-
-
Save Rvn0xsy/39ed264a2db15ec58fd13432d58c41e6 to your computer and use it in GitHub Desktop.
We can make this file beautiful and searchable if this error is corrected: Illegal quoting in line 1.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<Title>用友畅捷通-TPlus-CheckMutex存在SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>红帆OA iorepsavexml.aspx 文件上传漏洞</Title>,<Fofa>title="iOffice.net"</Fofa> | |
9 | |
<Title>泛微e-office 未授权访问</Title>,<Fofa>(body="login.php"&&body="eoffice")||body="/general/login/index.php" | |
<Title>SANGFOR终端检测响应平台任意用户免密登录及前台RCE漏洞</Title>,<Fofa>title="SANGFOR终端检测响应平台" icon_hash="1307354852"</Fofa> | |
<Title>用友U8 Cloud SQL注入漏洞</Title>,<Fofa>app="用友U8 Cloud"</Fofa> | |
<Title>用友NC-runStateServlet接口SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792"</Fofa> | |
<Title>金和OA_jc6_ntko-upload任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>泛微e-cology 9 SQL注入漏洞</Title>,<Fofa>app="泛微-协同商务系统"</Fofa> | |
%3CTitle%3EIP-guard WebServer存在权限绕过漏洞(QVD-2024-14103)%3C/Title%3E,<Fofa>icon_hash="2030860561"%3C/Fofa%3E | |
<Title>用友时空KSOA-linkadd.jsp SQL注入漏洞</Title>,<Fofa>title="企业信息系统门户"</Fofa> | |
<Title>Jenkins任意文件读取漏洞(CVE-2024-23897)</Title>,<Fofa>app="Jenkins"</Fofa> | |
<Title>飞企互联FE协作平台任意登录漏洞</Title>,<Fofa>app="FE-协作平台" app="飞企互联-FE企业运营管理平台"</Fofa> | |
<Title>用友畅捷通TPlus-InitServerInfo存在SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>福建科立讯通信指挥调度管理平台ajax_users.php SQL注入漏洞</Title>,<Fofa>body="app/structure/departments.php"||app="指挥调度管理平台"</Fofa> | |
<Title>泛微E-Mobile命令执行漏洞</Title>,<Fofa> "Weaver E-Mobile" </Fofa> | |
<Title>用友移动管理平台uploadIcon任意文件上传漏洞</Title>,<Fofa>app="用友-移动系统管理"</Fofa> | |
<Title>金和OA jc6 clobfield SQL注入漏洞</Title>,<Fofa>title="金和协同管理平台" || body="js/PasswordCommon.js" || body="js/PasswordNew.js" || body="Jinher Network" || (body="c6/Jhs && body="CloseWindowNoAsk") || header="Path=/jc6" || (body="JC6金和协同管理平台" && body="src=\"/jc6/platform/") || body="window.location = \"JHSoft.MobileApp/Default.htm\";" || Path=/jc6"</Fofa> | |
<Title>东华医疗协同办公系统反序列化漏洞</Title>,<Fofa>body="东华医疗协同办公系统"</Fofa> | |
<Title>飞企互联-FE企业运营管理平台publicData.jsp存在SQL注入漏洞</Title>,<Fofa>app="FE-协作平台" app="飞企互联-FE企业运营管理平台"</Fofa> | |
<Title>瑞友应用虚拟化系统-RAPAgent命令执行漏洞</Title>,<Fofa>title="瑞友天翼-应用虚拟化系统"</Fofa> | |
<Title>宏景eHR人力资源管理软件showmediainfo存在SQL注入漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa> | |
<Title>脸爱云一脸通智慧平台SelOperators信息泄露漏洞</Title>,<Fofa>body="View/UserReserved/UserReservedTest.aspx"</Fofa> | |
<Title>东方通TongWeb-selectApp.jsp任意文件上传漏洞</Title>,<Fofa>header="TongWeb Server" || banner="Server: TongWeb Server"</Fofa> | |
<Title>捷诚管理信息系统SQL注入漏洞</Title>,<Fofa>body="/Scripts/EnjoyMsg.js"</Fofa> | |
<Title>致远OA_getAjaxDataServlet接口存在XML实体注入漏洞</Title>,<Fofa>app="致远互联-OA"</Fofa> | |
<Title>帮管客CRM-jiliyu接口SQL漏洞</Title>,<Fofa>"帮管客-CRM"</Fofa> | |
<Title>Ncast盈可视高清智能录播系统RCE漏洞</Title>,<Fofa>app="Ncast-产品" && title=="高清智能录播系统"</Fofa> | |
<Title>网神防火墙app_av_import_save文件上传漏洞</Title>,<Fofa>title="网神SecGate 3600防火墙"</Fofa> | |
<Title>用友NC_Cloud soapFormat.ajax接口XXE漏洞</Title>,<Fofa>body="/Client/Uclient/UClient.exe"||body="ufida.ico"||body="nccloud"||body="/api/uclient/public/"</Fofa> | |
<Title>WordPress-js-support-ticket文件上传漏洞</Title>,<Fofa>body="wp-content/plugins/js-support-ticket"</Fofa> | |
<Title>用友时空KSOA-imagefield接口SQL注入漏洞</Title>,<Fofa>app="用友-时空KSOA"</Fofa> | |
<Title>迪普DPTech VPN 任意文件读取 CNVD-2023-69478</Title>,<Fofa>title=="SSL VPN Service" && header="Dptech" || cert="DPtechCa"</Fofa> | |
<Title>通达OA get_datas.php SQL注入漏洞</Title>,<Fofa>app="TDXK-通达OA"</Fofa> | |
<Title>网康NS-ASG应用安全网关singlelogin.php SQL注入漏洞</Title>,<Fofa>app="网康NS-ASG应用安全网关"</Fofa> | |
<Title>致远M1 usertokenservice 反序列化RCE漏洞</Title>,<Fofa>"M1-Server 已启动"</Fofa> | |
<Title>畅捷通TPlus-KeyInfoList.aspx SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>深信服下一代防火墙NGAF任意文件读取漏洞</Title>,<Fofa>Redirect.php?url=/LogInOut.php && port="85"</Fofa> | |
<Title>蓝凌EKP前台授权绕过导致文件上传漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa> | |
<Title>Progress-Flowmon命令注入漏洞</Title>,<Fofa>body="Flowmon-Web-Interface"</Fofa> | |
<Title>亿赛通电子文档安全管理系统任意文件读取漏洞</Title>,<Fofa>app="亿赛通电子文档安全管理系统"</Fofa> | |
<Title>亿赛通电子文档uploadFile接口文件上传漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa> | |
<Title>RG-UAC锐捷统一上网行为管理与审计系统远程代码执行漏洞</Title>,<Fofa>app="Ruijie-RG-UAC"</Fofa> | |
<Title>Panalog大数据日志审计系统libres_syn_delete.php命令执行漏洞</Title>,<Fofa>app="Panabit-Panalog"</Fofa> | |
<Title>易思智能物流无人值守系统5.0任意文件上传漏洞</Title>,<Fofa>"智能物流无人值守系统"</Fofa> | |
<Title>蓝凌OA treexml.tmpl 远程命令执行漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa> | |
<Title>惠尔顿-网络安全审计系统任意文件读取漏洞</Title>,<Fofa>app="惠尔顿-网络安全审计系统"</Fofa> | |
<Title>鸿运(通天星CMSV6车载)主动安全监控云平台任意文件读取漏洞</Title>,<Fofa>body="./open/webApi.html"||body="/808gps/</Fofa> | |
<Title>飞企互联-FE企业运营管理平台uploadAttachmentServlet任意文件上传漏洞</Title>,<Fofa>app="FE-协作平台"</Fofa> | |
<Title>用友U9-PatchFile.asmx接口任意文件上传漏洞</Title>,<Fofa>body="logo-u9.png"</Fofa> | |
<Title>金蝶云-星空ServiceGateway反序列化漏洞</Title>,<Fofa>body="kdUtils.min.js"</Fofa> | |
<Title>WIFISKY 7层流控路由器confirm.php接口RCE漏洞</Title>,<Fofa>title="WIFISKY 7层流控路由器"</Fofa> | |
<Title>MajorDoMo-thumb.php未授权RCE漏洞复现</Title>,<Fofa>app="MajordomoSL"</Fofa> | |
<Title>用友NC接口saveXmlToFIleServlet文件上传漏洞</Title>,<Fofa>title:"YONYOU NC"</Fofa> | |
<Title>用友畅捷通TPlus任意文件读取漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>宏景DisplayFiles任意文件读取漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa> | |
<Title>亿赛通电子文档安全管理系统XStream反序列化漏洞</Title>,<Fofa>title="电子文档安全管理系统"</Fofa> | |
<Title>浙江宇视isc网络视频录像机远程命令执行漏洞</Title>,<Fofa>body="Alarm" && body="白牌定制"</Fofa> | |
<Title>用友U9企业版任意文件上传漏洞</Title>,<Fofa>title==" U9-登录 "</Fofa> | |
<Title>ZenML服务器远程权限提升漏洞(CVE-2024-25723)</Title>,<Fofa>title=="ZenML - Dashboard"</Fofa> | |
<Title>全程云OA__ajax.ashx SQL注入漏洞</Title>,<Fofa>app:"全程云OA"</Fofa> | |
<Title>魔方网表mailupdate.jsp接口存在任意文件上传漏洞</Title>,<Fofa>icon_hash="694014318"</Fofa> | |
<Title>用友NC-avatar接口存在文件上传漏洞</Title>,<Fofa>body="/Client/Uclient/UClient.exe"</Fofa> | |
<Title>飞企互联-FE企业运营管理平台登录绕过漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa> | |
<Title>Backdoor Authentication Bypass and Command Injection in D-Link NAS</Title>,<Fofa>body="Text:In order to access the ShareCenter"</Fofa> | |
20 | |
<Title>安美数字酒店宽带运营系统SQL注入漏洞</Title>,<Fofa>title=酒店宽带运营系统</Fofa> | |
<Title>泛微OA-E-Cology-FileDownload文件读取漏洞</Title>,<Fofa>app="泛微-OA(e-cology”)</Fofa> | |
<Title>医院一站式后勤管理系统任意文件上传漏洞</Title>,<Fofa>body="frameworkModuleJob" "版权所有:南京博纳睿通软件科技有限公司"</Fofa> | |
<Title>飞企互联FE企业运营管理平台ProxyServletUti存在任意文件读取漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa> | |
<Title>H3C Magic B1STV100R012 远程代码执行漏洞</Title>,<Fofa>app="H3C-Ent-Router"</Fofa> | |
<Title>SpringBlade export-user SQL 注入漏洞</Title>,<Fofa>body="https://bladex.vip"</Fofa> | |
<Title>用友GRP-U8 bx_historyDataCheck.jsp SQL注入漏洞</Title>,<Fofa>app="yonyou-GRP-U8"</Fofa> | |
<Title>网康科技NS-ASG应用安全网关add_postlogin.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关"</Fofa> | |
<Title>用友NC接口PaWfm SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792" app="用友-UFIDA-NC"</Fofa> | |
<Title>明御安全网关远程命令执行漏洞</Title>,<Fofa>title="明御安全网关"</Fofa> | |
<Title>用友NC-workflowImageServlet接口SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792" </Fofa> | |
<Title>用友NC接口ConfigResourceServlet反序列漏洞</Title>,<Fofa>icon_hash="1085941792" app="用友-UFIDA-NC"</Fofa> | |
<Title>普元EOS-Platform-eos.jmx存在远程代码执行漏洞</Title>,<Fofa>body="普元" || (body="ame.primeton.com" && body="eos-web")</Fofa> | |
<Title>蓝凌EIS智慧协同平台saveImg接口任意文件上传漏洞</Title>,<Fofa>icon_hash="953405444"</Fofa> | |
<Title>用友GRP-U8-slbmbygr.jsp SQL注入漏洞</Title>,<Fofa>app="用友-GRP-U8"</Fofa> | |
<Title>OpenMetadata命令执行漏洞</Title>,<Fofa>icon_hash="733091897"</Fofa> | |
<Title>蓝凌OA-WechatLoginHelper.do SQL注入漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa> | |
<Title>联达OA-UpLoadFile.aspx任意文件上传漏洞</Title>,<Fofa>app="联达OA"</Fofa> | |
<Title>用友畅捷通TPlus-keyEdit.aspx接口存在SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>金和OA_MailTemplates.aspx_SQL注入漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>网康科技NS-ASG应用安全网关config_Anticrack.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关</Fofa> | |
<Title>富通天下外贸ERP任意文件上传漏洞</Title>,<Fofa>title="用户登录_富通天下外贸ERP"</Fofa> | |
<Title>大华智慧园区综合管理平台ipms接口远程代码执行漏洞</Title>,<Fofa>body="src=/WPMS/asset/common/js/jsencrypt.min.js</Fofa> | |
<Title>医院挂号系统SQL注入</Title>,<Fofa>body="res/img/ht_box_back.gif" || body="/res/img/ht_box_top.gif" || body="/res/img/ht_box_bottom.gif" || body="dom_loaded.load(init);"</Fofa> | |
<Title>大华智能物联综合管理平台justForTest用户登录漏洞</Title>,<Fofa>icon_hash="-1935899595"body="*客户端会小于800*"</Fofa> | |
<Title>用友U8 Cloud nc.bs.sm.login2.RegisterServlet SQL注入漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa> | |
<Title>大华DSS itcBulletin SQL注入漏洞</Title>,<Fofa>app="dahua-DSS"</Fofa> | |
<Title>大华DSS城市安防监控平台Struct2-045命令执行漏洞</Title>,<Fofa>app="dahua-DSS"</Fofa> | |
<Title>中成科信票务管理平台任意文件上传漏洞</Title>,<Fofa>body="技术支持:北京中成科信科技发展有限公司"</Fofa> | |
c | |
<Title>商混ERP-DictionaryEdit.aspx SQL注入漏洞</Title>,<Fofa>title="商混ERP系统"</Fofa> | |
<Title>用友U8-Cloud RegisterServlet接口SQL注入漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa> | |
<Title>广联达OA前台任意文件上传漏洞</Title>,<Fofa>fid="/yV4r5PdARKT4jaqLjJYqw=="</Fofa> | |
<Title>致远前台任意用户密码修改</Title>,<Fofa>app="致远互联-OA"</Fofa> | |
<Title>泛微-EMobile存在弱口令漏洞</Title>,<Fofa>app="泛微-EMobile"</Fofa> | |
<Title>Smartbi 内置用户登陆绕过</Title>,<Fofa>app="SMARTBI"</Fofa> | |
utm | |
<Title>WordPress-Automatic插件SQL注入漏洞</Title>,<Fofa>body="/wp-content/plugins/wp-automatic"</Fofa> | |
6 | |
<Title>金蝶星空云K3Cloud反序列化漏洞</Title>,<Fofa>app="金蝶云星空-管理中心"</Fofa> | |
<Title>湖南建研质量监测系统upload.ashx文件上传漏洞</Title>,<Fofa>body="/Content/Theme/Standard/webSite/login.css"</Fofa> | |
<Title>山石网科云鉴存在前台任意命令执行漏洞</Title>,<Fofa>“山石云鉴主机安全管理系统”</Fofa> | |
<Title>IDocView接口任意文件读取漏洞</Title>,<Fofa>title="I Doc View"</Fofa> | |
<Title>万户OA text2Html接口任意文件读取漏洞</Title>,<Fofa>app="万户网络-ezOFFICE"</Fofa> | |
<Title>致远OA任意管理员登录漏洞</Title>,<Fofa>app="致远互联-OA"</Fofa> | |
<Title>正方教学管理信息服务平台ReportServer存在任意文件读取漏洞</Title>,<Fofa>body="正方软件股份有限公司" && title="教学管理信息服务平台</Fofa> | |
<Title>西软云XMS-futurehotel-query接口XXE漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa> | |
<Title>万户OA-RhinoScriptEngineService命令执行漏洞</Title>,<Fofa>app="万户网络-ezOFFICE"</Fofa> | |
<Title>泛微e-office系统UserSelect接口存在未授权访问漏洞</Title>,<Fofa>app="泛微-EOffice"</Fofa> | |
7 | |
<Title>Laykefu客服系统任意文件上传漏洞</Title>,<Fofa>icon_hash="-334624619"</Fofa> | |
<Title>致远OA M3 Server 反序列化远程命令执行漏洞</Title>,<Fofa>M3-Server 已启动</Fofa> | |
<Title>飞企互联 FE 业务协作平台参数文件读取漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa> | |
<Title>Apache Ofbiz XML-RPC RCE漏洞-CVE-2023-49070</Title>,<Fofa>app="Apache_OFBiz"</Fofa> | |
<Title>F-logic DataCube3 SQL注入漏洞</Title>,<Fofa>title=="DataCube3"</Fofa> | |
<Title>iDocView upload接口任意文件读取漏洞</Title>,<Fofa>title="I Doc View"</Fofa> | |
<Title>海康威视CVE-2023-6895 IP网络对讲广播系统远程命令执行</Title>,<Fofa>icon_hash="-1830859634"</Fofa> | |
<Title>Yearning_front任意文件读取漏洞</Title>,<Fofa>app="Yearning"</Fofa> | |
<Title>Telesquare路由器远程代码执行漏洞(CVE-2024-29269)</Title>,<Fofa>title="Login to TLR-2005KSH" app="TELESQUARE-TLR-2005KSH"</Fofa> | |
<Title>奇安信天擎rptsvr接口任意文件上传漏洞</Title>,<Fofa>banner="QiAnXin web server" || banner="360 web server" || body="appid\":\"skylar6" || body="/task/index/detail?id={item.过期或者未授权,购买请联系4008-136-360</Fofa> | |
<Title>脸爱云 一脸通智慧管理平台任意用户添加漏洞</Title>,<Fofa>欢迎使用脸爱云 一脸通智慧管理平台</Fofa> | |
<Title>畅捷通TPlus-App_Code.ashx远程命令执行漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>大华EIMS-capture_handle接口远程命令执行漏洞</Title>,<Fofa>app:"大华 EIMS"</Fofa> | |
<Title>泛微E-Office-uploadfile.php任意文件上传漏洞</Title>,<Fofa>body="login.php"&&body="eoffice"||body="/general/login/index.php</Fofa> | |
<Title>云时空社会化商业ERP系统validateLoginName接口SQL注入漏洞</Title>,<Fofa>app="云时空社会化商业ERP系统"</Fofa> | |
<Title>云时空社会化商业ERP任意文件上传漏洞</Title>,<Fofa>app="云时空社会化商业ERP系统"</Fofa> | |
<Title>Draytek路由器addrouting命令执行漏洞</Title>,<Fofa>header="realm="VigorAP910C""</Fofa> | |
a | |
<Title>Cobbler存在远程命令执行漏洞(CVE-2021-40323)</Title>,<Fofa>"Cobbler Web Interface"</Fofa> | |
<Title>JumpServer 堡垒机未授权访问漏洞</Title>,<Fofa>icon_hash="-1162630024"</Fofa> | |
<Title>远秋医学培训系统未授权查看密码</Title>,<Fofa>title="远秋医学培训报名系统v1.0"</Fofa> | |
<Title>万户OA-upload任意文件上传漏洞</Title>,<Fofa>app="万户ezOFFICE协同管理平台"</Fofa> | |
<Title>西软云XMS反序列化漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa> | |
c | |
<Title>金和OA_uploadfileeditorsave接口任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>WordPress-thimpress_hotel_booking代码执行漏洞</Title>,<Fofa>body="wp-content/plugins/wp-hotel-booking"</Fofa> | |
<Title>蓝网科技临床浏览系统-documentUniqueId SQL注入漏洞复现(CVE-2024-4257)</Title>,<Fofa>app="LANWON-临床浏览系统"</Fofa> | |
<Title>CERIO-DT系列路由器Save.cgi接口命令执行漏洞</Title>,<Fofa>title="DT-100G-N" || title="DT-300N" || title="DT-100G" || title="AMR-3204G" || title="WMR-200N</Fofa> | |
<Title>WordPress_LayerSlider插件SQL注入漏洞</Title>,<Fofa>wp-content/plugins/LayerSlider/</Fofa> | |
<Title>海康威视-综合安防管理平台任意文件读取漏洞</Title>,<Fofa>综合安防管理平台</Fofa> | |
<Title>用友U8-Cloud TableInputOperServlet反序列化漏洞</Title>,<Fofa>app="用友-U8-Cloud" || body="/api/uclient/public/"</Fofa> | |
<Title>WordPress_Wholesale_Market插件存在任意文件读取漏洞</Title>,<Fofa>body="wp-content/plugins/wholesale-market"</Fofa> | |
<Title>亿赛通电子文档安全管理系统-jlockseniordao-findbylockname-sql注入漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa> | |
<Title>X2Modbus网关GetUser接口信息泄漏漏洞</Title>,<Fofa>server="SunFull-Webs"</Fofa> | |
<Title>OpenMetadata SpEL注入漏洞(CVE-2024-28848)</Title>,<Fofa>icon_hash="733091897"</Fofa> | |
<Title>蓝凌EIS智慧协同平台多个接口SQL注入</Title>,<Fofa>app="Landray-EIS智慧协同平台"</Fofa> | |
<Title>金蝶EAS myUploadFile任意文件上传漏洞</Title>,<Fofa>app="Kingdee-EAS"</Fofa> | |
<Title>广州图创图书馆集群管理系统updOpuserPw接口SQL注入漏洞</Title>,<Fofa>body="interlib/common/" || body="Interlib图书馆集群管理系统" || body="/interlib3/system_index" || body="打开Interlib主界面"</Fofa> | |
<Title>润乾报表dataSphereServlet任意文件上传漏洞</Title>,<Fofa>body="/raqsoft"</Fofa> | |
<Title>蓝凌OAsysUiComponent 文件存在任意文件上传漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa> | |
<Title>金和OA_CarCardInfo.aspx SQL注入漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>友点建站系统image_upload.php存在文件上传漏洞</Title>,<Fofa>app="友点建站-CMS"</Fofa> | |
<Title>IP-guard WebServer 远程命令执行漏洞</Title>,<Fofa> "IP-guard" && icon_hash="2030860561" </Fofa> | |
<Title>宝塔WAF防火墙SQL注入与未授权访问漏洞</Title>,<Fofa>title=='404 - Website not exist!' "宝塔"</Fofa> | |
<Title>致远M3敏感信息泄露漏洞</Title>,<Fofa>title="M3-Server"</Fofa> | |
<Title>aiohttp目录遍历漏洞(CVE-2024-23334)</Title>,<Fofa>app="aiohttp"</Fofa> | |
<Title>H3C网络管理系统任意文件读取漏洞</Title>,<Fofa>body="webui/js/jquerylib/jquery-1.7.2.min.js"</Fofa> | |
<Title>昂捷ERP WebService接口SQL注入漏洞</Title>,<Fofa>body="CheckSilverlightInstalled"</Fofa> | |
<Title>通天星-CMSV6 inspect_file-upload任意文件上传漏洞</Title>,<Fofa>body="./open/webApi.html"||body="/808gps/"</Fofa> | |
<Title>用友U8-Cloud接口FileManageServlet反序列漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa> | |
<Title>用友移动系统管理getFileLocal接口任意文件读取漏洞</Title>,<Fofa>app="用友-移动系统管理"</Fofa> | |
<Title>Array VPN任意文件读取漏洞</Title>,<Fofa>product="Array-VPN"</Fofa> | |
<Title>JFinalCMS 任意文件读取漏洞(CVE-2023-41599)</Title>,<Fofa>body="content=\"JreCms"</Fofa> | |
<Title>用友NC_CLOUD_smartweb2.RPC.d_XML外部实体注入漏洞</Title>,<Fofa>app="用友-UFIDA-NC"</Fofa> | |
<Title>金蝶Apusic应用服务器任意文件上传漏洞</Title>,<Fofa>app="Apusic应用服务器" fid="rqhtFwF4sIF7wTOroKTQGw=="</Fofa> | |
<Title>电信网关配置管理后台ipping.php命令执行漏洞</Title>,<Fofa>body="img/login_bg3.png" && body="系统登录"</Fofa> | |
<Title>大华智慧园区综合管理平台pageJson SQL注入漏洞</Title>,<Fofa>app="dahua-智慧园区综合管理平台"</Fofa> | |
<Title>锐捷EG易网关远程命令执行漏洞</Title>,<Fofa>app="Ruijie-EG易网关"</Fofa> | |
<Title>致远互联-OA前台fileUpload.do存在绕过文件上传漏洞</Title>,<Fofa>title="协同管理软件 V5.6SP1"</Fofa> | |
<Title>智跃人力资源管理系统GenerateEntityFromTable.aspx SQL注入漏洞</Title>,<Fofa>app="ZY-人力资源管理系统"</Fofa> | |
<Title>网康科技NS-ASG应用安全网关config_ISCGroupNoCache.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关"</Fofa> | |
<Title>WeiPHP SQL注入漏洞</Title>,<Fofa>app="WeiPHP"</Fofa> | |
<Title>GitLab任意用户密码重置漏洞(CVE-2023-7028)</Title>,<Fofa>app="GitLab"</Fofa> | |
<Title>金山终端安全系统V9.0 SQL注入漏洞</Title>,<Fofa>app="金山终端安全系统V9.0Web控制台" title=="用户登录-金山终端安全系统V9.0Web控制台"</Fofa> | |
<Title>金和OA_upload_json.asp存在任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>Salia PLCC cPH2 远程命令执行漏洞</Title>,<Fofa>html:"Salia PLCC"</Fofa> | |
<Title>WordPress Automatic Plugin任意文件下载漏洞</Title>,<Fofa>"/wp-content/plugins/wp-automatic"</Fofa> | |
<Title>JetBrains TeamCity 身份验证绕过漏洞(CVE-2024-27198)</Title>,<Fofa>body="Log in to TeamCity"</Fofa> | |
<Title>锐捷校园网自助服务系统SQL注入漏洞</Title>,<Fofa>title=="校园网自助服务系统"</Fofa> | |
<Title>Oracle WebLogic Server 远程代码执行漏洞 (CVE-2024-20931)</Title>,<Fofa>(body="Welcome to WebLogic Server") || (title=="Error 404--Not Found") || (((body="BEA WebLogic Serverver="Weblogic" || body="content=\"WebLogic Server" || body="Welcome to Weblogic Application" || body="BEA WebLogic Server") && header!="couchdb" && header!="boa" && header!="RouterOS" && header!="X-Generator: Drupal") || (banner="Weblogic" && banner!="couchdb" && banner!="drupal" && banner!=" Apache | |
<Title>思福迪运维安全管理系统test_qrcode_b远程命令执行漏洞</Title>,<Fofa>app="思福迪-LOGBASE"</Fofa> | |
<Title>宏景eHR报告组织收集树存在SQL注入漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa> | |
<Title>北京中科聚网一体化运营平台catchByUrl文件上传漏洞</Title>,<Fofa>body="thirdparty/ueditor/WordPaster"</Fofa> | |
<Title>禅道项目管理系统身份认证绕过漏洞</Title>,<Fofa>title="用户登录- 禅道"</Fofa> | |
<Title>金和OA任意文件读取漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>Confluence 未授权提权访问漏洞</Title>,<Fofa>app="ATLASSIAN-Confluence"</Fofa> | |
<Title>Apache OFBiz 身份验证绕过漏洞 (CVE-2023-51467)</Title>,<Fofa>app="Apache_OFBiz"</Fofa> | |
<Title>广州图创图书馆集群管理系统逻辑绕后导致未授权访问</Title>,<Fofa>body="广州图创计算机软件开发有限公司"</Fofa> | |
<Title>SysAid Server远程命令执行漏洞(CVE-2023-47246)</Title>,<Fofa>body="sysaid-logo-dark-green.png" || title="SysAid Help Desk Software" || body="Help Desk software <a href=\"hsysaid.com\">by SysAid</a>"</Fofa> | |
<Title>AJ-Report开源数据大屏远程命令执行漏洞</Title>,<Fofa>title="AJ-Report"</Fofa> | |
<Title>蓝凌EIS智慧协同平台rpt_listreport_definefield.aspx SQL注入漏洞</Title>,<Fofa>icon_hash="953405444"||app="Landray-OA系统"</Fofa> | |
<Title>Apache ActiveMQ 远程命令执行漏洞</Title>,<Fofa>app="APACHE-ActiveMQ" && port="61616"</Fofa> | |
<Title>红帆OA zyy_AttFile.asmx SQL注入漏洞</Title>,<Fofa>app="红帆-ioffice"</Fofa> | |
<Title>金盘移动图书馆系统任意文件上传漏洞</Title>,<Fofa>app="金盘软件-金盘移动图书馆系统"</Fofa> | |
<Title>科荣 AIO任意文件上传-目录遍历-任意文件读取漏洞</Title>,<Fofa>body="changeAccount('8000')" | |
<Title>用友NC-Cloud uploadChunk 任意文件上传漏洞</Title>,<Fofa>app="用友-NC-Cloud"</Fofa> | |
<Title>泛微e-cology-ProcessOverRequestByXml接口存在任意文件读取漏洞</Title>,<Fofa>body="/js/ecology8" || body="wui/common/css/w7OVFont_wev8.css" || (body="weaver" && body="ecology"ecology_JSessionId" && body="login/Login.jsp") || body="/wui/index.html" || body="jquery_wev8" && body="/login/Login.jsp?logintype=1</Fofa> | |
<Title>泛微云桥 e-Bridge addTaste接口SQL注入漏洞</Title>,<Fofa>app="泛微-云桥e-Bridge"</Fofa> | |
<Title>用友政务财务系统任意文件读取漏洞</Title>,<Fofa>app="用友-政务财务系统"</Fofa> | |
<Title>华为Auth-Http Server 1.0任意文件读取漏洞</Title>,<Fofa>server="Huawei Auth-Http Server 1.0"</Fofa> | |
<Title>天擎终端安全管理系统YII_CSRF_TOKEN远程代码执行漏洞</Title>,<Fofa>title="360新天擎" || body="appid\":\"skylar6" || body="/task/index/detail?id={item.id}" || body="已过期或者8-136-360" || title="360天擎" || title="360天擎终端安全管理系统"</Fofa> | |
<Title>西软云XMS-futurehotel-operate接口XXE漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa> | |
<Title>易宝OA ExecuteSqlForSingle SQL注入漏洞</Title>,<Fofa>"顶讯科技" | |
<Title>某微E-Office9文件上传漏洞 CVE-2023-2523</Title>,<Fofa>app="泛微-EOffice"</Fofa> | |
<Title>亿赛通电子文档安全管理系统DecryptApplication任意文件读取漏洞</Title>,<Fofa>app="亿赛通电子文档安全管理系统"</Fofa> | |
<Title>用友U8-Cloud接口ServiceDispatcherServlet反序列漏洞</Title>,<Fofa>app="用友-NC-Cloud"</Fofa> | |
<Title>联达OA uploadLogo.aspx任意文件上传漏洞</Title>,<Fofa>app="联达OA"</Fofa> | |
<Title>通达OA down.php接口未授权访问漏洞</Title>,<Fofa>app="TDXK-通达OA"</Fofa> | |
<Title>万户ezOFFICE-wf_printnum.jsp SQL注入漏洞</Title>,<Fofa>app="万户ezOFFICE协同管理平台"</Fofa> | |
<Title>红海云EHR系统PtFjk.mob任意文件上传漏洞</Title>,<Fofa>body="/RedseaPlatform/skins/images/favicon.ico"</Fofa> | |
<Title>万户 ezOFFICE DocumentEdit.jsp SQL注入</Title>,<Fofa>app="ezOFFICE协同管理平台"</Fofa> | |
<Title>云匣子堡垒机fastjson反序列化漏洞</Title>,<Fofa>body="type=application/x-xtx-axhost" && cert="云匣子" app="云安宝-云匣子"</Fofa> | |
<Title>Ncast高清智能录播系统存在任意文件读取漏洞</Title>,<Fofa>app="Ncast-产品" && title=="高清智能录播系统"</Fofa> | |
<Title>泛微e-cology接口getLabelByModule存在SQL注入漏洞</Title>,<Fofa>app="泛微-E-Weaver"</Fofa> | |
<Title>金和OA_SAP_B1Config.aspx未授权访问漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>用友NC-Cloud_importhttpscer接口任意文件上传漏洞</Title>,<Fofa>app="用友-NC-Cloud"</Fofa> | |
<Title>D-Link_DAR-8000-10上网行为审计网关任意文件上传漏洞</Title>,<Fofa>body="DAR-8000-10" && title="D-Link"</Fofa> | |
<Title>网神SecGate 3600防火墙sys_hand_upfile任意文件上传漏洞</Title>,<Fofa>body="./images/lsec/login/loading.gif" title="网神SecGate 3600防火墙"</Fofa> | |
<Title>用友U8-CRM客户关系管理系统任意文件读取漏洞</Title>,<Fofa>app="用友U8CRM"</Fofa> | |
<Title>EasyCVR 视频管理平台用户信息泄露</Title>,<Fofa>title="EasyCVR"</Fofa> | |
<Title>Netgear路由器boardDataWW.php存在RCE漏洞</Title>,<Fofa>title=="Netgear"</Fofa> | |
<Title>亿赛通-数据泄露防护(DLP)ClientAjax接口任意文件读取漏洞</Title>,<Fofa>body="CDGServer3" || title="电子文档安全管理系统" || cert="esafenet" || body="/help/getEditionInfo.jsp"</Fofa> | |
<Title>时空智友企业流程化管控系统SQL注入漏洞</Title>,<Fofa>body="企业流程化管控系统" && body="密码(Password):"</Fofa> | |
<Title>大华智慧园区综合管理平台bitmap接口任意文件上传漏洞</Title>,<Fofa>app="dahua-智慧园区综合管理平台"</Fofa> | |
<Title>通达OA SQL注入漏洞 CVE-2023-4165</Title>,<Fofa>app="TDXK-通达OA" && icon_hash="-759108386"</Fofa> | |
<Title>用友GRP-U8 SelectDMJE.jsp_SQL注入漏洞</Title>,<Fofa>app="用友-GRP-U8"</Fofa> | |
<Title>天融信TOPSEC_static_convert远程命令执行漏洞</Title>,<Fofa>app="天融信-上网行为管理系统"</Fofa> | |
<Title>金蝶OA-EAS系统 uploadLogo.action 任意文件上传漏洞</Title>,<Fofa>app="Kingdee-EAS"</Fofa> | |
<Title>网康科技NS-ASG应用安全网关SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关"</Fofa> | |
<Title>JeePlus低代码开发平台存在SQL注入漏洞</Title>,<Fofa>app="JeePlus"</Fofa> | |
<Title>omfyUI follow_symlinks文件读取漏洞</Title>,<Fofa>app="ComfyUI"</Fofa> | |
<Title>亿赛通电子文档安全管理系统远程命令执行漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa> | |
<Title>和丰多媒体信息发布系统QH.aspx文件上传漏洞</Title>,<Fofa>app="和丰山海-数字标牌"</Fofa> | |
<Title>CloudPanel任意文件上传漏洞</Title>,<Fofa>title=="CloudPanel | Log In"</Fofa> | |
<Title>宏景eHR-HCM任意文件读取漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa> | |
<Title>Pkpmbs建设工程质量监督系统文件上传漏洞</Title>,<Fofa>body="/Content/Theme/Standard/"</Fofa> | |
<Title>泛微E-Office远程代码执行漏洞</Title>,<Fofa>app="泛微-EOffice" && body="eoffice_loading_tip" && body="eoffice10"</Fofa> | |
<Title>金和OA_HomeService.asmx SQL注入</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>万户ezOFFICE wpsservlet任意文件上传漏洞</Title>,<Fofa>app="万户网络-ezOFFICE"</Fofa> | |
<Title>易宝OA系统DownloadFile接口文件读取漏洞</Title>,<Fofa>顶讯科技</Fofa> | |
<Title>浙大恩特客户资源管理系统文件上传和SQL注入漏洞</Title>,<Fofa>app="浙大恩特客户资源管理系统"</Fofa> | |
<Title>金蝶EAS_pdfviewlocal任意文件读取漏洞</Title>,<Fofa>app="Apusic应用服务器"</Fofa> | |
<Title>速达软件全系产品存在任意文件上传漏洞</Title>,<Fofa>app="速达软件-公司产品"</Fofa> | |
<Title>MetaCRM客户关系管理系统任意文件上传漏洞</Title>,<Fofa>body="/common/scripts/basic.js" product="美特软件-MetaCRM6"</Fofa> | |
<Title>PAN-OS安全设备命令执行漏洞</Title>,<Fofa>icon_hash="-631559155"</Fofa> | |
<Title>用友U8-OA协同工作系统doUpload.jsp任意文件上传漏洞</Title>,<Fofa>"用友U8 Cloud"</Fofa> | |
<Title>网动统一通信平台ActiveUC存在任意文件下载漏洞</Title>,<Fofa>title="网动统一通信平台(Active UC)"</Fofa> | |
<Title>广联达-linkworks-gwgdwebservice SQL注入漏洞</Title>,<Fofa>header="Services/Identification/login.ashx" || banner="Services/Identification/login.ashx"</Fofa> | |
<Title>网络验证系统getInfo参数SQL注入漏洞</Title>,<Fofa>body="zhuya/js/base.js"</Fofa> | |
<Title>用友U8-Cloud upload任意文件上传漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa> | |
<Title>天融信TOPSEC_maincgi.cgi远程命令执行</Title>,<Fofa>title="Web User Login" && body="/cgi/maincgi.cgi?Url=VerifyCode"</Fofa> | |
<Title>帆软报表 V8 get_geo_json 任意文件读取漏洞</Title>,<Fofa>body="isSupportForgetPwd"</Fofa> | |
<Title>飞鱼星上网行为管理系统企业版前台RCE</Title>,<Fofa>title="飞鱼星企业" title="飞鱼星企业级智能上网行为管理系统"</Fofa> | |
<Title>卡车卫星定位系统create存在未授权密码重置漏洞</Title>,<Fofa>icon_hash="1553867732"</Fofa> | |
<Title>泛微E-Office-jx2_config存在信息泄露漏洞</Title>,<Fofa>app="泛微-EOffice"</Fofa> | |
<Title>绿盟日志审计系统命令执行漏洞</Title>,<Fofa>fofa | |
``` | |
"<title>{{platformName}}</title>" && icon_hash="-1566499661" | |
``` | |
<Title>新视窗新一代物业管理系统任意文件上传漏洞</Title>,<Fofa>body="BPMSite/ClientSupport/OCXInstall.aspx"</Fofa> | |
<Title>锐捷RG-UAC统一上网行为管理与审计系统管理员密码泄露</Title>,<Fofa>title="RG-UAC登录页面" && body="admin"</Fofa> | |
<Title>宏景HCM系统infoView处SQL注入漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa> | |
<Title>用友NC_saveImageServlet接口存在文件上传漏洞</Title>,<Fofa>icon_hash="1085941792" app="用友-UFIDA-NC"</Fofa> | |
<Title>亿赛通电子文档安全管理系统接口dataSearch.jsp SQL注入漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa> | |
<Title>联软安全数据交换系统任意文件读取</Title>,<Fofa>body="UniExServices"</Fofa> | |
<Title>奇安信360天擎getsimilarlist SQL注入漏洞</Title>,<Fofa>body="/task/index/detail?id={item.id}" title="360新天擎"</Fofa> | |
<Title>多个防火墙产品远程代码执行漏洞</Title>,<Fofa>body="/webui/images/default/default/alert_close.jpg"</Fofa> | |
<Title>云网OA8.6 fastjson反序列化漏洞</Title>,<Fofa>"云网OA"</Fofa> | |
<Title>用友CRM-swfupload接口任意文件上传漏洞</Title>,<Fofa>body="用友U8CRM"</Fofa> | |
<Title>Jan任意文件上传漏洞</Title>,<Fofa>icon_hash="-165268926"</Fofa> | |
<Title>铭飞CMS list接口SQL注入漏洞</Title>,<Fofa>body="铭飞MCMS" || body="/mdiy/formData/save.do" || body="static/plugins/ms/1.0.0/ms.js</Fofa> | |
<Title>湖南建研-检测系统 admintool 任意文件上传漏洞</Title>,<Fofa>body="/Content/Theme/Standard/webSite/login.css"</Fofa> | |
<Title>用友NC的download文件存在任意文件读取漏洞</Title>,<Fofa>app="用友-UFIDA-NC"</Fofa> | |
<Title>用友移动系统管理uploadApk接口任意文件上传漏洞</Title>,<Fofa>body="../js/jslib/jquery.blockUI.js"</Fofa> | |
<Title>金石工程项目管理系统TianBaoJiLu.aspx SQL注入漏洞</Title>,<Fofa>body="金石工程项目管理系统"</Fofa> | |
<Title>海康运行管理中心fastjson远程命令执行漏洞</Title>,<Fofa>header="X-Content-Type-Options: nosniff" && body="<h1>Welcome to OpenResty!</h1>" && header="X-Xss-Protection: 1; mode=block"</Fofa> | |
<Title>用友U8cloud-ExportUfoFormatAction SQL注入漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa> | |
<Title>Jeecg任意文件上传漏洞</Title>,<Fofa>app="JEECG"</Fofa> | |
<Title>脸爱云一脸通智慧管理平台存在downloads.aspx信息泄露漏洞</Title>,<Fofa>body="View/UserReserved/UserReservedTest.aspx"</Fofa> | |
<Title>泛微E-Mobile-client.do存在命令执行漏洞</Title>,<Fofa> "Weaver E-Mobile" </Fofa> | |
<Title>海康威视综合安防管理平台信息泄露</Title>,<Fofa>app="HIKVISION-综合安防管理平台"</Fofa> | |
<Title>Adobe ColdFusion任意文件读取漏洞CVE-2024-20767</Title>,<Fofa>app="Adobe-ColdFusion"</Fofa> | |
<Title>通天星CMSV6车载视频监控平台downloadLogger接口任意文件读取漏洞</Title>,<Fofa>body="./open/webApi.html"||body="/808gps/"</Fofa> | |
<Title>用友NC uapws wsdl XXE漏洞</Title>,<Fofa>app="用友-UFIDA-NC"</Fofa> | |
<Title>WordPress Listingo 文件上传漏洞</Title>,<Fofa>body="wp-content/themes/listingo"</Fofa> | |
<Title>F-logic DataCube3任意文件上传漏洞</Title>,<Fofa>title=="DataCube3"</Fofa> | |
<Title>H3C-校园网自助服务系统flexfileupload任意文件上传漏洞</Title>,<Fofa>header="/selfservice"</Fofa> | |
<Title>潍微科技-水务信息管理平台ChangePwd接口存在SQL注入漏洞</Title>,<Fofa>icon_hash="-491165370"</Fofa> | |
<Title>TendaT路由器账号密码泄露</Title>,<Fofa>title="Tenda | LOGIN" && country="CN"</Fofa> | |
<Title>浙大恩特客户资源管理系统crmbasicaction任意文件上传</Title>,<Fofa>app="浙大恩特客户资源管理系统"</Fofa> | |
<Title>亿赛通电子文档安全管理系统UploadFileList任意文件读取漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa> | |
<Title>先锋WEB燃气收费系统文件上传漏洞</Title>,<Fofa>app="先锋WEB燃气收费系统"</Fofa> | |
<Title>金和OA_jc6_Upload任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"||body="/jc6/platform/sys/login</Fofa> | |
<Title>奥威亚视频云平台VideoCover.aspx接口存在任意文件上传漏洞</Title>,<Fofa>body="/Upload/DomainInfo/MaxAVALogo.png"</Fofa> | |
<Title>大华智能物联ICC综合管理平台readpic任意文件读取漏洞</Title>,<Fofa>:body="*客户端会小于800*"</Fofa> | |
<Title>好视通视频会议系统 toDownload.do接口任意文件读取漏洞</Title>,<Fofa>好视通视频会议系统 toDownload.do接口任意文件读取漏洞</Fofa> | |
<Title>福建科立讯通信指挥调度平台get_extension_yl.php SQL注入漏洞</Title>,<Fofa>body="app/structure/departments.php"||app="指挥调度管理平台"</Fofa> | |
<Title>HiKVISION 综合安防管理平台任意文件上传漏洞</Title>,<Fofa>app="HIKVISION-iSecure-Center"</Fofa> | |
<Title>亿赛通电子文档安全管理系统 UploadFileToCatalog SQL注入漏洞</Title>,<Fofa>body="/CDGServer3/index.jsp"</Fofa> | |
<Title>通达OA SQL注入漏洞 CVE-2023-4166</Title>,<Fofa>app="TDXK-通达OA" && icon_hash="-759108386"</Fofa> | |
<Title>通达OA header身份认证绕过漏洞</Title>,<Fofa>title="office Anywhere"</Fofa> | |
<Title>D-Link_DAR-8000操作系统命令注入漏洞</Title>,<Fofa>body="DAR-8000-10" && title="D-Link"</Fofa> | |
<Title>协达OA系统绕过登录认证登陆后台</Title>,<Fofa>body="/interface/CheckLoginName.jsp"</Fofa> | |
<Title>JEEVMS仓库管理系统任意文件读取漏洞</Title>,<Fofa>body="plug-in/lhgDialog/lhgdialog.min.js?skin=metro"或者fid="cC2r/XQpJXcYiYFHOc77bg=="</Fofa> | |
<Title>WordPress插件NotificationX存在sql注入漏洞</Title>,<Fofa>body="/wp-content/plugins/notificationx"</Fofa> | |
<Title>360天擎 - 未授权与SQL注入漏洞</Title>,<Fofa>title="360新天擎" && ip.isp="教育"</Fofa> | |
<Title>亿赛通电子文档安全管理系统hiddenWatermark文件上传漏洞</Title>,<Fofa>app="亿赛通电子文档安全管理系统"</Fofa> | |
<Title>东华医疗协同办公系统文件上传漏洞</Title>,<Fofa>body="东华医疗协同办公系统"</Fofa> | |
<Title>H3C-SecParh堡垒机任意用户登录漏洞</Title>,<Fofa>app="H3C-SecPath-运维审计系统" && body="2018"</Fofa> | |
<Title>用友NC_grouptemplet文件上传漏洞</Title>,<Fofa>title="YONYOU NC"</Fofa> | |
;q | |
<Title>用友GRPA++Cloud政府财务云任意文件读取漏洞</Title>,<Fofa>body="/pf/portal/login/css/fonts/style.css"</Fofa> | |
<Title>OfficeWeb365_任意文件读取漏洞</Title>,<Fofa>body="请输入furl参数" || header="OfficeWeb365" || banner="OfficeWeb365"</Fofa> | |
<Title>用友NC word.docx任意文件读取漏洞</Title>,<Fofa>body="UClient.dmg"</Fofa> | |
<Title>图创图书馆集群管理系统SQL注入漏洞</Title>,<Fofa>body="interlib"</Fofa> | |
<Title>飞企互联Ognl表达式注入导致RCE</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa> | |
<Title>Hytec Inter HWL-2511-SS popen.cgi命令注入漏洞</Title>,<Fofa>title="index" && header="lighttpd/1.4.30"</Fofa> | |
<Title>大华智慧园区综合管理平台 deleteFtp 远程命令执行漏洞</Title>,<Fofa>body="src=/WPMS/asset/common/js/jsencrypt.min.js"</Fofa> | |
<Title>用友NC-bill SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792" && body="/logo/images/logo.gif"</Fofa> | |
<Title>LiveGBS存在逻辑缺陷漏洞</Title>,<Fofa>icon_hash="-206100324"</Fofa> | |
<Title>用友畅捷通RRATableController存在反序列化漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>易宝OA系统任意文件上传漏洞</Title>,<Fofa>title="欢迎登录易宝OA系统"</Fofa> | |
<Title>泛微getE9DevelopAllNameValue2接口存在任意文件读取漏洞</Title>,<Fofa>app="泛微-OA(e-cology)"</Fofa> | |
<Title>海康威视安全接入网关任意文件读取漏洞</Title>,<Fofa>body="webui/js/jquerylib/jquery-1.7.2.min.js" && product="ABT-应用网关" || body="webui/js/jquerylib/jquery-1.7.2.min.js" 安全网关</Fofa> | |
<Title>福建科立讯通信有限公司指挥调度管理平台RCE漏洞</Title>,<Fofa>指挥调度管理平台</Fofa> | |
Z | |
<Title>广联达OA任意用户登录漏洞</Title>,<Fofa>fid="/yV4r5PdARKT4jaqLjJYqw=="</Fofa> | |
<Title>普元EOS-Platform-jmx.jmx远程代码执行漏洞</Title>,<Fofa>body="普元" || (body="ame.primeton.com" && body="eos-web")</Fofa> | |
<Title>奇安信网康下一代防火墙directdata远程命令执行漏洞</Title>,<Fofa>app="网康下一代防火墙"</Fofa> | |
<Title>天翼应用虚拟化系统sql注入漏洞</Title>,<Fofa>title="瑞友天翼-应用虚拟化系统" </Fofa> | |
<Title>金蝶Apusic应用服务器loadTree JNDI注入漏洞</Title>,<Fofa>app="Apusic应用服务器"</Fofa> | |
<Title>SpringBlade框架dict-biz接口SQL注入漏洞</Title>,<Fofa>body="Saber 将不能正常工作"</Fofa> | |
<Title>华夏ERP管理员信息泄露漏洞</Title>,<Fofa>icon_hash="-1298131932"</Fofa> | |
<Title>SpiderFlow爬虫平台远程命令执行漏洞</Title>,<Fofa>app="SpiderFlow"</Fofa> | |
<Title>致远互联FE协作办公平台editflow_manager存在sql注入漏洞</Title>,<Fofa>title="FE协作办公平台" || body="li_plugins_download"</Fofa> | |
<Title>Secnet安网智能AC管理系统actpt_5g信息泄露</Title>,<Fofa>title="安网-智能路由系统" || header="HTTPD_ac 1.0"</Fofa> | |
<Title>脸爱云一脸通智慧管理平台存在UpLoadPic.ashx文件上传漏洞</Title>,<Fofa>body="View/UserReserved/UserReservedTest.aspx"</Fofa> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment