGO系统远程代码执行漏洞(CVE-2023-1698).md -------------------------------------------------------------------------------- /WEBMAIL/WEBMAIL存在任意用户登录漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/WEBMAIL/WEBMAIL存在任意用户登录漏洞.md -------------------------------------------------------------------------------- /WVP视频平台/WVP视频平台(国标28181)未授权SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/WVP视频平台/WVP视频平台(国标28181)未授权SQL注入漏洞.md -------------------------------------------------------------------------------- /Weblogic/WebLogic远程代码执行漏洞(CVE-2024-21006).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Weblogic/WebLogic远程代码执行漏洞(CVE-2024-21006).md -------------------------------------------------------------------------------- /Weblogic/Weblogic远程代码执行(CVE-2024-20931).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Weblogic/Weblogic远程代码执行(CVE-2024-20931).md -------------------------------------------------------------------------------- /WeiPHP/WeiPHP存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/WeiPHP/WeiPHP存在SQL注入漏洞.md -------------------------------------------------------------------------------- /WinRAR/WinRAR CVE-2023-38831.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/WinRAR/WinRAR CVE-2023-38831.md -------------------------------------------------------------------------------- /WordPress/WordPress-js-support-ticket存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/WordPress/WordPress-js-support-ticket存在文件上传漏洞.md -------------------------------------------------------------------------------- /WordPress/WordPress插件Dokan-Pro存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/WordPress/WordPress插件Dokan-Pro存在SQL注入漏洞.md -------------------------------------------------------------------------------- /WordPress/wordpress listingo 文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/WordPress/wordpress listingo 文件上传漏洞.md -------------------------------------------------------------------------------- /X2Modbus/X2Modbus网关GetUser接口存在信息泄漏漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/X2Modbus/X2Modbus网关GetUser接口存在信息泄漏漏洞.md -------------------------------------------------------------------------------- /XWiki/XWiki-Platform远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/XWiki/XWiki-Platform远程代码执行漏洞.md -------------------------------------------------------------------------------- /XXL-JOB/XXL-JOB默认accessToken身份绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/XXL-JOB/XXL-JOB默认accessToken身份绕过漏洞.md -------------------------------------------------------------------------------- /Yearning/Yearning_front任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Yearning/Yearning_front任意文件读取.md -------------------------------------------------------------------------------- /YzmCMS/YzmCMS接口存在pay_callback远程命令执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/YzmCMS/YzmCMS接口存在pay_callback远程命令执行.md -------------------------------------------------------------------------------- /Zabbix/Zabbix-Serve-SQL注入漏洞(CVE-2024-22120).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Zabbix/Zabbix-Serve-SQL注入漏洞(CVE-2024-22120).md -------------------------------------------------------------------------------- /ZenML/ZenML服务器远程权限提升漏洞(CVE-2024-25723).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/ZenML/ZenML服务器远程权限提升漏洞(CVE-2024-25723).md -------------------------------------------------------------------------------- /Zimbra/CVE-2024-45519.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/Zimbra/CVE-2024-45519.md -------------------------------------------------------------------------------- /ZoneMinder/ZoneMinder系统sort接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/ZoneMinder/ZoneMinder系统sort接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /aiohttp/aiohttp存在目录遍历漏洞(CVE-2024-23334).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/aiohttp/aiohttp存在目录遍历漏洞(CVE-2024-23334).md -------------------------------------------------------------------------------- /cockpit/cockpit系统upload接口存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/cockpit/cockpit系统upload接口存在文件上传漏洞.md -------------------------------------------------------------------------------- /cups-browsed/CVE-2024-47177.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/cups-browsed/CVE-2024-47177.md -------------------------------------------------------------------------------- /dede/DeDecms接口sys_verifies.php存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/dede/DeDecms接口sys_verifies.php存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /dede/Dedecms v5.7.111前台tags.php SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/dede/Dedecms v5.7.111前台tags.php SQL注入漏洞.md -------------------------------------------------------------------------------- /eking管理易/eking管理易FileUpload接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/eking管理易/eking管理易FileUpload接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /iDocView/I Doc View任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/iDocView/I Doc View任意文件上传漏洞.md -------------------------------------------------------------------------------- /iDocView/IDocView_qJvqhFt接口任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/iDocView/IDocView_qJvqhFt接口任意文件读取.md -------------------------------------------------------------------------------- /iDocView/iDocView upload接口任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/iDocView/iDocView upload接口任意文件读取.md -------------------------------------------------------------------------------- /jshERP/jshERP信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/jshERP/jshERP信息泄露漏洞.md -------------------------------------------------------------------------------- /kkFileView/kkFileView-v4.3.0-RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/kkFileView/kkFileView-v4.3.0-RCE.md -------------------------------------------------------------------------------- /mysql2/mysql2原型污染漏洞(CVE-2024-21512).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/mysql2/mysql2原型污染漏洞(CVE-2024-21512).md -------------------------------------------------------------------------------- /omfyUI/omfyUI follow_symlinks文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/omfyUI/omfyUI follow_symlinks文件读取漏洞.md -------------------------------------------------------------------------------- /pgAdmin/CVE-2024-2044.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/pgAdmin/CVE-2024-2044.md -------------------------------------------------------------------------------- /pgAdmin/CVE-2024-9014.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/pgAdmin/CVE-2024-9014.md -------------------------------------------------------------------------------- /php/PHP-CGI-Windows平台远程代码执行漏洞(CVE-2024-4577).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/php/PHP-CGI-Windows平台远程代码执行漏洞(CVE-2024-4577).md -------------------------------------------------------------------------------- /pyLoad/pyLoad远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/pyLoad/pyLoad远程代码执行漏洞.md -------------------------------------------------------------------------------- /showdoc/ShowDoc3.2.5存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/showdoc/ShowDoc3.2.5存在SQL注入漏洞.md -------------------------------------------------------------------------------- /showdoc/showDoc-uploadImg任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/showdoc/showDoc-uploadImg任意文件上传漏洞.md -------------------------------------------------------------------------------- /showdoc/showdoc3.2.4-phar反序列漏洞复现.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/showdoc/showdoc3.2.4-phar反序列漏洞复现.md -------------------------------------------------------------------------------- /smanga/smanga存在未授权远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/smanga/smanga存在未授权远程代码执行漏洞.md -------------------------------------------------------------------------------- /thinkphp/thinkphp最新CVE-2024-44902反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/thinkphp/thinkphp最新CVE-2024-44902反序列化漏洞.md -------------------------------------------------------------------------------- /万户OA/万户 ezOFFICE DocumentEdit.jsp SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户 ezOFFICE DocumentEdit.jsp SQL注入.md -------------------------------------------------------------------------------- /万户OA/万户-ezOFFICE-OA-officeserver.jsp文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户-ezOFFICE-OA-officeserver.jsp文件上传漏洞.md -------------------------------------------------------------------------------- /万户OA/万户-ezOFFICE-download_ftp.jsp任意文件下载漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户-ezOFFICE-download_ftp.jsp任意文件下载漏洞.md -------------------------------------------------------------------------------- /万户OA/万户OA text2Html接口存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户OA text2Html接口存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /万户OA/万户OA-RhinoScriptEngineService命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户OA-RhinoScriptEngineService命令执行漏洞.md -------------------------------------------------------------------------------- /万户OA/万户OA-fileUpload.controller任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户OA-fileUpload.controller任意文件上传漏洞.md -------------------------------------------------------------------------------- /万户OA/万户OA-upload任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户OA-upload任意文件上传漏洞.md -------------------------------------------------------------------------------- /万户OA/万户OA系统接口GeneralWeb存在XXE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户OA系统接口GeneralWeb存在XXE漏洞.md -------------------------------------------------------------------------------- /万户OA/万户ezEIP-success.aspx存在反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户ezEIP-success.aspx存在反序列化漏洞.md -------------------------------------------------------------------------------- /万户OA/万户ezOFFICE-contract_gd.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户ezOFFICE-contract_gd.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /万户OA/万户ezOFFICE-wf_printnum.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户ezOFFICE-wf_printnum.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /万户OA/万户ezOFFICE系统graph_include.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户ezOFFICE系统graph_include.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /万户OA/万户ezoffice wpsservlet任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户ezoffice wpsservlet任意文件上传漏洞.md -------------------------------------------------------------------------------- /万户OA/万户协同办公平台存在未授权访问漏洞.md: -------------------------------------------------------------------------------- 1 | ## 万户协同办公平台存在未授权访问漏洞 2 | ``` 3 | 4 | GET /defaultroot/evoInterfaceServlet?paramType=user 5 | ``` 6 | -------------------------------------------------------------------------------- /万户OA/万户协同办公平台接口存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/万户OA/万户协同办公平台接口存在文件上传漏洞.md -------------------------------------------------------------------------------- /三汇网关管理软件/三汇网关管理软件debug.php远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/三汇网关管理软件/三汇网关管理软件debug.php远程命令执行漏洞.md -------------------------------------------------------------------------------- /世纪信通管理系统/世纪信通管理系统DownLoadFiles.ashx存在任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/世纪信通管理系统/世纪信通管理系统DownLoadFiles.ashx存在任意文件读取.md -------------------------------------------------------------------------------- /世邦通信/世邦通信SPON-IP网络对讲广播系统my_parser.php任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/世邦通信/世邦通信SPON-IP网络对讲广播系统my_parser.php任意文件上传漏洞.md -------------------------------------------------------------------------------- /东华医疗协同办公系统/东华医疗协同办公系统templateFile存在任意文件下载漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/东华医疗协同办公系统/东华医疗协同办公系统templateFile存在任意文件下载漏洞.md -------------------------------------------------------------------------------- /东华医疗协同办公系统/东华医疗协同办公系统反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/东华医疗协同办公系统/东华医疗协同办公系统反序列化漏洞.md -------------------------------------------------------------------------------- /东华医疗协同办公系统/东华医疗协同办公系统文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/东华医疗协同办公系统/东华医疗协同办公系统文件上传.md -------------------------------------------------------------------------------- /东方通/东方通TongWeb-selectApp.jsp存在任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/东方通/东方通TongWeb-selectApp.jsp存在任意文件上传.md -------------------------------------------------------------------------------- /东方通/东方通upload接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/东方通/东方通upload接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /中兴/中兴ZTE-ZSR-V2系列多业务路由器存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/中兴/中兴ZTE-ZSR-V2系列多业务路由器存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /中成科信票务管理系统/中成科信票务管理平台任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/中成科信票务管理系统/中成科信票务管理平台任意文件上传漏洞.md -------------------------------------------------------------------------------- /中远麒麟堡垒机/中远麒麟堡垒机SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/中远麒麟堡垒机/中远麒麟堡垒机SQL注入.md -------------------------------------------------------------------------------- /乐享智能运维管理平台/乐享智能运维管理平台getToken存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/乐享智能运维管理平台/乐享智能运维管理平台getToken存在SQL注入漏洞.md -------------------------------------------------------------------------------- /九思OA/九思OA接口WebServiceProxy存在XXE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/九思OA/九思OA接口WebServiceProxy存在XXE漏洞.md -------------------------------------------------------------------------------- /云匣子堡垒机/云匣子堡垒机fastjson漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/云匣子堡垒机/云匣子堡垒机fastjson漏洞.md -------------------------------------------------------------------------------- /云匣子堡垒机/云匣子系统接口ssoToolReport存在远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/云匣子堡垒机/云匣子系统接口ssoToolReport存在远程代码执行漏洞.md -------------------------------------------------------------------------------- /云时空/云时空社会化商业ERP任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/云时空/云时空社会化商业ERP任意文件上传.md -------------------------------------------------------------------------------- /云时空/云时空社会化商业ERP系统online存在身份认证绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/云时空/云时空社会化商业ERP系统online存在身份认证绕过漏洞.md -------------------------------------------------------------------------------- /云时空/时空智友企业流程化管控系统formservice存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/云时空/时空智友企业流程化管控系统formservice存在SQL注入漏洞.md -------------------------------------------------------------------------------- /云网OA/云网OA8.6存在fastjson反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/云网OA/云网OA8.6存在fastjson反序列化漏洞.md -------------------------------------------------------------------------------- /云课网校系统/云课网校系统文件上传漏洞(DVB-2024-6594).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/云课网校系统/云课网校系统文件上传漏洞(DVB-2024-6594).md -------------------------------------------------------------------------------- /交易所系统/仿新浪外汇余额宝时间交易所任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/交易所系统/仿新浪外汇余额宝时间交易所任意文件读取.md -------------------------------------------------------------------------------- /亿华人力资源管理系统/亿华人力资源管理系统unloadfile存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/亿华人力资源管理系统/亿华人力资源管理系统unloadfile存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /亿渡留言管理系统/亿渡留言管理系统uploadimg存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/亿渡留言管理系统/亿渡留言管理系统uploadimg存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /亿赛通电子文档安全管理系统/亿赛通-dataSearch.jsp-SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/亿赛通电子文档安全管理系统/亿赛通-dataSearch.jsp-SQL注入.md -------------------------------------------------------------------------------- /亿赛通电子文档安全管理系统/亿赛通update接口sql注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/亿赛通电子文档安全管理系统/亿赛通update接口sql注入.md -------------------------------------------------------------------------------- /亿赛通电子文档安全管理系统/亿赛通电子文档uploadFile接口文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/亿赛通电子文档安全管理系统/亿赛通电子文档uploadFile接口文件上传漏洞.md -------------------------------------------------------------------------------- /亿赛通电子文档安全管理系统/亿赛通电子文档安全管理系统dump接口存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/亿赛通电子文档安全管理系统/亿赛通电子文档安全管理系统dump接口存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /亿赛通电子文档安全管理系统/亿赛通电子文档安全管理系统getAllUsers身份绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/亿赛通电子文档安全管理系统/亿赛通电子文档安全管理系统getAllUsers身份绕过漏洞.md -------------------------------------------------------------------------------- /亿赛通电子文档安全管理系统/亿赛通电子文档安全管理系统远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/亿赛通电子文档安全管理系统/亿赛通电子文档安全管理系统远程命令执行漏洞.md -------------------------------------------------------------------------------- /亿赛通电子文档安全管理系统/亿赛通电子文档平台文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/亿赛通电子文档安全管理系统/亿赛通电子文档平台文件上传漏洞.md -------------------------------------------------------------------------------- /任我行/任我行 CRM SmsDataList SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/任我行/任我行 CRM SmsDataList SQL注入漏洞.md -------------------------------------------------------------------------------- /任我行/任我行协同CRM系统UploadFile存在反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/任我行/任我行协同CRM系统UploadFile存在反序列化漏洞.md -------------------------------------------------------------------------------- /企望制造 ERP/企望制造 ERP comboxstore.action 远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/企望制造 ERP/企望制造 ERP comboxstore.action 远程命令执行漏洞.md -------------------------------------------------------------------------------- /众诚软件/众诚网上订单系统o_sa_order.ashx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/众诚软件/众诚网上订单系统o_sa_order.ashx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /会捷通云视讯平台/会捷通云视讯平台fileDownload存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/会捷通云视讯平台/会捷通云视讯平台fileDownload存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /佑友防火墙/佑友防火墙后台接口download存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/佑友防火墙/佑友防火墙后台接口download存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /佑友防火墙/佑友防火墙后台接口maintain存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/佑友防火墙/佑友防火墙后台接口maintain存在命令执行漏洞.md -------------------------------------------------------------------------------- /佳会视频会议/佳会视频会议attachment任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/佳会视频会议/佳会视频会议attachment任意文件读取.md -------------------------------------------------------------------------------- /信呼OA/信呼OA系统index存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/信呼OA/信呼OA系统index存在SQL注入漏洞.md -------------------------------------------------------------------------------- /先锋WEB燃气收费系统/先锋WEB燃气收费系统文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/先锋WEB燃气收费系统/先锋WEB燃气收费系统文件上传漏洞.md -------------------------------------------------------------------------------- /全程云OA/全程云OA-svc.asmxSQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/全程云OA/全程云OA-svc.asmxSQL注入漏洞.md -------------------------------------------------------------------------------- /全程云OA/全程云OA__ajax.ashxSQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/全程云OA/全程云OA__ajax.ashxSQL注入漏洞.md -------------------------------------------------------------------------------- /全程云OA/全程云OA接口UploadFile存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/全程云OA/全程云OA接口UploadFile存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /全行业小程序运营系统/全行业小程序运营系统接口Wxapps.php存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/全行业小程序运营系统/全行业小程序运营系统接口Wxapps.php存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /公交IC卡收单管理系统/公交IC卡收单管理系统bus存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/公交IC卡收单管理系统/公交IC卡收单管理系统bus存在SQL注入漏洞.md -------------------------------------------------------------------------------- /公交IC卡收单管理系统/公交IC卡收单管理系统line存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/公交IC卡收单管理系统/公交IC卡收单管理系统line存在SQL注入漏洞.md -------------------------------------------------------------------------------- /公交IC卡收单管理系统/公交IC卡收单管理系统parametercard存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/公交IC卡收单管理系统/公交IC卡收单管理系统parametercard存在SQL注入漏洞.md -------------------------------------------------------------------------------- /公交IC卡收单管理系统/公交IC卡收单管理系统role存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/公交IC卡收单管理系统/公交IC卡收单管理系统role存在SQL注入漏洞.md -------------------------------------------------------------------------------- /公交IC卡收单管理系统/公交IC卡收单管理系统user存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/公交IC卡收单管理系统/公交IC卡收单管理系统user存在SQL注入漏洞.md -------------------------------------------------------------------------------- /公众号无限回调系统/公众号无限回调系统接口siteUrl存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/公众号无限回调系统/公众号无限回调系统接口siteUrl存在SQL注入漏洞.md -------------------------------------------------------------------------------- /六零导航页/六零导航页存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/六零导航页/六零导航页存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /分发签名系统/APP分发签名系统index-uplog.php存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/分发签名系统/APP分发签名系统index-uplog.php存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /分发签名系统/苹果IOS端IPA签名工具request_post任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/分发签名系统/苹果IOS端IPA签名工具request_post任意文件读取漏洞.md -------------------------------------------------------------------------------- /创客13星零售商城系统/创客13星零售商城系统前台任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/创客13星零售商城系统/创客13星零售商城系统前台任意文件上传漏洞.md -------------------------------------------------------------------------------- /北京中科聚网/北京中科聚网一体化运营平台catchByUrl存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/北京中科聚网/北京中科聚网一体化运营平台catchByUrl存在文件上传漏洞.md -------------------------------------------------------------------------------- /北京亚控科技/北京亚控科技KingPortal开发系统漏洞集合.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/北京亚控科技/北京亚控科技KingPortal开发系统漏洞集合.md -------------------------------------------------------------------------------- /医药信息管理系统/医药信息管理系统GetLshByTj存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/医药信息管理系统/医药信息管理系统GetLshByTj存在SQL注入.md -------------------------------------------------------------------------------- /医院挂号系统/医院挂号系统SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/医院挂号系统/医院挂号系统SQL注入.md -------------------------------------------------------------------------------- /华为Auth-Http Serve/华为Auth-Http Serve任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华为Auth-Http Serve/华为Auth-Http Serve任意文件读取.md -------------------------------------------------------------------------------- /华夏ERP/华夏ERPV3.3存在信息泄漏漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华夏ERP/华夏ERPV3.3存在信息泄漏漏洞.md -------------------------------------------------------------------------------- /华天动力/华天动力OA系统downloadWpsFile存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华天动力/华天动力OA系统downloadWpsFile存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /华望云/华望云会议管理平台conflog.inc存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华望云/华望云会议管理平台conflog.inc存在SQL注入漏洞.md -------------------------------------------------------------------------------- /华望云/华望云会议管理平台confmanger.inc存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华望云/华望云会议管理平台confmanger.inc存在SQL注入漏洞.md -------------------------------------------------------------------------------- /华望云/华望云会议管理平台deptactionlist存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华望云/华望云会议管理平台deptactionlist存在SQL注入漏洞.md -------------------------------------------------------------------------------- /华望云/华望云会议管理平台myconflist.in存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华望云/华望云会议管理平台myconflist.in存在SQL注入漏洞.md -------------------------------------------------------------------------------- /华望云/华望云会议管理平台recodemanger.inc存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华望云/华望云会议管理平台recodemanger.inc存在SQL注入漏洞.md -------------------------------------------------------------------------------- /华望云/华望云会议管理平台recodemangerForUser.inc存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华望云/华望云会议管理平台recodemangerForUser.inc存在SQL注入漏洞.md -------------------------------------------------------------------------------- /华望云/华望云会议管理平台syslog.inc存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华望云/华望云会议管理平台syslog.inc存在SQL注入漏洞.md -------------------------------------------------------------------------------- /华望云/华望云会议管理平台useractionlist存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华望云/华望云会议管理平台useractionlist存在SQL注入漏洞.md -------------------------------------------------------------------------------- /华测监测预警系统/华测监测预警系统接口UserEdit.aspx存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华测监测预警系统/华测监测预警系统接口UserEdit.aspx存在SQL注入.md -------------------------------------------------------------------------------- /华磊科技物流/华磊科技物流getOrderTrackingNumber存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华磊科技物流/华磊科技物流getOrderTrackingNumber存在sql注入漏洞.md -------------------------------------------------------------------------------- /华磊科技物流/华磊科技物流modifyInsurance存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/华磊科技物流/华磊科技物流modifyInsurance存在sql注入漏洞.md -------------------------------------------------------------------------------- /协达OA/协达OA系统绕过登录认证登陆后台.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/协达OA/协达OA系统绕过登录认证登陆后台.md -------------------------------------------------------------------------------- /南京星源图科技/南京星源图科技SparkShop存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/南京星源图科技/南京星源图科技SparkShop存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /卡车卫星定位系统/卡车卫星定位系统create存在未授权密码重置漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/卡车卫星定位系统/卡车卫星定位系统create存在未授权密码重置漏洞.md -------------------------------------------------------------------------------- /厦门四信通信科技有限公司/厦门四信通信科技有限公司视频监控管理系统存在逻辑缺陷漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/厦门四信通信科技有限公司/厦门四信通信科技有限公司视频监控管理系统存在逻辑缺陷漏洞.md -------------------------------------------------------------------------------- /友点建站系统/友点建站系统image_upload.php存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/友点建站系统/友点建站系统image_upload.php存在文件上传漏洞.md -------------------------------------------------------------------------------- /发卡网系统/HM发卡网反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/发卡网系统/HM发卡网反序列化漏洞.md -------------------------------------------------------------------------------- /发卡网系统/某自动发卡网alipay_notify.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/发卡网系统/某自动发卡网alipay_notify.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /发卡网系统/鲸发卡系统自动发卡网request_post存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/发卡网系统/鲸发卡系统自动发卡网request_post存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /同享人力管理管理平台/同享人力管理管理平台DownloadFile存在任意文件下载漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/同享人力管理管理平台/同享人力管理管理平台DownloadFile存在任意文件下载漏洞.md -------------------------------------------------------------------------------- /同享人力管理管理平台/同享人力管理管理平台SFZService.asmx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/同享人力管理管理平台/同享人力管理管理平台SFZService.asmx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /同享人力管理管理平台/同享人力管理管理平台UploadHandler存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/同享人力管理管理平台/同享人力管理管理平台UploadHandler存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /启明星辰/启明星辰-天清汉马VPN接口download任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/启明星辰/启明星辰-天清汉马VPN接口download任意文件读取.md -------------------------------------------------------------------------------- /启明星辰/启明星辰天玥网络安全审计系统SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/启明星辰/启明星辰天玥网络安全审计系统SQL注入漏洞.md -------------------------------------------------------------------------------- /和丰多媒体信息发布系统/和丰多媒体信息发布系统QH.aspx存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/和丰多媒体信息发布系统/和丰多媒体信息发布系统QH.aspx存在文件上传漏洞.md -------------------------------------------------------------------------------- /哲霖机械ERP/哲霖机械ERP接口DownloadInpFile存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/哲霖机械ERP/哲霖机械ERP接口DownloadInpFile存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /唯徳知识产权管理系统/唯徳知识产权管理系统WSFM.asmx接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/唯徳知识产权管理系统/唯徳知识产权管理系统WSFM.asmx接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /商混ERP/商混ERP-DictionaryEdit.aspxSQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/商混ERP/商混ERP-DictionaryEdit.aspxSQL注入漏洞.md -------------------------------------------------------------------------------- /商混ERP/商混ERP系统接口Operater_Action.aspx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/商混ERP/商混ERP系统接口Operater_Action.aspx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /商混ERP/商混ERP系统接口StockreceiveEdit.aspx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/商混ERP/商混ERP系统接口StockreceiveEdit.aspx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /商混ERP/商混ERP系统接口TaskCarToQueue.aspx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/商混ERP/商混ERP系统接口TaskCarToQueue.aspx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /喰星云-数字化餐饮服务系统/喰星云-数字化餐饮服务系统listuser信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/喰星云-数字化餐饮服务系统/喰星云-数字化餐饮服务系统listuser信息泄露漏洞.md -------------------------------------------------------------------------------- /喰星云-数字化餐饮服务系统/喰星云-数字化餐饮服务系统stock.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/喰星云-数字化餐饮服务系统/喰星云-数字化餐饮服务系统stock.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /因酷教育软件/因酷教育软件开源网校程序gok4任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/因酷教育软件/因酷教育软件开源网校程序gok4任意文件上传漏洞.md -------------------------------------------------------------------------------- /地大信息/地大信息-基础信息平台GetImg任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/地大信息/地大信息-基础信息平台GetImg任意文件读取漏洞.md -------------------------------------------------------------------------------- /多客圈子论坛系统/多客圈子论坛前台SSRF漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/多客圈子论坛系统/多客圈子论坛前台SSRF漏洞.md -------------------------------------------------------------------------------- /多客圈子论坛系统/多客圈子论坛系统httpGet任意文件读取漏洞复现.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/多客圈子论坛系统/多客圈子论坛系统httpGet任意文件读取漏洞复现.md -------------------------------------------------------------------------------- /大华/大华DSS itcBulletin SQL 注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华DSS itcBulletin SQL 注入漏洞.md -------------------------------------------------------------------------------- /大华/大华DSS城市安防监控平台Struct2-045命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华DSS城市安防监控平台Struct2-045命令执行漏洞.md -------------------------------------------------------------------------------- /大华/大华DSS系统group_saveGroup存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华DSS系统group_saveGroup存在SQL注入漏洞.md -------------------------------------------------------------------------------- /大华/大华EIMS-capture_handle接口远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华EIMS-capture_handle接口远程命令执行漏洞.md -------------------------------------------------------------------------------- /大华/大华ICC智能物联综合管理平台heapdump敏感信息泄露.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华ICC智能物联综合管理平台heapdump敏感信息泄露.md -------------------------------------------------------------------------------- /大华/大华ICC智能物联综合管理平台存在fastjson漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华ICC智能物联综合管理平台存在fastjson漏洞.md -------------------------------------------------------------------------------- /大华/大华城市安防监控系统平台管理存在user_edit.action信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华城市安防监控系统平台管理存在user_edit.action信息泄露漏洞.md -------------------------------------------------------------------------------- /大华/大华智慧园区clientServer接口SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华智慧园区clientServer接口SQL注入漏洞.md -------------------------------------------------------------------------------- /大华/大华智慧园区getNewStaypointDetailQuery接口SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华智慧园区getNewStaypointDetailQuery接口SQL注入漏洞.md -------------------------------------------------------------------------------- /大华/大华智慧园区管理平台任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华智慧园区管理平台任意文件读取.md -------------------------------------------------------------------------------- /大华/大华智慧园区综合管理平台 deleteFtp 远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华智慧园区综合管理平台 deleteFtp 远程命令执行漏洞.md -------------------------------------------------------------------------------- /大华/大华智慧园区综合管理平台 searchJson SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华智慧园区综合管理平台 searchJson SQL注入漏洞.md -------------------------------------------------------------------------------- /大华/大华智慧园区综合管理平台 文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华智慧园区综合管理平台 文件上传漏洞.md -------------------------------------------------------------------------------- /大华/大华智慧园区综合管理平台bitmap接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华智慧园区综合管理平台bitmap接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /大华/大华智慧园区综合管理平台ipms接口存在远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华智慧园区综合管理平台ipms接口存在远程代码执行漏洞.md -------------------------------------------------------------------------------- /大华/大华智慧园区综合管理平台pageJson存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华智慧园区综合管理平台pageJson存在SQL注入漏洞.md -------------------------------------------------------------------------------- /大华/大华智能物联ICC综合管理平台readpic任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华智能物联ICC综合管理平台readpic任意文件读取漏洞.md -------------------------------------------------------------------------------- /大华/大华智能物联综合管理平台justForTest用户登录漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大华/大华智能物联综合管理平台justForTest用户登录漏洞.md -------------------------------------------------------------------------------- /大唐电信/大唐电信AC集中管理平台敏感信息泄漏漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/大唐电信/大唐电信AC集中管理平台敏感信息泄漏漏洞.md -------------------------------------------------------------------------------- /天喻软件数据安全平台/天喻软件数据安全平台DownLoad.ashx存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天喻软件数据安全平台/天喻软件数据安全平台DownLoad.ashx存在SQL注入.md -------------------------------------------------------------------------------- /天擎/360 新天擎终端安全管理系统存在信息泄露漏洞.md: -------------------------------------------------------------------------------- 1 | ## 360 新天擎终端安全管理系统存在信息泄露漏洞 2 | ``` 3 | GET /runtime/admin_log_confcache 4 | ``` 5 | -------------------------------------------------------------------------------- /天擎/360天擎 - 未授权与sql注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天擎/360天擎 - 未授权与sql注入.md -------------------------------------------------------------------------------- /天擎/天擎终端安全管理系统YII_CSRF_TOKEN远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天擎/天擎终端安全管理系统YII_CSRF_TOKEN远程代码执行漏洞.md -------------------------------------------------------------------------------- /天擎/奇安信360天擎getsimilarlistSQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天擎/奇安信360天擎getsimilarlistSQL注入漏洞.md -------------------------------------------------------------------------------- /天擎/奇安信VPN任意用户密码重置.md: -------------------------------------------------------------------------------- 1 | ## 奇安信VPN任意用户密码重置 2 | 3 | 4 | ## 漏洞exp 5 | `https://github.com/adeljck/QAX_VPN_Crack` 6 | -------------------------------------------------------------------------------- /天擎/奇安信天擎rptsvr任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天擎/奇安信天擎rptsvr任意文件上传.md -------------------------------------------------------------------------------- /天擎/奇安信网康下一代防火墙directdata存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天擎/奇安信网康下一代防火墙directdata存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /天智云/天智云智造管理平台Usermanager.ashx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天智云/天智云智造管理平台Usermanager.ashx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /天翼应用虚拟化系统/天翼应用虚拟化系统sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天翼应用虚拟化系统/天翼应用虚拟化系统sql注入漏洞.md -------------------------------------------------------------------------------- /天融信/天融信TOPSEC_maincgi.cgi远程命令执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天融信/天融信TOPSEC_maincgi.cgi远程命令执行.md -------------------------------------------------------------------------------- /天融信/天融信TOPSEC_static_convert远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天融信/天融信TOPSEC_static_convert远程命令执行漏洞.md -------------------------------------------------------------------------------- /天融信/天融信运维安全审计系统synRequest存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天融信/天融信运维安全审计系统synRequest存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /天钥网关入/天钥网关前台SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天钥网关入/天钥网关前台SQL注入.md -------------------------------------------------------------------------------- /天问物业ERP系统/天问物业ERP系统ContractDownLoad存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/天问物业ERP系统/天问物业ERP系统ContractDownLoad存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /契约锁电子签章系统/契约锁电子签章平台add远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/契约锁电子签章系统/契约锁电子签章平台add远程命令执行漏洞.md -------------------------------------------------------------------------------- /契约锁电子签章系统/契约锁电子签章平台ukeysign存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/契约锁电子签章系统/契约锁电子签章平台ukeysign存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /契约锁电子签章系统/契约锁电子签章系统RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/契约锁电子签章系统/契约锁电子签章系统RCE.md -------------------------------------------------------------------------------- /奥威亚视频云平台/奥威亚云视频平台UploadFile.aspx存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/奥威亚视频云平台/奥威亚云视频平台UploadFile.aspx存在文件上传漏洞.md -------------------------------------------------------------------------------- /奥威亚视频云平台/奥威亚视频云平台VideoCover.aspx接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/奥威亚视频云平台/奥威亚视频云平台VideoCover.aspx接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /好视通视频会议系统/好视通视频会议系统 toDownload.do接口 任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/好视通视频会议系统/好视通视频会议系统 toDownload.do接口 任意文件读取漏洞.md -------------------------------------------------------------------------------- /孚盟云/孚盟云系统接口ajaxsenddingdingmessage存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/孚盟云/孚盟云系统接口ajaxsenddingdingmessage存在SQL注入漏洞.md -------------------------------------------------------------------------------- /学分制系统/学分制系统GetCalendarContentById存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/学分制系统/学分制系统GetCalendarContentById存在SQL注入漏洞.md -------------------------------------------------------------------------------- /安恒/安恒明御安全网关远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/安恒/安恒明御安全网关远程命令执行漏洞.md -------------------------------------------------------------------------------- /安恒/某恒明御漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/安恒/某恒明御漏洞.md -------------------------------------------------------------------------------- /安美数字酒店宽带运营系统/安美数字酒店宽带运营系统SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/安美数字酒店宽带运营系统/安美数字酒店宽带运营系统SQL注入漏洞.md -------------------------------------------------------------------------------- /安达通/安达通TPN-2G安全网关远程代码执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/安达通/安达通TPN-2G安全网关远程代码执行.md -------------------------------------------------------------------------------- /宏景OA/宏景 DisplayFiles任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景 DisplayFiles任意文件读取.md -------------------------------------------------------------------------------- /宏景OA/宏景HCM-codesettree接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景HCM-codesettree接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /宏景OA/宏景HCM-downlawbase接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景HCM-downlawbase接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /宏景OA/宏景HCM-pos_dept_post存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景HCM-pos_dept_post存在SQL注入漏洞.md -------------------------------------------------------------------------------- /宏景OA/宏景HCM系统fieldsettree接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景HCM系统fieldsettree接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /宏景OA/宏景HCM系统infoView处存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景HCM系统infoView处存在sql注入漏洞.md -------------------------------------------------------------------------------- /宏景OA/宏景OA文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景OA文件上传.md -------------------------------------------------------------------------------- /宏景OA/宏景eHR-OutputCode存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景eHR-OutputCode存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /宏景OA/宏景eHR-showmedia.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景eHR-showmedia.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /宏景OA/宏景eHR人力资源管理系统接口getSdutyTree存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景eHR人力资源管理系统接口getSdutyTree存在SQL注入漏洞.md -------------------------------------------------------------------------------- /宏景OA/宏景eHR人力资源管理系统接口loadtree存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景eHR人力资源管理系统接口loadtree存在SQL注入漏洞.md -------------------------------------------------------------------------------- /宏景OA/宏景eHR人力资源管理软件showmediainfo存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景eHR人力资源管理软件showmediainfo存在SQL注入漏洞.md -------------------------------------------------------------------------------- /宏景OA/宏景eHR系统ajaxService接口处存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏景OA/宏景eHR系统ajaxService接口处存在SQL注入漏洞.md -------------------------------------------------------------------------------- /宏脉医美行业管理系统/宏脉医美行业管理系统UEditor编辑器存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宏脉医美行业管理系统/宏脉医美行业管理系统UEditor编辑器存在文件上传漏洞.md -------------------------------------------------------------------------------- /宝塔/宝塔最新未授权访问漏洞及sql注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/宝塔/宝塔最新未授权访问漏洞及sql注入.md -------------------------------------------------------------------------------- /富通天下外贸ERP/富通天下外贸ERP任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/富通天下外贸ERP/富通天下外贸ERP任意文件上传漏洞.md -------------------------------------------------------------------------------- /山石网科云鉴/山石网科云鉴存在前台任意命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/山石网科云鉴/山石网科云鉴存在前台任意命令执行漏洞.md -------------------------------------------------------------------------------- /山石网科云鉴/山石网科应用防火墙WAF未授权命令注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/山石网科云鉴/山石网科应用防火墙WAF未授权命令注入漏洞.md -------------------------------------------------------------------------------- /帆软报表/帆软报表 V8 get_geo_json 任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/帆软报表/帆软报表 V8 get_geo_json 任意文件读取漏洞.md -------------------------------------------------------------------------------- /帆软报表/帆软系统ReportServer存在SQL注入漏洞导致RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/帆软报表/帆软系统ReportServer存在SQL注入漏洞导致RCE.md -------------------------------------------------------------------------------- /帮管客CRM/帮管客CRM-jiliyu接口存在SQL漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/帮管客CRM/帮管客CRM-jiliyu接口存在SQL漏洞.md -------------------------------------------------------------------------------- /平升电子水库监管平台/平升水库水文监测系统默认密码.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/平升电子水库监管平台/平升水库水文监测系统默认密码.md -------------------------------------------------------------------------------- /广州图创图书馆集群管理系统/广州图书馆集群系统WebBookNew存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广州图创图书馆集群管理系统/广州图书馆集群系统WebBookNew存在SQL注入漏洞.md -------------------------------------------------------------------------------- /广州图创图书馆集群管理系统/广州图创图书馆集群管理系统存在未授权访问.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广州图创图书馆集群管理系统/广州图创图书馆集群管理系统存在未授权访问.md -------------------------------------------------------------------------------- /广联达OA/广联达OA任意用户登录.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广联达OA/广联达OA任意用户登录.md -------------------------------------------------------------------------------- /广联达OA/广联达OA前台任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广联达OA/广联达OA前台任意文件上传.md -------------------------------------------------------------------------------- /广联达OA/广联达OA接口ArchiveWebService存在XML实体注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广联达OA/广联达OA接口ArchiveWebService存在XML实体注入漏洞.md -------------------------------------------------------------------------------- /广联达OA/广联达OA系统GetSSOStamp接口存在任意用户登录.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广联达OA/广联达OA系统GetSSOStamp接口存在任意用户登录.md -------------------------------------------------------------------------------- /广联达OA/广联达OA系统接口ConfigService.asmx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广联达OA/广联达OA系统接口ConfigService.asmx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /广联达OA/广联达OA系统接口do.asmx存在任意文件写入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广联达OA/广联达OA系统接口do.asmx存在任意文件写入漏洞.md -------------------------------------------------------------------------------- /广联达OA/广联达OA系统接口do.asmx存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广联达OA/广联达OA系统接口do.asmx存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /广联达OA/广联达oa sql注入漏洞 .md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广联达OA/广联达oa sql注入漏洞 .md -------------------------------------------------------------------------------- /广联达OA/广联达oa 后台文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广联达OA/广联达oa 后台文件上传漏洞.md -------------------------------------------------------------------------------- /广联达OA/某联达oa 后台文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/广联达OA/某联达oa 后台文件上传漏洞.md -------------------------------------------------------------------------------- /建文工程管理系统/建文工程管理系统desktop.ashx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/建文工程管理系统/建文工程管理系统desktop.ashx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /微信广告任务平台/微信广告任务平台存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/微信广告任务平台/微信广告任务平台存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /微厦在线学习平台/微厦在线学习平台OrganSetup存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/微厦在线学习平台/微厦在线学习平台OrganSetup存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /微商城系统/微商城系统api.php存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/微商城系统/微商城系统api.php存在文件上传漏洞.md -------------------------------------------------------------------------------- /微商城系统/微商城系统goods.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/微商城系统/微商城系统goods.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /微擎/微擎-AccountEdit-file-upload文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/微擎/微擎-AccountEdit-file-upload文件上传漏洞.md -------------------------------------------------------------------------------- /思福迪运维安全管理系统/思福迪运维安全管理系统RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/思福迪运维安全管理系统/思福迪运维安全管理系统RCE漏洞.md -------------------------------------------------------------------------------- /悦库企业网盘/悦库企业网盘userlogin.html存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/悦库企业网盘/悦库企业网盘userlogin.html存在SQL注入漏洞.md -------------------------------------------------------------------------------- /惠尔顿-网络安全审计系统/惠尔顿-网络安全审计系统存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/惠尔顿-网络安全审计系统/惠尔顿-网络安全审计系统存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /懒人网址导航页/懒人网址导航页search.html存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/懒人网址导航页/懒人网址导航页search.html存在SQL注入漏洞.md -------------------------------------------------------------------------------- /抢单刷单系统/某二开版海外抢单Shua单系统存在任意用户登录漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/抢单刷单系统/某二开版海外抢单Shua单系统存在任意用户登录漏洞.md -------------------------------------------------------------------------------- /拼团零售商城系统/拼团零售商城系统前台任意文件写入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/拼团零售商城系统/拼团零售商城系统前台任意文件写入漏洞.md -------------------------------------------------------------------------------- /挖矿质押单语言系统/某U挖矿质押单语言系统imageupload后台任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/挖矿质押单语言系统/某U挖矿质押单语言系统imageupload后台任意文件上传漏洞.md -------------------------------------------------------------------------------- /挖矿质押单语言系统/某U挖矿质押单语言系统前台未授权修改管理员密码.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/挖矿质押单语言系统/某U挖矿质押单语言系统前台未授权修改管理员密码.md -------------------------------------------------------------------------------- /挖矿质押单语言系统/某U挖矿质押单语言系统后台phar反序列漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/挖矿质押单语言系统/某U挖矿质押单语言系统后台phar反序列漏洞.md -------------------------------------------------------------------------------- /捷诚管理信息系统/捷诚管理信息系统sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/捷诚管理信息系统/捷诚管理信息系统sql注入漏洞.md -------------------------------------------------------------------------------- /数字通OA/数字通OA-智慧政务接口payslip存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/数字通OA/数字通OA-智慧政务接口payslip存在SQL注入漏洞.md -------------------------------------------------------------------------------- /数字通OA/数字通云平台智慧政务setting存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/数字通OA/数字通云平台智慧政务setting存在文件上传漏洞.md -------------------------------------------------------------------------------- /数字通OA/数字通云平台智慧政务workflow存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/数字通OA/数字通云平台智慧政务workflow存在SQL注入漏洞.md -------------------------------------------------------------------------------- /新视窗新一代物业管理系统/新视窗新一代物业管理系统任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/新视窗新一代物业管理系统/新视窗新一代物业管理系统任意文件上传漏洞.md -------------------------------------------------------------------------------- /方天云智慧平台系统/方天云智慧平台系统GetCompanyItem存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/方天云智慧平台系统/方天云智慧平台系统GetCompanyItem存在sql注入漏洞.md -------------------------------------------------------------------------------- /方天云智慧平台系统/方天云智慧平台系统Upload.ashx存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/方天云智慧平台系统/方天云智慧平台系统Upload.ashx存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /方天云智慧平台系统/方天云智慧平台系统setImg.ashx存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/方天云智慧平台系统/方天云智慧平台系统setImg.ashx存在文件上传漏洞.md -------------------------------------------------------------------------------- /方正全媒体/方正全媒体采编系统存在syn.do信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/方正全媒体/方正全媒体采编系统存在syn.do信息泄露漏洞.md -------------------------------------------------------------------------------- /方正全媒体/方正畅享全媒体新闻采编系统binary.do存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/方正全媒体/方正畅享全媒体新闻采编系统binary.do存在SQL注入漏洞.md -------------------------------------------------------------------------------- /明源云/明源云ERP接口ApiUpdate.ashx文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/明源云/明源云ERP接口ApiUpdate.ashx文件上传漏洞.md -------------------------------------------------------------------------------- /易天智能eHR管理平台/易天智能eHR管理平台任意用户添加漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/易天智能eHR管理平台/易天智能eHR管理平台任意用户添加漏洞.md -------------------------------------------------------------------------------- /易宝OA/易宝OA ExecuteSqlForSingle SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/易宝OA/易宝OA ExecuteSqlForSingle SQL注入漏洞.md -------------------------------------------------------------------------------- /易宝OA/易宝OA-BasicService.asmx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/易宝OA/易宝OA-BasicService.asmx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /易宝OA/易宝OA-BasicService.asmx存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/易宝OA/易宝OA-BasicService.asmx存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /易宝OA/易宝OA系统DownloadFile接口存在文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/易宝OA/易宝OA系统DownloadFile接口存在文件读取漏洞.md -------------------------------------------------------------------------------- /易思智能物流无人值守系统/易思智能物流无人值守系统5.0存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/易思智能物流无人值守系统/易思智能物流无人值守系统5.0存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /易捷OA/易捷OA协同办公软件ShowPic接口存在任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/易捷OA/易捷OA协同办公软件ShowPic接口存在任意文件读取.md -------------------------------------------------------------------------------- /智互联科技有限公司/智联云采SRM2.0系统接口autologin身份认证绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/智互联科技有限公司/智联云采SRM2.0系统接口autologin身份认证绕过漏洞.md -------------------------------------------------------------------------------- /智能停车管理系统/智能停车管理系统GetPasswayData存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/智能停车管理系统/智能停车管理系统GetPasswayData存在SQL注入漏洞.md -------------------------------------------------------------------------------- /智能停车管理系统/智能停车管理系统ToLogin存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/智能停车管理系统/智能停车管理系统ToLogin存在SQL注入漏洞.md -------------------------------------------------------------------------------- /极限OA/极限OA接口video_file.php存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/极限OA/极限OA接口video_file.php存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /某业务管理系统/某业务管理系统LoginUser存在信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/某业务管理系统/某业务管理系统LoginUser存在信息泄露漏洞.md -------------------------------------------------------------------------------- /某短视频直播打赏系统/某短视频直播打赏系统任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/某短视频直播打赏系统/某短视频直播打赏系统任意文件读取漏洞.md -------------------------------------------------------------------------------- /某短视频直播打赏系统/某短视频直播打赏系统后台任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/某短视频直播打赏系统/某短视频直播打赏系统后台任意文件上传漏洞.md -------------------------------------------------------------------------------- /正方/正方教学管理信息服务平台ReportServer存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/正方/正方教学管理信息服务平台ReportServer存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /正方/正方数字化校园平台RzptManage存在任意文件写入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/正方/正方数字化校园平台RzptManage存在任意文件写入漏洞.md -------------------------------------------------------------------------------- /汇智ERP/汇智ERP接口filehandle.aspx存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/汇智ERP/汇智ERP接口filehandle.aspx存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /汇智ERP/汇智ERP系统Upload.aspx存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/汇智ERP/汇智ERP系统Upload.aspx存在文件上传漏洞.md -------------------------------------------------------------------------------- /汉得SRM/汉得SRM tomcat.jsp 登录绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/汉得SRM/汉得SRM tomcat.jsp 登录绕过漏洞.md -------------------------------------------------------------------------------- /泛微OA/某微 E-Cology 某版本 SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/某微 E-Cology 某版本 SQL注入漏洞.md -------------------------------------------------------------------------------- /泛微OA/某微E-Office9文件上传漏洞 CVE-2023-2523.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/某微E-Office9文件上传漏洞 CVE-2023-2523.md -------------------------------------------------------------------------------- /泛微OA/某微E-Office9文件上传漏洞 CVE-2023-2648.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/某微E-Office9文件上传漏洞 CVE-2023-2648.md -------------------------------------------------------------------------------- /泛微OA/泛微 HrmCareerApplyPerView sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微 HrmCareerApplyPerView sql注入漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微-EMobile存在弱口令漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微-EMobile存在弱口令漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微-OA系统ResourceServlet接口任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微-OA系统ResourceServlet接口任意文件读取漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微E-Cology-KtreeUploadAction任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-Cology-KtreeUploadAction任意文件上传漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微E-Cology接口getFileViewUrl存在SSRF漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-Cology接口getFileViewUrl存在SSRF漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微E-Mobile-client.do存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-Mobile-client.do存在命令执行漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微E-Mobile-messageType.do存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-Mobile-messageType.do存在命令执行漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微E-MobileServer远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-MobileServer远程命令执行漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微E-Mobile硬编码口令漏洞(XVE-2024-28095).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-Mobile硬编码口令漏洞(XVE-2024-28095).md -------------------------------------------------------------------------------- /泛微OA/泛微E-Mobile系统接口cdnfile存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-Mobile系统接口cdnfile存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微E-Office-json_common.phpSQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-Office-json_common.phpSQL注入漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微E-Office-jx2_config存在信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-Office-jx2_config存在信息泄露漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微E-Office-uploadfile.php任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-Office-uploadfile.php任意文件上传漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微E-Office10-OfficeServer任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-Office10-OfficeServer任意文件上传漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微E-Office系统login_other.php存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微E-Office系统login_other.php存在sql注入漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微OA-E-Cology-FileDownload文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微OA-E-Cology-FileDownload文件读取漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微OA-E-Mobile移动管理平台lang2sql任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微OA-E-Mobile移动管理平台lang2sql任意文件上传漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微e-cology-v10远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微e-cology-v10远程代码执行漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微e-cology9_SQL注入-CNVD-2023-12632.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微e-cology9_SQL注入-CNVD-2023-12632.md -------------------------------------------------------------------------------- /泛微OA/泛微e-cology9接口XmlRpcServlet存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微e-cology9接口XmlRpcServlet存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微e-cology接口HrmService前台SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微e-cology接口HrmService前台SQL注入漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微e-cology接口getLabelByModule存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微e-cology接口getLabelByModule存在sql注入漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微e-office 未授权访问.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微e-office 未授权访问.md -------------------------------------------------------------------------------- /泛微OA/泛微e-office-uploadify.php存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微e-office-uploadify.php存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微e-office系统UserSelect接口存在未授权访问漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微e-office系统UserSelect接口存在未授权访问漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微ecology9系统接口ModeDateService存在SQL漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微ecology9系统接口ModeDateService存在SQL漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微ecology系统setup接口存在信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微ecology系统setup接口存在信息泄露漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微ecology系统接口BlogService存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微ecology系统接口BlogService存在SQL注入漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微云桥 e-Bridge addTaste接口SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微云桥 e-Bridge addTaste接口SQL注入漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微云桥(e-Bridge)系统接口addResume存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微云桥(e-Bridge)系统接口addResume存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /泛微OA/泛微移动管理平台lang2sql接口任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/泛微OA/泛微移动管理平台lang2sql接口任意文件上传.md -------------------------------------------------------------------------------- /浙大恩特客户资源管理系统/浙大恩特客户资源管理系统 文件上传和sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/浙大恩特客户资源管理系统/浙大恩特客户资源管理系统 文件上传和sql注入漏洞.md -------------------------------------------------------------------------------- /浙江宇视/浙江宇视isc网络视频录像机LogReport.php存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/浙江宇视/浙江宇视isc网络视频录像机LogReport.php存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /浪潮云/浪潮云财务系统UploadListFile存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/浪潮云/浪潮云财务系统UploadListFile存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /浪潮云/浪潮云财务系统xtdysrv.asmx存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/浪潮云/浪潮云财务系统xtdysrv.asmx存在命令执行漏洞.md -------------------------------------------------------------------------------- /海康威视/HiKVISION 综合安防管理平台 任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/HiKVISION 综合安防管理平台 任意文件上传漏洞.md -------------------------------------------------------------------------------- /海康威视/海康威视-综合安防管理平台-files-文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视-综合安防管理平台-files-文件读取.md -------------------------------------------------------------------------------- /海康威视/海康威视CVE-2023-6895 IP网络对讲广播系统远程命令执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视CVE-2023-6895 IP网络对讲广播系统远程命令执行.md -------------------------------------------------------------------------------- /海康威视/海康威视IP网络对讲广播系统任意文件下载漏洞CVE-2023-6893.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视IP网络对讲广播系统任意文件下载漏洞CVE-2023-6893.md -------------------------------------------------------------------------------- /海康威视/海康威视IVMS-8700 fastjson命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视IVMS-8700 fastjson命令执行漏洞.md -------------------------------------------------------------------------------- /海康威视/海康威视安全接入网关任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视安全接入网关任意文件读取漏洞.md -------------------------------------------------------------------------------- /海康威视/海康威视综合安防download存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视综合安防download存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /海康威视/海康威视综合安防管理平台clusters接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视综合安防管理平台clusters接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /海康威视/海康威视综合安防管理平台keepAlive远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视综合安防管理平台keepAlive远程代码执行漏洞.md -------------------------------------------------------------------------------- /海康威视/海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞.md -------------------------------------------------------------------------------- /海康威视/海康威视综合安防管理平台productFile远程代码执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视综合安防管理平台productFile远程代码执行.md -------------------------------------------------------------------------------- /海康威视/海康威视综合安防管理平台uploadAllPackage任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视综合安防管理平台uploadAllPackage任意文件上传漏洞.md -------------------------------------------------------------------------------- /海康威视/海康威视综合安防管理平台信息泄露.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视综合安防管理平台信息泄露.md -------------------------------------------------------------------------------- /海康威视/海康威视综合安防系统detection接口存在RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视综合安防系统detection接口存在RCE漏洞.md -------------------------------------------------------------------------------- /海康威视/海康威视运行管理中心fastjson漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海康威视/海康威视运行管理中心fastjson漏洞.md -------------------------------------------------------------------------------- /海洋cms/SeaCMS海洋影视管理系统dmku存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海洋cms/SeaCMS海洋影视管理系统dmku存在SQL注入漏洞.md -------------------------------------------------------------------------------- /海洋cms/SeaCMS海洋影视管理系统index.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海洋cms/SeaCMS海洋影视管理系统index.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /海洋cms/海洋CMS-admin_notify.php远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海洋cms/海洋CMS-admin_notify.php远程代码执行漏洞.md -------------------------------------------------------------------------------- /海洋cms/海洋CMS后台admin_smtp.php存在远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海洋cms/海洋CMS后台admin_smtp.php存在远程代码执行漏洞.md -------------------------------------------------------------------------------- /海翔ERP/海翔ERP SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/海翔ERP/海翔ERP SQL注入漏洞.md -------------------------------------------------------------------------------- /润乾报表/润乾报表InputServlet接口存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/润乾报表/润乾报表InputServlet接口存在文件上传漏洞.md -------------------------------------------------------------------------------- /润乾报表/润乾报表dataSphereServlet任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/润乾报表/润乾报表dataSphereServlet任意文件上传.md -------------------------------------------------------------------------------- /润乾报表/润乾报表dataSphereServlet接口存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/润乾报表/润乾报表dataSphereServlet接口存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /润乾报表/润乾报表平台InputServlet存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/润乾报表/润乾报表平台InputServlet存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /深信服/某x服应用交付系统命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/深信服/某x服应用交付系统命令执行漏洞.md -------------------------------------------------------------------------------- /深信服/某服 sxf-报表系统命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/深信服/某服 sxf-报表系统命令执行漏洞.md -------------------------------------------------------------------------------- /深信服/深信服SANGFOR终端检测响应平台 - 任意用户免密登录,前台RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/深信服/深信服SANGFOR终端检测响应平台 - 任意用户免密登录,前台RCE.md -------------------------------------------------------------------------------- /深信服/深信服SG上网优化管理系统 catjs.php 任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/深信服/深信服SG上网优化管理系统 catjs.php 任意文件读取漏洞.md -------------------------------------------------------------------------------- /深信服/深信服下一代防火墙NGAF RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/深信服/深信服下一代防火墙NGAF RCE漏洞.md -------------------------------------------------------------------------------- /深信服/深信服下一代防火墙NGAF任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/深信服/深信服下一代防火墙NGAF任意文件读取漏洞.md -------------------------------------------------------------------------------- /深信服/深信服数据中心管理系统 XML 实体注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/深信服/深信服数据中心管理系统 XML 实体注入漏洞.md -------------------------------------------------------------------------------- /深澜计费管理系统/深澜计费管理系统proxy存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/深澜计费管理系统/深澜计费管理系统proxy存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /深澜计费管理系统/深澜计费管理系统strategy存在反序列化RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/深澜计费管理系统/深澜计费管理系统strategy存在反序列化RCE漏洞.md -------------------------------------------------------------------------------- /湖南建研检测系统/湖南建研-检测系统 admintool 任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/湖南建研检测系统/湖南建研-检测系统 admintool 任意文件上传.md -------------------------------------------------------------------------------- /湖南建研检测系统/湖南建研检测系统存在DownLoad2.aspx任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/湖南建研检测系统/湖南建研检测系统存在DownLoad2.aspx任意文件读取漏洞.md -------------------------------------------------------------------------------- /湖南建研检测系统/湖南建研质量监测系统upload.ashx文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/湖南建研检测系统/湖南建研质量监测系统upload.ashx文件上传漏洞.md -------------------------------------------------------------------------------- /漫画系统/微信公众号小说漫画系统fileupload.php存在前台任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/漫画系统/微信公众号小说漫画系统fileupload.php存在前台任意文件上传漏洞.md -------------------------------------------------------------------------------- /漫画系统/微信公众号小说漫画系统前台任意文件写入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/漫画系统/微信公众号小说漫画系统前台任意文件写入漏洞.md -------------------------------------------------------------------------------- /潍微科技/潍微科技-水务信息管理平台ChangePwd接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/潍微科技/潍微科技-水务信息管理平台ChangePwd接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /灵当CRM/灵当CRM系统接口getOrderList存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/灵当CRM/灵当CRM系统接口getOrderList存在SQL注入漏洞.md -------------------------------------------------------------------------------- /灵当CRM/灵当CRM系统接口multipleUpload.php文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/灵当CRM/灵当CRM系统接口multipleUpload.php文件上传漏洞.md -------------------------------------------------------------------------------- /点企来客服系统/点企来客服系统getwaitnum存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/点企来客服系统/点企来客服系统getwaitnum存在sql注入漏洞.md -------------------------------------------------------------------------------- /点企来客服系统/点企来客服系统存在硬编码漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/点企来客服系统/点企来客服系统存在硬编码漏洞.md -------------------------------------------------------------------------------- /热网无线监测系统/热网无线监测系统GetMenuItem存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/热网无线监测系统/热网无线监测系统GetMenuItem存在SQL注入漏洞.md -------------------------------------------------------------------------------- /物业专项维修资金管理系统/物业专项维修资金管理系统漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/物业专项维修资金管理系统/物业专项维修资金管理系统漏洞.md -------------------------------------------------------------------------------- /环境自动监测监控系统/3C环境自动监测监控系统ReadLog文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/环境自动监测监控系统/3C环境自动监测监控系统ReadLog文件读取漏洞.md -------------------------------------------------------------------------------- /珠海新华通软件股份有限公司/珠海新华通软件股份有限公司云平台存在登录绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/珠海新华通软件股份有限公司/珠海新华通软件股份有限公司云平台存在登录绕过漏洞.md -------------------------------------------------------------------------------- /瑞友天翼应用虚拟化系统/瑞友天翼应用虚拟化系统appsave接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/瑞友天翼应用虚拟化系统/瑞友天翼应用虚拟化系统appsave接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /瑞友天翼应用虚拟化系统/瑞友应用虚拟化系统-RAPAgent存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/瑞友天翼应用虚拟化系统/瑞友应用虚拟化系统-RAPAgent存在命令执行漏洞.md -------------------------------------------------------------------------------- /瑞斯康达/瑞斯康达-多业务智能网关-RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/瑞斯康达/瑞斯康达-多业务智能网关-RCE.md -------------------------------------------------------------------------------- /瑞星EDR/瑞星EDR-XSS漏洞可打管理员cookie.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/瑞星EDR/瑞星EDR-XSS漏洞可打管理员cookie.md -------------------------------------------------------------------------------- /用友OA/某友时空KSOA PayBill SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/某友时空KSOA PayBill SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友 GRP U8 license_check.jsp 存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友 GRP U8 license_check.jsp 存在SQL注入.md -------------------------------------------------------------------------------- /用友OA/用友 NC Cloud jsinvoke 任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友 NC Cloud jsinvoke 任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友 NC uapws wsdl XXE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友 NC uapws wsdl XXE漏洞.md -------------------------------------------------------------------------------- /用友OA/用友-U9-PatchFile.asmx任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友-U9-PatchFile.asmx任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友CRM 任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友CRM 任意文件读取漏洞.md -------------------------------------------------------------------------------- /用友OA/用友CRM客户关系管理系统import.php存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友CRM客户关系管理系统import.php存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友CRM系统uploadfile.php接口存在任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友CRM系统uploadfile.php接口存在任意文件上传.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-FileUpload任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-FileUpload任意文件上传.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-PayReturnForWcp接口存在XXE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-PayReturnForWcp接口存在XXE漏洞.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-Proxy存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-Proxy存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-SelectDMJE.jsp_SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-SelectDMJE.jsp_SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-UploadFileData任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-UploadFileData任意文件上传.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-bx_dj_check.jsp存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-bx_dj_check.jsp存在SQL注入.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-obr_zdybxd_check.jsp存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-obr_zdybxd_check.jsp存在SQL注入.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-obr_zdybxd_check存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-obr_zdybxd_check存在sql注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-operOriztion存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-operOriztion存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-slbmbygr.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-slbmbygr.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-sqcxIndex.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-sqcxIndex.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-ufgovbank存在XXE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-ufgovbank存在XXE漏洞.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8-userInfoWeb存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8-userInfoWeb存在SQL注入.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8存在XML注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8存在XML注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友GRP-U8日志泄漏漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRP-U8日志泄漏漏洞.md -------------------------------------------------------------------------------- /用友OA/用友GRPA++Cloud政府财务云存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友GRPA++Cloud政府财务云存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC word.docx任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC word.docx任意文件读取漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-ActionServlet存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-ActionServlet存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-Cloud uploadChunk 任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-Cloud uploadChunk 任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-Cloud_importhttpscer接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-Cloud_importhttpscer接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-Cloud文件服务器用户登陆绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-Cloud文件服务器用户登陆绕过漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-Cloud系统queryStaffByName存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-Cloud系统queryStaffByName存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-avatar接口存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-avatar接口存在文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-bill存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-bill存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-complainbilldetail存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-complainbilldetail存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-downCourseWare任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-downCourseWare任意文件读取.md -------------------------------------------------------------------------------- /用友OA/用友NC-downTax存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-downTax存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-oacoSchedulerEvents接口存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-oacoSchedulerEvents接口存在sql注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-pagesServlet存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-pagesServlet存在SQL注入.md -------------------------------------------------------------------------------- /用友OA/用友NC-runStateServlet接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-runStateServlet接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-saveDoc.ajax存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-saveDoc.ajax存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-showcontent接口存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-showcontent接口存在sql注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-uploadControl接口存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-uploadControl接口存在文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-warningDetailInfo接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-warningDetailInfo接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC-workflowImageServlet接口存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC-workflowImageServlet接口存在sql注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NCCloud系统runScript存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NCCloud系统runScript存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC_CLOUD_smartweb2.RPC.d_XML外部实体注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC_CLOUD_smartweb2.RPC.d_XML外部实体注入.md -------------------------------------------------------------------------------- /用友OA/用友NC_Cloud_soapFormat.ajax接口存在XXE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC_Cloud_soapFormat.ajax接口存在XXE.md -------------------------------------------------------------------------------- /用友OA/用友NC_grouptemplet文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC_grouptemplet文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC_saveImageServlet接口存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC_saveImageServlet接口存在文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC接口ConfigResourceServlet存在反序列漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC接口ConfigResourceServlet存在反序列漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC接口PaWfm存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC接口PaWfm存在sql注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC接口download存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC接口download存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC接口saveXmlToFIleServlet存在文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC接口saveXmlToFIleServlet存在文件上传.md -------------------------------------------------------------------------------- /用友OA/用友NC的download文件存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC的download文件存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC系统FileManager接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC系统FileManager接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC系统linkVoucher存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC系统linkVoucher存在sql注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC系统printBill接口存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC系统printBill接口存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC系统registerServlet接口存在JNDI注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC系统registerServlet接口存在JNDI注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友NC系统接口link存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友NC系统接口link存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8 Cloud-ArchiveVerify存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8 Cloud-ArchiveVerify存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8+CRM系统leadconversion.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8+CRM系统leadconversion.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8-CRM系统chkService.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8-CRM系统chkService.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8-CRM系统接口attrlist存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8-CRM系统接口attrlist存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8-Cloud upload任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8-Cloud upload任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8-Cloud接口FileManageServlet存在反序列漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8-Cloud接口FileManageServlet存在反序列漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8-Cloud接口FileServlet存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8-Cloud接口FileServlet存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8-Cloud系统XChangeServlet接口存在XXE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8-Cloud系统XChangeServlet接口存在XXE漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8-OA协同工作系统doUpload.jsp任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8-OA协同工作系统doUpload.jsp任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8-cloud RegisterServlet接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8-cloud RegisterServlet接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8GRP-fastjson漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8GRP-fastjson漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U8_Cloud-base64存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U8_Cloud-base64存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U9-PatchFile.asmx接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U9-PatchFile.asmx接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U9-UMWebService.asmx存在文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U9-UMWebService.asmx存在文件读取漏洞.md -------------------------------------------------------------------------------- /用友OA/用友U9系统DoQuery接口存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友U9系统DoQuery接口存在SQL注入.md -------------------------------------------------------------------------------- /用友OA/用友Ufida-ELTextFile.load.d任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友Ufida-ELTextFile.load.d任意文件读取漏洞.md -------------------------------------------------------------------------------- /用友OA/用友crm-swfupload接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友crm-swfupload接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友crm客户关系管理help.php存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友crm客户关系管理help.php存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /用友OA/用友nc-cloud RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友nc-cloud RCE.md -------------------------------------------------------------------------------- /用友OA/用友nc电子采购信息系统securitycheck存在sql注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友nc电子采购信息系统securitycheck存在sql注入.md -------------------------------------------------------------------------------- /用友OA/用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞.md -------------------------------------------------------------------------------- /用友OA/用友u9系统接口GetConnectionString存在信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友u9系统接口GetConnectionString存在信息泄露漏洞.md -------------------------------------------------------------------------------- /用友OA/用友政务财务系统FileDownload存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友政务财务系统FileDownload存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /用友OA/用友时空KSOA-imagefield接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友时空KSOA-imagefield接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友时空KSOA-linkadd.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友时空KSOA-linkadd.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友时空KSOA系统接口PreviewKPQT.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友时空KSOA系统接口PreviewKPQT.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友时空KSOA系统接口PrintZP.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友时空KSOA系统接口PrintZP.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友时空KSOA系统接口PrintZPFB.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友时空KSOA系统接口PrintZPFB.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友时空KSOA系统接口PrintZPYG.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友时空KSOA系统接口PrintZPYG.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友时空KSOA系统接口PrintZPZP.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友时空KSOA系统接口PrintZPZP.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友时空KSOA系统接口fillKP.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友时空KSOA系统接口fillKP.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友智石开PLM-getWorkGroups存在信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友智石开PLM-getWorkGroups存在信息泄露漏洞.md -------------------------------------------------------------------------------- /用友OA/用友畅捷通-TPlus-CheckMutex存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友畅捷通-TPlus-CheckMutex存在sql注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友畅捷通-TPlus系统接口ajaxpro存在ssrf漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友畅捷通-TPlus系统接口ajaxpro存在ssrf漏洞.md -------------------------------------------------------------------------------- /用友OA/用友畅捷通CRM-create_site.phpSQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友畅捷通CRM-create_site.phpSQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友畅捷通RRATableController存在反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友畅捷通RRATableController存在反序列化漏洞.md -------------------------------------------------------------------------------- /用友OA/用友畅捷通TPlus-DownloadProxy.aspx任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友畅捷通TPlus-DownloadProxy.aspx任意文件读取漏洞.md -------------------------------------------------------------------------------- /用友OA/用友畅捷通TPlus-InitServerInfo存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友畅捷通TPlus-InitServerInfo存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友畅捷通TPlus-keyEdit.aspx接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友畅捷通TPlus-keyEdit.aspx接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/用友移动管理平台uploadIcon任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友移动管理平台uploadIcon任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/用友移动系统管理getFileLocal接口存在任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友移动系统管理getFileLocal接口存在任意文件读取.md -------------------------------------------------------------------------------- /用友OA/用友移动系统管理uploadApk接口存在任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友移动系统管理uploadApk接口存在任意文件上传.md -------------------------------------------------------------------------------- /用友OA/用友系统-U9企业版存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/用友系统-U9企业版存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /用友OA/畅捷通CRM系统newleadset.php接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/畅捷通CRM系统newleadset.php接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友OA/畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /用友OA/畅捷通TPlus-KeyInfoList.aspx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/用友OA/畅捷通TPlus-KeyInfoList.aspx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /申瓯通信在线录音管理系统/申瓯通信在线录音管理系统Thinkphp远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/申瓯通信在线录音管理系统/申瓯通信在线录音管理系统Thinkphp远程代码执行漏洞.md -------------------------------------------------------------------------------- /申瓯通信在线录音管理系统/申瓯通信在线录音管理系统download任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/申瓯通信在线录音管理系统/申瓯通信在线录音管理系统download任意文件读取漏洞.md -------------------------------------------------------------------------------- /电信网关配置管理/电信网关配置管理后台del_file.php接口存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/电信网关配置管理/电信网关配置管理后台del_file.php接口存在命令执行漏洞.md -------------------------------------------------------------------------------- /电信网关配置管理/电信网关配置管理后台ipping.php存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/电信网关配置管理/电信网关配置管理后台ipping.php存在命令执行漏洞.md -------------------------------------------------------------------------------- /电信网关配置管理/电信网关配置管理后台rewrite.php接口存在文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/电信网关配置管理/电信网关配置管理后台rewrite.php接口存在文件上传漏洞.md -------------------------------------------------------------------------------- /真内控国产化开发平台/真内控国产化开发平台接口preview任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/真内控国产化开发平台/真内控国产化开发平台接口preview任意文件读取漏洞.md -------------------------------------------------------------------------------- /睿因Wavlink/睿因 Wavlink WL_WNJ575A3 远程命令执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/睿因Wavlink/睿因 Wavlink WL_WNJ575A3 远程命令执行.md -------------------------------------------------------------------------------- /短剧影视小程序/短剧影视小程序前台juhecurl任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/短剧影视小程序/短剧影视小程序前台juhecurl任意文件读取漏洞.md -------------------------------------------------------------------------------- /短剧影视小程序/短剧影视小程序前台未授权漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/短剧影视小程序/短剧影视小程序前台未授权漏洞.md -------------------------------------------------------------------------------- /碧海威/碧海威L7产品confirm存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/碧海威/碧海威L7产品confirm存在命令执行漏洞.md -------------------------------------------------------------------------------- /社交系统/某仿soul欲音社交系统存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/社交系统/某仿soul欲音社交系统存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /禅道/禅道 16.5 router.class.php SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/禅道/禅道 16.5 router.class.php SQL注入漏洞.md -------------------------------------------------------------------------------- /禅道/禅道 v18.0-v18.3 存在后台命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/禅道/禅道 v18.0-v18.3 存在后台命令执行漏洞.md -------------------------------------------------------------------------------- /禅道/禅道18.5存在后台命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/禅道/禅道18.5存在后台命令执行漏洞.md -------------------------------------------------------------------------------- /禅道/禅道项目管理系统身份认证绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/禅道/禅道项目管理系统身份认证绕过漏洞.md -------------------------------------------------------------------------------- /福建科立讯通信/福建科立讯通信有限公司指挥调度管理平台RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/福建科立讯通信/福建科立讯通信有限公司指挥调度管理平台RCE.md -------------------------------------------------------------------------------- /私有云管理平台/私有云管理平台存在登录绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/私有云管理平台/私有云管理平台存在登录绕过漏洞.md -------------------------------------------------------------------------------- /科荣AIO/科荣 AIO任意文件上传-目录遍历-任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/科荣AIO/科荣 AIO任意文件上传-目录遍历-任意文件读取漏洞.md -------------------------------------------------------------------------------- /科荣AIO/科荣AIO-ReadFile存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/科荣AIO/科荣AIO-ReadFile存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /科荣AIO/科荣AIO-moffice接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/科荣AIO/科荣AIO-moffice接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /科荣AIO/科荣AIO管理系统endTime参数存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/科荣AIO/科荣AIO管理系统endTime参数存在SQL注入漏洞.md -------------------------------------------------------------------------------- /科荣AIO/科荣AIO系统接口UtilServlet存在代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/科荣AIO/科荣AIO系统接口UtilServlet存在代码执行漏洞.md -------------------------------------------------------------------------------- /章管家-印章智慧管理平台/章管家list.htm存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/章管家-印章智慧管理平台/章管家list.htm存在SQL注入漏洞.md -------------------------------------------------------------------------------- /章管家-印章智慧管理平台/章管家updatePwd.htm存在任意账号密码重置漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/章管家-印章智慧管理平台/章管家updatePwd.htm存在任意账号密码重置漏洞.md -------------------------------------------------------------------------------- /章管家-印章智慧管理平台/章管家前台任意文件上传漏洞(XVE-2024-19042).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/章管家-印章智慧管理平台/章管家前台任意文件上传漏洞(XVE-2024-19042).md -------------------------------------------------------------------------------- /红帆OA/红帆OA iorepsavexml.aspx 文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/红帆OA/红帆OA iorepsavexml.aspx 文件上传漏洞.md -------------------------------------------------------------------------------- /红帆OA/红帆OA zyy_AttFile.asmx SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/红帆OA/红帆OA zyy_AttFile.asmx SQL注入漏洞.md -------------------------------------------------------------------------------- /红帆OA/红帆ioffice-udfGetDocStep.asmx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/红帆OA/红帆ioffice-udfGetDocStep.asmx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /红海云eHR/红海云eHR-PtFjk.mob存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/红海云eHR/红海云eHR-PtFjk.mob存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /红海云eHR/红海云eHR系统kgFile.mob存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/红海云eHR/红海云eHR系统kgFile.mob存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /红海云eHR/红海云eHR系统pc.mob存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/红海云eHR/红海云eHR系统pc.mob存在sql注入漏洞.md -------------------------------------------------------------------------------- /绿盟/某盟 SAS堡垒机 local_user.php 任意用户登录漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/绿盟/某盟 SAS堡垒机 local_user.php 任意用户登录漏洞.md -------------------------------------------------------------------------------- /绿盟/某盟 SAS堡垒机 漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/绿盟/某盟 SAS堡垒机 漏洞.md -------------------------------------------------------------------------------- /绿盟/某盟sas安全审计系统任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/绿盟/某盟sas安全审计系统任意文件读取漏洞.md -------------------------------------------------------------------------------- /绿盟/绿盟 NF 下一代防火墙 任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/绿盟/绿盟 NF 下一代防火墙 任意文件上传漏洞.md -------------------------------------------------------------------------------- /绿盟/绿盟日志审计系统存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/绿盟/绿盟日志审计系统存在命令执行漏洞.md -------------------------------------------------------------------------------- /网动统一通信平台/网动统一通信平台ActiveUC存在任意文件下载漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/网动统一通信平台/网动统一通信平台ActiveUC存在任意文件下载漏洞.md -------------------------------------------------------------------------------- /网御星云/网御ACM上网行为管理系统bottomframe.cgi存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/网御星云/网御ACM上网行为管理系统bottomframe.cgi存在SQL注入漏洞.md -------------------------------------------------------------------------------- /网御星云/网御VPN安全网关存在任意文件下载漏洞(CNVD-2024-34014).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/网御星云/网御VPN安全网关存在任意文件下载漏洞(CNVD-2024-34014).md -------------------------------------------------------------------------------- /网神/某神SecSSL3600安全接入网关系统任意密码修改漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/网神/某神SecSSL3600安全接入网关系统任意密码修改漏洞.md -------------------------------------------------------------------------------- /网神/网神SecGate3600未授权添加用户漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/网神/网神SecGate3600未授权添加用户漏洞.md -------------------------------------------------------------------------------- /网神/网神防火墙 app_av_import_save文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/网神/网神防火墙 app_av_import_save文件上传漏洞.md -------------------------------------------------------------------------------- /网络验证系/网络验证系统getInfo参数存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/网络验证系/网络验证系统getInfo参数存在SQL注入漏洞.md -------------------------------------------------------------------------------- /网课交单平台/29网课交单平台epay.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/网课交单平台/29网课交单平台epay.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /翰智员工服务平台/翰智员工服务平台loginByPassword存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/翰智员工服务平台/翰智员工服务平台loginByPassword存在SQL注入漏洞.md -------------------------------------------------------------------------------- /联奕统一身份认证平台/联奕统一身份认证平台getDataSource存在信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/联奕统一身份认证平台/联奕统一身份认证平台getDataSource存在信息泄露漏洞.md -------------------------------------------------------------------------------- /联想网盘/联想网盘存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/联想网盘/联想网盘存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /联软/联软安全数据交换系统任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/联软/联软安全数据交换系统任意文件读取.md -------------------------------------------------------------------------------- /联软/联软安渡UniNXG安全数据交换系统poserver.zz存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/联软/联软安渡UniNXG安全数据交换系统poserver.zz存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /联软/联软安渡系统接口queryLinklnfo存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/联软/联软安渡系统接口queryLinklnfo存在SQL注入漏洞.md -------------------------------------------------------------------------------- /联达OA/联达OA uploadLogo.aspx存在任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/联达OA/联达OA uploadLogo.aspx存在任意文件上传.md -------------------------------------------------------------------------------- /联达OA/联达OA-UpLoadFile.aspx存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/联达OA/联达OA-UpLoadFile.aspx存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /脸爱云一脸通智慧管理平台/脸爱云 一脸通智慧管理平台任意用户添加漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/脸爱云一脸通智慧管理平台/脸爱云 一脸通智慧管理平台任意用户添加漏洞.md -------------------------------------------------------------------------------- /脸爱云一脸通智慧管理平台/脸爱云一脸通智慧平台SelOperators信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/脸爱云一脸通智慧管理平台/脸爱云一脸通智慧平台SelOperators信息泄露漏洞.md -------------------------------------------------------------------------------- /致远OA/致远M1 usertokenservice 反序列化RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远M1 usertokenservice 反序列化RCE漏洞.md -------------------------------------------------------------------------------- /致远OA/致远M3敏感信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远M3敏感信息泄露漏洞.md -------------------------------------------------------------------------------- /致远OA/致远OA M3 Server 反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远OA M3 Server 反序列化漏洞.md -------------------------------------------------------------------------------- /致远OA/致远OA wpsAssistServlet任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远OA wpsAssistServlet任意文件读取漏洞.md -------------------------------------------------------------------------------- /致远OA/致远OA-A8-V5接口officeservlet存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远OA-A8-V5接口officeservlet存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /致远OA/致远OA-ucpcLogin密码重置漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远OA-ucpcLogin密码重置漏洞.md -------------------------------------------------------------------------------- /致远OA/致远OAV52019系统properties信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远OAV52019系统properties信息泄露漏洞.md -------------------------------------------------------------------------------- /致远OA/致远OA_V8.1SP2文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远OA_V8.1SP2文件上传漏洞.md -------------------------------------------------------------------------------- /致远OA/致远OA_getAjaxDataServlet接口存在任XXE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远OA_getAjaxDataServlet接口存在任XXE漏洞.md -------------------------------------------------------------------------------- /致远OA/致远OA任意管理员登录.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远OA任意管理员登录.md -------------------------------------------------------------------------------- /致远OA/致远OA前台任意用户密码修改漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远OA前台任意用户密码修改漏洞.md -------------------------------------------------------------------------------- /致远OA/致远OA帆软组件ReportServer目录遍历漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远OA帆软组件ReportServer目录遍历漏洞.md -------------------------------------------------------------------------------- /致远OA/致远OA系统constDef接口存在代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远OA系统constDef接口存在代码执行漏洞.md -------------------------------------------------------------------------------- /致远OA/致远oa系统saveFormula4Cloud存在JNDI注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远oa系统saveFormula4Cloud存在JNDI注入.md -------------------------------------------------------------------------------- /致远OA/致远互联-OA前台fileUpload.do存在绕过文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远互联-OA前台fileUpload.do存在绕过文件上传漏洞.md -------------------------------------------------------------------------------- /致远OA/致远互联AnalyticsCloud分析云存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远互联AnalyticsCloud分析云存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /致远OA/致远互联FE协作办公平台apprvaddNew存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远互联FE协作办公平台apprvaddNew存在sql注入漏洞.md -------------------------------------------------------------------------------- /致远OA/致远互联FE协作办公平台editflow_manager存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远互联FE协作办公平台editflow_manager存在sql注入漏洞.md -------------------------------------------------------------------------------- /致远OA/致远互联FE协作办公平台ncsubjass存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远互联FE协作办公平台ncsubjass存在SQL注入.md -------------------------------------------------------------------------------- /致远OA/致远前台任意用户密码修改.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/致远OA/致远前台任意用户密码修改.md -------------------------------------------------------------------------------- /菠菜/万豪娱乐存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/菠菜/万豪娱乐存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /菠菜/彩票系统存在任意文件preview.php上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/菠菜/彩票系统存在任意文件preview.php上传漏洞.md -------------------------------------------------------------------------------- /蓝凌OA/某凌OA前台代码执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蓝凌OA/某凌OA前台代码执行.md -------------------------------------------------------------------------------- /蓝凌OA/蓝凌EIS智慧协同平台saveImg接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蓝凌OA/蓝凌EIS智慧协同平台saveImg接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /蓝凌OA/蓝凌EIS智慧协同平台多个接口SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蓝凌OA/蓝凌EIS智慧协同平台多个接口SQL注入.md -------------------------------------------------------------------------------- /蓝凌OA/蓝凌EKP前台授权绕过导致文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蓝凌OA/蓝凌EKP前台授权绕过导致文件上传.md -------------------------------------------------------------------------------- /蓝凌OA/蓝凌EKP系统dataxml.tmpl存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蓝凌OA/蓝凌EKP系统dataxml.tmpl存在命令执行漏洞.md -------------------------------------------------------------------------------- /蓝凌OA/蓝凌KEP前台RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蓝凌OA/蓝凌KEP前台RCE漏洞.md -------------------------------------------------------------------------------- /蓝凌OA/蓝凌OA treexml.tmpl 远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蓝凌OA/蓝凌OA treexml.tmpl 远程命令执行漏洞.md -------------------------------------------------------------------------------- /蓝凌OA/蓝凌OA-WechatLoginHelper.do存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蓝凌OA/蓝凌OA-WechatLoginHelper.do存在SQL注入漏洞.md -------------------------------------------------------------------------------- /蓝凌OA/蓝凌OAsysUiComponent 文件存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蓝凌OA/蓝凌OAsysUiComponent 文件存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /蓝海卓越计费管理系统/蓝海卓越计费管理系统SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蓝海卓越计费管理系统/蓝海卓越计费管理系统SQL注入漏洞.md -------------------------------------------------------------------------------- /蓝海卓越计费管理系统/蓝海卓越计费管理系统存在debug.php远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蓝海卓越计费管理系统/蓝海卓越计费管理系统存在debug.php远程命令执行漏洞.md -------------------------------------------------------------------------------- /蜂信物联/蜂信物联(FastBee)物联网平台download存在任意文件下载漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/蜂信物联/蜂信物联(FastBee)物联网平台download存在任意文件下载漏洞.md -------------------------------------------------------------------------------- /西软云/西软云XMS-futurehotel-operate接口存在XXE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/西软云/西软云XMS-futurehotel-operate接口存在XXE漏洞.md -------------------------------------------------------------------------------- /西软云/西软云XMS-futurehotel-query接口存在XXE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/西软云/西软云XMS-futurehotel-query接口存在XXE漏洞.md -------------------------------------------------------------------------------- /西软云/西软云XMS反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/西软云/西软云XMS反序列化漏洞.md -------------------------------------------------------------------------------- /誉龙数字/誉龙视音频综合管理平台FindById存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/誉龙数字/誉龙视音频综合管理平台FindById存在SQL注入漏洞.md -------------------------------------------------------------------------------- /誉龙数字/誉龙视音频综合管理平台TimeSyn存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/誉龙数字/誉龙视音频综合管理平台TimeSyn存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /资管云/百易云资产管理运营系统house.save.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/资管云/百易云资产管理运营系统house.save.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /资管云/百易云资产管理运营系统ticket.edit.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/资管云/百易云资产管理运营系统ticket.edit.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /赛思/赛思 SuccezBl前台任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/赛思/赛思 SuccezBl前台任意文件上传.md -------------------------------------------------------------------------------- /赛蓝企业管理系统/赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/赛蓝企业管理系统/赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞.md -------------------------------------------------------------------------------- /赛蓝企业管理系统/赛蓝企业管理系统DownloadBuilder任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/赛蓝企业管理系统/赛蓝企业管理系统DownloadBuilder任意文件读取漏洞.md -------------------------------------------------------------------------------- /赛蓝企业管理系统/赛蓝企业管理系统GetCssFile存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/赛蓝企业管理系统/赛蓝企业管理系统GetCssFile存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /赛蓝企业管理系统/赛蓝企业管理系统GetJSFile存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/赛蓝企业管理系统/赛蓝企业管理系统GetJSFile存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /赛蓝企业管理系统/赛蓝企业管理系统ReadTxtLog存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/赛蓝企业管理系统/赛蓝企业管理系统ReadTxtLog存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /赛蓝企业管理系统/赛蓝企业管理系统SubmitUploadify存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/赛蓝企业管理系统/赛蓝企业管理系统SubmitUploadify存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /超易企业管理系统/超易企业管理系统Login.ashx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/超易企业管理系统/超易企业管理系统Login.ashx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /超级猫签名APP分发平台/超级猫签名APP分发平台前台存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/超级猫签名APP分发平台/超级猫签名APP分发平台前台存在SQL注入漏洞.md -------------------------------------------------------------------------------- /超级猫签名APP分发平台/超级猫签名APP分发平台前台远程文件写入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/超级猫签名APP分发平台/超级猫签名APP分发平台前台远程文件写入漏洞.md -------------------------------------------------------------------------------- /路由器/AC集中管理平台未授权漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/AC集中管理平台未授权漏洞.md -------------------------------------------------------------------------------- /路由器/ALR-F800存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/ALR-F800存在命令执行漏洞.md -------------------------------------------------------------------------------- /路由器/CERIO-DT系列路由器Save.cgi接口存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/CERIO-DT系列路由器Save.cgi接口存在命令执行漏洞.md -------------------------------------------------------------------------------- /路由器/Netgear路由器boardDataWW.php存在RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/Netgear路由器boardDataWW.php存在RCE漏洞.md -------------------------------------------------------------------------------- /路由器/T18-1TOTOLINK-A6000R-远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/T18-1TOTOLINK-A6000R-远程命令执行漏洞.md -------------------------------------------------------------------------------- /路由器/TOTOLINK A3700R命令执行漏洞CVE-2023-46574.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/TOTOLINK A3700R命令执行漏洞CVE-2023-46574.md -------------------------------------------------------------------------------- /路由器/TP-Link-ER7206存在命令注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/TP-Link-ER7206存在命令注入漏洞.md -------------------------------------------------------------------------------- /路由器/Telesquare路由器RCE(CVE-2024-29269).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/Telesquare路由器RCE(CVE-2024-29269).md -------------------------------------------------------------------------------- /路由器/WIFISKY-7层流控路由器confirm.php接口处存在RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/WIFISKY-7层流控路由器confirm.php接口处存在RCE漏洞.md -------------------------------------------------------------------------------- /路由器/draytek路由器addrouting命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/draytek路由器addrouting命令执行漏洞.md -------------------------------------------------------------------------------- /路由器/中移铁通禹路由器信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/中移铁通禹路由器信息泄露漏洞.md -------------------------------------------------------------------------------- /路由器/极企智能办公路由接口jumper.php存在RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/路由器/极企智能办公路由接口jumper.php存在RCE漏洞.md -------------------------------------------------------------------------------- /辰信景云终端安全管理系统/某信景云终端安全管理系统存在loginSQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/辰信景云终端安全管理系统/某信景云终端安全管理系统存在loginSQL注入漏洞.md -------------------------------------------------------------------------------- /迈普多业务融合网关/迈普多业务融合网关send_order.cgi存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/迈普多业务融合网关/迈普多业务融合网关send_order.cgi存在命令执行漏洞.md -------------------------------------------------------------------------------- /远秋医学培训系统/远秋医学培训系统未授权查看密码.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/远秋医学培训系统/远秋医学培训系统未授权查看密码.md -------------------------------------------------------------------------------- /迪普/迪普DPTech VPN 任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/迪普/迪普DPTech VPN 任意文件读取.md -------------------------------------------------------------------------------- /通天星/通天星CMSV6接口pointManage存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通天星/通天星CMSV6接口pointManage存在SQL注入.md -------------------------------------------------------------------------------- /通天星/通天星CMSV6车载视频监控平台SESSION伪造漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通天星/通天星CMSV6车载视频监控平台SESSION伪造漏洞.md -------------------------------------------------------------------------------- /通天星/通天星CMSV6车载视频监控平台disable存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通天星/通天星CMSV6车载视频监控平台disable存在SQL注入.md -------------------------------------------------------------------------------- /通天星/通天星CMSV6车载视频监控平台xz_center信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通天星/通天星CMSV6车载视频监控平台xz_center信息泄露漏洞.md -------------------------------------------------------------------------------- /通天星/鸿运(通天星CMSV6车载)主动安全监控云平台存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通天星/鸿运(通天星CMSV6车载)主动安全监控云平台存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /通达OA/通达OA down.php接口存在未授权访问漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通达OA/通达OA down.php接口存在未授权访问漏洞.md -------------------------------------------------------------------------------- /通达OA/通达OA get_datas.php前台sql注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通达OA/通达OA get_datas.php前台sql注入.md -------------------------------------------------------------------------------- /通达OA/通达OA header身份认证绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通达OA/通达OA header身份认证绕过漏洞.md -------------------------------------------------------------------------------- /通达OA/通达OA sql注入漏洞 CVE-2023-4165.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通达OA/通达OA sql注入漏洞 CVE-2023-4165.md -------------------------------------------------------------------------------- /通达OA/通达OA sql注入漏洞 CVE-2023-4166.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通达OA/通达OA sql注入漏洞 CVE-2023-4166.md -------------------------------------------------------------------------------- /通达OA/通达OA-WHERE_STR存在前台SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通达OA/通达OA-WHERE_STR存在前台SQL注入漏洞.md -------------------------------------------------------------------------------- /通达OA/通达OAV11.10接口login.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/通达OA/通达OAV11.10接口login.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /速达软件/速达软件全系产品存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/速达软件/速达软件全系产品存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA jc6 clobfield SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA jc6 clobfield SQL注入漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA-C6-download.jsp任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA-C6-download.jsp任意文件读取漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA-C6协同管理平台DBModules.aspx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA-C6协同管理平台DBModules.aspx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA-C6接口DownLoadBgImage存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA-C6接口DownLoadBgImage存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OAC6-FileDownLoad.aspx任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OAC6-FileDownLoad.aspx任意文件读取漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OAC6-GetSqlData.aspx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OAC6-GetSqlData.aspx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA_CarCardInfo.aspx_SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA_CarCardInfo.aspx_SQL注入漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA_HomeService.asmxSQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA_HomeService.asmxSQL注入.md -------------------------------------------------------------------------------- /金和OA/金和OA_MailTemplates.aspx_SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA_MailTemplates.aspx_SQL注入漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA_SAP_B1Config.aspx未授权访问漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA_SAP_B1Config.aspx未授权访问漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA_jc6_Upload任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA_jc6_Upload任意文件上传.md -------------------------------------------------------------------------------- /金和OA/金和OA_jc6_ntko-upload任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA_jc6_ntko-upload任意文件上传漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA_upload_json.asp存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA_upload_json.asp存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA_uploadfileeditorsave接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA_uploadfileeditorsave接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA任意文件读取漏洞.md -------------------------------------------------------------------------------- /金和OA/金和OA系统接口SignUpload.ashx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金和OA/金和OA系统接口SignUpload.ashx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /金山/金山EDR RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金山/金山EDR RCE漏洞.md -------------------------------------------------------------------------------- /金山/金山WPS RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金山/金山WPS RCE.md -------------------------------------------------------------------------------- /金山/金山云EDR任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金山/金山云EDR任意文件上传漏洞.md -------------------------------------------------------------------------------- /金山/金山终端安全系统V9.0 SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金山/金山终端安全系统V9.0 SQL注入漏洞.md -------------------------------------------------------------------------------- /金山/金山终端安全系统V9任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金山/金山终端安全系统V9任意文件上传漏洞.md -------------------------------------------------------------------------------- /金慧/金慧综合管理信息系统LoginBegin.aspx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金慧/金慧综合管理信息系统LoginBegin.aspx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /金斗云/金斗云-HKMP智慧商业软件download任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金斗云/金斗云-HKMP智慧商业软件download任意文件读取漏洞.md -------------------------------------------------------------------------------- /金斗云/金斗云-HKMP智慧商业软件任意用户添加漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金斗云/金斗云-HKMP智慧商业软件任意用户添加漏洞.md -------------------------------------------------------------------------------- /金盘移动图书馆系统/金盘移动图书馆系统存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金盘移动图书馆系统/金盘移动图书馆系统存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /金蝶/金蝶Apusic应用服务器loadTree JNDI注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金蝶/金蝶Apusic应用服务器loadTree JNDI注入漏洞.md -------------------------------------------------------------------------------- /金蝶/金蝶Apusic应用服务器任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金蝶/金蝶Apusic应用服务器任意文件上传.md -------------------------------------------------------------------------------- /金蝶/金蝶EAS myUploadFile任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金蝶/金蝶EAS myUploadFile任意文件上传.md -------------------------------------------------------------------------------- /金蝶/金蝶EAS_pdfviewlocal任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金蝶/金蝶EAS_pdfviewlocal任意文件读取漏洞.md -------------------------------------------------------------------------------- /金蝶/金蝶OA-EAS系统 uploadLogo.action 任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金蝶/金蝶OA-EAS系统 uploadLogo.action 任意文件上传漏洞.md -------------------------------------------------------------------------------- /金蝶/金蝶OA云星空 ScpSupRegHandler 任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金蝶/金蝶OA云星空 ScpSupRegHandler 任意文件上传漏洞.md -------------------------------------------------------------------------------- /金蝶/金蝶云-星空ServiceGateway反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金蝶/金蝶云-星空ServiceGateway反序列化漏洞.md -------------------------------------------------------------------------------- /金蝶/金蝶云星空 CommonFileserver 任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金蝶/金蝶云星空 CommonFileserver 任意文件读取漏洞.md -------------------------------------------------------------------------------- /金蝶/金蝶云星空UserService反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金蝶/金蝶云星空UserService反序列化漏洞.md -------------------------------------------------------------------------------- /金蝶/金蝶星空云K3Cloud反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/金蝶/金蝶星空云K3Cloud反序列化漏洞.md -------------------------------------------------------------------------------- /铭飞/铭飞CMS list接口存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/铭飞/铭飞CMS list接口存在SQL注入.md -------------------------------------------------------------------------------- /铭飞/铭飞CMS-search接口存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/铭飞/铭飞CMS-search接口存在sql注入漏洞.md -------------------------------------------------------------------------------- /铭飞/铭飞MCMS接口upload.do存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/铭飞/铭飞MCMS接口upload.do存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /锐捷/RG-UAC锐捷统一上网行为管理与审计系统存在远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/锐捷/RG-UAC锐捷统一上网行为管理与审计系统存在远程代码执行漏洞.md -------------------------------------------------------------------------------- /锐捷/锐捷 NBR 路由器 fileupload.php 任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/锐捷/锐捷 NBR 路由器 fileupload.php 任意文件上传漏洞.md -------------------------------------------------------------------------------- /锐捷/锐捷-EG易网关存在RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/锐捷/锐捷-EG易网关存在RCE漏洞.md -------------------------------------------------------------------------------- /锐捷/锐捷NBR系列路由器存在管理员密码重置漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/锐捷/锐捷NBR系列路由器存在管理员密码重置漏洞.md -------------------------------------------------------------------------------- /锐捷/锐捷RG-EW1200G无线路由器登录绕过.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/锐捷/锐捷RG-EW1200G无线路由器登录绕过.md -------------------------------------------------------------------------------- /锐捷/锐捷RG-NBS2026G-P交换机WEB管理ping.htm未授权访问漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/锐捷/锐捷RG-NBS2026G-P交换机WEB管理ping.htm未授权访问漏洞.md -------------------------------------------------------------------------------- /锐捷/锐捷RG-UAC统一上网行为管理与审计系统管理员密码泄露.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/锐捷/锐捷RG-UAC统一上网行为管理与审计系统管理员密码泄露.md -------------------------------------------------------------------------------- /锐捷/锐捷RG-UAC统一上网行为管理审计系统online.php存在远程代码执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/锐捷/锐捷RG-UAC统一上网行为管理审计系统online.php存在远程代码执行.md -------------------------------------------------------------------------------- /锐捷/锐捷上网行为管理系统static_convert.php存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/锐捷/锐捷上网行为管理系统static_convert.php存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /锐捷/锐捷网络flwo.control.php存在RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/锐捷/锐捷网络flwo.control.php存在RCE漏洞.md -------------------------------------------------------------------------------- /锐捷/锐捷网络无线AC命令执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/锐捷/锐捷网络无线AC命令执行.md -------------------------------------------------------------------------------- /防火墙产品/多个防火墙产品RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/防火墙产品/多个防火墙产品RCE.md -------------------------------------------------------------------------------- /青藤云 EDR/青藤云 EDR 权限提升漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/青藤云 EDR/青藤云 EDR 权限提升漏洞.md -------------------------------------------------------------------------------- /顺景ERP/顺景ERP管理系统UploadInvtSpFile存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/顺景ERP/顺景ERP管理系统UploadInvtSpFile存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /风速科技统一认证平台/风速科技统一认证平台存在密码重置漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/风速科技统一认证平台/风速科技统一认证平台存在密码重置漏洞.md -------------------------------------------------------------------------------- /飞企互联/⻜企互联loginService任意登录.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/飞企互联/⻜企互联loginService任意登录.md -------------------------------------------------------------------------------- /飞企互联/飞企互联 FE 业务协作平台存在参数文件读取漏洞 .md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/飞企互联/飞企互联 FE 业务协作平台存在参数文件读取漏洞 .md -------------------------------------------------------------------------------- /飞企互联/飞企互联-FE企业运营管理平台treeXml.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/飞企互联/飞企互联-FE企业运营管理平台treeXml.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /飞企互联/飞企互联-FE企业运营管理平台登录绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/飞企互联/飞企互联-FE企业运营管理平台登录绕过漏洞.md -------------------------------------------------------------------------------- /飞企互联/飞企互联Ognl表达式注入导致RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/飞企互联/飞企互联Ognl表达式注入导致RCE.md -------------------------------------------------------------------------------- /飞讯云/飞讯云MyImportData前台SQL注入(XVE-2024-18113).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/飞讯云/飞讯云MyImportData前台SQL注入(XVE-2024-18113).md -------------------------------------------------------------------------------- /飞鱼星/飞鱼星上网行为管理系统企业版前台RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/飞鱼星/飞鱼星上网行为管理系统企业版前台RCE.md -------------------------------------------------------------------------------- /驰骋BPM/驰骋BPM系统存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/驰骋BPM/驰骋BPM系统存在SQL注入漏洞.md -------------------------------------------------------------------------------- /魅思视频管理系统/魅思视频管理系统getOrderStatus存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/魅思视频管理系统/魅思视频管理系统getOrderStatus存在SQL注入漏洞.md -------------------------------------------------------------------------------- /魔方网表/魔方网表mailupdate.jsp接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Sec-Fork/POC-20241008/HEAD/魔方网表/魔方网表mailupdate.jsp接口存在任意文件上传漏洞.md --------------------------------------------------------------------------------