Skip to content

Instantly share code, notes, and snippets.

@Rvn0xsy

Rvn0xsy/fofa.csv Secret

Created September 8, 2024 13:38
Show Gist options
  • Save Rvn0xsy/39ed264a2db15ec58fd13432d58c41e6 to your computer and use it in GitHub Desktop.
Save Rvn0xsy/39ed264a2db15ec58fd13432d58c41e6 to your computer and use it in GitHub Desktop.
We can make this file beautiful and searchable if this error is corrected: Illegal quoting in line 1.
<Title>用友畅捷通-TPlus-CheckMutex存在SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>红帆OA iorepsavexml.aspx 文件上传漏洞</Title>,<Fofa>title="iOffice.net"</Fofa>
9
<Title>泛微e-office 未授权访问</Title>,<Fofa>(body="login.php"&&body="eoffice")||body="/general/login/index.php"
<Title>SANGFOR终端检测响应平台任意用户免密登录及前台RCE漏洞</Title>,<Fofa>title="SANGFOR终端检测响应平台" icon_hash="1307354852"</Fofa>
<Title>用友U8 Cloud SQL注入漏洞</Title>,<Fofa>app="用友U8 Cloud"</Fofa>
<Title>用友NC-runStateServlet接口SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792"</Fofa>
<Title>金和OA_jc6_ntko-upload任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>泛微e-cology 9 SQL注入漏洞</Title>,<Fofa>app="泛微-协同商务系统"</Fofa>
%3CTitle%3EIP-guard WebServer存在权限绕过漏洞(QVD-2024-14103)%3C/Title%3E,<Fofa>icon_hash="2030860561"%3C/Fofa%3E
<Title>用友时空KSOA-linkadd.jsp SQL注入漏洞</Title>,<Fofa>title="企业信息系统门户"</Fofa>
<Title>Jenkins任意文件读取漏洞(CVE-2024-23897)</Title>,<Fofa>app="Jenkins"</Fofa>
<Title>飞企互联FE协作平台任意登录漏洞</Title>,<Fofa>app="FE-协作平台" app="飞企互联-FE企业运营管理平台"</Fofa>
<Title>用友畅捷通TPlus-InitServerInfo存在SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>福建科立讯通信指挥调度管理平台ajax_users.php SQL注入漏洞</Title>,<Fofa>body="app/structure/departments.php"||app="指挥调度管理平台"</Fofa>
<Title>泛微E-Mobile命令执行漏洞</Title>,<Fofa> "Weaver E-Mobile" </Fofa>
<Title>用友移动管理平台uploadIcon任意文件上传漏洞</Title>,<Fofa>app="用友-移动系统管理"</Fofa>
<Title>金和OA jc6 clobfield SQL注入漏洞</Title>,<Fofa>title="金和协同管理平台" || body="js/PasswordCommon.js" || body="js/PasswordNew.js" || body="Jinher Network" || (body="c6/Jhs && body="CloseWindowNoAsk") || header="Path=/jc6" || (body="JC6金和协同管理平台" && body="src=\"/jc6/platform/") || body="window.location = \"JHSoft.MobileApp/Default.htm\";" || Path=/jc6"</Fofa>
<Title>东华医疗协同办公系统反序列化漏洞</Title>,<Fofa>body="东华医疗协同办公系统"</Fofa>
<Title>飞企互联-FE企业运营管理平台publicData.jsp存在SQL注入漏洞</Title>,<Fofa>app="FE-协作平台" app="飞企互联-FE企业运营管理平台"</Fofa>
<Title>瑞友应用虚拟化系统-RAPAgent命令执行漏洞</Title>,<Fofa>title="瑞友天翼-应用虚拟化系统"</Fofa>
<Title>宏景eHR人力资源管理软件showmediainfo存在SQL注入漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa>
<Title>脸爱云一脸通智慧平台SelOperators信息泄露漏洞</Title>,<Fofa>body="View/UserReserved/UserReservedTest.aspx"</Fofa>
<Title>东方通TongWeb-selectApp.jsp任意文件上传漏洞</Title>,<Fofa>header="TongWeb Server" || banner="Server: TongWeb Server"</Fofa>
<Title>捷诚管理信息系统SQL注入漏洞</Title>,<Fofa>body="/Scripts/EnjoyMsg.js"</Fofa>
<Title>致远OA_getAjaxDataServlet接口存在XML实体注入漏洞</Title>,<Fofa>app="致远互联-OA"</Fofa>
<Title>帮管客CRM-jiliyu接口SQL漏洞</Title>,<Fofa>"帮管客-CRM"</Fofa>
<Title>Ncast盈可视高清智能录播系统RCE漏洞</Title>,<Fofa>app="Ncast-产品" && title=="高清智能录播系统"</Fofa>
<Title>网神防火墙app_av_import_save文件上传漏洞</Title>,<Fofa>title="网神SecGate 3600防火墙"</Fofa>
<Title>用友NC_Cloud soapFormat.ajax接口XXE漏洞</Title>,<Fofa>body="/Client/Uclient/UClient.exe"||body="ufida.ico"||body="nccloud"||body="/api/uclient/public/"</Fofa>
<Title>WordPress-js-support-ticket文件上传漏洞</Title>,<Fofa>body="wp-content/plugins/js-support-ticket"</Fofa>
<Title>用友时空KSOA-imagefield接口SQL注入漏洞</Title>,<Fofa>app="用友-时空KSOA"</Fofa>
<Title>迪普DPTech VPN 任意文件读取 CNVD-2023-69478</Title>,<Fofa>title=="SSL VPN Service" && header="Dptech" || cert="DPtechCa"</Fofa>
<Title>通达OA get_datas.php SQL注入漏洞</Title>,<Fofa>app="TDXK-通达OA"</Fofa>
<Title>网康NS-ASG应用安全网关singlelogin.php SQL注入漏洞</Title>,<Fofa>app="网康NS-ASG应用安全网关"</Fofa>
<Title>致远M1 usertokenservice 反序列化RCE漏洞</Title>,<Fofa>"M1-Server 已启动"</Fofa>
<Title>畅捷通TPlus-KeyInfoList.aspx SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>深信服下一代防火墙NGAF任意文件读取漏洞</Title>,<Fofa>Redirect.php?url=/LogInOut.php && port="85"</Fofa>
<Title>蓝凌EKP前台授权绕过导致文件上传漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa>
<Title>Progress-Flowmon命令注入漏洞</Title>,<Fofa>body="Flowmon-Web-Interface"</Fofa>
<Title>亿赛通电子文档安全管理系统任意文件读取漏洞</Title>,<Fofa>app="亿赛通电子文档安全管理系统"</Fofa>
<Title>亿赛通电子文档uploadFile接口文件上传漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa>
<Title>RG-UAC锐捷统一上网行为管理与审计系统远程代码执行漏洞</Title>,<Fofa>app="Ruijie-RG-UAC"</Fofa>
<Title>Panalog大数据日志审计系统libres_syn_delete.php命令执行漏洞</Title>,<Fofa>app="Panabit-Panalog"</Fofa>
<Title>易思智能物流无人值守系统5.0任意文件上传漏洞</Title>,<Fofa>"智能物流无人值守系统"</Fofa>
<Title>蓝凌OA treexml.tmpl 远程命令执行漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa>
<Title>惠尔顿-网络安全审计系统任意文件读取漏洞</Title>,<Fofa>app="惠尔顿-网络安全审计系统"</Fofa>
<Title>鸿运(通天星CMSV6车载)主动安全监控云平台任意文件读取漏洞</Title>,<Fofa>body="./open/webApi.html"||body="/808gps/</Fofa>
<Title>飞企互联-FE企业运营管理平台uploadAttachmentServlet任意文件上传漏洞</Title>,<Fofa>app="FE-协作平台"</Fofa>
<Title>用友U9-PatchFile.asmx接口任意文件上传漏洞</Title>,<Fofa>body="logo-u9.png"</Fofa>
<Title>金蝶云-星空ServiceGateway反序列化漏洞</Title>,<Fofa>body="kdUtils.min.js"</Fofa>
<Title>WIFISKY 7层流控路由器confirm.php接口RCE漏洞</Title>,<Fofa>title="WIFISKY 7层流控路由器"</Fofa>
<Title>MajorDoMo-thumb.php未授权RCE漏洞复现</Title>,<Fofa>app="MajordomoSL"</Fofa>
<Title>用友NC接口saveXmlToFIleServlet文件上传漏洞</Title>,<Fofa>title:"YONYOU NC"</Fofa>
<Title>用友畅捷通TPlus任意文件读取漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>宏景DisplayFiles任意文件读取漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa>
<Title>亿赛通电子文档安全管理系统XStream反序列化漏洞</Title>,<Fofa>title="电子文档安全管理系统"</Fofa>
<Title>浙江宇视isc网络视频录像机远程命令执行漏洞</Title>,<Fofa>body="Alarm" && body="白牌定制"</Fofa>
<Title>用友U9企业版任意文件上传漏洞</Title>,<Fofa>title==" U9-登录 "</Fofa>
<Title>ZenML服务器远程权限提升漏洞(CVE-2024-25723)</Title>,<Fofa>title=="ZenML - Dashboard"</Fofa>
<Title>全程云OA__ajax.ashx SQL注入漏洞</Title>,<Fofa>app:"全程云OA"</Fofa>
<Title>魔方网表mailupdate.jsp接口存在任意文件上传漏洞</Title>,<Fofa>icon_hash="694014318"</Fofa>
<Title>用友NC-avatar接口存在文件上传漏洞</Title>,<Fofa>body="/Client/Uclient/UClient.exe"</Fofa>
<Title>飞企互联-FE企业运营管理平台登录绕过漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa>
<Title>Backdoor Authentication Bypass and Command Injection in D-Link NAS</Title>,<Fofa>body="Text:In order to access the ShareCenter"</Fofa>
20
<Title>安美数字酒店宽带运营系统SQL注入漏洞</Title>,<Fofa>title=酒店宽带运营系统</Fofa>
<Title>泛微OA-E-Cology-FileDownload文件读取漏洞</Title>,<Fofa>app="泛微-OA(e-cology”)</Fofa>
<Title>医院一站式后勤管理系统任意文件上传漏洞</Title>,<Fofa>body="frameworkModuleJob" "版权所有:南京博纳睿通软件科技有限公司"</Fofa>
<Title>飞企互联FE企业运营管理平台ProxyServletUti存在任意文件读取漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa>
<Title>H3C Magic B1STV100R012 远程代码执行漏洞</Title>,<Fofa>app="H3C-Ent-Router"</Fofa>
<Title>SpringBlade export-user SQL 注入漏洞</Title>,<Fofa>body="https://bladex.vip"</Fofa>
<Title>用友GRP-U8 bx_historyDataCheck.jsp SQL注入漏洞</Title>,<Fofa>app="yonyou-GRP-U8"</Fofa>
<Title>网康科技NS-ASG应用安全网关add_postlogin.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关"</Fofa>
<Title>用友NC接口PaWfm SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792" app="用友-UFIDA-NC"</Fofa>
<Title>明御安全网关远程命令执行漏洞</Title>,<Fofa>title="明御安全网关"</Fofa>
<Title>用友NC-workflowImageServlet接口SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792" </Fofa>
<Title>用友NC接口ConfigResourceServlet反序列漏洞</Title>,<Fofa>icon_hash="1085941792" app="用友-UFIDA-NC"</Fofa>
<Title>普元EOS-Platform-eos.jmx存在远程代码执行漏洞</Title>,<Fofa>body="普元" || (body="ame.primeton.com" && body="eos-web")</Fofa>
<Title>蓝凌EIS智慧协同平台saveImg接口任意文件上传漏洞</Title>,<Fofa>icon_hash="953405444"</Fofa>
<Title>用友GRP-U8-slbmbygr.jsp SQL注入漏洞</Title>,<Fofa>app="用友-GRP-U8"</Fofa>
<Title>OpenMetadata命令执行漏洞</Title>,<Fofa>icon_hash="733091897"</Fofa>
<Title>蓝凌OA-WechatLoginHelper.do SQL注入漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa>
<Title>联达OA-UpLoadFile.aspx任意文件上传漏洞</Title>,<Fofa>app="联达OA"</Fofa>
<Title>用友畅捷通TPlus-keyEdit.aspx接口存在SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>金和OA_MailTemplates.aspx_SQL注入漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>网康科技NS-ASG应用安全网关config_Anticrack.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关</Fofa>
<Title>富通天下外贸ERP任意文件上传漏洞</Title>,<Fofa>title="用户登录_富通天下外贸ERP"</Fofa>
<Title>大华智慧园区综合管理平台ipms接口远程代码执行漏洞</Title>,<Fofa>body="src=/WPMS/asset/common/js/jsencrypt.min.js</Fofa>
<Title>医院挂号系统SQL注入</Title>,<Fofa>body="res/img/ht_box_back.gif" || body="/res/img/ht_box_top.gif" || body="/res/img/ht_box_bottom.gif" || body="dom_loaded.load(init);"</Fofa>
<Title>大华智能物联综合管理平台justForTest用户登录漏洞</Title>,<Fofa>icon_hash="-1935899595"body="*客户端会小于800*"</Fofa>
<Title>用友U8 Cloud nc.bs.sm.login2.RegisterServlet SQL注入漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa>
<Title>大华DSS itcBulletin SQL注入漏洞</Title>,<Fofa>app="dahua-DSS"</Fofa>
<Title>大华DSS城市安防监控平台Struct2-045命令执行漏洞</Title>,<Fofa>app="dahua-DSS"</Fofa>
<Title>中成科信票务管理平台任意文件上传漏洞</Title>,<Fofa>body="技术支持:北京中成科信科技发展有限公司"</Fofa>
c
<Title>商混ERP-DictionaryEdit.aspx SQL注入漏洞</Title>,<Fofa>title="商混ERP系统"</Fofa>
<Title>用友U8-Cloud RegisterServlet接口SQL注入漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa>
<Title>广联达OA前台任意文件上传漏洞</Title>,<Fofa>fid="/yV4r5PdARKT4jaqLjJYqw=="</Fofa>
<Title>致远前台任意用户密码修改</Title>,<Fofa>app="致远互联-OA"</Fofa>
<Title>泛微-EMobile存在弱口令漏洞</Title>,<Fofa>app="泛微-EMobile"</Fofa>
<Title>Smartbi 内置用户登陆绕过</Title>,<Fofa>app="SMARTBI"</Fofa>
utm
<Title>WordPress-Automatic插件SQL注入漏洞</Title>,<Fofa>body="/wp-content/plugins/wp-automatic"</Fofa>
6
<Title>金蝶星空云K3Cloud反序列化漏洞</Title>,<Fofa>app="金蝶云星空-管理中心"</Fofa>
<Title>湖南建研质量监测系统upload.ashx文件上传漏洞</Title>,<Fofa>body="/Content/Theme/Standard/webSite/login.css"</Fofa>
<Title>山石网科云鉴存在前台任意命令执行漏洞</Title>,<Fofa>“山石云鉴主机安全管理系统”</Fofa>
<Title>IDocView接口任意文件读取漏洞</Title>,<Fofa>title="I Doc View"</Fofa>
<Title>万户OA text2Html接口任意文件读取漏洞</Title>,<Fofa>app="万户网络-ezOFFICE"</Fofa>
<Title>致远OA任意管理员登录漏洞</Title>,<Fofa>app="致远互联-OA"</Fofa>
<Title>正方教学管理信息服务平台ReportServer存在任意文件读取漏洞</Title>,<Fofa>body="正方软件股份有限公司" && title="教学管理信息服务平台</Fofa>
<Title>西软云XMS-futurehotel-query接口XXE漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa>
<Title>万户OA-RhinoScriptEngineService命令执行漏洞</Title>,<Fofa>app="万户网络-ezOFFICE"</Fofa>
<Title>泛微e-office系统UserSelect接口存在未授权访问漏洞</Title>,<Fofa>app="泛微-EOffice"</Fofa>
7
<Title>Laykefu客服系统任意文件上传漏洞</Title>,<Fofa>icon_hash="-334624619"</Fofa>
<Title>致远OA M3 Server 反序列化远程命令执行漏洞</Title>,<Fofa>M3-Server 已启动</Fofa>
<Title>飞企互联 FE 业务协作平台参数文件读取漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa>
<Title>Apache Ofbiz XML-RPC RCE漏洞-CVE-2023-49070</Title>,<Fofa>app="Apache_OFBiz"</Fofa>
<Title>F-logic DataCube3 SQL注入漏洞</Title>,<Fofa>title=="DataCube3"</Fofa>
<Title>iDocView upload接口任意文件读取漏洞</Title>,<Fofa>title="I Doc View"</Fofa>
<Title>海康威视CVE-2023-6895 IP网络对讲广播系统远程命令执行</Title>,<Fofa>icon_hash="-1830859634"</Fofa>
<Title>Yearning_front任意文件读取漏洞</Title>,<Fofa>app="Yearning"</Fofa>
<Title>Telesquare路由器远程代码执行漏洞(CVE-2024-29269)</Title>,<Fofa>title="Login to TLR-2005KSH" app="TELESQUARE-TLR-2005KSH"</Fofa>
<Title>奇安信天擎rptsvr接口任意文件上传漏洞</Title>,<Fofa>banner="QiAnXin web server" || banner="360 web server" || body="appid\":\"skylar6" || body="/task/index/detail?id={item.过期或者未授权,购买请联系4008-136-360</Fofa>
<Title>脸爱云 一脸通智慧管理平台任意用户添加漏洞</Title>,<Fofa>欢迎使用脸爱云 一脸通智慧管理平台</Fofa>
<Title>畅捷通TPlus-App_Code.ashx远程命令执行漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>大华EIMS-capture_handle接口远程命令执行漏洞</Title>,<Fofa>app:"大华 EIMS"</Fofa>
<Title>泛微E-Office-uploadfile.php任意文件上传漏洞</Title>,<Fofa>body="login.php"&&body="eoffice"||body="/general/login/index.php</Fofa>
<Title>云时空社会化商业ERP系统validateLoginName接口SQL注入漏洞</Title>,<Fofa>app="云时空社会化商业ERP系统"</Fofa>
<Title>云时空社会化商业ERP任意文件上传漏洞</Title>,<Fofa>app="云时空社会化商业ERP系统"</Fofa>
<Title>Draytek路由器addrouting命令执行漏洞</Title>,<Fofa>header="realm="VigorAP910C""</Fofa>
a
<Title>Cobbler存在远程命令执行漏洞(CVE-2021-40323)</Title>,<Fofa>"Cobbler Web Interface"</Fofa>
<Title>JumpServer 堡垒机未授权访问漏洞</Title>,<Fofa>icon_hash="-1162630024"</Fofa>
<Title>远秋医学培训系统未授权查看密码</Title>,<Fofa>title="远秋医学培训报名系统v1.0"</Fofa>
<Title>万户OA-upload任意文件上传漏洞</Title>,<Fofa>app="万户ezOFFICE协同管理平台"</Fofa>
<Title>西软云XMS反序列化漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa>
c
<Title>金和OA_uploadfileeditorsave接口任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>WordPress-thimpress_hotel_booking代码执行漏洞</Title>,<Fofa>body="wp-content/plugins/wp-hotel-booking"</Fofa>
<Title>蓝网科技临床浏览系统-documentUniqueId SQL注入漏洞复现(CVE-2024-4257)</Title>,<Fofa>app="LANWON-临床浏览系统"</Fofa>
<Title>CERIO-DT系列路由器Save.cgi接口命令执行漏洞</Title>,<Fofa>title="DT-100G-N" || title="DT-300N" || title="DT-100G" || title="AMR-3204G" || title="WMR-200N</Fofa>
<Title>WordPress_LayerSlider插件SQL注入漏洞</Title>,<Fofa>wp-content/plugins/LayerSlider/</Fofa>
<Title>海康威视-综合安防管理平台任意文件读取漏洞</Title>,<Fofa>综合安防管理平台</Fofa>
<Title>用友U8-Cloud TableInputOperServlet反序列化漏洞</Title>,<Fofa>app="用友-U8-Cloud" || body="/api/uclient/public/"</Fofa>
<Title>WordPress_Wholesale_Market插件存在任意文件读取漏洞</Title>,<Fofa>body="wp-content/plugins/wholesale-market"</Fofa>
<Title>亿赛通电子文档安全管理系统-jlockseniordao-findbylockname-sql注入漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa>
<Title>X2Modbus网关GetUser接口信息泄漏漏洞</Title>,<Fofa>server="SunFull-Webs"</Fofa>
<Title>OpenMetadata SpEL注入漏洞(CVE-2024-28848)</Title>,<Fofa>icon_hash="733091897"</Fofa>
<Title>蓝凌EIS智慧协同平台多个接口SQL注入</Title>,<Fofa>app="Landray-EIS智慧协同平台"</Fofa>
<Title>金蝶EAS myUploadFile任意文件上传漏洞</Title>,<Fofa>app="Kingdee-EAS"</Fofa>
<Title>广州图创图书馆集群管理系统updOpuserPw接口SQL注入漏洞</Title>,<Fofa>body="interlib/common/" || body="Interlib图书馆集群管理系统" || body="/interlib3/system_index" || body="打开Interlib主界面"</Fofa>
<Title>润乾报表dataSphereServlet任意文件上传漏洞</Title>,<Fofa>body="/raqsoft"</Fofa>
<Title>蓝凌OAsysUiComponent 文件存在任意文件上传漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa>
<Title>金和OA_CarCardInfo.aspx SQL注入漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>友点建站系统image_upload.php存在文件上传漏洞</Title>,<Fofa>app="友点建站-CMS"</Fofa>
<Title>IP-guard WebServer 远程命令执行漏洞</Title>,<Fofa> "IP-guard" && icon_hash="2030860561" </Fofa>
<Title>宝塔WAF防火墙SQL注入与未授权访问漏洞</Title>,<Fofa>title=='404 - Website not exist!' "宝塔"</Fofa>
<Title>致远M3敏感信息泄露漏洞</Title>,<Fofa>title="M3-Server"</Fofa>
<Title>aiohttp目录遍历漏洞(CVE-2024-23334)</Title>,<Fofa>app="aiohttp"</Fofa>
<Title>H3C网络管理系统任意文件读取漏洞</Title>,<Fofa>body="webui/js/jquerylib/jquery-1.7.2.min.js"</Fofa>
<Title>昂捷ERP WebService接口SQL注入漏洞</Title>,<Fofa>body="CheckSilverlightInstalled"</Fofa>
<Title>通天星-CMSV6 inspect_file-upload任意文件上传漏洞</Title>,<Fofa>body="./open/webApi.html"||body="/808gps/"</Fofa>
<Title>用友U8-Cloud接口FileManageServlet反序列漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa>
<Title>用友移动系统管理getFileLocal接口任意文件读取漏洞</Title>,<Fofa>app="用友-移动系统管理"</Fofa>
<Title>Array VPN任意文件读取漏洞</Title>,<Fofa>product="Array-VPN"</Fofa>
<Title>JFinalCMS 任意文件读取漏洞(CVE-2023-41599)</Title>,<Fofa>body="content=\"JreCms"</Fofa>
<Title>用友NC_CLOUD_smartweb2.RPC.d_XML外部实体注入漏洞</Title>,<Fofa>app="用友-UFIDA-NC"</Fofa>
<Title>金蝶Apusic应用服务器任意文件上传漏洞</Title>,<Fofa>app="Apusic应用服务器" fid="rqhtFwF4sIF7wTOroKTQGw=="</Fofa>
<Title>电信网关配置管理后台ipping.php命令执行漏洞</Title>,<Fofa>body="img/login_bg3.png" && body="系统登录"</Fofa>
<Title>大华智慧园区综合管理平台pageJson SQL注入漏洞</Title>,<Fofa>app="dahua-智慧园区综合管理平台"</Fofa>
<Title>锐捷EG易网关远程命令执行漏洞</Title>,<Fofa>app="Ruijie-EG易网关"</Fofa>
<Title>致远互联-OA前台fileUpload.do存在绕过文件上传漏洞</Title>,<Fofa>title="协同管理软件 V5.6SP1"</Fofa>
<Title>智跃人力资源管理系统GenerateEntityFromTable.aspx SQL注入漏洞</Title>,<Fofa>app="ZY-人力资源管理系统"</Fofa>
<Title>网康科技NS-ASG应用安全网关config_ISCGroupNoCache.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关"</Fofa>
<Title>WeiPHP SQL注入漏洞</Title>,<Fofa>app="WeiPHP"</Fofa>
<Title>GitLab任意用户密码重置漏洞(CVE-2023-7028)</Title>,<Fofa>app="GitLab"</Fofa>
<Title>金山终端安全系统V9.0 SQL注入漏洞</Title>,<Fofa>app="金山终端安全系统V9.0Web控制台" title=="用户登录-金山终端安全系统V9.0Web控制台"</Fofa>
<Title>金和OA_upload_json.asp存在任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>Salia PLCC cPH2 远程命令执行漏洞</Title>,<Fofa>html:"Salia PLCC"</Fofa>
<Title>WordPress Automatic Plugin任意文件下载漏洞</Title>,<Fofa>"/wp-content/plugins/wp-automatic"</Fofa>
<Title>JetBrains TeamCity 身份验证绕过漏洞(CVE-2024-27198)</Title>,<Fofa>body="Log in to TeamCity"</Fofa>
<Title>锐捷校园网自助服务系统SQL注入漏洞</Title>,<Fofa>title=="校园网自助服务系统"</Fofa>
<Title>Oracle WebLogic Server 远程代码执行漏洞 (CVE-2024-20931)</Title>,<Fofa>(body="Welcome to WebLogic Server") || (title=="Error 404--Not Found") || (((body="BEA WebLogic Serverver="Weblogic" || body="content=\"WebLogic Server" || body="Welcome to Weblogic Application" || body="BEA WebLogic Server") && header!="couchdb" && header!="boa" && header!="RouterOS" && header!="X-Generator: Drupal") || (banner="Weblogic" && banner!="couchdb" && banner!="drupal" && banner!=" Apache
<Title>思福迪运维安全管理系统test_qrcode_b远程命令执行漏洞</Title>,<Fofa>app="思福迪-LOGBASE"</Fofa>
<Title>宏景eHR报告组织收集树存在SQL注入漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa>
<Title>北京中科聚网一体化运营平台catchByUrl文件上传漏洞</Title>,<Fofa>body="thirdparty/ueditor/WordPaster"</Fofa>
<Title>禅道项目管理系统身份认证绕过漏洞</Title>,<Fofa>title="用户登录- 禅道"</Fofa>
<Title>金和OA任意文件读取漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>Confluence 未授权提权访问漏洞</Title>,<Fofa>app="ATLASSIAN-Confluence"</Fofa>
<Title>Apache OFBiz 身份验证绕过漏洞 (CVE-2023-51467)</Title>,<Fofa>app="Apache_OFBiz"</Fofa>
<Title>广州图创图书馆集群管理系统逻辑绕后导致未授权访问</Title>,<Fofa>body="广州图创计算机软件开发有限公司"</Fofa>
<Title>SysAid Server远程命令执行漏洞(CVE-2023-47246)</Title>,<Fofa>body="sysaid-logo-dark-green.png" || title="SysAid Help Desk Software" || body="Help Desk software <a href=\"hsysaid.com\">by SysAid</a>"</Fofa>
<Title>AJ-Report开源数据大屏远程命令执行漏洞</Title>,<Fofa>title="AJ-Report"</Fofa>
<Title>蓝凌EIS智慧协同平台rpt_listreport_definefield.aspx SQL注入漏洞</Title>,<Fofa>icon_hash="953405444"||app="Landray-OA系统"</Fofa>
<Title>Apache ActiveMQ 远程命令执行漏洞</Title>,<Fofa>app="APACHE-ActiveMQ" && port="61616"</Fofa>
<Title>红帆OA zyy_AttFile.asmx SQL注入漏洞</Title>,<Fofa>app="红帆-ioffice"</Fofa>
<Title>金盘移动图书馆系统任意文件上传漏洞</Title>,<Fofa>app="金盘软件-金盘移动图书馆系统"</Fofa>
<Title>科荣 AIO任意文件上传-目录遍历-任意文件读取漏洞</Title>,<Fofa>body="changeAccount('8000')"
<Title>用友NC-Cloud uploadChunk 任意文件上传漏洞</Title>,<Fofa>app="用友-NC-Cloud"</Fofa>
<Title>泛微e-cology-ProcessOverRequestByXml接口存在任意文件读取漏洞</Title>,<Fofa>body="/js/ecology8" || body="wui/common/css/w7OVFont_wev8.css" || (body="weaver" && body="ecology"ecology_JSessionId" && body="login/Login.jsp") || body="/wui/index.html" || body="jquery_wev8" && body="/login/Login.jsp?logintype=1</Fofa>
<Title>泛微云桥 e-Bridge addTaste接口SQL注入漏洞</Title>,<Fofa>app="泛微-云桥e-Bridge"</Fofa>
<Title>用友政务财务系统任意文件读取漏洞</Title>,<Fofa>app="用友-政务财务系统"</Fofa>
<Title>华为Auth-Http Server 1.0任意文件读取漏洞</Title>,<Fofa>server="Huawei Auth-Http Server 1.0"</Fofa>
<Title>天擎终端安全管理系统YII_CSRF_TOKEN远程代码执行漏洞</Title>,<Fofa>title="360新天擎" || body="appid\":\"skylar6" || body="/task/index/detail?id={item.id}" || body="已过期或者8-136-360" || title="360天擎" || title="360天擎终端安全管理系统"</Fofa>
<Title>西软云XMS-futurehotel-operate接口XXE漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa>
<Title>易宝OA ExecuteSqlForSingle SQL注入漏洞</Title>,<Fofa>"顶讯科技"
<Title>某微E-Office9文件上传漏洞 CVE-2023-2523</Title>,<Fofa>app="泛微-EOffice"</Fofa>
<Title>亿赛通电子文档安全管理系统DecryptApplication任意文件读取漏洞</Title>,<Fofa>app="亿赛通电子文档安全管理系统"</Fofa>
<Title>用友U8-Cloud接口ServiceDispatcherServlet反序列漏洞</Title>,<Fofa>app="用友-NC-Cloud"</Fofa>
<Title>联达OA uploadLogo.aspx任意文件上传漏洞</Title>,<Fofa>app="联达OA"</Fofa>
<Title>通达OA down.php接口未授权访问漏洞</Title>,<Fofa>app="TDXK-通达OA"</Fofa>
<Title>万户ezOFFICE-wf_printnum.jsp SQL注入漏洞</Title>,<Fofa>app="万户ezOFFICE协同管理平台"</Fofa>
<Title>红海云EHR系统PtFjk.mob任意文件上传漏洞</Title>,<Fofa>body="/RedseaPlatform/skins/images/favicon.ico"</Fofa>
<Title>万户 ezOFFICE DocumentEdit.jsp SQL注入</Title>,<Fofa>app="ezOFFICE协同管理平台"</Fofa>
<Title>云匣子堡垒机fastjson反序列化漏洞</Title>,<Fofa>body="type=application/x-xtx-axhost" && cert="云匣子" app="云安宝-云匣子"</Fofa>
<Title>Ncast高清智能录播系统存在任意文件读取漏洞</Title>,<Fofa>app="Ncast-产品" && title=="高清智能录播系统"</Fofa>
<Title>泛微e-cology接口getLabelByModule存在SQL注入漏洞</Title>,<Fofa>app="泛微-E-Weaver"</Fofa>
<Title>金和OA_SAP_B1Config.aspx未授权访问漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>用友NC-Cloud_importhttpscer接口任意文件上传漏洞</Title>,<Fofa>app="用友-NC-Cloud"</Fofa>
<Title>D-Link_DAR-8000-10上网行为审计网关任意文件上传漏洞</Title>,<Fofa>body="DAR-8000-10" && title="D-Link"</Fofa>
<Title>网神SecGate 3600防火墙sys_hand_upfile任意文件上传漏洞</Title>,<Fofa>body="./images/lsec/login/loading.gif" title="网神SecGate 3600防火墙"</Fofa>
<Title>用友U8-CRM客户关系管理系统任意文件读取漏洞</Title>,<Fofa>app="用友U8CRM"</Fofa>
<Title>EasyCVR 视频管理平台用户信息泄露</Title>,<Fofa>title="EasyCVR"</Fofa>
<Title>Netgear路由器boardDataWW.php存在RCE漏洞</Title>,<Fofa>title=="Netgear"</Fofa>
<Title>亿赛通-数据泄露防护(DLP)ClientAjax接口任意文件读取漏洞</Title>,<Fofa>body="CDGServer3" || title="电子文档安全管理系统" || cert="esafenet" || body="/help/getEditionInfo.jsp"</Fofa>
<Title>时空智友企业流程化管控系统SQL注入漏洞</Title>,<Fofa>body="企业流程化管控系统" && body="密码(Password):"</Fofa>
<Title>大华智慧园区综合管理平台bitmap接口任意文件上传漏洞</Title>,<Fofa>app="dahua-智慧园区综合管理平台"</Fofa>
<Title>通达OA SQL注入漏洞 CVE-2023-4165</Title>,<Fofa>app="TDXK-通达OA" && icon_hash="-759108386"</Fofa>
<Title>用友GRP-U8 SelectDMJE.jsp_SQL注入漏洞</Title>,<Fofa>app="用友-GRP-U8"</Fofa>
<Title>天融信TOPSEC_static_convert远程命令执行漏洞</Title>,<Fofa>app="天融信-上网行为管理系统"</Fofa>
<Title>金蝶OA-EAS系统 uploadLogo.action 任意文件上传漏洞</Title>,<Fofa>app="Kingdee-EAS"</Fofa>
<Title>网康科技NS-ASG应用安全网关SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关"</Fofa>
<Title>JeePlus低代码开发平台存在SQL注入漏洞</Title>,<Fofa>app="JeePlus"</Fofa>
<Title>omfyUI follow_symlinks文件读取漏洞</Title>,<Fofa>app="ComfyUI"</Fofa>
<Title>亿赛通电子文档安全管理系统远程命令执行漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa>
<Title>和丰多媒体信息发布系统QH.aspx文件上传漏洞</Title>,<Fofa>app="和丰山海-数字标牌"</Fofa>
<Title>CloudPanel任意文件上传漏洞</Title>,<Fofa>title=="CloudPanel | Log In"</Fofa>
<Title>宏景eHR-HCM任意文件读取漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa>
<Title>Pkpmbs建设工程质量监督系统文件上传漏洞</Title>,<Fofa>body="/Content/Theme/Standard/"</Fofa>
<Title>泛微E-Office远程代码执行漏洞</Title>,<Fofa>app="泛微-EOffice" && body="eoffice_loading_tip" && body="eoffice10"</Fofa>
<Title>金和OA_HomeService.asmx SQL注入</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>万户ezOFFICE wpsservlet任意文件上传漏洞</Title>,<Fofa>app="万户网络-ezOFFICE"</Fofa>
<Title>易宝OA系统DownloadFile接口文件读取漏洞</Title>,<Fofa>顶讯科技</Fofa>
<Title>浙大恩特客户资源管理系统文件上传和SQL注入漏洞</Title>,<Fofa>app="浙大恩特客户资源管理系统"</Fofa>
<Title>金蝶EAS_pdfviewlocal任意文件读取漏洞</Title>,<Fofa>app="Apusic应用服务器"</Fofa>
<Title>速达软件全系产品存在任意文件上传漏洞</Title>,<Fofa>app="速达软件-公司产品"</Fofa>
<Title>MetaCRM客户关系管理系统任意文件上传漏洞</Title>,<Fofa>body="/common/scripts/basic.js" product="美特软件-MetaCRM6"</Fofa>
<Title>PAN-OS安全设备命令执行漏洞</Title>,<Fofa>icon_hash="-631559155"</Fofa>
<Title>用友U8-OA协同工作系统doUpload.jsp任意文件上传漏洞</Title>,<Fofa>"用友U8 Cloud"</Fofa>
<Title>网动统一通信平台ActiveUC存在任意文件下载漏洞</Title>,<Fofa>title="网动统一通信平台(Active UC)"</Fofa>
<Title>广联达-linkworks-gwgdwebservice SQL注入漏洞</Title>,<Fofa>header="Services/Identification/login.ashx" || banner="Services/Identification/login.ashx"</Fofa>
<Title>网络验证系统getInfo参数SQL注入漏洞</Title>,<Fofa>body="zhuya/js/base.js"</Fofa>
<Title>用友U8-Cloud upload任意文件上传漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa>
<Title>天融信TOPSEC_maincgi.cgi远程命令执行</Title>,<Fofa>title="Web User Login" && body="/cgi/maincgi.cgi?Url=VerifyCode"</Fofa>
<Title>帆软报表 V8 get_geo_json 任意文件读取漏洞</Title>,<Fofa>body="isSupportForgetPwd"</Fofa>
<Title>飞鱼星上网行为管理系统企业版前台RCE</Title>,<Fofa>title="飞鱼星企业" title="飞鱼星企业级智能上网行为管理系统"</Fofa>
<Title>卡车卫星定位系统create存在未授权密码重置漏洞</Title>,<Fofa>icon_hash="1553867732"</Fofa>
<Title>泛微E-Office-jx2_config存在信息泄露漏洞</Title>,<Fofa>app="泛微-EOffice"</Fofa>
<Title>绿盟日志审计系统命令执行漏洞</Title>,<Fofa>fofa
```
"<title>{{platformName}}</title>" && icon_hash="-1566499661"
```
<Title>新视窗新一代物业管理系统任意文件上传漏洞</Title>,<Fofa>body="BPMSite/ClientSupport/OCXInstall.aspx"</Fofa>
<Title>锐捷RG-UAC统一上网行为管理与审计系统管理员密码泄露</Title>,<Fofa>title="RG-UAC登录页面" && body="admin"</Fofa>
<Title>宏景HCM系统infoView处SQL注入漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa>
<Title>用友NC_saveImageServlet接口存在文件上传漏洞</Title>,<Fofa>icon_hash="1085941792" app="用友-UFIDA-NC"</Fofa>
<Title>亿赛通电子文档安全管理系统接口dataSearch.jsp SQL注入漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa>
<Title>联软安全数据交换系统任意文件读取</Title>,<Fofa>body="UniExServices"</Fofa>
<Title>奇安信360天擎getsimilarlist SQL注入漏洞</Title>,<Fofa>body="/task/index/detail?id={item.id}" title="360新天擎"</Fofa>
<Title>多个防火墙产品远程代码执行漏洞</Title>,<Fofa>body="/webui/images/default/default/alert_close.jpg"</Fofa>
<Title>云网OA8.6 fastjson反序列化漏洞</Title>,<Fofa>"云网OA"</Fofa>
<Title>用友CRM-swfupload接口任意文件上传漏洞</Title>,<Fofa>body="用友U8CRM"</Fofa>
<Title>Jan任意文件上传漏洞</Title>,<Fofa>icon_hash="-165268926"</Fofa>
<Title>铭飞CMS list接口SQL注入漏洞</Title>,<Fofa>body="铭飞MCMS" || body="/mdiy/formData/save.do" || body="static/plugins/ms/1.0.0/ms.js</Fofa>
<Title>湖南建研-检测系统 admintool 任意文件上传漏洞</Title>,<Fofa>body="/Content/Theme/Standard/webSite/login.css"</Fofa>
<Title>用友NC的download文件存在任意文件读取漏洞</Title>,<Fofa>app="用友-UFIDA-NC"</Fofa>
<Title>用友移动系统管理uploadApk接口任意文件上传漏洞</Title>,<Fofa>body="../js/jslib/jquery.blockUI.js"</Fofa>
<Title>金石工程项目管理系统TianBaoJiLu.aspx SQL注入漏洞</Title>,<Fofa>body="金石工程项目管理系统"</Fofa>
<Title>海康运行管理中心fastjson远程命令执行漏洞</Title>,<Fofa>header="X-Content-Type-Options: nosniff" && body="<h1>Welcome to OpenResty!</h1>" && header="X-Xss-Protection: 1; mode=block"</Fofa>
<Title>用友U8cloud-ExportUfoFormatAction SQL注入漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa>
<Title>Jeecg任意文件上传漏洞</Title>,<Fofa>app="JEECG"</Fofa>
<Title>脸爱云一脸通智慧管理平台存在downloads.aspx信息泄露漏洞</Title>,<Fofa>body="View/UserReserved/UserReservedTest.aspx"</Fofa>
<Title>泛微E-Mobile-client.do存在命令执行漏洞</Title>,<Fofa> "Weaver E-Mobile" </Fofa>
<Title>海康威视综合安防管理平台信息泄露</Title>,<Fofa>app="HIKVISION-综合安防管理平台"</Fofa>
<Title>Adobe ColdFusion任意文件读取漏洞CVE-2024-20767</Title>,<Fofa>app="Adobe-ColdFusion"</Fofa>
<Title>通天星CMSV6车载视频监控平台downloadLogger接口任意文件读取漏洞</Title>,<Fofa>body="./open/webApi.html"||body="/808gps/"</Fofa>
<Title>用友NC uapws wsdl XXE漏洞</Title>,<Fofa>app="用友-UFIDA-NC"</Fofa>
<Title>WordPress Listingo 文件上传漏洞</Title>,<Fofa>body="wp-content/themes/listingo"</Fofa>
<Title>F-logic DataCube3任意文件上传漏洞</Title>,<Fofa>title=="DataCube3"</Fofa>
<Title>H3C-校园网自助服务系统flexfileupload任意文件上传漏洞</Title>,<Fofa>header="/selfservice"</Fofa>
<Title>潍微科技-水务信息管理平台ChangePwd接口存在SQL注入漏洞</Title>,<Fofa>icon_hash="-491165370"</Fofa>
<Title>TendaT路由器账号密码泄露</Title>,<Fofa>title="Tenda | LOGIN" && country="CN"</Fofa>
<Title>浙大恩特客户资源管理系统crmbasicaction任意文件上传</Title>,<Fofa>app="浙大恩特客户资源管理系统"</Fofa>
<Title>亿赛通电子文档安全管理系统UploadFileList任意文件读取漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa>
<Title>先锋WEB燃气收费系统文件上传漏洞</Title>,<Fofa>app="先锋WEB燃气收费系统"</Fofa>
<Title>金和OA_jc6_Upload任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"||body="/jc6/platform/sys/login</Fofa>
<Title>奥威亚视频云平台VideoCover.aspx接口存在任意文件上传漏洞</Title>,<Fofa>body="/Upload/DomainInfo/MaxAVALogo.png"</Fofa>
<Title>大华智能物联ICC综合管理平台readpic任意文件读取漏洞</Title>,<Fofa>:body="*客户端会小于800*"</Fofa>
<Title>好视通视频会议系统 toDownload.do接口任意文件读取漏洞</Title>,<Fofa>好视通视频会议系统 toDownload.do接口任意文件读取漏洞</Fofa>
<Title>福建科立讯通信指挥调度平台get_extension_yl.php SQL注入漏洞</Title>,<Fofa>body="app/structure/departments.php"||app="指挥调度管理平台"</Fofa>
<Title>HiKVISION 综合安防管理平台任意文件上传漏洞</Title>,<Fofa>app="HIKVISION-iSecure-Center"</Fofa>
<Title>亿赛通电子文档安全管理系统 UploadFileToCatalog SQL注入漏洞</Title>,<Fofa>body="/CDGServer3/index.jsp"</Fofa>
<Title>通达OA SQL注入漏洞 CVE-2023-4166</Title>,<Fofa>app="TDXK-通达OA" && icon_hash="-759108386"</Fofa>
<Title>通达OA header身份认证绕过漏洞</Title>,<Fofa>title="office Anywhere"</Fofa>
<Title>D-Link_DAR-8000操作系统命令注入漏洞</Title>,<Fofa>body="DAR-8000-10" && title="D-Link"</Fofa>
<Title>协达OA系统绕过登录认证登陆后台</Title>,<Fofa>body="/interface/CheckLoginName.jsp"</Fofa>
<Title>JEEVMS仓库管理系统任意文件读取漏洞</Title>,<Fofa>body="plug-in/lhgDialog/lhgdialog.min.js?skin=metro"或者fid="cC2r/XQpJXcYiYFHOc77bg=="</Fofa>
<Title>WordPress插件NotificationX存在sql注入漏洞</Title>,<Fofa>body="/wp-content/plugins/notificationx"</Fofa>
<Title>360天擎 - 未授权与SQL注入漏洞</Title>,<Fofa>title="360新天擎" && ip.isp="教育"</Fofa>
<Title>亿赛通电子文档安全管理系统hiddenWatermark文件上传漏洞</Title>,<Fofa>app="亿赛通电子文档安全管理系统"</Fofa>
<Title>东华医疗协同办公系统文件上传漏洞</Title>,<Fofa>body="东华医疗协同办公系统"</Fofa>
<Title>H3C-SecParh堡垒机任意用户登录漏洞</Title>,<Fofa>app="H3C-SecPath-运维审计系统" && body="2018"</Fofa>
<Title>用友NC_grouptemplet文件上传漏洞</Title>,<Fofa>title="YONYOU NC"</Fofa>
;q
<Title>用友GRPA++Cloud政府财务云任意文件读取漏洞</Title>,<Fofa>body="/pf/portal/login/css/fonts/style.css"</Fofa>
<Title>OfficeWeb365_任意文件读取漏洞</Title>,<Fofa>body="请输入furl参数" || header="OfficeWeb365" || banner="OfficeWeb365"</Fofa>
<Title>用友NC word.docx任意文件读取漏洞</Title>,<Fofa>body="UClient.dmg"</Fofa>
<Title>图创图书馆集群管理系统SQL注入漏洞</Title>,<Fofa>body="interlib"</Fofa>
<Title>飞企互联Ognl表达式注入导致RCE</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa>
<Title>Hytec Inter HWL-2511-SS popen.cgi命令注入漏洞</Title>,<Fofa>title="index" && header="lighttpd/1.4.30"</Fofa>
<Title>大华智慧园区综合管理平台 deleteFtp 远程命令执行漏洞</Title>,<Fofa>body="src=/WPMS/asset/common/js/jsencrypt.min.js"</Fofa>
<Title>用友NC-bill SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792" && body="/logo/images/logo.gif"</Fofa>
<Title>LiveGBS存在逻辑缺陷漏洞</Title>,<Fofa>icon_hash="-206100324"</Fofa>
<Title>用友畅捷通RRATableController存在反序列化漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>易宝OA系统任意文件上传漏洞</Title>,<Fofa>title="欢迎登录易宝OA系统"</Fofa>
<Title>泛微getE9DevelopAllNameValue2接口存在任意文件读取漏洞</Title>,<Fofa>app="泛微-OA(e-cology)"</Fofa>
<Title>海康威视安全接入网关任意文件读取漏洞</Title>,<Fofa>body="webui/js/jquerylib/jquery-1.7.2.min.js" && product="ABT-应用网关" || body="webui/js/jquerylib/jquery-1.7.2.min.js" 安全网关</Fofa>
<Title>福建科立讯通信有限公司指挥调度管理平台RCE漏洞</Title>,<Fofa>指挥调度管理平台</Fofa>
Z
<Title>广联达OA任意用户登录漏洞</Title>,<Fofa>fid="/yV4r5PdARKT4jaqLjJYqw=="</Fofa>
<Title>普元EOS-Platform-jmx.jmx远程代码执行漏洞</Title>,<Fofa>body="普元" || (body="ame.primeton.com" && body="eos-web")</Fofa>
<Title>奇安信网康下一代防火墙directdata远程命令执行漏洞</Title>,<Fofa>app="网康下一代防火墙"</Fofa>
<Title>天翼应用虚拟化系统sql注入漏洞</Title>,<Fofa>title="瑞友天翼-应用虚拟化系统" </Fofa>
<Title>金蝶Apusic应用服务器loadTree JNDI注入漏洞</Title>,<Fofa>app="Apusic应用服务器"</Fofa>
<Title>SpringBlade框架dict-biz接口SQL注入漏洞</Title>,<Fofa>body="Saber 将不能正常工作"</Fofa>
<Title>华夏ERP管理员信息泄露漏洞</Title>,<Fofa>icon_hash="-1298131932"</Fofa>
<Title>SpiderFlow爬虫平台远程命令执行漏洞</Title>,<Fofa>app="SpiderFlow"</Fofa>
<Title>致远互联FE协作办公平台editflow_manager存在sql注入漏洞</Title>,<Fofa>title="FE协作办公平台" || body="li_plugins_download"</Fofa>
<Title>Secnet安网智能AC管理系统actpt_5g信息泄露</Title>,<Fofa>title="安网-智能路由系统" || header="HTTPD_ac 1.0"</Fofa>
<Title>脸爱云一脸通智慧管理平台存在UpLoadPic.ashx文件上传漏洞</Title>,<Fofa>body="View/UserReserved/UserReservedTest.aspx"</Fofa>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment