├── README.md ├── go ├── ACTI_camera_images_File_read.go ├── AceNet_AceReporter_Report_component_Arbitrary_file_download.go ├── D_Link_Dir_645_getcfg.php_Account_password_disclosure_CVE_2019_17506.go ├── D_Link_ShareCenter_DNS_320_system_mgr.cgi_RCE.go ├── ESAFENET_DLP_dataimport_RCE.go ├── Elasticsearch_Remote_Code_Execution_CVE_2014_3120.go ├── Elasticsearch_Remote_Code_Execution_CVE_2015_1427.go ├── FLIR_AX8_Arbitrary_File_Download_Vulnerability_CNVD-2021-39018.go ├── ForgeRock_AM_RCE_CVE_2021_35464.go ├── H3C_HG659_lib_File_read.go ├── H3C_IMC_dynamiccontent.properties.xhtm_RCE.go ├── H3C_Next_generation_firewall_File_read.go ├── H3C_SecPath_Operation_Login_bypass.go ├── HEJIA_PEMS_SystemLog.cgi_Arbitrary_file_download.go ├── HanWang_Time_Attendance_SQL_injection.go ├── Holographic_AI_network_operation_and_maintenance_platform_RCE.go ├── Huijietong_cloud_video_fileDownload_File_read.go ├── Huijietong_cloud_video_list_Information_leakage.go ├── JEEWMS_Arbitrary_File_Read_Vulnerability.go ├── Jellyfin_Audio_File_read_CVE_2021_21402.go ├── JingHe_OA_download.asp_File_read.go ├── Kingdee_EAS_server_file_Directory_traversal.go ├── LanhaiZuoyue_system_debug.php_RCE.go ├── LanhaiZuoyue_system_download.php_File_read.go ├── Longjing_Technology_BEMS_API_1.21_Remote_Arbitrary_File_Download.go ├── Many_network_devices_have_arbitrary_file_downloads.go ├── Many_network_devices_have_password_leaks.go ├── NVS3000_integrated_video_surveillance_platform_is_not_accessible.go ├── Node_red_UI_base_Arbitrary_File_Read_Vulnerability_CVE_2021_3223.go ├── Panabit_Application_Gateway_ajax_top_backstage_RCE.go ├── Panabit_Panalog_cmdhandle.php_backstage_RCE.go ├── Panabit_iXCache_ajax_cmd_backstage_RCE.go ├── Qilai_OA_CloseMsg.aspx_SQL_injection.go ├── SECWORLD_Next_generation_firewall_pki_file_download_File_read.go ├── SPON_IP_network_intercom_broadcast_system_exportrecord.php_any_file_download.go ├── SPON_IP_network_intercom_broadcast_system_getjson.php_Arbitrary_file_read.go ├── SPON_IP_network_intercom_broadcast_system_ping.php_RCE.go ├── SPON_IP_network_intercom_broadcast_system_rj_get_token.php_any_file_read.go ├── Selea_OCR_ANPR_SeleaCamera_File_read.go ├── Selea_OCR_ANPR_get_file.php_File_read.go ├── Shenzhen_West_dieter_Technology_Co_LTD_CPE_WiFi__ping_RCE.go ├── Shenzhen_West_dieter_Technology_Co_LTD_CPE_WiFi__tracert_RCE.go ├── ShiziyuCms_ApiController.class.php_SQL_injection.go ├── ShiziyuCms_ApigoodsController.class.php_SQL_injection.go ├── ShiziyuCms_wxapp.php_File_update.go ├── ShopXO_download_File_read_CNVD_2021_15822.go ├── TamronOS_IPTV_ping_RCE.go ├── Tongda_OA_api.ali.php_RCE.go ├── TopSec_Reporter_Arbitrary_file_download_CNVD_2021_41972.go ├── Tuchuang_Library_System_Arbitrary_Reading_File_CNVD_2021_34454.go ├── WangKang_NS_ASG_cert_download.php_File_read.go ├── WangKang_Next_generation_firewall_router_RCE.go ├── Weaver_OA_E_Cology_Workflowservicexml_RCE.go ├── Weaver_e_cology_OA_XStream_RCE_CVE_2021_21350.go ├── ZZZCMS_parserSearch_RCE.go ├── ZhongQing_naibo_Education_Cloud_Platform_Information_leakage.go ├── ZhongQing_naibo_Education_Cloud_platform_reset_password.go ├── ZhongkeWangwei_Next_generation_firewall_File_read.go ├── Zhongxing_F460_web_shell_cmd.gch_RCE.go ├── dahua_DSS_Arbitrary_file_download_cnvd_2020_61986.go ├── nsoft_EWEBS_casmain.xgi_File_read.go ├── showDocGo.go ├── showDocJson.go └── xiaomi_Mi_wiFi_From_File_Read_To_Login_CVE_2019_18370.go └── json ├── 360_TianQing_ccid_SQL_injectable.json ├── 360_Tianqing_database_information_disclosure.json ├── ADSelfService_Plus_RCE_CVE_2021_40539.json ├── Active_UC_index.action_RCE.json ├── Adslr_Enterprise_online_behavior_management_system_Information_leakage.json ├── Alibaba Nacos 控制台默认弱口令.json ├── Alibaba Nacos 未授权访问漏洞.json ├── Alibaba_Nacos_Add_user_not_authorized.json ├── Alibaba_Nacos_Default_password.json ├── Apache ActiveMQ Console控制台弱口令.json ├── Apache Cocoon Xml 注入 CVE-2020-11991.json ├── Apache Kylin Console 控制台弱口令.json ├── Apache Kylin 未授权配置泄露 CVE-2020-13937.json ├── Apache Solr任意文件读取漏洞.json ├── Apache_2.4.49_Path_Traversal_CVE_2021_41773.json ├── Apache_2.4.49_RCE_CVE_2021_41773_and_2.4.50_CVE_2021_42013.json ├── Apache_APISIX_Dashboard_CVE_2021_45232.json ├── Apache_APISIX_Dashboard_RCE_CVE_2021_45232.json ├── Apache_ActiveMQ_Console_Weak_Password.json ├── Apache_Airflow_Unauthorized.json ├── Apache_Druid_Abritrary_File_Read_CVE_2021_36749.json ├── Apache_Druid_Arbitrary_File_Read_CVE_2021_36749.json ├── Apache_Druid_Log4shell_CVE_2021_44228.json ├── Apache_HTTP_Server_Arbitrary_File_Read_CVE_2021_41773.json ├── Apache_HTTP_Server_SSRF_CVE_2021_40438.json ├── Apache_JSPWiki_Log4shell_CVE_2021_44228_1.json ├── Apache_JSPWiki_Log4shell_CVE_2021_44228_2.json ├── Apache_Kylin_Console_Default_password.json ├── Apache_Kylin_Unauthorized_configuration_disclosure.json ├── Apache_OFBiz_Log4shell_CVE_2021_44228.json ├── Apache_SkyWalking_Log4shell_CVE_2021_44228.json ├── Apache_Solr_Arbitrary_File_Read.json ├── Apache_Solr_RemoteStreaming_File_Read.json ├── Aspcms_Backend_Leak.json ├── Atlassian Jira 信息泄露漏洞 CVE-2020-14181.json ├── Atlassian_Confluence_OGNL_injection_CVE_2021_26084.json ├── Atlassian_Jira_user_information_disclosure.json ├── CVE_2018_19367_.json ├── Cacti_Weathermap_File_Write.json ├── China_Mobile_Yu_Routing_Sensitive_Information_Leaks_Vulnerability.json ├── China_Mobile_Yu_routed_the_login_bypass.json ├── Citrix_Unauthorized_CVE_2020_8193.json ├── ClickHouse_SQLI.json ├── ClusterEngineV4.0_RCE_.json ├── ClusterEngine_V4.0_Shell_cluster_RCE.json ├── Coldfusion_LFI_CVE_2010_2861.json ├── Confluence_RCE_CVE_2021_26084.json ├── Consul_Rexec_RCE.json ├── Coremail_configuration_information_disclosure.json ├── Couch_CMS_Infoleak_CVE_2018_7662.json ├── Couchdb_Add_User_Not_Authorized_CVE_2017_12635.json ├── Couchdb_Unauth.json ├── CraftCMS_Seomatic_RCE_CVE_2020_9597.json ├── D-Link AC集中管理系统默认弱口令.json ├── D-Link DCS系列监控 CNVD-2020-25078.json ├── D-Link DCS系列监控 账号密码信息泄露漏洞 CNVD-2020-25078.json ├── D_Link_AC_Centralized_management_system__Default_weak_password.json ├── D_Link_DC_Disclosure_of_account_password_information.json ├── D_Link_DIR_868L_getcfg.php_Account_password_leakage.json ├── D_Link_ShareCenter_DNS_320_RCE.json ├── Datang_AC_Default_Password.json ├── DedeCMS_Carbuyaction_FileInclude.json ├── DedeCMS_InfoLeak_CVE_2018_6910.json ├── Discuz_ML_3.x_RCE__CNVD_2019_22239.json ├── Discuz_RCE_WOOYUN_2010_080723.json ├── Discuz_Wechat_Plugins_Unauth.json ├── Discuz_v72_SQLI.json ├── Dlink_850L_Info_Leak.json ├── Dlink_Info_Leak_CVE_2019_17506.json ├── Dlink_RCE_CVE_2019_16920.json ├── Docker_Registry_API_Unauth.json ├── Dubbo_Admin_Default_Password.json ├── Eyou_Mail_system_RCE.json ├── F5_BIG_IP_RCE_CVE_2021_22986_exp.json ├── Fastmeeting_Arbitrary_File_Read.json ├── FineReport_Directory_traversal.json ├── FineReport_v8.0_Arbitrary_file_read_.json ├── FineReport_v9_Arbitrary_File_Overwrite.json ├── Finetree_5MP_default_password_or_Unauthorized_user_added.json ├── GitLab Graphql邮箱信息泄露漏洞 CVE-2020-26413.json ├── GitLab_Graphql_Email_information_disclosure.json ├── GitLab_SSRF_CVE_2021_22214.json ├── Gitlab_RCE_CVE_2021_22205.json ├── Grafana_Arbitrary_file_read.json ├── Grafana_Plugins_Arbitrary_File_Read.json ├── H3C_IMC_RCE.json ├── H5S_video_platform_GetSrc_information_leakage.json ├── H5S_video_platform_GetUserInfo_Account_password_leakage.json ├── HIKVISION 视频编码设备接入网关 任意文件下载.json ├── HIKVISION_Video_coding_equipment_Download_any_file.json ├── Hikvision_RCE_CVE_2021_36260.json ├── Hsmedia_Hgateway_Default_account.json ├── IFW8_Enterprise_router_Password_leakage_.json ├── IRDM4000_Smart_station_Unauthorized_access.json ├── IceWarp_WebClient_basic_RCE.json ├── JQuery_1.7.2Version_site_foreground_arbitrary_file_download.json ├── Jellyfin_10.7.0_Unauthenticated_Abritrary_File_Read_CVE_2021_21402.json ├── Jellyfin_SSRF_CVE_2021_29490.json ├── JingHe_OA_C6_Default_password.json ├── Jinher_OA_C6_download.jsp_Arbitrary_file_read.json ├── Jinshan_V8.json ├── Jitong_EWEBS_arbitrary_file_read.json ├── Jitong_EWEBS_phpinfo_leak.json ├── KEDACOM_MTS_transcoding_server_Arbitrary_file_download_CNVD_2020_48650.json ├── Kingsoft_V8_Arbitrary_file_read.json ├── Kingsoft_V8_Default_weak_password.json ├── Konga_Default_JWT_KEY.json ├── Kyan.json ├── Kyan_Account_password_leak.json ├── Kyan_design_account_password_disclosure.json ├── Kyan_run.php_RCE.json ├── Lanproxy 目录遍历漏洞 CVE-2021-3019.json ├── Lanproxy_Arbitrary_File_Read_CVE_2021_3019.json ├── Lanproxy_Directory_traversal_CVE_2021_3019.json ├── Laravel .env 配置文件泄露 CVE-2017-16894.json ├── Laravel_.env_configuration_file_leaks_(CVE-2017-16894).json ├── Leadsec_ACM_information_leakage_CNVD_2016_08574.json ├── MPSec_ISG1000_Security_Gateway_Arbitrary_File_Download_Vulnerability.json ├── MessageSolution 邮件归档系统EEA 信息泄露漏洞 CNVD-2021-10543.json ├── MessageSolution_EEA_information_disclosure.json ├── Metabase_Geojson_Arbitrary_File_Read_CVE_2021_41277.json ├── Metabase_geojson_Arbitrary_file_reading_CVE_2021_41277.json ├── Micro_module_monitoring_system_User_list.php_information_leakage.json ├── Microsoft Exchange SSRF漏洞 CVE-2021-26885.json ├── MobileIron_Log4shell_CVE_2021_44228.json ├── Node_RED_ui_base_Arbitrary_File_Read.json ├── OpenSNS_RCE.json ├── RG_UAC.json ├── Ruijie_smartweb_password_information_disclosure.json ├── Ruijie_smartweb_weak_password.json ├── RuoYi_Druid_Unauthorized_access.json ├── SDWAN_smart_gateway_weak_password.json ├── Samsung_WLAN_AP_RCE.json ├── Samsung_WLAN_AP_WEA453e_RCE.json ├── Samsung_WLAN_AP_wea453e_router_RCE.json ├── Security_Devices_Hardcoded_Password.json ├── Seeyon_OA_A6_DownExcelBeanServlet_User_information_leakage.json ├── Seeyon_OA_A6__Disclosure_of_database_sensitive_information.json ├── Seeyon_OA_A6_initDataAssess.jsp_User_information_leakage.json ├── Seeyon_OA_A6_setextno.jsp_SQL_injection.json ├── Seeyon_OA_A6_test.jsp_SQL_injection.json ├── Seeyon_OA_A8_m_Information_leakage.json ├── ShopXO_download_Arbitrary_file_read_CNVD_2021_15822.json ├── SonarQube_unauth_CVE_2020_27986.json ├── SonicWall SSL-VPN 远程命令执行漏洞.json ├── SonicWall_SSL_VPN_RCE.json ├── Struts2_Log4Shell_CVE_2021_44228_1.json ├── Struts2_Log4Shell_CVE_2021_44228_2.json ├── Struts2_Log4Shell_CVE_2021_44228_3.json ├── TamronOS_IPTV_Arbitrary_file_download.json ├── TamronOS_IPTV_RCE.json ├── Tianwen_ERP_system__uploadfile.aspx_Arbitraryvfilevupload.json ├── U8_OA.json ├── UniFi_Network_Log4shell_CVE_2021_44228.json ├── VENGD_Arbitrary_File_Upload.json ├── VMWare_Horizon_Log4shell_CVE_2021_44228.json ├── VMWare_Operations_vRealize_Operations_Manager_API_SSRF_CVE_2021_21975.json ├── VMware_NSX_Log4shell_CVE_2021_44228.json ├── VMware_vCenter_Log4shell_CVE_2021_44228_1.json ├── VMware_vCenter_v7.0.2_Arbitrary_File_Read.json ├── Wayos AC集中管理系统默认弱口令 CNVD-2021-00876.json ├── Wayos_AC_Centralized_management_system_Default_weak_password.json ├── Weaver_EOffice_Arbitrary_File_Upload_CNVD_2021_49104.json ├── Weaver_OA_8_SQL_injection.json ├── Weaver_e_office_UploadFile.php_file_upload_CNVD_2021_49104.json ├── Weblogic LDAP Internet RCE CVE-2021-2109.json ├── Weblogic LDAP 远程代码执行漏洞 CVE-2021-2109.json ├── Weblogic SSRF漏洞 CVE-2014-4210.json ├── Weblogic_LDAP_RCE_CVE_2021_2109.json ├── Weblogic_SSRF.json ├── XXL-JOB 任务调度中心 后台默认弱口令.json ├── XXL_JOB_Default_password.json ├── Xieda_oa.json ├── YAPI_RCE.json ├── Yinpeng_Hanming_Video_Conferencing__Arbitrary_file_read.json ├── Yonyou_UFIDA_NC_bsh.servlet.BshServlet_rce.json ├── ZhongXinJingDun_Default_administrator_password.json ├── alibaba_canal_default_password.json ├── chanjet_CRM_get_usedspace.php_sql_injection.json ├── dahua_DSS_Arbitrary_file_download.json ├── fahuo100_sql_injection_CNVD_2021_30193.json ├── firewall_Leaked_user_name_and_password.json ├── landray_OA_Arbitrary_file_read.json ├── mallgard.json ├── php8.1backdoor.json ├── sangfor_Behavior_perception_system_c.php_RCE.json ├── shtermQiZhi_Fortress_Arbitrary_User_Login.json ├── tongdaoa_unauth.json ├── yongyou_NC_bsh.servlet.BshServlet_RCE.json ├── yycms_XSS.json ├── 帆软报表 v8.0 任意文件读取漏洞 CNVD-2018-04757.json ├── 来福云SQL注入漏洞.json ├── 致远OA A6 数据库敏感信息泄露.json ├── 致远OA A6 用户敏感信息泄露.json ├── 致远OA webmail.do任意文件下载 CNVD-2020-62422.json ├── 蜂网互联 企业级路由器v4.31 密码泄露漏洞 CVE-2019-16313.json └── 锐捷NBR路由器 EWEB网管系统 远程命令执行漏洞.json /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/README.md -------------------------------------------------------------------------------- /go/ACTI_camera_images_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/ACTI_camera_images_File_read.go -------------------------------------------------------------------------------- /go/AceNet_AceReporter_Report_component_Arbitrary_file_download.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/AceNet_AceReporter_Report_component_Arbitrary_file_download.go -------------------------------------------------------------------------------- /go/D_Link_Dir_645_getcfg.php_Account_password_disclosure_CVE_2019_17506.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/D_Link_Dir_645_getcfg.php_Account_password_disclosure_CVE_2019_17506.go -------------------------------------------------------------------------------- /go/D_Link_ShareCenter_DNS_320_system_mgr.cgi_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/D_Link_ShareCenter_DNS_320_system_mgr.cgi_RCE.go -------------------------------------------------------------------------------- /go/ESAFENET_DLP_dataimport_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/ESAFENET_DLP_dataimport_RCE.go -------------------------------------------------------------------------------- /go/Elasticsearch_Remote_Code_Execution_CVE_2014_3120.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Elasticsearch_Remote_Code_Execution_CVE_2014_3120.go -------------------------------------------------------------------------------- /go/Elasticsearch_Remote_Code_Execution_CVE_2015_1427.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Elasticsearch_Remote_Code_Execution_CVE_2015_1427.go -------------------------------------------------------------------------------- /go/FLIR_AX8_Arbitrary_File_Download_Vulnerability_CNVD-2021-39018.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/FLIR_AX8_Arbitrary_File_Download_Vulnerability_CNVD-2021-39018.go -------------------------------------------------------------------------------- /go/ForgeRock_AM_RCE_CVE_2021_35464.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/ForgeRock_AM_RCE_CVE_2021_35464.go -------------------------------------------------------------------------------- /go/H3C_HG659_lib_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/H3C_HG659_lib_File_read.go -------------------------------------------------------------------------------- /go/H3C_IMC_dynamiccontent.properties.xhtm_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/H3C_IMC_dynamiccontent.properties.xhtm_RCE.go -------------------------------------------------------------------------------- /go/H3C_Next_generation_firewall_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/H3C_Next_generation_firewall_File_read.go -------------------------------------------------------------------------------- /go/H3C_SecPath_Operation_Login_bypass.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/H3C_SecPath_Operation_Login_bypass.go -------------------------------------------------------------------------------- /go/HEJIA_PEMS_SystemLog.cgi_Arbitrary_file_download.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/HEJIA_PEMS_SystemLog.cgi_Arbitrary_file_download.go -------------------------------------------------------------------------------- /go/HanWang_Time_Attendance_SQL_injection.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/HanWang_Time_Attendance_SQL_injection.go -------------------------------------------------------------------------------- /go/Holographic_AI_network_operation_and_maintenance_platform_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Holographic_AI_network_operation_and_maintenance_platform_RCE.go -------------------------------------------------------------------------------- /go/Huijietong_cloud_video_fileDownload_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Huijietong_cloud_video_fileDownload_File_read.go -------------------------------------------------------------------------------- /go/Huijietong_cloud_video_list_Information_leakage.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Huijietong_cloud_video_list_Information_leakage.go -------------------------------------------------------------------------------- /go/JEEWMS_Arbitrary_File_Read_Vulnerability.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/JEEWMS_Arbitrary_File_Read_Vulnerability.go -------------------------------------------------------------------------------- /go/Jellyfin_Audio_File_read_CVE_2021_21402.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Jellyfin_Audio_File_read_CVE_2021_21402.go -------------------------------------------------------------------------------- /go/JingHe_OA_download.asp_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/JingHe_OA_download.asp_File_read.go -------------------------------------------------------------------------------- /go/Kingdee_EAS_server_file_Directory_traversal.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Kingdee_EAS_server_file_Directory_traversal.go -------------------------------------------------------------------------------- /go/LanhaiZuoyue_system_debug.php_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/LanhaiZuoyue_system_debug.php_RCE.go -------------------------------------------------------------------------------- /go/LanhaiZuoyue_system_download.php_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/LanhaiZuoyue_system_download.php_File_read.go -------------------------------------------------------------------------------- /go/Longjing_Technology_BEMS_API_1.21_Remote_Arbitrary_File_Download.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Longjing_Technology_BEMS_API_1.21_Remote_Arbitrary_File_Download.go -------------------------------------------------------------------------------- /go/Many_network_devices_have_arbitrary_file_downloads.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Many_network_devices_have_arbitrary_file_downloads.go -------------------------------------------------------------------------------- /go/Many_network_devices_have_password_leaks.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Many_network_devices_have_password_leaks.go -------------------------------------------------------------------------------- /go/NVS3000_integrated_video_surveillance_platform_is_not_accessible.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/NVS3000_integrated_video_surveillance_platform_is_not_accessible.go -------------------------------------------------------------------------------- /go/Node_red_UI_base_Arbitrary_File_Read_Vulnerability_CVE_2021_3223.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Node_red_UI_base_Arbitrary_File_Read_Vulnerability_CVE_2021_3223.go -------------------------------------------------------------------------------- /go/Panabit_Application_Gateway_ajax_top_backstage_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Panabit_Application_Gateway_ajax_top_backstage_RCE.go -------------------------------------------------------------------------------- /go/Panabit_Panalog_cmdhandle.php_backstage_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Panabit_Panalog_cmdhandle.php_backstage_RCE.go -------------------------------------------------------------------------------- /go/Panabit_iXCache_ajax_cmd_backstage_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Panabit_iXCache_ajax_cmd_backstage_RCE.go -------------------------------------------------------------------------------- /go/Qilai_OA_CloseMsg.aspx_SQL_injection.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Qilai_OA_CloseMsg.aspx_SQL_injection.go -------------------------------------------------------------------------------- /go/SECWORLD_Next_generation_firewall_pki_file_download_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/SECWORLD_Next_generation_firewall_pki_file_download_File_read.go -------------------------------------------------------------------------------- /go/SPON_IP_network_intercom_broadcast_system_exportrecord.php_any_file_download.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/SPON_IP_network_intercom_broadcast_system_exportrecord.php_any_file_download.go -------------------------------------------------------------------------------- /go/SPON_IP_network_intercom_broadcast_system_getjson.php_Arbitrary_file_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/SPON_IP_network_intercom_broadcast_system_getjson.php_Arbitrary_file_read.go -------------------------------------------------------------------------------- /go/SPON_IP_network_intercom_broadcast_system_ping.php_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/SPON_IP_network_intercom_broadcast_system_ping.php_RCE.go -------------------------------------------------------------------------------- /go/SPON_IP_network_intercom_broadcast_system_rj_get_token.php_any_file_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/SPON_IP_network_intercom_broadcast_system_rj_get_token.php_any_file_read.go -------------------------------------------------------------------------------- /go/Selea_OCR_ANPR_SeleaCamera_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Selea_OCR_ANPR_SeleaCamera_File_read.go -------------------------------------------------------------------------------- /go/Selea_OCR_ANPR_get_file.php_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Selea_OCR_ANPR_get_file.php_File_read.go -------------------------------------------------------------------------------- /go/Shenzhen_West_dieter_Technology_Co_LTD_CPE_WiFi__ping_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Shenzhen_West_dieter_Technology_Co_LTD_CPE_WiFi__ping_RCE.go -------------------------------------------------------------------------------- /go/Shenzhen_West_dieter_Technology_Co_LTD_CPE_WiFi__tracert_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Shenzhen_West_dieter_Technology_Co_LTD_CPE_WiFi__tracert_RCE.go -------------------------------------------------------------------------------- /go/ShiziyuCms_ApiController.class.php_SQL_injection.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/ShiziyuCms_ApiController.class.php_SQL_injection.go -------------------------------------------------------------------------------- /go/ShiziyuCms_ApigoodsController.class.php_SQL_injection.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/ShiziyuCms_ApigoodsController.class.php_SQL_injection.go -------------------------------------------------------------------------------- /go/ShiziyuCms_wxapp.php_File_update.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/ShiziyuCms_wxapp.php_File_update.go -------------------------------------------------------------------------------- /go/ShopXO_download_File_read_CNVD_2021_15822.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/ShopXO_download_File_read_CNVD_2021_15822.go -------------------------------------------------------------------------------- /go/TamronOS_IPTV_ping_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/TamronOS_IPTV_ping_RCE.go -------------------------------------------------------------------------------- /go/Tongda_OA_api.ali.php_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Tongda_OA_api.ali.php_RCE.go -------------------------------------------------------------------------------- /go/TopSec_Reporter_Arbitrary_file_download_CNVD_2021_41972.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/TopSec_Reporter_Arbitrary_file_download_CNVD_2021_41972.go -------------------------------------------------------------------------------- /go/Tuchuang_Library_System_Arbitrary_Reading_File_CNVD_2021_34454.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Tuchuang_Library_System_Arbitrary_Reading_File_CNVD_2021_34454.go -------------------------------------------------------------------------------- /go/WangKang_NS_ASG_cert_download.php_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/WangKang_NS_ASG_cert_download.php_File_read.go -------------------------------------------------------------------------------- /go/WangKang_Next_generation_firewall_router_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/WangKang_Next_generation_firewall_router_RCE.go -------------------------------------------------------------------------------- /go/Weaver_OA_E_Cology_Workflowservicexml_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Weaver_OA_E_Cology_Workflowservicexml_RCE.go -------------------------------------------------------------------------------- /go/Weaver_e_cology_OA_XStream_RCE_CVE_2021_21350.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Weaver_e_cology_OA_XStream_RCE_CVE_2021_21350.go -------------------------------------------------------------------------------- /go/ZZZCMS_parserSearch_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/ZZZCMS_parserSearch_RCE.go -------------------------------------------------------------------------------- /go/ZhongQing_naibo_Education_Cloud_Platform_Information_leakage.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/ZhongQing_naibo_Education_Cloud_Platform_Information_leakage.go -------------------------------------------------------------------------------- /go/ZhongQing_naibo_Education_Cloud_platform_reset_password.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/ZhongQing_naibo_Education_Cloud_platform_reset_password.go -------------------------------------------------------------------------------- /go/ZhongkeWangwei_Next_generation_firewall_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/ZhongkeWangwei_Next_generation_firewall_File_read.go -------------------------------------------------------------------------------- /go/Zhongxing_F460_web_shell_cmd.gch_RCE.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/Zhongxing_F460_web_shell_cmd.gch_RCE.go -------------------------------------------------------------------------------- /go/dahua_DSS_Arbitrary_file_download_cnvd_2020_61986.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/dahua_DSS_Arbitrary_file_download_cnvd_2020_61986.go -------------------------------------------------------------------------------- /go/nsoft_EWEBS_casmain.xgi_File_read.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/nsoft_EWEBS_casmain.xgi_File_read.go -------------------------------------------------------------------------------- /go/showDocGo.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/showDocGo.go -------------------------------------------------------------------------------- /go/showDocJson.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/showDocJson.go -------------------------------------------------------------------------------- /go/xiaomi_Mi_wiFi_From_File_Read_To_Login_CVE_2019_18370.go: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/go/xiaomi_Mi_wiFi_From_File_Read_To_Login_CVE_2019_18370.go -------------------------------------------------------------------------------- /json/360_TianQing_ccid_SQL_injectable.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/360_TianQing_ccid_SQL_injectable.json -------------------------------------------------------------------------------- /json/360_Tianqing_database_information_disclosure.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/360_Tianqing_database_information_disclosure.json -------------------------------------------------------------------------------- /json/ADSelfService_Plus_RCE_CVE_2021_40539.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/ADSelfService_Plus_RCE_CVE_2021_40539.json -------------------------------------------------------------------------------- /json/Active_UC_index.action_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Active_UC_index.action_RCE.json -------------------------------------------------------------------------------- /json/Adslr_Enterprise_online_behavior_management_system_Information_leakage.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Adslr_Enterprise_online_behavior_management_system_Information_leakage.json -------------------------------------------------------------------------------- /json/Alibaba Nacos 控制台默认弱口令.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Alibaba Nacos 控制台默认弱口令.json -------------------------------------------------------------------------------- /json/Alibaba Nacos 未授权访问漏洞.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Alibaba Nacos 未授权访问漏洞.json -------------------------------------------------------------------------------- /json/Alibaba_Nacos_Add_user_not_authorized.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Alibaba_Nacos_Add_user_not_authorized.json -------------------------------------------------------------------------------- /json/Alibaba_Nacos_Default_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Alibaba_Nacos_Default_password.json -------------------------------------------------------------------------------- /json/Apache ActiveMQ Console控制台弱口令.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache ActiveMQ Console控制台弱口令.json -------------------------------------------------------------------------------- /json/Apache Cocoon Xml 注入 CVE-2020-11991.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache Cocoon Xml 注入 CVE-2020-11991.json -------------------------------------------------------------------------------- /json/Apache Kylin Console 控制台弱口令.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache Kylin Console 控制台弱口令.json -------------------------------------------------------------------------------- /json/Apache Kylin 未授权配置泄露 CVE-2020-13937.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache Kylin 未授权配置泄露 CVE-2020-13937.json -------------------------------------------------------------------------------- /json/Apache Solr任意文件读取漏洞.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache Solr任意文件读取漏洞.json -------------------------------------------------------------------------------- /json/Apache_2.4.49_Path_Traversal_CVE_2021_41773.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_2.4.49_Path_Traversal_CVE_2021_41773.json -------------------------------------------------------------------------------- /json/Apache_2.4.49_RCE_CVE_2021_41773_and_2.4.50_CVE_2021_42013.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_2.4.49_RCE_CVE_2021_41773_and_2.4.50_CVE_2021_42013.json -------------------------------------------------------------------------------- /json/Apache_APISIX_Dashboard_CVE_2021_45232.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_APISIX_Dashboard_CVE_2021_45232.json -------------------------------------------------------------------------------- /json/Apache_APISIX_Dashboard_RCE_CVE_2021_45232.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_APISIX_Dashboard_RCE_CVE_2021_45232.json -------------------------------------------------------------------------------- /json/Apache_ActiveMQ_Console_Weak_Password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_ActiveMQ_Console_Weak_Password.json -------------------------------------------------------------------------------- /json/Apache_Airflow_Unauthorized.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_Airflow_Unauthorized.json -------------------------------------------------------------------------------- /json/Apache_Druid_Abritrary_File_Read_CVE_2021_36749.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_Druid_Abritrary_File_Read_CVE_2021_36749.json -------------------------------------------------------------------------------- /json/Apache_Druid_Arbitrary_File_Read_CVE_2021_36749.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_Druid_Arbitrary_File_Read_CVE_2021_36749.json -------------------------------------------------------------------------------- /json/Apache_Druid_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_Druid_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /json/Apache_HTTP_Server_Arbitrary_File_Read_CVE_2021_41773.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_HTTP_Server_Arbitrary_File_Read_CVE_2021_41773.json -------------------------------------------------------------------------------- /json/Apache_HTTP_Server_SSRF_CVE_2021_40438.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_HTTP_Server_SSRF_CVE_2021_40438.json -------------------------------------------------------------------------------- /json/Apache_JSPWiki_Log4shell_CVE_2021_44228_1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_JSPWiki_Log4shell_CVE_2021_44228_1.json -------------------------------------------------------------------------------- /json/Apache_JSPWiki_Log4shell_CVE_2021_44228_2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_JSPWiki_Log4shell_CVE_2021_44228_2.json -------------------------------------------------------------------------------- /json/Apache_Kylin_Console_Default_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_Kylin_Console_Default_password.json -------------------------------------------------------------------------------- /json/Apache_Kylin_Unauthorized_configuration_disclosure.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_Kylin_Unauthorized_configuration_disclosure.json -------------------------------------------------------------------------------- /json/Apache_OFBiz_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_OFBiz_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /json/Apache_SkyWalking_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_SkyWalking_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /json/Apache_Solr_Arbitrary_File_Read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_Solr_Arbitrary_File_Read.json -------------------------------------------------------------------------------- /json/Apache_Solr_RemoteStreaming_File_Read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Apache_Solr_RemoteStreaming_File_Read.json -------------------------------------------------------------------------------- /json/Aspcms_Backend_Leak.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Aspcms_Backend_Leak.json -------------------------------------------------------------------------------- /json/Atlassian Jira 信息泄露漏洞 CVE-2020-14181.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Atlassian Jira 信息泄露漏洞 CVE-2020-14181.json -------------------------------------------------------------------------------- /json/Atlassian_Confluence_OGNL_injection_CVE_2021_26084.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Atlassian_Confluence_OGNL_injection_CVE_2021_26084.json -------------------------------------------------------------------------------- /json/Atlassian_Jira_user_information_disclosure.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Atlassian_Jira_user_information_disclosure.json -------------------------------------------------------------------------------- /json/CVE_2018_19367_.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/CVE_2018_19367_.json -------------------------------------------------------------------------------- /json/Cacti_Weathermap_File_Write.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Cacti_Weathermap_File_Write.json -------------------------------------------------------------------------------- /json/China_Mobile_Yu_Routing_Sensitive_Information_Leaks_Vulnerability.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/China_Mobile_Yu_Routing_Sensitive_Information_Leaks_Vulnerability.json -------------------------------------------------------------------------------- /json/China_Mobile_Yu_routed_the_login_bypass.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/China_Mobile_Yu_routed_the_login_bypass.json -------------------------------------------------------------------------------- /json/Citrix_Unauthorized_CVE_2020_8193.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Citrix_Unauthorized_CVE_2020_8193.json -------------------------------------------------------------------------------- /json/ClickHouse_SQLI.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/ClickHouse_SQLI.json -------------------------------------------------------------------------------- /json/ClusterEngineV4.0_RCE_.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/ClusterEngineV4.0_RCE_.json -------------------------------------------------------------------------------- /json/ClusterEngine_V4.0_Shell_cluster_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/ClusterEngine_V4.0_Shell_cluster_RCE.json -------------------------------------------------------------------------------- /json/Coldfusion_LFI_CVE_2010_2861.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Coldfusion_LFI_CVE_2010_2861.json -------------------------------------------------------------------------------- /json/Confluence_RCE_CVE_2021_26084.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Confluence_RCE_CVE_2021_26084.json -------------------------------------------------------------------------------- /json/Consul_Rexec_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Consul_Rexec_RCE.json -------------------------------------------------------------------------------- /json/Coremail_configuration_information_disclosure.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Coremail_configuration_information_disclosure.json -------------------------------------------------------------------------------- /json/Couch_CMS_Infoleak_CVE_2018_7662.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Couch_CMS_Infoleak_CVE_2018_7662.json -------------------------------------------------------------------------------- /json/Couchdb_Add_User_Not_Authorized_CVE_2017_12635.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Couchdb_Add_User_Not_Authorized_CVE_2017_12635.json -------------------------------------------------------------------------------- /json/Couchdb_Unauth.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Couchdb_Unauth.json -------------------------------------------------------------------------------- /json/CraftCMS_Seomatic_RCE_CVE_2020_9597.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/CraftCMS_Seomatic_RCE_CVE_2020_9597.json -------------------------------------------------------------------------------- /json/D-Link AC集中管理系统默认弱口令.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/D-Link AC集中管理系统默认弱口令.json -------------------------------------------------------------------------------- /json/D-Link DCS系列监控 CNVD-2020-25078.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/D-Link DCS系列监控 CNVD-2020-25078.json -------------------------------------------------------------------------------- /json/D-Link DCS系列监控 账号密码信息泄露漏洞 CNVD-2020-25078.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/D-Link DCS系列监控 账号密码信息泄露漏洞 CNVD-2020-25078.json -------------------------------------------------------------------------------- /json/D_Link_AC_Centralized_management_system__Default_weak_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/D_Link_AC_Centralized_management_system__Default_weak_password.json -------------------------------------------------------------------------------- /json/D_Link_DC_Disclosure_of_account_password_information.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/D_Link_DC_Disclosure_of_account_password_information.json -------------------------------------------------------------------------------- /json/D_Link_DIR_868L_getcfg.php_Account_password_leakage.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/D_Link_DIR_868L_getcfg.php_Account_password_leakage.json -------------------------------------------------------------------------------- /json/D_Link_ShareCenter_DNS_320_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/D_Link_ShareCenter_DNS_320_RCE.json -------------------------------------------------------------------------------- /json/Datang_AC_Default_Password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Datang_AC_Default_Password.json -------------------------------------------------------------------------------- /json/DedeCMS_Carbuyaction_FileInclude.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/DedeCMS_Carbuyaction_FileInclude.json -------------------------------------------------------------------------------- /json/DedeCMS_InfoLeak_CVE_2018_6910.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/DedeCMS_InfoLeak_CVE_2018_6910.json -------------------------------------------------------------------------------- /json/Discuz_ML_3.x_RCE__CNVD_2019_22239.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Discuz_ML_3.x_RCE__CNVD_2019_22239.json -------------------------------------------------------------------------------- /json/Discuz_RCE_WOOYUN_2010_080723.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Discuz_RCE_WOOYUN_2010_080723.json -------------------------------------------------------------------------------- /json/Discuz_Wechat_Plugins_Unauth.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Discuz_Wechat_Plugins_Unauth.json -------------------------------------------------------------------------------- /json/Discuz_v72_SQLI.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Discuz_v72_SQLI.json -------------------------------------------------------------------------------- /json/Dlink_850L_Info_Leak.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Dlink_850L_Info_Leak.json -------------------------------------------------------------------------------- /json/Dlink_Info_Leak_CVE_2019_17506.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Dlink_Info_Leak_CVE_2019_17506.json -------------------------------------------------------------------------------- /json/Dlink_RCE_CVE_2019_16920.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Dlink_RCE_CVE_2019_16920.json -------------------------------------------------------------------------------- /json/Docker_Registry_API_Unauth.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Docker_Registry_API_Unauth.json -------------------------------------------------------------------------------- /json/Dubbo_Admin_Default_Password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Dubbo_Admin_Default_Password.json -------------------------------------------------------------------------------- /json/Eyou_Mail_system_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Eyou_Mail_system_RCE.json -------------------------------------------------------------------------------- /json/F5_BIG_IP_RCE_CVE_2021_22986_exp.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/F5_BIG_IP_RCE_CVE_2021_22986_exp.json -------------------------------------------------------------------------------- /json/Fastmeeting_Arbitrary_File_Read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Fastmeeting_Arbitrary_File_Read.json -------------------------------------------------------------------------------- /json/FineReport_Directory_traversal.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/FineReport_Directory_traversal.json -------------------------------------------------------------------------------- /json/FineReport_v8.0_Arbitrary_file_read_.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/FineReport_v8.0_Arbitrary_file_read_.json -------------------------------------------------------------------------------- /json/FineReport_v9_Arbitrary_File_Overwrite.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/FineReport_v9_Arbitrary_File_Overwrite.json -------------------------------------------------------------------------------- /json/Finetree_5MP_default_password_or_Unauthorized_user_added.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Finetree_5MP_default_password_or_Unauthorized_user_added.json -------------------------------------------------------------------------------- /json/GitLab Graphql邮箱信息泄露漏洞 CVE-2020-26413.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/GitLab Graphql邮箱信息泄露漏洞 CVE-2020-26413.json -------------------------------------------------------------------------------- /json/GitLab_Graphql_Email_information_disclosure.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/GitLab_Graphql_Email_information_disclosure.json -------------------------------------------------------------------------------- /json/GitLab_SSRF_CVE_2021_22214.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/GitLab_SSRF_CVE_2021_22214.json -------------------------------------------------------------------------------- /json/Gitlab_RCE_CVE_2021_22205.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Gitlab_RCE_CVE_2021_22205.json -------------------------------------------------------------------------------- /json/Grafana_Arbitrary_file_read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Grafana_Arbitrary_file_read.json -------------------------------------------------------------------------------- /json/Grafana_Plugins_Arbitrary_File_Read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Grafana_Plugins_Arbitrary_File_Read.json -------------------------------------------------------------------------------- /json/H3C_IMC_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/H3C_IMC_RCE.json -------------------------------------------------------------------------------- /json/H5S_video_platform_GetSrc_information_leakage.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/H5S_video_platform_GetSrc_information_leakage.json -------------------------------------------------------------------------------- /json/H5S_video_platform_GetUserInfo_Account_password_leakage.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/H5S_video_platform_GetUserInfo_Account_password_leakage.json -------------------------------------------------------------------------------- /json/HIKVISION 视频编码设备接入网关 任意文件下载.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/HIKVISION 视频编码设备接入网关 任意文件下载.json -------------------------------------------------------------------------------- /json/HIKVISION_Video_coding_equipment_Download_any_file.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/HIKVISION_Video_coding_equipment_Download_any_file.json -------------------------------------------------------------------------------- /json/Hikvision_RCE_CVE_2021_36260.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Hikvision_RCE_CVE_2021_36260.json -------------------------------------------------------------------------------- /json/Hsmedia_Hgateway_Default_account.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Hsmedia_Hgateway_Default_account.json -------------------------------------------------------------------------------- /json/IFW8_Enterprise_router_Password_leakage_.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/IFW8_Enterprise_router_Password_leakage_.json -------------------------------------------------------------------------------- /json/IRDM4000_Smart_station_Unauthorized_access.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/IRDM4000_Smart_station_Unauthorized_access.json -------------------------------------------------------------------------------- /json/IceWarp_WebClient_basic_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/IceWarp_WebClient_basic_RCE.json -------------------------------------------------------------------------------- /json/JQuery_1.7.2Version_site_foreground_arbitrary_file_download.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/JQuery_1.7.2Version_site_foreground_arbitrary_file_download.json -------------------------------------------------------------------------------- /json/Jellyfin_10.7.0_Unauthenticated_Abritrary_File_Read_CVE_2021_21402.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Jellyfin_10.7.0_Unauthenticated_Abritrary_File_Read_CVE_2021_21402.json -------------------------------------------------------------------------------- /json/Jellyfin_SSRF_CVE_2021_29490.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Jellyfin_SSRF_CVE_2021_29490.json -------------------------------------------------------------------------------- /json/JingHe_OA_C6_Default_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/JingHe_OA_C6_Default_password.json -------------------------------------------------------------------------------- /json/Jinher_OA_C6_download.jsp_Arbitrary_file_read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Jinher_OA_C6_download.jsp_Arbitrary_file_read.json -------------------------------------------------------------------------------- /json/Jinshan_V8.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Jinshan_V8.json -------------------------------------------------------------------------------- /json/Jitong_EWEBS_arbitrary_file_read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Jitong_EWEBS_arbitrary_file_read.json -------------------------------------------------------------------------------- /json/Jitong_EWEBS_phpinfo_leak.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Jitong_EWEBS_phpinfo_leak.json -------------------------------------------------------------------------------- /json/KEDACOM_MTS_transcoding_server_Arbitrary_file_download_CNVD_2020_48650.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/KEDACOM_MTS_transcoding_server_Arbitrary_file_download_CNVD_2020_48650.json -------------------------------------------------------------------------------- /json/Kingsoft_V8_Arbitrary_file_read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Kingsoft_V8_Arbitrary_file_read.json -------------------------------------------------------------------------------- /json/Kingsoft_V8_Default_weak_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Kingsoft_V8_Default_weak_password.json -------------------------------------------------------------------------------- /json/Konga_Default_JWT_KEY.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Konga_Default_JWT_KEY.json -------------------------------------------------------------------------------- /json/Kyan.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Kyan.json -------------------------------------------------------------------------------- /json/Kyan_Account_password_leak.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Kyan_Account_password_leak.json -------------------------------------------------------------------------------- /json/Kyan_design_account_password_disclosure.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Kyan_design_account_password_disclosure.json -------------------------------------------------------------------------------- /json/Kyan_run.php_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Kyan_run.php_RCE.json -------------------------------------------------------------------------------- /json/Lanproxy 目录遍历漏洞 CVE-2021-3019.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Lanproxy 目录遍历漏洞 CVE-2021-3019.json -------------------------------------------------------------------------------- /json/Lanproxy_Arbitrary_File_Read_CVE_2021_3019.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Lanproxy_Arbitrary_File_Read_CVE_2021_3019.json -------------------------------------------------------------------------------- /json/Lanproxy_Directory_traversal_CVE_2021_3019.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Lanproxy_Directory_traversal_CVE_2021_3019.json -------------------------------------------------------------------------------- /json/Laravel .env 配置文件泄露 CVE-2017-16894.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Laravel .env 配置文件泄露 CVE-2017-16894.json -------------------------------------------------------------------------------- /json/Laravel_.env_configuration_file_leaks_(CVE-2017-16894).json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Laravel_.env_configuration_file_leaks_(CVE-2017-16894).json -------------------------------------------------------------------------------- /json/Leadsec_ACM_information_leakage_CNVD_2016_08574.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Leadsec_ACM_information_leakage_CNVD_2016_08574.json -------------------------------------------------------------------------------- /json/MPSec_ISG1000_Security_Gateway_Arbitrary_File_Download_Vulnerability.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/MPSec_ISG1000_Security_Gateway_Arbitrary_File_Download_Vulnerability.json -------------------------------------------------------------------------------- /json/MessageSolution 邮件归档系统EEA 信息泄露漏洞 CNVD-2021-10543.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/MessageSolution 邮件归档系统EEA 信息泄露漏洞 CNVD-2021-10543.json -------------------------------------------------------------------------------- /json/MessageSolution_EEA_information_disclosure.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/MessageSolution_EEA_information_disclosure.json -------------------------------------------------------------------------------- /json/Metabase_Geojson_Arbitrary_File_Read_CVE_2021_41277.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Metabase_Geojson_Arbitrary_File_Read_CVE_2021_41277.json -------------------------------------------------------------------------------- /json/Metabase_geojson_Arbitrary_file_reading_CVE_2021_41277.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Metabase_geojson_Arbitrary_file_reading_CVE_2021_41277.json -------------------------------------------------------------------------------- /json/Micro_module_monitoring_system_User_list.php_information_leakage.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Micro_module_monitoring_system_User_list.php_information_leakage.json -------------------------------------------------------------------------------- /json/Microsoft Exchange SSRF漏洞 CVE-2021-26885.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Microsoft Exchange SSRF漏洞 CVE-2021-26885.json -------------------------------------------------------------------------------- /json/MobileIron_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/MobileIron_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /json/Node_RED_ui_base_Arbitrary_File_Read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Node_RED_ui_base_Arbitrary_File_Read.json -------------------------------------------------------------------------------- /json/OpenSNS_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/OpenSNS_RCE.json -------------------------------------------------------------------------------- /json/RG_UAC.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/RG_UAC.json -------------------------------------------------------------------------------- /json/Ruijie_smartweb_password_information_disclosure.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Ruijie_smartweb_password_information_disclosure.json -------------------------------------------------------------------------------- /json/Ruijie_smartweb_weak_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Ruijie_smartweb_weak_password.json -------------------------------------------------------------------------------- /json/RuoYi_Druid_Unauthorized_access.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/RuoYi_Druid_Unauthorized_access.json -------------------------------------------------------------------------------- /json/SDWAN_smart_gateway_weak_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/SDWAN_smart_gateway_weak_password.json -------------------------------------------------------------------------------- /json/Samsung_WLAN_AP_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Samsung_WLAN_AP_RCE.json -------------------------------------------------------------------------------- /json/Samsung_WLAN_AP_WEA453e_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Samsung_WLAN_AP_WEA453e_RCE.json -------------------------------------------------------------------------------- /json/Samsung_WLAN_AP_wea453e_router_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Samsung_WLAN_AP_wea453e_router_RCE.json -------------------------------------------------------------------------------- /json/Security_Devices_Hardcoded_Password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Security_Devices_Hardcoded_Password.json -------------------------------------------------------------------------------- /json/Seeyon_OA_A6_DownExcelBeanServlet_User_information_leakage.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Seeyon_OA_A6_DownExcelBeanServlet_User_information_leakage.json -------------------------------------------------------------------------------- /json/Seeyon_OA_A6__Disclosure_of_database_sensitive_information.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Seeyon_OA_A6__Disclosure_of_database_sensitive_information.json -------------------------------------------------------------------------------- /json/Seeyon_OA_A6_initDataAssess.jsp_User_information_leakage.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Seeyon_OA_A6_initDataAssess.jsp_User_information_leakage.json -------------------------------------------------------------------------------- /json/Seeyon_OA_A6_setextno.jsp_SQL_injection.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Seeyon_OA_A6_setextno.jsp_SQL_injection.json -------------------------------------------------------------------------------- /json/Seeyon_OA_A6_test.jsp_SQL_injection.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Seeyon_OA_A6_test.jsp_SQL_injection.json -------------------------------------------------------------------------------- /json/Seeyon_OA_A8_m_Information_leakage.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Seeyon_OA_A8_m_Information_leakage.json -------------------------------------------------------------------------------- /json/ShopXO_download_Arbitrary_file_read_CNVD_2021_15822.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/ShopXO_download_Arbitrary_file_read_CNVD_2021_15822.json -------------------------------------------------------------------------------- /json/SonarQube_unauth_CVE_2020_27986.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/SonarQube_unauth_CVE_2020_27986.json -------------------------------------------------------------------------------- /json/SonicWall SSL-VPN 远程命令执行漏洞.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/SonicWall SSL-VPN 远程命令执行漏洞.json -------------------------------------------------------------------------------- /json/SonicWall_SSL_VPN_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/SonicWall_SSL_VPN_RCE.json -------------------------------------------------------------------------------- /json/Struts2_Log4Shell_CVE_2021_44228_1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Struts2_Log4Shell_CVE_2021_44228_1.json -------------------------------------------------------------------------------- /json/Struts2_Log4Shell_CVE_2021_44228_2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Struts2_Log4Shell_CVE_2021_44228_2.json -------------------------------------------------------------------------------- /json/Struts2_Log4Shell_CVE_2021_44228_3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Struts2_Log4Shell_CVE_2021_44228_3.json -------------------------------------------------------------------------------- /json/TamronOS_IPTV_Arbitrary_file_download.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/TamronOS_IPTV_Arbitrary_file_download.json -------------------------------------------------------------------------------- /json/TamronOS_IPTV_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/TamronOS_IPTV_RCE.json -------------------------------------------------------------------------------- /json/Tianwen_ERP_system__uploadfile.aspx_Arbitraryvfilevupload.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Tianwen_ERP_system__uploadfile.aspx_Arbitraryvfilevupload.json -------------------------------------------------------------------------------- /json/U8_OA.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/U8_OA.json -------------------------------------------------------------------------------- /json/UniFi_Network_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/UniFi_Network_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /json/VENGD_Arbitrary_File_Upload.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/VENGD_Arbitrary_File_Upload.json -------------------------------------------------------------------------------- /json/VMWare_Horizon_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/VMWare_Horizon_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /json/VMWare_Operations_vRealize_Operations_Manager_API_SSRF_CVE_2021_21975.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/VMWare_Operations_vRealize_Operations_Manager_API_SSRF_CVE_2021_21975.json -------------------------------------------------------------------------------- /json/VMware_NSX_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/VMware_NSX_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /json/VMware_vCenter_Log4shell_CVE_2021_44228_1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/VMware_vCenter_Log4shell_CVE_2021_44228_1.json -------------------------------------------------------------------------------- /json/VMware_vCenter_v7.0.2_Arbitrary_File_Read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/VMware_vCenter_v7.0.2_Arbitrary_File_Read.json -------------------------------------------------------------------------------- /json/Wayos AC集中管理系统默认弱口令 CNVD-2021-00876.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Wayos AC集中管理系统默认弱口令 CNVD-2021-00876.json -------------------------------------------------------------------------------- /json/Wayos_AC_Centralized_management_system_Default_weak_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Wayos_AC_Centralized_management_system_Default_weak_password.json -------------------------------------------------------------------------------- /json/Weaver_EOffice_Arbitrary_File_Upload_CNVD_2021_49104.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Weaver_EOffice_Arbitrary_File_Upload_CNVD_2021_49104.json -------------------------------------------------------------------------------- /json/Weaver_OA_8_SQL_injection.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Weaver_OA_8_SQL_injection.json -------------------------------------------------------------------------------- /json/Weaver_e_office_UploadFile.php_file_upload_CNVD_2021_49104.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Weaver_e_office_UploadFile.php_file_upload_CNVD_2021_49104.json -------------------------------------------------------------------------------- /json/Weblogic LDAP Internet RCE CVE-2021-2109.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Weblogic LDAP Internet RCE CVE-2021-2109.json -------------------------------------------------------------------------------- /json/Weblogic LDAP 远程代码执行漏洞 CVE-2021-2109.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Weblogic LDAP 远程代码执行漏洞 CVE-2021-2109.json -------------------------------------------------------------------------------- /json/Weblogic SSRF漏洞 CVE-2014-4210.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Weblogic SSRF漏洞 CVE-2014-4210.json -------------------------------------------------------------------------------- /json/Weblogic_LDAP_RCE_CVE_2021_2109.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Weblogic_LDAP_RCE_CVE_2021_2109.json -------------------------------------------------------------------------------- /json/Weblogic_SSRF.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Weblogic_SSRF.json -------------------------------------------------------------------------------- /json/XXL-JOB 任务调度中心 后台默认弱口令.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/XXL-JOB 任务调度中心 后台默认弱口令.json -------------------------------------------------------------------------------- /json/XXL_JOB_Default_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/XXL_JOB_Default_password.json -------------------------------------------------------------------------------- /json/Xieda_oa.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Xieda_oa.json -------------------------------------------------------------------------------- /json/YAPI_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/YAPI_RCE.json -------------------------------------------------------------------------------- /json/Yinpeng_Hanming_Video_Conferencing__Arbitrary_file_read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Yinpeng_Hanming_Video_Conferencing__Arbitrary_file_read.json -------------------------------------------------------------------------------- /json/Yonyou_UFIDA_NC_bsh.servlet.BshServlet_rce.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/Yonyou_UFIDA_NC_bsh.servlet.BshServlet_rce.json -------------------------------------------------------------------------------- /json/ZhongXinJingDun_Default_administrator_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/ZhongXinJingDun_Default_administrator_password.json -------------------------------------------------------------------------------- /json/alibaba_canal_default_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/alibaba_canal_default_password.json -------------------------------------------------------------------------------- /json/chanjet_CRM_get_usedspace.php_sql_injection.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/chanjet_CRM_get_usedspace.php_sql_injection.json -------------------------------------------------------------------------------- /json/dahua_DSS_Arbitrary_file_download.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/dahua_DSS_Arbitrary_file_download.json -------------------------------------------------------------------------------- /json/fahuo100_sql_injection_CNVD_2021_30193.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/fahuo100_sql_injection_CNVD_2021_30193.json -------------------------------------------------------------------------------- /json/firewall_Leaked_user_name_and_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/firewall_Leaked_user_name_and_password.json -------------------------------------------------------------------------------- /json/landray_OA_Arbitrary_file_read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/landray_OA_Arbitrary_file_read.json -------------------------------------------------------------------------------- /json/mallgard.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/mallgard.json -------------------------------------------------------------------------------- /json/php8.1backdoor.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/php8.1backdoor.json -------------------------------------------------------------------------------- /json/sangfor_Behavior_perception_system_c.php_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/sangfor_Behavior_perception_system_c.php_RCE.json -------------------------------------------------------------------------------- /json/shtermQiZhi_Fortress_Arbitrary_User_Login.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/shtermQiZhi_Fortress_Arbitrary_User_Login.json -------------------------------------------------------------------------------- /json/tongdaoa_unauth.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/tongdaoa_unauth.json -------------------------------------------------------------------------------- /json/yongyou_NC_bsh.servlet.BshServlet_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/yongyou_NC_bsh.servlet.BshServlet_RCE.json -------------------------------------------------------------------------------- /json/yycms_XSS.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/yycms_XSS.json -------------------------------------------------------------------------------- /json/帆软报表 v8.0 任意文件读取漏洞 CNVD-2018-04757.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/帆软报表 v8.0 任意文件读取漏洞 CNVD-2018-04757.json -------------------------------------------------------------------------------- /json/来福云SQL注入漏洞.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/来福云SQL注入漏洞.json -------------------------------------------------------------------------------- /json/致远OA A6 数据库敏感信息泄露.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/致远OA A6 数据库敏感信息泄露.json -------------------------------------------------------------------------------- /json/致远OA A6 用户敏感信息泄露.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/致远OA A6 用户敏感信息泄露.json -------------------------------------------------------------------------------- /json/致远OA webmail.do任意文件下载 CNVD-2020-62422.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/致远OA webmail.do任意文件下载 CNVD-2020-62422.json -------------------------------------------------------------------------------- /json/蜂网互联 企业级路由器v4.31 密码泄露漏洞 CVE-2019-16313.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/蜂网互联 企业级路由器v4.31 密码泄露漏洞 CVE-2019-16313.json -------------------------------------------------------------------------------- /json/锐捷NBR路由器 EWEB网管系统 远程命令执行漏洞.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheTh1nk3r/Goby_POC/HEAD/json/锐捷NBR路由器 EWEB网管系统 远程命令执行漏洞.json --------------------------------------------------------------------------------