Skip to content

Instantly share code, notes, and snippets.

@Rvn0xsy
Created September 24, 2024 16:51
Show Gist options
  • Save Rvn0xsy/52387fbf6e951763bce08ac3735ff98f to your computer and use it in GitHub Desktop.
Save Rvn0xsy/52387fbf6e951763bce08ac3735ff98f to your computer and use it in GitHub Desktop.
Qpipe
We can make this file beautiful and searchable if this error is corrected: Illegal quoting in line 1.
<Title>用友畅捷通-TPlus-CheckMutex存在sql注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>红帆OA iorepsavexml.aspx 文件上传漏洞</Title>,<Fofa>title="iOffice.net"</Fofa>
<Title>泛微e-office 未授权访问漏洞</Title>,<Fofa>(body="login.php"&&body="eoffice")||body="/general/login/index.php"</Fofa>
<Title>SANGFOR终端检测响应平台任意用户免密登录及前台RCE漏洞</Title>,<Fofa>title="SANGFOR终端检测响应平台"</Fofa>
<Title>用友U8 Cloud KeyWordDetailReportQuery SQL注入漏洞</Title>,<Fofa>app="用友U8 Cloud"</Fofa>
<Title>用友NC-runStateServlet接口SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792"</Fofa>
<Title>金和OA_jc6_ntko-upload任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>泛微e-cology V9<10.56 SQL注入漏洞</Title>,<Fofa>app="泛微-协同商务系统"</Fofa>
<Title>IP-guard WebServer权限绕过漏洞</Title>,<Fofa>icon_hash="2030860561"</Fofa>
<Title>用友时空KSOA-linkadd.jsp SQL注入漏洞</Title>,<Fofa>title="企业信息系统门户"</Fofa>
<Title>Jenkins任意文件读取漏洞</Title>,<Fofa>app="Jenkins"</Fofa>
<Title>飞企互联loginService任意登录漏洞</Title>,<Fofa>app="FE-协作平台" app="飞企互联-FE企业运营管理平台"</Fofa>
<Title>用友畅捷通TPlus-InitServerInfo存在SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>福建科立讯通信指挥调度管理平台SQL注入漏洞</Title>,<Fofa>body="app/structure/departments.php"||app="指挥调度管理平台"</Fofa>
<Title>泛微E-Mobile命令执行漏洞</Title>,<Fofa>"Weaver E-Mobile"</Fofa>
<Title>用友移动管理平台uploadIcon任意文件上传漏洞</Title>,<Fofa>app="用友-移动系统管理"</Fofa>
<Title>金和OA jc6 clobfield SQL注入漏洞</Title>,<Fofa>header="Path=/jc6" || (body="JC6金和协同管理平台" && body="src=\"/jc6/platform/") || banner="Path=/jc6"</Fofa>
<Title>东华医疗协同办公系统反序列化漏洞</Title>,<Fofa>body="东华医疗协同办公系统"</Fofa>
<Title>飞企互联-FE企业运营管理平台publicData.jsp SQL注入漏洞</Title>,<Fofa>app="FE-协作平台" app="飞企互联-FE企业运营管理平台"</Fofa>
<Title>瑞友应用虚拟化系统-RAPAgent SQL注入漏洞</Title>,<Fofa>title="瑞友天翼-应用虚拟化系统"</Fofa>
<Title>宏景eHR人力资源管理软件showmediainfo SQL注入漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa>
<Title>脸爱云一脸通智慧平台SelOperators信息泄露漏洞</Title>,<Fofa>body="View/UserReserved/UserReservedTest.aspx"</Fofa>
<Title>东方通TongWeb任意文件上传漏洞</Title>,<Fofa>header="TongWeb Server" || banner="Server: TongWeb Server"</Fofa>
<Title>捷诚管理信息系统SQL注入漏洞</Title>,<Fofa>body="/Scripts/EnjoyMsg.js"</Fofa>
<Title>致远OA getAjaxDataServlet接口存在XML实体注入漏洞</Title>,<Fofa>app="致远互联-OA"</Fofa>
<Title>帮管客CRM-jiliyu接口SQL漏洞</Title>,<Fofa>"帮管客-CRM"</Fofa>
<Title>Ncast盈可视高清智能录播系统RCE漏洞</Title>,<Fofa>app="Ncast-产品" && title=="高清智能录播系统"</Fofa>
<Title>网神防火墙app_av_import_save文件上传漏洞</Title>,<Fofa>title="网神SecGate 3600防火墙"</Fofa>
<Title>用友NC_Cloud soapFormat.ajax接口XXE漏洞</Title>,<Fofa>body="/Client/Uclient/UClient.exe"||body="ufida.ico"||body="nccloud"||body="/api/uclient/public/"</Fofa>
<Title>WordPress-js-support-ticket 文件上传漏洞</Title>,<Fofa>body="wp-content/plugins/js-support-ticket"</Fofa>
<Title>用友时空KSOA-imagefield接口SQL注入漏洞</Title>,<Fofa>app="用友-时空KSOA"</Fofa>
<Title>迪普DPTech VPN 任意文件读取漏洞</Title>,<Fofa>title=="SSL VPN Service" && header="Dptech" || cert="DPtechCa"</Fofa>
<Title>通达OA get_datas.php SQL注入漏洞</Title>,<Fofa>app="TDXK-通达OA"</Fofa>
<Title>网康NS-ASG应用安全网关singlelogin.php SQL注入漏洞</Title>,<Fofa>app="网康NS-ASG应用安全网关"</Fofa>
<Title>致远M1 usertokenservice 反序列化RCE漏洞</Title>,<Fofa>"M1-Server 已启动"</Fofa>
<Title>畅捷通TPlus-KeyInfoList.aspx SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>深信服下一代防火墙NGAF任意文件读取漏洞</Title>,<Fofa>"Redirect.php?url=/LogInOut.php" && port="85"</Fofa>
<Title>蓝凌EKP前台授权绕过文件上传漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa>
<Title>Progress-Flowmon命令注入漏洞 (CVE-2024-2389)</Title>,<Fofa>body="Flowmon-Web-Interface"</Fofa>
<Title>亿赛通电子文档安全管理系统任意文件读取漏洞</Title>,<Fofa>app="亿赛通电子文档安全管理系统"</Fofa>
<Title>亿赛通电子文档uploadFile接口文件上传漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa>
<Title>RG-UAC锐捷统一上网行为管理与审计系统远程代码执行漏洞</Title>,<Fofa>app="Ruijie-RG-UAC"</Fofa>
<Title>Panalog大数据日志审计系统libres_syn_delete.php命令执行漏洞</Title>,<Fofa>app="Panabit-Panalog"</Fofa>
<Title>易思智能物流无人值守系统5.0任意文件上传漏洞</Title>,<Fofa>"智能物流无人值守系统"</Fofa>
<Title>蓝凌OA treexml.tmpl 远程命令执行漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa>
<Title>惠尔顿-网络安全审计系统任意文件读取漏洞</Title>,<Fofa>app="惠尔顿-网络安全审计系统"</Fofa>
<Title>鸿运(通天星CMSV6车载)任意文件读取漏洞</Title>,<Fofa>body="./open/webApi.html"||body="/808gps/"</Fofa>
<Title>飞企互联-FE企业运营管理平台任意文件上传漏洞</Title>,<Fofa>app="FE-协作平台"</Fofa>
<Title>用友U9-PatchFile.asmx任意文件上传漏洞</Title>,<Fofa>body="logo-u9.png"</Fofa>
<Title>金蝶云-星空ServiceGateway反序列化漏洞</Title>,<Fofa>None</Fofa>
<Title>WIFISKY 7层流控路由器confirm.php接口RCE漏洞</Title>,<Fofa>title="WIFISKY 7层流控路由器"</Fofa>
<Title>MajorDoMo /modules/thumb/thumb.php未授权RCE漏洞</Title>,<Fofa>app="MajordomoSL"</Fofa>
<Title>用友NC接口文件上传漏洞</Title>,<Fofa>title:"YONYOU NC"</Fofa>
<Title>用友畅捷通TPlus任意文件读取漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>宏景DisplayFiles任意文件读取漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa>
<Title>浙江宇视isc网络视频录像机LogReport.php远程命令执行漏洞</Title>,<Fofa>body="Alarm" && body="白牌定制"</Fofa>
<Title>用友系统-U9企业版任意文件上传漏洞</Title>,<Fofa>title==" U9-登录 "</Fofa>
<Title>ZenML服务器远程权限提升漏洞</Title>,<Fofa>title=="ZenML - Dashboard"</Fofa>
<Title>全程云OA__ajax.ashx SQL注入漏洞</Title>,<Fofa>.passImg{background:url(images/yiyaoshi.png)</Fofa>
<Title>魔方网表mailupdate.jsp接口任意文件上传漏洞</Title>,<Fofa>icon_hash="694014318"</Fofa>
<Title>用友NC-avatar接口文件上传漏洞</Title>,<Fofa>body="/Client/Uclient/UClient.exe"</Fofa>
<Title>飞企互联-FE企业运营管理平台登录绕过漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa>
<Title>D-Link NAS CVE-2024-3272/CVE-2024-3273 Authentication Bypass and Command Injection</Title>,<Fofa>body="Text:In order to access the ShareCenter"</Fofa>
<Title>安美数字酒店宽带运营系统SQL注入漏洞</Title>,<Fofa>title=酒店宽带运营系统</Fofa>
<Title>泛微OA-E-Cology-FileDownload文件读取漏洞</Title>,<Fofa>app="泛微-OA(e-cology”)</Fofa>
<Title>医院一站式后勤管理系统任意文件上传漏洞</Title>,<Fofa>body="frameworkModuleJob"</Fofa>
<Title>飞企互联-FE企业运营管理平台ProxyServletUti存在任意文件读取漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa>
<Title>H3C Magic B1STV100R012 RCE via whoami Command</Title>,<Fofa>POST /goform/aspForm HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML
<Title>SpringBlade export-user SQL 注入漏洞</Title>,<Fofa>body="https://bladex.vip"</Fofa>
<Title>用友 GRP-U8 bx_historyDataCheck.jsp SQL注入漏洞</Title>,<Fofa>app="yonyou-GRP-U8"</Fofa>
<Title>网康科技NS-ASG应用安全网关add_postlogin.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关"</Fofa>
<Title>用友NC接口PaWfm SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792" app="用友-UFIDA-NC"</Fofa>
<Title>明御安全网关RCE漏洞</Title>,<Fofa>title="明御安全网关"</Fofa>
<Title>用友NC-workflowImageServlet接口SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792" </Fofa>
<Title>用友NC接口ConfigResourceServlet反序列化漏洞</Title>,<Fofa>icon_hash="1085941792" app="用友-UFIDA-NC"</Fofa>
<Title>普元EOS-Platform-eos.jmx存在远程代码执行漏洞</Title>,<Fofa>body="普元" || (body="ame.primeton.com" && body="eos-web")</Fofa>
<Title>蓝凌EIS智慧协同平台saveImg接口任意文件上传漏洞</Title>,<Fofa>icon_hash="953405444"</Fofa>
<Title>用友GRP-U8-slbmbygr.jsp SQL注入漏洞</Title>,<Fofa>app="用友-GRP-U8"</Fofa>
<Title>OpenMetadata命令执行漏洞 (CVE-2024-28255)</Title>,<Fofa>icon_hash="733091897"</Fofa>
<Title>蓝凌OA SQL注入漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa>
<Title>联达OA-UpLoadFile.aspx任意文件上传漏洞</Title>,<Fofa>app="联达OA"</Fofa>
<Title>用友畅捷通TPlus-keyEdit.aspx SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>金和OA_MailTemplates.aspx_SQL注入漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>网康科技NS-ASG应用安全网关config_Anticrack.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关</Fofa>
<Title>富通天下外贸ERP任意文件上传漏洞</Title>,<Fofa>title="用户登录_富通天下外贸ERP"</Fofa>
<Title>大华智慧园区综合管理平台ipms接口远程代码执行漏洞</Title>,<Fofa>body="src=/WPMS/asset/common/js/jsencrypt.min.js"</Fofa>
<Title>医院挂号系统SQL注入</Title>,<Fofa>body="res/img/ht_box_back.gif" || body="/res/img/ht_box_top.gif" || body="/res/img/ht_box_bottom.gif" || body="dom_loaded.load(init);"</Fofa>
<Title>大华智能物联综合管理平台登录接口漏洞</Title>,<Fofa>icon_hash="-1935899595"body="*客户端会小于800*"</Fofa>
<Title>用友U8 Cloud nc.bs.sm.login2.RegisterServlet SQL注入漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa>
<Title>大华DSS itcBulletin SQL注入漏洞</Title>,<Fofa>app="dahua-DSS"</Fofa>
<Title>大华DSS城市安防监控平台Struct2-045命令执行漏洞</Title>,<Fofa>app="dahua-DSS"</Fofa>
<Title>中成科信票务管理平台任意文件上传漏洞</Title>,<Fofa>body="技术支持:北京中成科信科技发展有限公司"</Fofa>
<Title>商混ERP-DictionaryEdit.aspx SQL注入漏洞</Title>,<Fofa>title="商混ERP系统"</Fofa>
<Title>用友U8-Cloud RegisterServlet接口SQL注入漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa>
<Title>广联达OA前台任意文件上传漏洞</Title>,<Fofa>fid="/yV4r5PdARKT4jaqLjJYqw=="</Fofa>
<Title>致远OA任意用户密码修改漏洞</Title>,<Fofa>app="致远互联-OA"</Fofa>
<Title>泛微-EMobile弱口令漏洞</Title>,<Fofa>app="泛微-EMobile"</Fofa>
<Title>Smartbi 内置用户登陆绕过</Title>,<Fofa>app="SMARTBI"</Fofa>
<Title>WordPress-Automatic插件SQL注入漏洞</Title>,<Fofa>body="/wp-content/plugins/wp-automatic"</Fofa>
<Title>金蝶星空云K3Cloud反序列化漏洞</Title>,<Fofa>app="金蝶云星空-管理中心"</Fofa>
<Title>湖南建研质量监测系统upload.ashx文件上传漏洞</Title>,<Fofa>body="/Content/Theme/Standard/webSite/login.css"</Fofa>
<Title>山石网科云鉴存在前台任意命令执行漏洞</Title>,<Fofa>None</Fofa>
<Title>IDocView接口任意文件读取漏洞</Title>,<Fofa>title="I Doc View"</Fofa>
<Title>万户OA text2Html接口任意文件读取漏洞</Title>,<Fofa>app="万户网络-ezOFFICE"</Fofa>
<Title>致远OA任意管理员登录漏洞</Title>,<Fofa>app="致远互联-OA"</Fofa>
<Title>正方教学管理信息服务平台ReportServer任意文件读取漏洞</Title>,<Fofa>body="正方软件股份有限公司" && title="教学管理信息服务平台</Fofa>
<Title>西软云XMS-futurehotel-query接口XXE漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa>
<Title>万户OA-RhinoScriptEngineService命令执行漏洞</Title>,<Fofa>app="万户网络-ezOFFICE"</Fofa>
<Title>泛微e-office系统UserSelect接口未授权访问漏洞</Title>,<Fofa>app="泛微-EOffice"</Fofa>
<Title>Laykefu客服系统任意文件上传漏洞</Title>,<Fofa>icon_hash="-334624619"</Fofa>
<Title>致远OA M3 Server 反序列化漏洞</Title>,<Fofa>M3-Server 已启动</Fofa>
<Title>飞企互联 FE 业务协作平台参数文件读取漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa>
<Title>Apache Ofbiz XML-RPC 远程代码执行漏洞</Title>,<Fofa>app="Apache_OFBiz"</Fofa>
<Title>DataCube3 SQL注入漏洞 (CVE-2024-31750)</Title>,<Fofa>title=="DataCube3"</Fofa>
<Title>iDocView upload接口任意文件读取漏洞</Title>,<Fofa>title="I Doc View"</Fofa>
<Title>海康威视对讲广播系统远程命令执行漏洞</Title>,<Fofa>icon_hash="-1830859634"</Fofa>
<Title>Yearning任意文件读取漏洞</Title>,<Fofa>app="Yearning"</Fofa>
<Title>Telesquare路由器远程代码执行漏洞</Title>,<Fofa>title="Login to TLR-2005KSH" app="TELESQUARE-TLR-2005KSH"</Fofa>
<Title>奇安信天擎rptsvr接口任意文件上传漏洞</Title>,<Fofa>banner="QiAnXin web server" || banner="360 web server" || body="appid\":\"skylar6" || body="/task/index/detail?id={item.id}" || body="已过期或者未授权,购买请联系4008-136-360</Fofa>
<Title>脸爱云一脸通智慧管理平台任意用户添加漏洞</Title>,<Fofa>None</Fofa>
<Title>畅捷通TPlus-App_Code.ashx远程命令执行漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa>
<Title>大华EIMS-capture_handle接口远程命令执行漏洞</Title>,<Fofa>{<title>eims</title>}</Fofa>
<Title>泛微E-Office-uploadfile.php任意文件上传漏洞</Title>,<Fofa>(body="login.php"&&body="eoffice")||body="/general/login/index.php</Fofa>
<Title>云时空社会化商业ERP系统validateLoginName接口SQL注入漏洞</Title>,<Fofa>app="云时空社会化商业ERP系统"</Fofa>
<Title>云时空社会化商业ERP任意文件上传漏洞</Title>,<Fofa>app="云时空社会化商业ERP系统"</Fofa>
<Title>Draytek路由器addrouting命令执行漏洞</Title>,<Fofa>header="realm="VigorAP910C"</Fofa>
<Title>Cobbler远程命令执行漏洞 (CVE-2021-40323)</Title>,<Fofa>"Cobbler Web Interface"</Fofa>
<Title>JumpServer未授权访问漏洞</Title>,<Fofa>icon_hash="-1162630024"</Fofa>
<Title>远秋医学培训系统未授权查看密码漏洞</Title>,<Fofa>title="远秋医学培训报名系统v1.0"</Fofa>
<Title>万户OA-upload任意文件上传漏洞</Title>,<Fofa>app="万户ezOFFICE协同管理平台"</Fofa>
<Title>西软云XMS反序列化漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa>
<Title>金和OA_uploadfileeditorsave接口任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>WordPress-thimpress_hotel_booking代码执行漏洞</Title>,<Fofa>body="wp-content/plugins/wp-hotel-booking"</Fofa>
<Title>蓝网科技临床浏览系统 SQL注入漏洞复现 (CVE-2024-4257)</Title>,<Fofa>app="LANWON-临床浏览系统"</Fofa>
<Title>CERIO-DT系列路由器Save.cgi命令执行漏洞</Title>,<Fofa>title="DT-100G-N" || title="DT-300N" || title="DT-100G" || title="AMR-3204G" || title="WMR-200N"</Fofa>
<Title>WordPress_LayerSlider插件SQL注入漏洞</Title>,<Fofa>"wp-content/plugins/LayerSlider/"</Fofa>
<Title>海康威视-综合安防管理平台任意文件读取漏洞</Title>,<Fofa>综合安防管理平台</Fofa>
<Title>用友U8-Cloud TableInputOperServlet反序列化漏洞</Title>,<Fofa>app="用友-U8-Cloud" || body="/api/uclient/public/"</Fofa>
<Title>WordPress_Wholesale_Market插件任意文件读取漏洞</Title>,<Fofa>body="wp-content/plugins/wholesale-market"</Fofa>
<Title>亿赛通电子文档安全管理系统-jlockseniordao-findbylockname-sql注入漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa>
<Title>X2Modbus网关GetUser接口信息泄漏漏洞</Title>,<Fofa>server="SunFull-Webs"</Fofa>
<Title>OpenMetadata SpEL注入漏洞</Title>,<Fofa>icon_hash="733091897"</Fofa>
<Title>蓝凌EIS智慧协同平台多个接口SQL注入</Title>,<Fofa>app="Landray-EIS智慧协同平台"</Fofa>
<Title>金蝶EAS myUploadFile任意文件上传漏洞</Title>,<Fofa>app="Kingdee-EAS"</Fofa>
<Title>广州图创图书馆集群管理系统updOpuserPw接口SQL注入漏洞</Title>,<Fofa>body="interlib/common/" || body="Interlib图书馆集群管理系统" || body="/interlib3/system_index" || body="打开Interlib主界面"</Fofa>
<Title>润乾报表dataSphereServlet任意文件上传漏洞</Title>,<Fofa>body="/raqsoft"</Fofa>
<Title>蓝凌OAsysUiComponent 文件存在任意文件上传漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa>
<Title>金和OA_CarCardInfo.aspx_SQL注入漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>友点建站系统image_upload.php文件上传漏洞</Title>,<Fofa>app="友点建站-CMS"</Fofa>
<Title>IP-guard WebServer 远程命令执行漏洞</Title>,<Fofa>"IP-guard" && icon_hash="2030860561"</Fofa>
<Title>宝塔WAF防火墙SQL注入和未授权访问漏洞</Title>,<Fofa>title=='404 - Website not exist!' "宝塔"</Fofa>
<Title>致远M3敏感信息泄露漏洞</Title>,<Fofa>title="M3-Server"</Fofa>
<Title>aiohttp目录遍历漏洞 (CVE-2024-23334)</Title>,<Fofa>app="aiohttp"</Fofa>
<Title>H3C网络管理系统任意文件读取漏洞</Title>,<Fofa>body="webui/js/jquerylib/jquery-1.7.2.min.js</Fofa>
<Title>昂捷ERP WebService接口SQL注入漏洞</Title>,<Fofa>body="CheckSilverlightInstalled"</Fofa>
<Title>通天星-CMSV6任意文件上传漏洞</Title>,<Fofa>body="./open/webApi.html"||body="/808gps/</Fofa>
<Title>用友U8-Cloud FileManageServlet反序列漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa>
<Title>用友移动系统管理getFileLocal接口任意文件读取漏洞</Title>,<Fofa>app="用友-移动系统管理"</Fofa>
<Title>Array VPN任意文件读取漏洞</Title>,<Fofa>product="Array-VPN"</Fofa>
<Title>JFinalCMS 任意文件读取漏洞(CVE-2023-41599)</Title>,<Fofa>body="content=\"JreCms"</Fofa>
<Title>金蝶Apusic应用服务器任意文件上传漏洞</Title>,<Fofa>app="Apusic应用服务器" fid="rqhtFwF4sIF7wTOroKTQGw=="</Fofa>
<Title>电信网关配置管理后台ipping.php命令执行漏洞</Title>,<Fofa>body="img/login_bg3.png" && body="系统登录"</Fofa>
<Title>大华智慧园区综合管理平台pageJson SQL注入漏洞</Title>,<Fofa>app="dahua-智慧园区综合管理平台"</Fofa>
<Title>锐捷-EG易网关存在RCE漏洞</Title>,<Fofa>app="Ruijie-EG易网关"</Fofa>
<Title>致远互联OA前台fileUpload.do存在绕过文件上传漏洞</Title>,<Fofa>title="协同管理软件 V5.6SP1"</Fofa>
<Title>智跃人力资源管理系统GenerateEntityFromTable.aspx SQL注入漏洞</Title>,<Fofa>app="ZY-人力资源管理系统"</Fofa>
<Title>网康科技NS-ASG应用安全网关config_ISCGroupNoCache.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关"</Fofa>
<Title>WeiPHP存在SQL注入漏洞</Title>,<Fofa>app="WeiPHP"</Fofa>
<Title>GitLab 任意用户密码重置漏洞</Title>,<Fofa>app="GitLab"</Fofa>
<Title>金山终端安全系统V9.0 SQL注入漏洞</Title>,<Fofa>app="金山终端安全系统V9.0Web控制台" title=="用户登录-金山终端安全系统V9.0Web控制台"</Fofa>
5
<Title>金和OA_upload_json.asp任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>Salia PLCC cPH2 远程命令执行漏洞</Title>,<Fofa>"Salia PLCC"</Fofa>
<Title>WordPress Automatic Plugin任意文件下载漏洞</Title>,<Fofa>/wp-content/plugins/wp-automatic</Fofa>
<Title>TeamCity身份验证绕过漏洞</Title>,<Fofa>body="Log in to TeamCity"</Fofa>
<Title>锐捷校园网自助服务系统operatorReportorRoamService SQL注入漏洞</Title>,<Fofa>title=="校园网自助服务系统"</Fofa>
<Title>Oracle WebLogic Server JNDI注入漏洞(CVE-2024-20931)</Title>,<Fofa>(body="Welcome to WebLogic Server") || (title=="Error 404--Not Found") || (((body="
BEA WebLogic Server" || server="Weblogic" || body="content=\"WebLogic Server" || body="
Welcome to Weblogic Application" || body="
BEA WebLogic Server") && header!="couchdb" && header!="boa" && header!="RouterOS" && header!="X-Generator: Drupal") || (banner="Weblogic" && banner!="couchdb" && banner!="drupal" && banner!=" Apache
<Title>思福迪运维安全管理系统test_qrcode_b远程命令执行漏洞</Title>,<Fofa>app="思福迪-LOGBASE"</Fofa>
<Title>宏景eHR SQL注入漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa>
<Title>北京中科聚网一体化运营平台catchByUrl文件上传漏洞</Title>,<Fofa>body="thirdparty/ueditor/WordPaster"</Fofa>
<Title>禅道项目管理系统身份认证绕过漏洞</Title>,<Fofa>title="用户登录- 禅道"</Fofa>
<Title>金和OA任意文件读取漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa>
<Title>Confluence 未授权提权访问漏洞 CVE-2023-22515</Title>,<Fofa>app="ATLASSIAN-Confluence"</Fofa>
<Title>Apache OFBiz 身份验证绕过导致命令执行漏洞</Title>,<Fofa>app="Apache_OFBiz"</Fofa>
<Title>广州图创图书馆集群管理系统存在逻辑绕过漏洞</Title>,<Fofa>body="广州图创计算机软件开发有限公司"</Fofa>
<Title>SysAid Server远程命令执行漏洞</Title>,<Fofa>body="sysaid-logo-dark-green.png" || title="SysAid Help Desk Software" || body="Help Desk software <a href=\"http://www.sysaid.com\">by SysAid</a>"</Fofa>
<Title>AJ-Report开源数据大屏远程命令执行漏洞</Title>,<Fofa>title="AJ-Report"</Fofa>
<Title>蓝凌EIS智慧协同平台rpt_listreport_definefield.aspx SQL注入漏洞</Title>,<Fofa>icon_hash="953405444"||app="Landray-OA系统"</Fofa>
<Title>Apache ActiveMQ远程命令执行漏洞</Title>,<Fofa>app="APACHE-ActiveMQ" && port="61616"</Fofa>
<Output>
<Title>红帆OA zyy_AttFile.asmx SQL注入漏洞</Title>,<Fofa>app="红帆-ioffice"</Fofa>
</Output>
<Title>金盘移动图书馆系统任意文件上传漏洞</Title>,<Fofa>app="金盘软件-金盘移动图书馆系统"</Fofa>
<Title>科荣 AIO任意文件上传-目录遍历-任意文件读取漏洞</Title>,<Fofa>{body="changeAccount('8000')"}<Fofa>{http://xxxxxx/ReportServlet?operation=getFileList&path=../../../}<Fofa>{POST /ReportServlet?operation=saveFormatFile&fileName=demo.css&language= HTTP/1.1 Host: xxxxxx Connection: lose Content-Type: application/x-www-form-urlencoded Content-Length: 2 demo}<Fofa>{http://xxxxx/ReportServlet?operation=getPicFile&fileName=/DISKC/Windows/Win.ini}</Fofa>
<Title>用友NC-Cloud uploadChunk任意文件上传漏洞</Title>,<Fofa>app="用友-NC-Cloud"</Fofa>
<Title>泛微e-cology-ProcessOverRequestByXml接口任意文件读取漏洞</Title>,<Fofa>body="/js/ecology8" || body="wui/common/css/w7OVFont_wev8.css" || (body="weaver" && body="ecology") || (header="ecology_JSessionId" && body="login/Login.jsp") || body="/wui/index.html" || body="jquery_wev8" && body="/login/Login.jsp?logintype=1</Fofa>
<Title>泛微云桥 e-Bridge addTaste接口SQL注入漏洞</Title>,<Fofa>app="泛微-云桥e-Bridge"</Fofa>
<Title>用友政务财务系统任意文件读取漏洞</Title>,<Fofa>app="用友-政务财务系统"</Fofa>
<Title>华为Auth-Http Server 1.0任意文件读取漏洞</Title>,<Fofa>server="Huawei Auth-Http Server 1.0"</Fofa>
<Title>天擎终端安全管理系统YII_CSRF_TOKEN远程代码执行漏洞</Title>,<Fofa>title="360新天擎" || body="appid\":\"skylar6" || body="/task/index/detail?id={item.id}" || body="已过期或者未授权,购买请联系4008-136-360" || title="360天擎" || title="360天擎终端安全管理系统"</Fofa>
<Title>西软云XMS-futurehotel-operate接口XXE漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa>
<Title>易宝OA ExecuteSqlForSingle SQL注入漏洞</Title>,<Fofa>None</Fofa>
<Title>某微E-Office9文件上传漏洞</Title>,<Fofa>app="泛微-EOffice"</Fofa>
<Title>亿赛通电子文档安全管理系统任意文件读取漏洞</Title>,<Fofa>app="亿赛通电子文档安全管理系统"</Fofa>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment