-
-
Save Rvn0xsy/52387fbf6e951763bce08ac3735ff98f to your computer and use it in GitHub Desktop.
Qpipe
We can make this file beautiful and searchable if this error is corrected: Illegal quoting in line 1.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<Title>用友畅捷通-TPlus-CheckMutex存在sql注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>红帆OA iorepsavexml.aspx 文件上传漏洞</Title>,<Fofa>title="iOffice.net"</Fofa> | |
<Title>泛微e-office 未授权访问漏洞</Title>,<Fofa>(body="login.php"&&body="eoffice")||body="/general/login/index.php"</Fofa> | |
<Title>SANGFOR终端检测响应平台任意用户免密登录及前台RCE漏洞</Title>,<Fofa>title="SANGFOR终端检测响应平台"</Fofa> | |
<Title>用友U8 Cloud KeyWordDetailReportQuery SQL注入漏洞</Title>,<Fofa>app="用友U8 Cloud"</Fofa> | |
<Title>用友NC-runStateServlet接口SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792"</Fofa> | |
<Title>金和OA_jc6_ntko-upload任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>泛微e-cology V9<10.56 SQL注入漏洞</Title>,<Fofa>app="泛微-协同商务系统"</Fofa> | |
<Title>IP-guard WebServer权限绕过漏洞</Title>,<Fofa>icon_hash="2030860561"</Fofa> | |
<Title>用友时空KSOA-linkadd.jsp SQL注入漏洞</Title>,<Fofa>title="企业信息系统门户"</Fofa> | |
<Title>Jenkins任意文件读取漏洞</Title>,<Fofa>app="Jenkins"</Fofa> | |
<Title>飞企互联loginService任意登录漏洞</Title>,<Fofa>app="FE-协作平台" app="飞企互联-FE企业运营管理平台"</Fofa> | |
<Title>用友畅捷通TPlus-InitServerInfo存在SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>福建科立讯通信指挥调度管理平台SQL注入漏洞</Title>,<Fofa>body="app/structure/departments.php"||app="指挥调度管理平台"</Fofa> | |
<Title>泛微E-Mobile命令执行漏洞</Title>,<Fofa>"Weaver E-Mobile"</Fofa> | |
<Title>用友移动管理平台uploadIcon任意文件上传漏洞</Title>,<Fofa>app="用友-移动系统管理"</Fofa> | |
<Title>金和OA jc6 clobfield SQL注入漏洞</Title>,<Fofa>header="Path=/jc6" || (body="JC6金和协同管理平台" && body="src=\"/jc6/platform/") || banner="Path=/jc6"</Fofa> | |
<Title>东华医疗协同办公系统反序列化漏洞</Title>,<Fofa>body="东华医疗协同办公系统"</Fofa> | |
<Title>飞企互联-FE企业运营管理平台publicData.jsp SQL注入漏洞</Title>,<Fofa>app="FE-协作平台" app="飞企互联-FE企业运营管理平台"</Fofa> | |
<Title>瑞友应用虚拟化系统-RAPAgent SQL注入漏洞</Title>,<Fofa>title="瑞友天翼-应用虚拟化系统"</Fofa> | |
<Title>宏景eHR人力资源管理软件showmediainfo SQL注入漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa> | |
<Title>脸爱云一脸通智慧平台SelOperators信息泄露漏洞</Title>,<Fofa>body="View/UserReserved/UserReservedTest.aspx"</Fofa> | |
<Title>东方通TongWeb任意文件上传漏洞</Title>,<Fofa>header="TongWeb Server" || banner="Server: TongWeb Server"</Fofa> | |
<Title>捷诚管理信息系统SQL注入漏洞</Title>,<Fofa>body="/Scripts/EnjoyMsg.js"</Fofa> | |
<Title>致远OA getAjaxDataServlet接口存在XML实体注入漏洞</Title>,<Fofa>app="致远互联-OA"</Fofa> | |
<Title>帮管客CRM-jiliyu接口SQL漏洞</Title>,<Fofa>"帮管客-CRM"</Fofa> | |
<Title>Ncast盈可视高清智能录播系统RCE漏洞</Title>,<Fofa>app="Ncast-产品" && title=="高清智能录播系统"</Fofa> | |
<Title>网神防火墙app_av_import_save文件上传漏洞</Title>,<Fofa>title="网神SecGate 3600防火墙"</Fofa> | |
<Title>用友NC_Cloud soapFormat.ajax接口XXE漏洞</Title>,<Fofa>body="/Client/Uclient/UClient.exe"||body="ufida.ico"||body="nccloud"||body="/api/uclient/public/"</Fofa> | |
<Title>WordPress-js-support-ticket 文件上传漏洞</Title>,<Fofa>body="wp-content/plugins/js-support-ticket"</Fofa> | |
<Title>用友时空KSOA-imagefield接口SQL注入漏洞</Title>,<Fofa>app="用友-时空KSOA"</Fofa> | |
<Title>迪普DPTech VPN 任意文件读取漏洞</Title>,<Fofa>title=="SSL VPN Service" && header="Dptech" || cert="DPtechCa"</Fofa> | |
<Title>通达OA get_datas.php SQL注入漏洞</Title>,<Fofa>app="TDXK-通达OA"</Fofa> | |
<Title>网康NS-ASG应用安全网关singlelogin.php SQL注入漏洞</Title>,<Fofa>app="网康NS-ASG应用安全网关"</Fofa> | |
<Title>致远M1 usertokenservice 反序列化RCE漏洞</Title>,<Fofa>"M1-Server 已启动"</Fofa> | |
<Title>畅捷通TPlus-KeyInfoList.aspx SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>深信服下一代防火墙NGAF任意文件读取漏洞</Title>,<Fofa>"Redirect.php?url=/LogInOut.php" && port="85"</Fofa> | |
<Title>蓝凌EKP前台授权绕过文件上传漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa> | |
<Title>Progress-Flowmon命令注入漏洞 (CVE-2024-2389)</Title>,<Fofa>body="Flowmon-Web-Interface"</Fofa> | |
<Title>亿赛通电子文档安全管理系统任意文件读取漏洞</Title>,<Fofa>app="亿赛通电子文档安全管理系统"</Fofa> | |
<Title>亿赛通电子文档uploadFile接口文件上传漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa> | |
<Title>RG-UAC锐捷统一上网行为管理与审计系统远程代码执行漏洞</Title>,<Fofa>app="Ruijie-RG-UAC"</Fofa> | |
<Title>Panalog大数据日志审计系统libres_syn_delete.php命令执行漏洞</Title>,<Fofa>app="Panabit-Panalog"</Fofa> | |
<Title>易思智能物流无人值守系统5.0任意文件上传漏洞</Title>,<Fofa>"智能物流无人值守系统"</Fofa> | |
<Title>蓝凌OA treexml.tmpl 远程命令执行漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa> | |
<Title>惠尔顿-网络安全审计系统任意文件读取漏洞</Title>,<Fofa>app="惠尔顿-网络安全审计系统"</Fofa> | |
<Title>鸿运(通天星CMSV6车载)任意文件读取漏洞</Title>,<Fofa>body="./open/webApi.html"||body="/808gps/"</Fofa> | |
<Title>飞企互联-FE企业运营管理平台任意文件上传漏洞</Title>,<Fofa>app="FE-协作平台"</Fofa> | |
<Title>用友U9-PatchFile.asmx任意文件上传漏洞</Title>,<Fofa>body="logo-u9.png"</Fofa> | |
<Title>金蝶云-星空ServiceGateway反序列化漏洞</Title>,<Fofa>None</Fofa> | |
<Title>WIFISKY 7层流控路由器confirm.php接口RCE漏洞</Title>,<Fofa>title="WIFISKY 7层流控路由器"</Fofa> | |
<Title>MajorDoMo /modules/thumb/thumb.php未授权RCE漏洞</Title>,<Fofa>app="MajordomoSL"</Fofa> | |
<Title>用友NC接口文件上传漏洞</Title>,<Fofa>title:"YONYOU NC"</Fofa> | |
<Title>用友畅捷通TPlus任意文件读取漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>宏景DisplayFiles任意文件读取漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa> | |
<Title>浙江宇视isc网络视频录像机LogReport.php远程命令执行漏洞</Title>,<Fofa>body="Alarm" && body="白牌定制"</Fofa> | |
<Title>用友系统-U9企业版任意文件上传漏洞</Title>,<Fofa>title==" U9-登录 "</Fofa> | |
<Title>ZenML服务器远程权限提升漏洞</Title>,<Fofa>title=="ZenML - Dashboard"</Fofa> | |
<Title>全程云OA__ajax.ashx SQL注入漏洞</Title>,<Fofa>.passImg{background:url(images/yiyaoshi.png)</Fofa> | |
<Title>魔方网表mailupdate.jsp接口任意文件上传漏洞</Title>,<Fofa>icon_hash="694014318"</Fofa> | |
<Title>用友NC-avatar接口文件上传漏洞</Title>,<Fofa>body="/Client/Uclient/UClient.exe"</Fofa> | |
<Title>飞企互联-FE企业运营管理平台登录绕过漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa> | |
<Title>D-Link NAS CVE-2024-3272/CVE-2024-3273 Authentication Bypass and Command Injection</Title>,<Fofa>body="Text:In order to access the ShareCenter"</Fofa> | |
<Title>安美数字酒店宽带运营系统SQL注入漏洞</Title>,<Fofa>title=酒店宽带运营系统</Fofa> | |
<Title>泛微OA-E-Cology-FileDownload文件读取漏洞</Title>,<Fofa>app="泛微-OA(e-cology”)</Fofa> | |
<Title>医院一站式后勤管理系统任意文件上传漏洞</Title>,<Fofa>body="frameworkModuleJob"</Fofa> | |
<Title>飞企互联-FE企业运营管理平台ProxyServletUti存在任意文件读取漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa> | |
<Title>H3C Magic B1STV100R012 RCE via whoami Command</Title>,<Fofa>POST /goform/aspForm HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML | |
<Title>SpringBlade export-user SQL 注入漏洞</Title>,<Fofa>body="https://bladex.vip"</Fofa> | |
<Title>用友 GRP-U8 bx_historyDataCheck.jsp SQL注入漏洞</Title>,<Fofa>app="yonyou-GRP-U8"</Fofa> | |
<Title>网康科技NS-ASG应用安全网关add_postlogin.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关"</Fofa> | |
<Title>用友NC接口PaWfm SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792" app="用友-UFIDA-NC"</Fofa> | |
<Title>明御安全网关RCE漏洞</Title>,<Fofa>title="明御安全网关"</Fofa> | |
<Title>用友NC-workflowImageServlet接口SQL注入漏洞</Title>,<Fofa>icon_hash="1085941792" </Fofa> | |
<Title>用友NC接口ConfigResourceServlet反序列化漏洞</Title>,<Fofa>icon_hash="1085941792" app="用友-UFIDA-NC"</Fofa> | |
<Title>普元EOS-Platform-eos.jmx存在远程代码执行漏洞</Title>,<Fofa>body="普元" || (body="ame.primeton.com" && body="eos-web")</Fofa> | |
<Title>蓝凌EIS智慧协同平台saveImg接口任意文件上传漏洞</Title>,<Fofa>icon_hash="953405444"</Fofa> | |
<Title>用友GRP-U8-slbmbygr.jsp SQL注入漏洞</Title>,<Fofa>app="用友-GRP-U8"</Fofa> | |
<Title>OpenMetadata命令执行漏洞 (CVE-2024-28255)</Title>,<Fofa>icon_hash="733091897"</Fofa> | |
<Title>蓝凌OA SQL注入漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa> | |
<Title>联达OA-UpLoadFile.aspx任意文件上传漏洞</Title>,<Fofa>app="联达OA"</Fofa> | |
<Title>用友畅捷通TPlus-keyEdit.aspx SQL注入漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>金和OA_MailTemplates.aspx_SQL注入漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>网康科技NS-ASG应用安全网关config_Anticrack.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关</Fofa> | |
<Title>富通天下外贸ERP任意文件上传漏洞</Title>,<Fofa>title="用户登录_富通天下外贸ERP"</Fofa> | |
<Title>大华智慧园区综合管理平台ipms接口远程代码执行漏洞</Title>,<Fofa>body="src=/WPMS/asset/common/js/jsencrypt.min.js"</Fofa> | |
<Title>医院挂号系统SQL注入</Title>,<Fofa>body="res/img/ht_box_back.gif" || body="/res/img/ht_box_top.gif" || body="/res/img/ht_box_bottom.gif" || body="dom_loaded.load(init);"</Fofa> | |
<Title>大华智能物联综合管理平台登录接口漏洞</Title>,<Fofa>icon_hash="-1935899595"body="*客户端会小于800*"</Fofa> | |
<Title>用友U8 Cloud nc.bs.sm.login2.RegisterServlet SQL注入漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa> | |
<Title>大华DSS itcBulletin SQL注入漏洞</Title>,<Fofa>app="dahua-DSS"</Fofa> | |
<Title>大华DSS城市安防监控平台Struct2-045命令执行漏洞</Title>,<Fofa>app="dahua-DSS"</Fofa> | |
<Title>中成科信票务管理平台任意文件上传漏洞</Title>,<Fofa>body="技术支持:北京中成科信科技发展有限公司"</Fofa> | |
<Title>商混ERP-DictionaryEdit.aspx SQL注入漏洞</Title>,<Fofa>title="商混ERP系统"</Fofa> | |
<Title>用友U8-Cloud RegisterServlet接口SQL注入漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa> | |
<Title>广联达OA前台任意文件上传漏洞</Title>,<Fofa>fid="/yV4r5PdARKT4jaqLjJYqw=="</Fofa> | |
<Title>致远OA任意用户密码修改漏洞</Title>,<Fofa>app="致远互联-OA"</Fofa> | |
<Title>泛微-EMobile弱口令漏洞</Title>,<Fofa>app="泛微-EMobile"</Fofa> | |
<Title>Smartbi 内置用户登陆绕过</Title>,<Fofa>app="SMARTBI"</Fofa> | |
<Title>WordPress-Automatic插件SQL注入漏洞</Title>,<Fofa>body="/wp-content/plugins/wp-automatic"</Fofa> | |
<Title>金蝶星空云K3Cloud反序列化漏洞</Title>,<Fofa>app="金蝶云星空-管理中心"</Fofa> | |
<Title>湖南建研质量监测系统upload.ashx文件上传漏洞</Title>,<Fofa>body="/Content/Theme/Standard/webSite/login.css"</Fofa> | |
<Title>山石网科云鉴存在前台任意命令执行漏洞</Title>,<Fofa>None</Fofa> | |
<Title>IDocView接口任意文件读取漏洞</Title>,<Fofa>title="I Doc View"</Fofa> | |
<Title>万户OA text2Html接口任意文件读取漏洞</Title>,<Fofa>app="万户网络-ezOFFICE"</Fofa> | |
<Title>致远OA任意管理员登录漏洞</Title>,<Fofa>app="致远互联-OA"</Fofa> | |
<Title>正方教学管理信息服务平台ReportServer任意文件读取漏洞</Title>,<Fofa>body="正方软件股份有限公司" && title="教学管理信息服务平台</Fofa> | |
<Title>西软云XMS-futurehotel-query接口XXE漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa> | |
<Title>万户OA-RhinoScriptEngineService命令执行漏洞</Title>,<Fofa>app="万户网络-ezOFFICE"</Fofa> | |
<Title>泛微e-office系统UserSelect接口未授权访问漏洞</Title>,<Fofa>app="泛微-EOffice"</Fofa> | |
<Title>Laykefu客服系统任意文件上传漏洞</Title>,<Fofa>icon_hash="-334624619"</Fofa> | |
<Title>致远OA M3 Server 反序列化漏洞</Title>,<Fofa>M3-Server 已启动</Fofa> | |
<Title>飞企互联 FE 业务协作平台参数文件读取漏洞</Title>,<Fofa>app="飞企互联-FE企业运营管理平台"</Fofa> | |
<Title>Apache Ofbiz XML-RPC 远程代码执行漏洞</Title>,<Fofa>app="Apache_OFBiz"</Fofa> | |
<Title>DataCube3 SQL注入漏洞 (CVE-2024-31750)</Title>,<Fofa>title=="DataCube3"</Fofa> | |
<Title>iDocView upload接口任意文件读取漏洞</Title>,<Fofa>title="I Doc View"</Fofa> | |
<Title>海康威视对讲广播系统远程命令执行漏洞</Title>,<Fofa>icon_hash="-1830859634"</Fofa> | |
<Title>Yearning任意文件读取漏洞</Title>,<Fofa>app="Yearning"</Fofa> | |
<Title>Telesquare路由器远程代码执行漏洞</Title>,<Fofa>title="Login to TLR-2005KSH" app="TELESQUARE-TLR-2005KSH"</Fofa> | |
<Title>奇安信天擎rptsvr接口任意文件上传漏洞</Title>,<Fofa>banner="QiAnXin web server" || banner="360 web server" || body="appid\":\"skylar6" || body="/task/index/detail?id={item.id}" || body="已过期或者未授权,购买请联系4008-136-360</Fofa> | |
<Title>脸爱云一脸通智慧管理平台任意用户添加漏洞</Title>,<Fofa>None</Fofa> | |
<Title>畅捷通TPlus-App_Code.ashx远程命令执行漏洞</Title>,<Fofa>app="畅捷通-TPlus"</Fofa> | |
<Title>大华EIMS-capture_handle接口远程命令执行漏洞</Title>,<Fofa>{<title>eims</title>}</Fofa> | |
<Title>泛微E-Office-uploadfile.php任意文件上传漏洞</Title>,<Fofa>(body="login.php"&&body="eoffice")||body="/general/login/index.php</Fofa> | |
<Title>云时空社会化商业ERP系统validateLoginName接口SQL注入漏洞</Title>,<Fofa>app="云时空社会化商业ERP系统"</Fofa> | |
<Title>云时空社会化商业ERP任意文件上传漏洞</Title>,<Fofa>app="云时空社会化商业ERP系统"</Fofa> | |
<Title>Draytek路由器addrouting命令执行漏洞</Title>,<Fofa>header="realm="VigorAP910C"</Fofa> | |
<Title>Cobbler远程命令执行漏洞 (CVE-2021-40323)</Title>,<Fofa>"Cobbler Web Interface"</Fofa> | |
<Title>JumpServer未授权访问漏洞</Title>,<Fofa>icon_hash="-1162630024"</Fofa> | |
<Title>远秋医学培训系统未授权查看密码漏洞</Title>,<Fofa>title="远秋医学培训报名系统v1.0"</Fofa> | |
<Title>万户OA-upload任意文件上传漏洞</Title>,<Fofa>app="万户ezOFFICE协同管理平台"</Fofa> | |
<Title>西软云XMS反序列化漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa> | |
<Title>金和OA_uploadfileeditorsave接口任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>WordPress-thimpress_hotel_booking代码执行漏洞</Title>,<Fofa>body="wp-content/plugins/wp-hotel-booking"</Fofa> | |
<Title>蓝网科技临床浏览系统 SQL注入漏洞复现 (CVE-2024-4257)</Title>,<Fofa>app="LANWON-临床浏览系统"</Fofa> | |
<Title>CERIO-DT系列路由器Save.cgi命令执行漏洞</Title>,<Fofa>title="DT-100G-N" || title="DT-300N" || title="DT-100G" || title="AMR-3204G" || title="WMR-200N"</Fofa> | |
<Title>WordPress_LayerSlider插件SQL注入漏洞</Title>,<Fofa>"wp-content/plugins/LayerSlider/"</Fofa> | |
<Title>海康威视-综合安防管理平台任意文件读取漏洞</Title>,<Fofa>综合安防管理平台</Fofa> | |
<Title>用友U8-Cloud TableInputOperServlet反序列化漏洞</Title>,<Fofa>app="用友-U8-Cloud" || body="/api/uclient/public/"</Fofa> | |
<Title>WordPress_Wholesale_Market插件任意文件读取漏洞</Title>,<Fofa>body="wp-content/plugins/wholesale-market"</Fofa> | |
<Title>亿赛通电子文档安全管理系统-jlockseniordao-findbylockname-sql注入漏洞</Title>,<Fofa>app="亿赛通-电子文档安全管理系统"</Fofa> | |
<Title>X2Modbus网关GetUser接口信息泄漏漏洞</Title>,<Fofa>server="SunFull-Webs"</Fofa> | |
<Title>OpenMetadata SpEL注入漏洞</Title>,<Fofa>icon_hash="733091897"</Fofa> | |
<Title>蓝凌EIS智慧协同平台多个接口SQL注入</Title>,<Fofa>app="Landray-EIS智慧协同平台"</Fofa> | |
<Title>金蝶EAS myUploadFile任意文件上传漏洞</Title>,<Fofa>app="Kingdee-EAS"</Fofa> | |
<Title>广州图创图书馆集群管理系统updOpuserPw接口SQL注入漏洞</Title>,<Fofa>body="interlib/common/" || body="Interlib图书馆集群管理系统" || body="/interlib3/system_index" || body="打开Interlib主界面"</Fofa> | |
<Title>润乾报表dataSphereServlet任意文件上传漏洞</Title>,<Fofa>body="/raqsoft"</Fofa> | |
<Title>蓝凌OAsysUiComponent 文件存在任意文件上传漏洞</Title>,<Fofa>app="Landray-OA系统"</Fofa> | |
<Title>金和OA_CarCardInfo.aspx_SQL注入漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>友点建站系统image_upload.php文件上传漏洞</Title>,<Fofa>app="友点建站-CMS"</Fofa> | |
<Title>IP-guard WebServer 远程命令执行漏洞</Title>,<Fofa>"IP-guard" && icon_hash="2030860561"</Fofa> | |
<Title>宝塔WAF防火墙SQL注入和未授权访问漏洞</Title>,<Fofa>title=='404 - Website not exist!' "宝塔"</Fofa> | |
<Title>致远M3敏感信息泄露漏洞</Title>,<Fofa>title="M3-Server"</Fofa> | |
<Title>aiohttp目录遍历漏洞 (CVE-2024-23334)</Title>,<Fofa>app="aiohttp"</Fofa> | |
<Title>H3C网络管理系统任意文件读取漏洞</Title>,<Fofa>body="webui/js/jquerylib/jquery-1.7.2.min.js</Fofa> | |
<Title>昂捷ERP WebService接口SQL注入漏洞</Title>,<Fofa>body="CheckSilverlightInstalled"</Fofa> | |
<Title>通天星-CMSV6任意文件上传漏洞</Title>,<Fofa>body="./open/webApi.html"||body="/808gps/</Fofa> | |
<Title>用友U8-Cloud FileManageServlet反序列漏洞</Title>,<Fofa>app="用友-U8-Cloud"</Fofa> | |
<Title>用友移动系统管理getFileLocal接口任意文件读取漏洞</Title>,<Fofa>app="用友-移动系统管理"</Fofa> | |
<Title>Array VPN任意文件读取漏洞</Title>,<Fofa>product="Array-VPN"</Fofa> | |
<Title>JFinalCMS 任意文件读取漏洞(CVE-2023-41599)</Title>,<Fofa>body="content=\"JreCms"</Fofa> | |
<Title>金蝶Apusic应用服务器任意文件上传漏洞</Title>,<Fofa>app="Apusic应用服务器" fid="rqhtFwF4sIF7wTOroKTQGw=="</Fofa> | |
<Title>电信网关配置管理后台ipping.php命令执行漏洞</Title>,<Fofa>body="img/login_bg3.png" && body="系统登录"</Fofa> | |
<Title>大华智慧园区综合管理平台pageJson SQL注入漏洞</Title>,<Fofa>app="dahua-智慧园区综合管理平台"</Fofa> | |
<Title>锐捷-EG易网关存在RCE漏洞</Title>,<Fofa>app="Ruijie-EG易网关"</Fofa> | |
<Title>致远互联OA前台fileUpload.do存在绕过文件上传漏洞</Title>,<Fofa>title="协同管理软件 V5.6SP1"</Fofa> | |
<Title>智跃人力资源管理系统GenerateEntityFromTable.aspx SQL注入漏洞</Title>,<Fofa>app="ZY-人力资源管理系统"</Fofa> | |
<Title>网康科技NS-ASG应用安全网关config_ISCGroupNoCache.php SQL注入漏洞</Title>,<Fofa>app="网康科技-NS-ASG安全网关"</Fofa> | |
<Title>WeiPHP存在SQL注入漏洞</Title>,<Fofa>app="WeiPHP"</Fofa> | |
<Title>GitLab 任意用户密码重置漏洞</Title>,<Fofa>app="GitLab"</Fofa> | |
<Title>金山终端安全系统V9.0 SQL注入漏洞</Title>,<Fofa>app="金山终端安全系统V9.0Web控制台" title=="用户登录-金山终端安全系统V9.0Web控制台"</Fofa> | |
5 | |
<Title>金和OA_upload_json.asp任意文件上传漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>Salia PLCC cPH2 远程命令执行漏洞</Title>,<Fofa>"Salia PLCC"</Fofa> | |
<Title>WordPress Automatic Plugin任意文件下载漏洞</Title>,<Fofa>/wp-content/plugins/wp-automatic</Fofa> | |
<Title>TeamCity身份验证绕过漏洞</Title>,<Fofa>body="Log in to TeamCity"</Fofa> | |
<Title>锐捷校园网自助服务系统operatorReportorRoamService SQL注入漏洞</Title>,<Fofa>title=="校园网自助服务系统"</Fofa> | |
<Title>Oracle WebLogic Server JNDI注入漏洞(CVE-2024-20931)</Title>,<Fofa>(body="Welcome to WebLogic Server") || (title=="Error 404--Not Found") || (((body=" | |
BEA WebLogic Server" || server="Weblogic" || body="content=\"WebLogic Server" || body=" | |
Welcome to Weblogic Application" || body=" | |
BEA WebLogic Server") && header!="couchdb" && header!="boa" && header!="RouterOS" && header!="X-Generator: Drupal") || (banner="Weblogic" && banner!="couchdb" && banner!="drupal" && banner!=" Apache | |
<Title>思福迪运维安全管理系统test_qrcode_b远程命令执行漏洞</Title>,<Fofa>app="思福迪-LOGBASE"</Fofa> | |
<Title>宏景eHR SQL注入漏洞</Title>,<Fofa>app="HJSOFT-HCM"</Fofa> | |
<Title>北京中科聚网一体化运营平台catchByUrl文件上传漏洞</Title>,<Fofa>body="thirdparty/ueditor/WordPaster"</Fofa> | |
<Title>禅道项目管理系统身份认证绕过漏洞</Title>,<Fofa>title="用户登录- 禅道"</Fofa> | |
<Title>金和OA任意文件读取漏洞</Title>,<Fofa>app="金和网络-金和OA"</Fofa> | |
<Title>Confluence 未授权提权访问漏洞 CVE-2023-22515</Title>,<Fofa>app="ATLASSIAN-Confluence"</Fofa> | |
<Title>Apache OFBiz 身份验证绕过导致命令执行漏洞</Title>,<Fofa>app="Apache_OFBiz"</Fofa> | |
<Title>广州图创图书馆集群管理系统存在逻辑绕过漏洞</Title>,<Fofa>body="广州图创计算机软件开发有限公司"</Fofa> | |
<Title>SysAid Server远程命令执行漏洞</Title>,<Fofa>body="sysaid-logo-dark-green.png" || title="SysAid Help Desk Software" || body="Help Desk software <a href=\"http://www.sysaid.com\">by SysAid</a>"</Fofa> | |
<Title>AJ-Report开源数据大屏远程命令执行漏洞</Title>,<Fofa>title="AJ-Report"</Fofa> | |
<Title>蓝凌EIS智慧协同平台rpt_listreport_definefield.aspx SQL注入漏洞</Title>,<Fofa>icon_hash="953405444"||app="Landray-OA系统"</Fofa> | |
<Title>Apache ActiveMQ远程命令执行漏洞</Title>,<Fofa>app="APACHE-ActiveMQ" && port="61616"</Fofa> | |
<Output> | |
<Title>红帆OA zyy_AttFile.asmx SQL注入漏洞</Title>,<Fofa>app="红帆-ioffice"</Fofa> | |
</Output> | |
<Title>金盘移动图书馆系统任意文件上传漏洞</Title>,<Fofa>app="金盘软件-金盘移动图书馆系统"</Fofa> | |
<Title>科荣 AIO任意文件上传-目录遍历-任意文件读取漏洞</Title>,<Fofa>{body="changeAccount('8000')"}<Fofa>{http://xxxxxx/ReportServlet?operation=getFileList&path=../../../}<Fofa>{POST /ReportServlet?operation=saveFormatFile&fileName=demo.css&language= HTTP/1.1 Host: xxxxxx Connection: lose Content-Type: application/x-www-form-urlencoded Content-Length: 2 demo}<Fofa>{http://xxxxx/ReportServlet?operation=getPicFile&fileName=/DISKC/Windows/Win.ini}</Fofa> | |
<Title>用友NC-Cloud uploadChunk任意文件上传漏洞</Title>,<Fofa>app="用友-NC-Cloud"</Fofa> | |
<Title>泛微e-cology-ProcessOverRequestByXml接口任意文件读取漏洞</Title>,<Fofa>body="/js/ecology8" || body="wui/common/css/w7OVFont_wev8.css" || (body="weaver" && body="ecology") || (header="ecology_JSessionId" && body="login/Login.jsp") || body="/wui/index.html" || body="jquery_wev8" && body="/login/Login.jsp?logintype=1</Fofa> | |
<Title>泛微云桥 e-Bridge addTaste接口SQL注入漏洞</Title>,<Fofa>app="泛微-云桥e-Bridge"</Fofa> | |
<Title>用友政务财务系统任意文件读取漏洞</Title>,<Fofa>app="用友-政务财务系统"</Fofa> | |
<Title>华为Auth-Http Server 1.0任意文件读取漏洞</Title>,<Fofa>server="Huawei Auth-Http Server 1.0"</Fofa> | |
<Title>天擎终端安全管理系统YII_CSRF_TOKEN远程代码执行漏洞</Title>,<Fofa>title="360新天擎" || body="appid\":\"skylar6" || body="/task/index/detail?id={item.id}" || body="已过期或者未授权,购买请联系4008-136-360" || title="360天擎" || title="360天擎终端安全管理系统"</Fofa> | |
<Title>西软云XMS-futurehotel-operate接口XXE漏洞</Title>,<Fofa>app="shiji-西软云XMS"</Fofa> | |
<Title>易宝OA ExecuteSqlForSingle SQL注入漏洞</Title>,<Fofa>None</Fofa> | |
<Title>某微E-Office9文件上传漏洞</Title>,<Fofa>app="泛微-EOffice"</Fofa> | |
<Title>亿赛通电子文档安全管理系统任意文件读取漏洞</Title>,<Fofa>app="亿赛通电子文档安全管理系统"</Fofa> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment