René's URL Explorer Experiment


Title: GitHub - eeeeeeeeee-code/POC: 备份的漏洞库,3月开始我们来维护

Open Graph Title: GitHub - eeeeeeeeee-code/POC: 备份的漏洞库,3月开始我们来维护

X Title: GitHub - eeeeeeeeee-code/POC: 备份的漏洞库,3月开始我们来维护

Description: 备份的漏洞库,3月开始我们来维护. Contribute to eeeeeeeeee-code/POC development by creating an account on GitHub.

Open Graph Description: 备份的漏洞库,3月开始我们来维护. Contribute to eeeeeeeeee-code/POC development by creating an account on GitHub.

X Description: 备份的漏洞库,3月开始我们来维护. Contribute to eeeeeeeeee-code/POC development by creating an account on GitHub.

Opengraph URL: https://github.com/eeeeeeeeee-code/POC

X: @github

direct link

Domain: github.com

route-pattern/:user_id/:repository
route-controllerfiles
route-actiondisambiguate
fetch-noncev2:b3fb84de-f88c-39c0-c656-ca78675cc1cd
current-catalog-service-hashf3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb
request-id9A4C:4BD90:1B74331:2689209:696A50EA
html-safe-nonce684d927f5cb80b01a098a5b78776b16617f97d84259cbfa9b4c3607d39579979
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiI5QTRDOjRCRDkwOjFCNzQzMzE6MjY4OTIwOTo2OTZBNTBFQSIsInZpc2l0b3JfaWQiOiIzNzM2MzEwNzc4MzM5OTM4NTM4IiwicmVnaW9uX2VkZ2UiOiJpYWQiLCJyZWdpb25fcmVuZGVyIjoiaWFkIn0=
visitor-hmac05245dde8db1b643d86e5de866fa1fc50b63a5c30bd041311f6a160350b7c065
hovercard-subject-tagrepository:942713148
github-keyboard-shortcutsrepository,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location//
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/eeeeeeeeee-code/POC
twitter:imagehttps://opengraph.githubassets.com/e8116775f14f57c5cb94b574ee68894ec641f0292d0150b540ac1012fd4add24/eeeeeeeeee-code/POC
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/e8116775f14f57c5cb94b574ee68894ec641f0292d0150b540ac1012fd4add24/eeeeeeeeee-code/POC
og:image:alt备份的漏洞库,3月开始我们来维护. Contribute to eeeeeeeeee-code/POC development by creating an account on GitHub.
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
hostnamegithub.com
expected-hostnamegithub.com
None3f871c8e07f0ae1886fa8dac284166d28b09ad5bada6476fc10b674e489788ef
turbo-cache-controlno-preview
go-importgithub.com/eeeeeeeeee-code/POC git https://github.com/eeeeeeeeee-code/POC.git
octolytics-dimension-user_id115862499
octolytics-dimension-user_logineeeeeeeeee-code
octolytics-dimension-repository_id942713148
octolytics-dimension-repository_nwoeeeeeeeeee-code/POC
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forkfalse
octolytics-dimension-repository_network_root_id942713148
octolytics-dimension-repository_network_root_nwoeeeeeeeeee-code/POC
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release63c426b30d262aba269ef14c40e3c817b384cd61
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://github.com/eeeeeeeeee-code/POC#start-of-content
https://github.com/
Sign in https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Feeeeeeeeee-code%2FPOC
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Feeeeeeeeee-code%2FPOC
Sign up https://github.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=eeeeeeeeee-code%2FPOC
Reloadhttps://github.com/eeeeeeeeee-code/POC
Reloadhttps://github.com/eeeeeeeeee-code/POC
Reloadhttps://github.com/eeeeeeeeee-code/POC
eeeeeeeeee-code https://github.com/eeeeeeeeee-code
POChttps://github.com/eeeeeeeeee-code/POC
Notifications https://github.com/login?return_to=%2Feeeeeeeeee-code%2FPOC
Fork 480 https://github.com/login?return_to=%2Feeeeeeeeee-code%2FPOC
Star 1.8k https://github.com/login?return_to=%2Feeeeeeeeee-code%2FPOC
1.8k stars https://github.com/eeeeeeeeee-code/POC/stargazers
480 forks https://github.com/eeeeeeeeee-code/POC/forks
Branches https://github.com/eeeeeeeeee-code/POC/branches
Tags https://github.com/eeeeeeeeee-code/POC/tags
Activity https://github.com/eeeeeeeeee-code/POC/activity
Star https://github.com/login?return_to=%2Feeeeeeeeee-code%2FPOC
Notifications https://github.com/login?return_to=%2Feeeeeeeeee-code%2FPOC
Code https://github.com/eeeeeeeeee-code/POC
Issues 6 https://github.com/eeeeeeeeee-code/POC/issues
Pull requests 0 https://github.com/eeeeeeeeee-code/POC/pulls
Actions https://github.com/eeeeeeeeee-code/POC/actions
Projects 0 https://github.com/eeeeeeeeee-code/POC/projects
Security Uh oh! There was an error while loading. Please reload this page. https://github.com/eeeeeeeeee-code/POC/security
Please reload this pagehttps://github.com/eeeeeeeeee-code/POC
Insights https://github.com/eeeeeeeeee-code/POC/pulse
Code https://github.com/eeeeeeeeee-code/POC
Issues https://github.com/eeeeeeeeee-code/POC/issues
Pull requests https://github.com/eeeeeeeeee-code/POC/pulls
Actions https://github.com/eeeeeeeeee-code/POC/actions
Projects https://github.com/eeeeeeeeee-code/POC/projects
Security https://github.com/eeeeeeeeee-code/POC/security
Insights https://github.com/eeeeeeeeee-code/POC/pulse
Brancheshttps://github.com/eeeeeeeeee-code/POC/branches
Tagshttps://github.com/eeeeeeeeee-code/POC/tags
https://github.com/eeeeeeeeee-code/POC/branches
https://github.com/eeeeeeeeee-code/POC/tags
312 Commitshttps://github.com/eeeeeeeeee-code/POC/commits/main/
https://github.com/eeeeeeeeee-code/POC/commits/main/
wpochttps://github.com/eeeeeeeeee-code/POC/tree/main/wpoc
wpochttps://github.com/eeeeeeeeee-code/POC/tree/main/wpoc
README.mdhttps://github.com/eeeeeeeeee-code/POC/blob/main/README.md
README.mdhttps://github.com/eeeeeeeeee-code/POC/blob/main/README.md
READMEhttps://github.com/eeeeeeeeee-code/POC
https://github.com/eeeeeeeeee-code/POC#注意
https://private-user-images.githubusercontent.com/73454853/423716566-a2b045ed-2231-47ff-87f9-d325fe73157d.png?jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.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.Ppe1W5grXlsxzorM3pL_61QDeQNAaIbHc0uNbUmkObg
https://github.com/eeeeeeeeee-code/POC#漏洞收集
https://github.com/eeeeeeeeee-code/POC#2025-12-11
高格智能制造目视化系统SCCJ参数存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%99%E6%B1%9F%E9%AB%98%E6%A0%BC%E8%BD%AF%E4%BB%B6%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E9%AB%98%E6%A0%BC%E6%99%BA%E8%83%BD%E5%88%B6%E9%80%A0%E7%9B%AE%E8%A7%86%E5%8C%96%E7%B3%BB%E7%BB%9FSCCJ%E5%8F%82%E6%95%B0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
喰星云·数字化餐饮服务系统home_check存在SQL注入.mhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%96%B0%E6%98%9F%E4%BA%91%C2%B7%E6%95%B0%E5%AD%97%E5%8C%96%E9%A4%90%E9%A5%AE%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9F/%E5%96%B0%E6%98%9F%E4%BA%91%C2%B7%E6%95%B0%E5%AD%97%E5%8C%96%E9%A4%90%E9%A5%AE%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Fhome_check%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
恒友摄影ERPlogin.ashx存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%81%92%E5%8F%8B%E6%91%84%E5%BD%B1ERP/%E6%81%92%E5%8F%8B%E6%91%84%E5%BD%B1ERP%E7%9A%84login.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
蓝凌EIS智慧协同平台mail_xml存在XXE注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEIS%E6%99%BA%E6%85%A7%E5%8D%8F%E5%90%8C%E5%B9%B3%E5%8F%B0mail_xml%E5%AD%98%E5%9C%A8XXE%E6%B3%A8%E5%85%A5.md
点晴MIS管理信息系统login_out.asp存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%82%B9%E6%99%B4MIS%E7%AE%A1%E7%90%86%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9F/%E7%82%B9%E6%99%B4MIS%E7%AE%A1%E7%90%86%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9Flogin_out.asp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
迪博数据决策系统downloadImpTemplet存在任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%BF%AA%E5%8D%9A%E6%95%B0%E6%8D%AE%E5%86%B3%E7%AD%96%E7%B3%BB%E7%BB%9F/%E8%BF%AA%E5%8D%9A%E6%95%B0%E6%8D%AE%E5%86%B3%E7%AD%96%E7%B3%BB%E7%BB%9FdownloadImpTemplet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
友加畅捷管理系统GetZTList存在信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8F%8B%E5%8A%A0%E7%95%85%E6%8D%B7%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%8F%8B%E5%8A%A0%E7%95%85%E6%8D%B7%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetZTList%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
朗新天霁人力资源管理系统UserInfo ZFMCWebService存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9C%97%E6%96%B0%E5%A4%A9%E9%9C%81%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%9C%97%E6%96%B0%E5%A4%A9%E9%9C%81%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUserInfo%20ZFMCWebService%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
Dify系统命令执行漏洞(CVE-2025-55182)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Dify%E7%B3%BB%E7%BB%9F/Dify%E7%B3%BB%E7%BB%9F%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2025-55182).md
大华ICC智能物联综合管理平台viewPDF存在任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EICC%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0viewPDF%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
https://github.com/eeeeeeeeee-code/POC#2025-09-01
深圳市锐明技术股份有限公司Crocus系统RepairRecord.do文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Crocus%E7%B3%BB%E7%BB%9FRepairRecord.do%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
新中大ERP企业管理软件 NGInterface 存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B0%E4%B8%AD%E5%A4%A7ERP%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6/%E6%96%B0%E4%B8%AD%E5%A4%A7ERP%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6%20NGInterface%20%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
森鑫炬水务企业综合运营平台 InstanceGet 存在任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%A3%AE%E9%91%AB%E7%82%AC%E6%B0%B4%E5%8A%A1%E4%BC%81%E4%B8%9A%E7%BB%BC%E5%90%88%E8%BF%90%E8%90%A5%E5%B9%B3%E5%8F%B0/%E6%A3%AE%E9%91%AB%E7%82%AC%E6%B0%B4%E5%8A%A1%E4%BC%81%E4%B8%9A%E7%BB%BC%E5%90%88%E8%BF%90%E8%90%A5%E5%B9%B3%E5%8F%B0%20InstanceGet%20%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
湖南建研-检测系统 admintool 存在任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E6%A3%80%E6%B5%8B%E7%B3%BB%E7%BB%9F/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94-%E6%A3%80%E6%B5%8B%E7%B3%BB%E7%BB%9F%20admintool%20%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
弥特科技全流程追溯系统geticp存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BC%A5%E7%89%B9%E7%A7%91%E6%8A%80%E5%85%A8%E6%B5%81%E7%A8%8B%E8%BF%BD%E6%BA%AF%E7%B3%BB%E7%BB%9F/%E5%BC%A5%E7%89%B9%E7%A7%91%E6%8A%80%E5%85%A8%E6%B5%81%E7%A8%8B%E8%BF%BD%E6%BA%AF%E7%B3%BB%E7%BB%9Fgeticp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
上海网仕科技TranscoderMS index存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%8A%E6%B5%B7%E7%BD%91%E4%BB%95%E7%A7%91%E6%8A%80/%E4%B8%8A%E6%B5%B7%E7%BD%91%E4%BB%95%E7%A7%91%E6%8A%80TranscoderMS%20index%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
致远OA存在文件上传导致RCE(CVE-2025-34040)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E5%AF%BC%E8%87%B4RCE(CVE-2025-34040).md
usdtAdmin收款管理系统存在excel敏感信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%99%9A%E6%8B%9F%E5%B8%81%E4%B9%B0%E5%8D%96USDT%E5%9C%BA%E5%A4%96%E4%BA%A4%E6%98%93%E6%89%80/usdtAdmin%E6%94%B6%E6%AC%BE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8excel%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
天锐绿盘云文档安全管理uploadFolder存在文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E9%94%90%E7%BB%BF%E7%9B%98%E4%BA%91%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86/%E5%A4%A9%E9%94%90%E7%BB%BF%E7%9B%98%E4%BA%91%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86uploadFolder%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
山石网科HSM-monitor存在任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B1%B1%E7%9F%B3%E7%BD%91%E7%A7%91/%E5%B1%B1%E7%9F%B3%E7%BD%91%E7%A7%91HSM-monitor%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
索贝融媒体restore存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%88%90%E9%83%BD%E7%B4%A2%E8%B4%9D%E6%95%B0%E7%A0%81%E7%A7%91%E6%8A%80/%E7%B4%A2%E8%B4%9D%E8%9E%8D%E5%AA%92%E4%BD%93restore%20%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#2025-06-11
金和OA-C6系统接口ActionDataSet存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA-C6%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3ActionDataSet%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
灵当CRM系统接口Playforrecord接口处存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%81%B5%E5%BD%93CRM/%E7%81%B5%E5%BD%93CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3Playforrecord%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
原创先锋后台管理admin_list存在未授权访问https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8E%9F%E5%88%9B%E5%85%88%E9%94%8B%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86/%E5%8E%9F%E5%88%9B%E5%85%88%E9%94%8B%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86admin_list%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md
礼品卡电子券收卡系统parent_id存在前台存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A4%BC%E5%93%81%E5%8D%A1%E7%94%B5%E5%AD%90%E5%88%B8%E6%94%B6%E5%8D%A1%E7%B3%BB%E7%BB%9F/%E7%A4%BC%E5%93%81%E5%8D%A1%E7%94%B5%E5%AD%90%E5%88%B8%E6%94%B6%E5%8D%A1%E7%B3%BB%E7%BB%9Fparent_id%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
NetMizer日志管理系统terminals接口存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/NetMizer/NetMizer%E6%97%A5%E5%BF%97%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fterminals%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
数夫CRM接口file_download存在任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%95%B0%E5%A4%ABCRM/%E6%95%B0%E5%A4%ABCRM%E6%8E%A5%E5%8F%A3file_download%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
银达汇智智慧综合管理平台PPlugList接口存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%93%B6%E8%BE%BE%E6%B1%87%E6%99%BA%E6%99%BA%E6%85%A7%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E9%93%B6%E8%BE%BE%E6%B1%87%E6%99%BA%E6%99%BA%E6%85%A7%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0PPlugList%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
WordPress Madara存在本地文件包含(CVE-2025-4524)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%20Madara%E5%AD%98%E5%9C%A8%E6%9C%AC%E5%9C%B0%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB(CVE-2025-4524).md
Pichome接口index存在任意文件读取(CVE-2025-1743)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Pichome/Pichome%E6%8E%A5%E5%8F%A3index%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96(CVE-2025-1743).md
PagerMaid-Pyro后台管理系统run_sh接口存在未授权命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PagerMaid-Pyro%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/PagerMaid-Pyro%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Frun_sh%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Grafana存在未授权SSRF漏洞(CVE-2025-4123)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Grafana/Grafana%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83SSRF%E6%BC%8F%E6%B4%9E(CVE-2025-4123).md
unibox路由器postprosa接口存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/unibox%E8%B7%AF%E7%94%B1%E5%99%A8/unibox%E8%B7%AF%E7%94%B1%E5%99%A8postprosa%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
Salia PLCC cPH2 远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Salia/Salia%20PLCC%20cPH2%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Supermap iServer任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Supermap%20iServer/Supermap%20iServer%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#2025-04-28
Langflow框架远程命令执行漏洞(CVE-2025-3248)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Langflow%E6%A1%86%E6%9E%B6/Langflow%E6%A1%86%E6%9E%B6%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2025-3248).md
FOXCMS黔狐内容管理系统_远程代码执行漏洞(CVE-2025-29306)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/FOXCMS%E9%BB%94%E7%8B%90%E5%86%85%E5%AE%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/FOXCMS%E9%BB%94%E7%8B%90%E5%86%85%E5%AE%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F_%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2025-29306).md
https://github.com/eeeeeeeeee-code/POC#2025-04-21-新增漏洞
GNU Mailman目录遍历漏洞(CVE-2025-43919)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/GNU%20Mailman/GNU%20Mailman%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E(CVE-2025-43919).md
Erlang-OTP SSH服务器存在rce漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Erlang-OTP/Erlang-OTP%20SSH%E6%9C%8D%E5%8A%A1%E5%99%A8%E5%AD%98%E5%9C%A8rce%E6%BC%8F%E6%B4%9E.md
WordPress SureTriggers Plugin存在身份验证绕过漏洞(CVE-2025-3102)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%20SureTriggers%20Plugin%E5%AD%98%E5%9C%A8%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(CVE-2025-3102).md
任我行协同CRM普及版viewaccountBase存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BB%BB%E6%88%91%E8%A1%8C/%E4%BB%BB%E6%88%91%E8%A1%8C%E5%8D%8F%E5%90%8CCRM%E6%99%AE%E5%8F%8A%E7%89%88viewaccountBase%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
CRMEB开源电商系统orderlist存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/CRMEB/CRMEB%E5%BC%80%E6%BA%90%E7%94%B5%E5%95%86%E7%B3%BB%E7%BB%9Forderlist%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
世邦通信SPON-IP网络对讲广播系统videobacktrackpush.php任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%96%E9%82%A6%E9%80%9A%E4%BF%A1/%E4%B8%96%E9%82%A6%E9%80%9A%E4%BF%A1SPON-IP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Fvideobacktrackpush.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
NetMizer日志管理系统hostipreport接口存在RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/NetMizer/NetMizer%E6%97%A5%E5%BF%97%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fhostipreport%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md
宏景eHR人力资源管理系统接口searchCreatPlanList存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFeHR%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3searchCreatPlanList%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
深澜计费管理系统down-load存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B7%B1%E6%BE%9C%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B7%B1%E6%BE%9C%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdown-load%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
万户 ezOFFICE selectAmountField.jsp SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7%20ezOFFICE%20selectAmountField.jsp%20SQL%E6%B3%A8%E5%85%A5.md
im即时通讯系统preview.php前台任意⽂件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/im%E5%8D%B3%E6%97%B6%E9%80%9A%E8%AE%AF%E7%B3%BB%E7%BB%9F/im%E5%8D%B3%E6%97%B6%E9%80%9A%E8%AE%AF%E7%B3%BB%E7%BB%9Fpreview.php%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E2%BD%82%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
万户 ezOFFICE DocumentHistory.jsp SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7%20ezOFFICE%20DocumentHistory.jsp%20SQL%E6%B3%A8%E5%85%A5.md
要塞T3系统接口Ajax_CheckMobileRepeat存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%A6%81%E5%A1%9ET3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%A6%81%E5%A1%9ET3%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3Ajax_CheckMobileRepeat%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-CRM系统接口eventseteventsetlist.php存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3eventseteventsetlist.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
天闻数媒名师工作室系统fileTempDownload任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E9%97%BB%E6%95%B0%E5%AA%92%E5%90%8D%E5%B8%88%E5%B7%A5%E4%BD%9C%E5%AE%A4%E7%B3%BB%E7%BB%9F/%E5%A4%A9%E9%97%BB%E6%95%B0%E5%AA%92%E5%90%8D%E5%B8%88%E5%B7%A5%E4%BD%9C%E5%AE%A4%E7%B3%BB%E7%BB%9FfileTempDownload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
龙腾码支付payservicecurl任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%BE%99%E8%85%BE%E7%A0%81%E6%94%AF%E4%BB%98/%E9%BE%99%E8%85%BE%E7%A0%81%E6%94%AF%E4%BB%98payservicecurl%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
时空智友企业流程化管控系统indexService.notice存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B%E4%BC%81%E4%B8%9A%E6%B5%81%E7%A8%8B%E5%8C%96%E7%AE%A1%E6%8E%A7%E7%B3%BB%E7%BB%9FindexService.notice%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#2025-04-07-新增漏洞
WordPress RomethemeKit Plugin存在RCE漏洞(CVE-2025-30911)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%20RomethemeKit%20Plugin%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E(CVE-2025-30911).md
WordPress Beam me up Scotty Plugin存在xss漏洞(CVE-2025-31864)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%20Beam%20me%20up%20Scotty%20Plugin%E5%AD%98%E5%9C%A8xss%E6%BC%8F%E6%B4%9E(CVE-2025-31864).md
WordPress Newsletters Plugin存在SQL漏洞(CVE-2025-30921)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%20Newsletters%20Plugin%E5%AD%98%E5%9C%A8SQL%E6%BC%8F%E6%B4%9E(CVE-2025-30921).md
Next中间件绕过漏洞(CVE-2025-29927)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Next/Next%E4%B8%AD%E9%97%B4%E4%BB%B6%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(CVE-2025-29927).md
WordPress (User Registration & Membership) Plugin权限提升漏洞(CVE-2025-2563)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%20(User%20Registration%20&%20Membership)%20Plugin%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E(CVE-2025-2563).md
信呼OA办公系统前台index.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BF%A1%E5%91%BCOA/%E4%BF%A1%E5%91%BCOA%E5%8A%9E%E5%85%AC%E7%B3%BB%E7%BB%9F%E5%89%8D%E5%8F%B0index.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20250331-新增漏洞
KUBERNETES INGRESS-NGINX远程代码执行漏洞(CVE-2025-1974)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/KUBERNETES%20INGRESS-NGINX/KUBERNETES%20INGRESS-NGINX%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2025-1974).md
CrushFTP身份验证绕过(CVE-2025-2825)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/CrushFTP/CrushFTP%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87(CVE-2025-2825).md
Vite开发服务器任意文件读取漏洞(CVE-2025-30208)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Vite%E5%BC%80%E5%8F%91%E6%9C%8D%E5%8A%A1%E5%99%A8/Vite%E5%BC%80%E5%8F%91%E6%9C%8D%E5%8A%A1%E5%99%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2025-30208).md
https://github.com/eeeeeeeeee-code/POC#20250324-新增漏洞
安恒明御安全网关aaa_local_web_custom_auth_html_submit存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E6%81%92/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3aaa_local_web_custom_auth_html_submit%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷 EWEB路由器 timeout.php任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E8%B7%AF%E7%94%B1%E5%99%A8/%E9%94%90%E6%8D%B7EWEB%E8%B7%AF%E7%94%B1%E5%99%A8timeout.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20250317-新增漏洞
Cleo Harmony接口Synchronization存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Cleo%20Harmony/Cleo%20Harmony%E6%8E%A5%E5%8F%A3Synchronization%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
安恒明御安全网关net_dynamic_pop_adv_submit存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E6%81%92/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3net_dynamic_pop_adv_submit%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
PowerCreator接口OpenPublicCourse.aspx存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PowerCreator/PowerCreator%E6%8E%A5%E5%8F%A3OpenPublicCourse.aspx%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
PowerCreator接口CatalogCourse.aspx存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PowerCreator/PowerCreator%E6%8E%A5%E5%8F%A3CatalogCourse.aspx%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
PowerCreator接口ShowResourceSkillComment.aspx存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PowerCreator/PowerCreator%E6%8E%A5%E5%8F%A3ShowResourceSkillComment.aspx%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20250308-新增漏洞
安美数字酒店宽带运营系统get_user_enrollment.php注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9Fget_user_enrollment.php%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
安美数字酒店宽带运营系统get_ip.phpSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9Fget_ip.phpSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
安美数字酒店宽带运营系统list_qry.phpSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9Flist_qry.php%E6%8E%A5%E5%8F%A3SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20250306-新增漏洞
华夏通讯录存在前台upload任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E5%A4%8F%E9%80%9A%E8%AE%AF%E5%BD%95/%E5%8D%8E%E5%A4%8F%E9%80%9A%E8%AE%AF%E5%BD%95%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0upload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
HEYBBS2.1论坛search.php存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/HEYBBS2.1%E8%AE%BA%E5%9D%9B/HEYBBS2.1%E8%AE%BA%E5%9D%9Bsearch.php%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
快递微信小程序系统存在前台任意文件删除漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BF%AB%E9%80%92%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F/%E5%BF%AB%E9%80%92%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4%E6%BC%8F%E6%B4%9E.md
虚拟币买卖USDT场外交易所upload.do存在任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%99%9A%E6%8B%9F%E5%B8%81%E4%B9%B0%E5%8D%96USDT%E5%9C%BA%E5%A4%96%E4%BA%A4%E6%98%93%E6%89%80/%E8%99%9A%E6%8B%9F%E5%B8%81%E4%B9%B0%E5%8D%96USDT%E5%9C%BA%E5%A4%96%E4%BA%A4%E6%98%93%E6%89%80upload.do%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
百易云资产管理系统admin.ticket.close.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%99%BE%E6%98%93%E4%BA%91%E8%B5%84%E4%BA%A7%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%99%BE%E6%98%93%E4%BA%91%E8%B5%84%E4%BA%A7%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fadmin.ticket.close.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微e-office系统sms_page.php接口存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-office%E7%B3%BB%E7%BB%9Fsms_page.php%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20250221-新增漏洞
MasterSAM接口downloadService任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/MasterSAM/MasterSAM%E6%8E%A5%E5%8F%A3downloadService%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
金和OA-C6系统接口IncentivePlanFulfillAppprove.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA-C6%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3IncentivePlanFulfillAppprove.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Elber-Wayber模拟数字音频密码重置漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/wayber/Elber-Wayber%E6%A8%A1%E6%8B%9F%E6%95%B0%E5%AD%97%E9%9F%B3%E9%A2%91%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E.md
SonicOS-SSLVPN身份验证绕过漏洞(CVE-2024-53704)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SonicWall/SonicOS-SSLVPN%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(CVE-2024-53704).md
停车场后台管理系统GetVideo存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%81%9C%E8%BD%A6%E5%9C%BA%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%81%9C%E8%BD%A6%E5%9C%BA%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetVideo%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金盘移动图书馆系统upload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E7%9B%98/%E9%87%91%E7%9B%98%E7%A7%BB%E5%8A%A8%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%B3%BB%E7%BB%9Fupload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
金盘移动图书馆系统download.jsp存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E7%9B%98/%E9%87%91%E7%9B%98%E7%A7%BB%E5%8A%A8%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%B3%BB%E7%BB%9Fdownload.jsp%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
华测监测预警系统FileDownLoad.ashx存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E6%B5%8B%E7%9B%91%E6%B5%8B%E9%A2%84%E8%AD%A6%E7%B3%BB%E7%BB%9F/%E5%8D%8E%E6%B5%8B%E7%9B%91%E6%B5%8B%E9%A2%84%E8%AD%A6%E7%B3%BB%E7%BB%9FFileDownLoad.ashx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
NUUO摄像机handle_config.php远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/NUUO/NUUO%E6%91%84%E5%83%8F%E6%9C%BAhandle_config.php%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
NUUO摄像机handle_site_config远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/NUUO/NUUO%E6%91%84%E5%83%8F%E6%9C%BAhandle_site_config%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
NUUO摄像机debugging_center_utils远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/NUUO/NUUO%E6%91%84%E5%83%8F%E6%9C%BAdebugging_center_utils%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
JEEWMS系统cgFormBuildController.do存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JEEWMS/JEEWMS%E7%B3%BB%E7%BB%9FcgFormBuildController.do%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
JEEWMS系统dynamicDataSourceController.do存在JDBC反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JEEWMS/JEEWMS%E7%B3%BB%E7%BB%9FdynamicDataSourceController.do%E5%AD%98%E5%9C%A8JDBC%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
JEEWMS系统commonController.do存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JEEWMS/JEEWMS%E7%B3%BB%E7%BB%9FcommonController.do%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
JEEWMS系统cgReportController.do存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JEEWMS/JEEWMS%E7%B3%BB%E7%BB%9FcgReportController.do%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
JEEWMS系统graphReportController.do存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JEEWMS/JEEWMS%E7%B3%BB%E7%BB%9FgraphReportController.do%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
电子文档安全管理系统V6.0接口backup存在任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FV6.0%E6%8E%A5%E5%8F%A3backup%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
酒店智慧营销IPTV系统userlogin.php存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/IPTV%E7%B3%BB%E7%BB%9F/%E9%85%92%E5%BA%97%E6%99%BA%E6%85%A7%E8%90%A5%E9%94%80IPTV%E7%B3%BB%E7%BB%9Fuserlogin.php%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20250206新增漏洞
WordPress插件WP-Guru存在任意文件读取漏洞(CVE-2024-12849)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6WP-Guru%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-12849).md
WordPress插件radio存在SSRF漏洞(CVE-2024-54385)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6radio%E5%AD%98%E5%9C%A8SSRF%E6%BC%8F%E6%B4%9E(CVE-2024-54385).md
WordPress插件Icegram-Express存在未经身份验证的SQL注入漏洞(CVE-2024-4295)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6Icegram-Express%E5%AD%98%E5%9C%A8%E6%9C%AA%E7%BB%8F%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%9A%84SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-4295).md
Aviatrix未授权远程代码执行漏洞(CVE-2024-50603)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Aviatrix/Aviatrix%E6%9C%AA%E6%8E%88%E6%9D%83%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-50603).md
CyberPanel需授权命令注入漏洞(CVE-2024-53376)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/cyberpanel/CyberPanel%E9%9C%80%E6%8E%88%E6%9D%83%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-53376).md
tenda路由器WriteFacMac存在远程命令执行漏洞(CVE-2024-10697)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Tenda/tenda%E8%B7%AF%E7%94%B1%E5%99%A8WriteFacMac%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-10697).md
瑞友天翼应用虚拟化系统GetPwdPolicy存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%91%9E%E5%8F%8B%E5%A4%A9%E7%BF%BC%E5%BA%94%E7%94%A8%E8%99%9A%E6%8B%9F%E5%8C%96%E7%B3%BB%E7%BB%9F/%E7%91%9E%E5%8F%8B%E5%A4%A9%E7%BF%BC%E5%BA%94%E7%94%A8%E8%99%9A%E6%8B%9F%E5%8C%96%E7%B3%BB%E7%BB%9FGetPwdPolicy%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统OrganiseAjax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FOrganiseAjax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统MultiServerAjax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FMultiServerAjax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统LogicGroupAjax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FLogicGroupAjax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统SecureUsbService存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSecureUsbService%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统DeviceAjax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDeviceAjax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统FileFormatAjax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FFileFormatAjax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统NetSecPolicyAjax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FNetSecPolicyAjax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统DocInfoAjax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDocInfoAjax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC接口checkekey存在SQL注入漏洞(XVE-2024-37013)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E6%8E%A5%E5%8F%A3checkekey%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(XVE-2024-37013).md
禅道21.1开源版存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A6%85%E9%81%93/%E7%A6%85%E9%81%9321.1%E5%BC%80%E6%BA%90%E7%89%88%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
明源地产ERP接口Service.asmx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%8E%E6%BA%90%E4%BA%91/%E6%98%8E%E6%BA%90%E5%9C%B0%E4%BA%A7ERP%E6%8E%A5%E5%8F%A3Service.asmx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
pearProjectApi系统接口organizationCode存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/pearProjectApi/pearProjectApi%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3organizationCode%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
pearProjectApi系统接口projectCode存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/pearProjectApi/pearProjectApi%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3projectCode%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
zzcms系统接口ad_list.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/zzcms/zzcms%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3ad_list.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
zzcms系统接口index.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/zzcms/zzcms%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3index.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
锐捷系统接口auth存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3auth%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
WeGIA存在前台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WeGIA/WeGIA%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
RGCMS2.0存在phar反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/RGCMS/RGCMS2.0%E5%AD%98%E5%9C%A8phar%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
74CMS存在任意文件上传漏洞(CVE-2024-2561)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/74CMS/CVE-2024-2561.md
https://github.com/eeeeeeeeee-code/POC#20250104-新增漏洞
Guns后台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Guns/Guns%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
金山终端安全系统V9.0任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%B1%B1/%E9%87%91%E5%B1%B1%E7%BB%88%E7%AB%AF%E5%AE%89%E5%85%A8%E7%B3%BB%E7%BB%9FV9.0%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
九垠赢商业管理系统Common.ashx存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B9%9D%E5%9E%A0%E7%A7%91%E6%8A%80/%E4%B9%9D%E5%9E%A0%E8%B5%A2%E5%95%86%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FCommon.ashx%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
时空物流运输管理系统存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%97%B6%E7%A9%BA%E7%89%A9%E6%B5%81%E8%BF%90%E8%BE%93%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%97%B6%E7%A9%BA%E7%89%A9%E6%B5%81%E8%BF%90%E8%BE%93%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
内训宝scorm存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%86%85%E8%AE%AD%E5%AE%9D%E7%A7%91%E6%8A%80/%E5%86%85%E8%AE%AD%E5%AE%9Dscorm%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
W&Jsoft-D-Security数据仿泄露系统(DLP)存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WNJsoft/W&Jsoft-D-Security%E6%95%B0%E6%8D%AE%E4%BB%BF%E6%B3%84%E9%9C%B2%E7%B3%BB%E7%BB%9F(DLP)%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
方正畅享全媒体新闻采编系统imageProxy.do任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B9%E6%AD%A3%E5%85%A8%E5%AA%92%E4%BD%93/%E6%96%B9%E6%AD%A3%E7%95%85%E4%BA%AB%E5%85%A8%E5%AA%92%E4%BD%93%E6%96%B0%E9%97%BB%E9%87%87%E7%BC%96%E7%B3%BB%E7%BB%9FimageProxy.do%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
急诊综合管理平台ServicePage.aspx任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%92%E6%85%A7%E8%BD%AF%E4%BB%B6/%E6%80%A5%E8%AF%8A%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0ServicePage.aspx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
快云服务器助手GetDetail任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BF%AB%E4%BA%91/%E5%BF%AB%E4%BA%91%E6%9C%8D%E5%8A%A1%E5%99%A8%E5%8A%A9%E6%89%8BGetDetail%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
朗速ERP系统接口UEditorAjaxApi.ashx存在SSRF漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9C%97%E9%80%9FERP/%E6%9C%97%E9%80%9FERP%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3UEditorAjaxApi.ashx%E5%AD%98%E5%9C%A8SSRF%E6%BC%8F%E6%B4%9E.md
药业管理软件UploadFile文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%BB%84%E8%8D%AF%E5%B8%88/%E8%8D%AF%E4%B8%9A%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6UploadFile%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
WordPress插件Crypto身份认证绕过漏洞复现(CVE-2024-9989)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6Crypto%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CVE-2024-9989).md
WordPress插件Wux-Blog-Editor存在越权漏洞(CVE-2024-9932)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6Wux-Blog-Editor%E5%AD%98%E5%9C%A8%E8%B6%8A%E6%9D%83%E6%BC%8F%E6%B4%9E(CVE-2024-9932).md
Next.js权限绕过(CVE-2024-51479)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Next/Next.js%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87(CVE-2024-51479).md
https://github.com/eeeeeeeeee-code/POC#20241228-新增漏洞
CPAS审计管理系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8C%97%E4%BA%AC%E5%8F%8B%E6%95%B0%E8%81%9A%E7%A7%91%E6%8A%80/CPAS%E5%AE%A1%E8%AE%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
CPAS审计管理系统getCurserIfAllowLogin存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8C%97%E4%BA%AC%E5%8F%8B%E6%95%B0%E8%81%9A%E7%A7%91%E6%8A%80/CPAS%E5%AE%A1%E8%AE%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FgetCurserIfAllowLogin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
WordPress插件rtw_pdf_file任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6rtw_pdf_file%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
WordPress插件FileUpload任意文件读取漏洞复现(CVE-2024-9047)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6FileUpload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CVE-2024-9047).md
WordPress插件Tutor_LMS存在SQL注入漏洞复现(CVE-2024-10400)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6Tutor_LMS%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CVE-2024-10400).md
灵当CRM系统接口getMyAmbassador存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%81%B5%E5%BD%93CRM/%E7%81%B5%E5%BD%93CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3getMyAmbassador%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
灵当CRM系统接口uploadfile文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%81%B5%E5%BD%93CRM/%E7%81%B5%E5%BD%93CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3uploadfile%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
卓软计量业务管理平台image.ashx任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E7%BE%8E%E5%8D%93%E8%BD%AF/%E5%8D%93%E8%BD%AF%E8%AE%A1%E9%87%8F%E4%B8%9A%E5%8A%A1%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0image.ashx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
博斯外贸管理软件loginednew.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%9A%E6%96%AF%E8%BD%AF%E4%BB%B6/%E5%8D%9A%E6%96%AF%E5%A4%96%E8%B4%B8%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6loginednew.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
博斯外贸管理软件logined.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%9A%E6%96%AF%E8%BD%AF%E4%BB%B6/%E5%8D%9A%E6%96%AF%E5%A4%96%E8%B4%B8%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6logined.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
安科瑞环保用电监管云平台etEnterpriseInfoY存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E7%A7%91%E7%91%9E/%E5%AE%89%E7%A7%91%E7%91%9E%E7%8E%AF%E4%BF%9D%E7%94%A8%E7%94%B5%E7%9B%91%E7%AE%A1%E4%BA%91%E5%B9%B3%E5%8F%B0etEnterpriseInfoY%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
勤云远程稿件处理系统存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8C%97%E4%BA%AC%E5%8B%A4%E4%BA%91%E7%A7%91%E6%8A%80/%E5%8B%A4%E4%BA%91%E8%BF%9C%E7%A8%8B%E7%A8%BF%E4%BB%B6%E5%A4%84%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
赛诸葛数字化智能中台系统login存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%9B%E8%AF%B8%E8%91%9B/%E8%B5%9B%E8%AF%B8%E8%91%9B%E6%95%B0%E5%AD%97%E5%8C%96%E6%99%BA%E8%83%BD%E4%B8%AD%E5%8F%B0%E7%B3%BB%E7%BB%9Flogin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
网神SecFox运维安全管理与审计系统FastJson反序列化RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E7%A5%9E/%E7%BD%91%E7%A5%9ESecFox%E8%BF%90%E7%BB%B4%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E4%B8%8E%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9FFastJson%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96RCE%E6%BC%8F%E6%B4%9E.md
朗速ERP系统FileUploadApi.ashx存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9C%97%E9%80%9FERP/%E6%9C%97%E9%80%9FERP%E7%B3%BB%E7%BB%9FFileUploadApi.ashx%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
月子会所ERP管理云平台GetData.ashx存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%AD%A6%E6%B1%89%E9%87%91%E5%90%8C%E6%96%B9/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0GetData.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
科汛新职教网校系统CheckOrder存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E6%B1%9B/%E7%A7%91%E6%B1%9B%E6%96%B0%E8%81%8C%E6%95%99%E7%BD%91%E6%A0%A1%E7%B3%BB%E7%BB%9FCheckOrder%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
虹安DLP数据泄漏防护系统pushSetup.do存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%99%B9%E5%AE%89/%E8%99%B9%E5%AE%89DLP%E6%95%B0%E6%8D%AE%E6%B3%84%E6%BC%8F%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9FpushSetup.do%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
蓝凌EKP系统fsscCommonPortlet.do存在未授权SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEKP%E7%B3%BB%E7%BB%9FfsscCommonPortlet.do%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20241221-新增漏洞
蓝凌EKP系统接口thirdImSyncForKKWebService存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEKP%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3thirdImSyncForKKWebService%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
蓝凌EKP系统接口sysFormMainDataInsystemWebservice存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEKP%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3sysFormMainDataInsystemWebservice%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
蓝凌EKP系统任意文件读取漏洞集合https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEKP%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%E9%9B%86%E5%90%88.md
神州数码DCN系统接口online_list.php存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/DCN/%E7%A5%9E%E5%B7%9E%E6%95%B0%E7%A0%81DCN%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3online_list.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
TOTOLINK远程代码执行漏洞(CVE-2024-51228)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/TOTOLINK%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-51228).md
泛微云桥e-Bridge系统接口addTasteJsonp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AE%E4%BA%91%E6%A1%A5e-Bridge%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3addTasteJsonp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微云桥e-Bridge系统checkMobile存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AE%E4%BA%91%E6%A1%A5e-Bridge%E7%B3%BB%E7%BB%9FcheckMobile%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微e-cology9系统接口FileDownloadLocation接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-cology9%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3FileDownloadLocation%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
JeecgBoot系统接口passwordChange任意用户密码重置漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JeecgBoot/JeecgBoot%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3passwordChange%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E.md
国威HB1910数字程控电话交换机generate.php未授权RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B7%B1%E5%9C%B3%E5%9B%BD%E5%A8%81%E7%94%B5%E5%AD%90/%E5%9B%BD%E5%A8%81HB1910%E6%95%B0%E5%AD%97%E7%A8%8B%E6%8E%A7%E7%94%B5%E8%AF%9D%E4%BA%A4%E6%8D%A2%E6%9C%BAgenerate.php%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E.md
Cloudlog系统request_form存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Cloudlog/Cloudlog%E7%B3%BB%E7%BB%9Frequest_form%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
协众OA系统接口checkLoginQrCode存在SQL注入漏洞复现https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8F%E4%BC%97OA/%E5%8D%8F%E4%BC%97OA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3checkLoginQrCode%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0.md
云连POS-ERP管理系统ZksrService存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%91%E8%BF%9EPOS-ERP%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%91%E8%BF%9EPOS-ERP%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FZksrService%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
云连POS-ERP管理系统downloadFile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%91%E8%BF%9EPOS-ERP%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%91%E8%BF%9EPOS-ERP%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FdownloadFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
杜特网上订单管理系统getUserImage.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9D%9C%E7%89%B9%E7%BD%91/%E6%9D%9C%E7%89%B9%E7%BD%91%E4%B8%8A%E8%AE%A2%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FgetUserImage.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
秒优科技-供应链管理系统doAction存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%92%E4%BC%98%E7%A7%91%E6%8A%80/%E7%A7%92%E4%BC%98%E7%A7%91%E6%8A%80-%E4%BE%9B%E5%BA%94%E9%93%BE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FdoAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
昂捷CRM系统cwsuploadpicture.asmx任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%82%E6%8D%B7ERP/%E6%98%82%E6%8D%B7CRM%E7%B3%BB%E7%BB%9Fcwsuploadpicture.asmx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
圣乔ERP系统downloadFile.action任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%9C%A3%E4%B9%94ERP/%E5%9C%A3%E4%B9%94ERP%E7%B3%BB%E7%BB%9FdownloadFile.action%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
用友NC-Cloud系统接口getStaffInfo存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-Cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3getStaffInfo%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud系统接口ReleaseRepMngAction存在SQL注入漏洞复现(CNVD-2024-33023)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3ReleaseRepMngAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CNVD-2024-33023).md
飞鱼星-路由器存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E9%B1%BC%E6%98%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F-%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
上海汉塔网络科技有限公司上网行为管理系统存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%8A%E6%B5%B7%E6%B1%89%E5%A1%94/%E4%B8%8A%E6%B5%B7%E6%B1%89%E5%A1%94%E7%BD%91%E7%BB%9C%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Apache-Tomcat条件竞争致远程代码执行漏洞(CVE-2024-50379)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-Tomcat%E6%9D%A1%E4%BB%B6%E7%AB%9E%E4%BA%89%E8%87%B4%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-50379).md
方正畅享全媒体新闻采编系统screen.do存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B9%E6%AD%A3%E5%85%A8%E5%AA%92%E4%BD%93/%E6%96%B9%E6%AD%A3%E7%95%85%E4%BA%AB%E5%85%A8%E5%AA%92%E4%BD%93%E6%96%B0%E9%97%BB%E9%87%87%E7%BC%96%E7%B3%BB%E7%BB%9Fscreen.do%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
方正畅享全媒体新闻采编系统reportCenter.do存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B9%E6%AD%A3%E5%85%A8%E5%AA%92%E4%BD%93/%E6%96%B9%E6%AD%A3%E7%95%85%E4%BA%AB%E5%85%A8%E5%AA%92%E4%BD%93%E6%96%B0%E9%97%BB%E9%87%87%E7%BC%96%E7%B3%BB%E7%BB%9FreportCenter.do%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20241214-新增漏洞
顺景ERP系统FullGuidFileName任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A1%BA%E6%99%AFERP/%E9%A1%BA%E6%99%AFERP%E7%B3%BB%E7%BB%9FFullGuidFileName%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
圣乔ERP系统queryForString存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%9C%A3%E4%B9%94ERP/%E5%9C%A3%E4%B9%94ERP%E7%B3%BB%E7%BB%9FqueryForString%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
圣乔ERP系统uploadFile文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%9C%A3%E4%B9%94ERP/%E5%9C%A3%E4%B9%94ERP%E7%B3%BB%E7%BB%9FuploadFile%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
圣乔ERP系统SingleRowQueryConvertor存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%9C%A3%E4%B9%94ERP/%E5%9C%A3%E4%B9%94ERP%E7%B3%BB%E7%BB%9FSingleRowQueryConvertor%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
圣乔ERP系统queryForMapWithDefaultValues存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%9C%A3%E4%B9%94ERP/%E5%9C%A3%E4%B9%94ERP%E7%B3%BB%E7%BB%9FqueryForMapWithDefaultValues%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
圣乔ERP系统getSupplyQueryKeyword存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%9C%A3%E4%B9%94ERP/%E5%9C%A3%E4%B9%94ERP%E7%B3%BB%E7%BB%9FgetSupplyQueryKeyword%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
PbootCMS接口entrance.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PbootCMS/PbootCMS%E6%8E%A5%E5%8F%A3entrance.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
海康威视运行管理中心applyST远程代码执行漏洞(XVE-2024-33936)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E8%BF%90%E8%A1%8C%E7%AE%A1%E7%90%86%E4%B8%AD%E5%BF%83applyST%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(XVE-2024-33936).md
大华DSS数字监控系统attachment_downloadAtt.action任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%E6%95%B0%E5%AD%97%E7%9B%91%E6%8E%A7%E7%B3%BB%E7%BB%9Fattachment_downloadAtt.action%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
电子图书阅读平台downFile.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%B5%E5%AD%90%E5%9B%BE%E4%B9%A6%E9%98%85%E8%AF%BB%E5%B9%B3%E5%8F%B0/%E7%94%B5%E5%AD%90%E5%9B%BE%E4%B9%A6%E9%98%85%E8%AF%BB%E5%B9%B3%E5%8F%B0downFile.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
中成科信票务管理系统ReturnTicketPlance.ashx存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1%E7%A5%A8%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FReturnTicketPlance.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
易宝OA-GetUDEFStreamID存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E5%AE%9DOA/%E6%98%93%E5%AE%9DOA-GetUDEFStreamID%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
WordPress插件query-console存在未授权RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6query-console%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E.md
EasyCVR视频管理平台taillog任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EasyCVR/EasyCVR%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0taillog%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Mitel企业协作平台任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Mitel/Mitel%E4%BC%81%E4%B8%9A%E5%8D%8F%E4%BD%9C%E5%B9%B3%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
三汇SMG网关管理软件SMGSuperAdmin信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%89%E6%B1%87%E7%BD%91%E5%85%B3%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6/%E4%B8%89%E6%B1%87SMG%E7%BD%91%E5%85%B3%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6SMGSuperAdmin%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
生命港湾服务配置工具平台Download任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%9F%E5%91%BD%E6%B8%AF%E6%B9%BE%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF/%E7%94%9F%E5%91%BD%E6%B8%AF%E6%B9%BE%E6%9C%8D%E5%8A%A1%E9%85%8D%E7%BD%AE%E5%B7%A5%E5%85%B7%E5%B9%B3%E5%8F%B0Download%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
孚盟云系统接口MailAjax.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AD%9A%E7%9B%9F%E4%BA%91/%E5%AD%9A%E7%9B%9F%E4%BA%91%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3MailAjax.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
杜特网上订单管理系统Login.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9D%9C%E7%89%B9%E7%BD%91/%E6%9D%9C%E7%89%B9%E7%BD%91%E4%B8%8A%E8%AE%A2%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FLogin.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
DockerUI存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/DockerUI/DockerUI%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
OpenWrt任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/OpenWrt/OpenWrt%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
某短视频系统视频知识付费系统存在前台任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9F%90%E7%9F%AD%E8%A7%86%E9%A2%91%E7%9B%B4%E6%92%AD%E6%89%93%E8%B5%8F%E7%B3%BB%E7%BB%9F/%E6%9F%90%E7%9F%AD%E8%A7%86%E9%A2%91%E7%B3%BB%E7%BB%9F%E8%A7%86%E9%A2%91%E7%9F%A5%E8%AF%86%E4%BB%98%E8%B4%B9%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
CRMEB任意文件下载漏洞分析(CVE-2024-52726)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/CRMEB/CRMEB%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90(CVE-2024-52726).md
中科网威anysec安全网关arping存在后台远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%AD%E7%A7%91%E7%BD%91%E5%A8%81%E7%A7%91%E6%8A%80/%E4%B8%AD%E7%A7%91%E7%BD%91%E5%A8%81anysec%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3arping%E5%AD%98%E5%9C%A8%E5%90%8E%E5%8F%B0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Yapi存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Yapi/Yapi%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
金和JC6协同管理平台oaplusrangedownloadfile存在文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8CJC6%E5%8D%8F%E5%90%8C%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0oaplusrangedownloadfile%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20241207-新增漏洞
Zabbix SQL注入漏洞(CVE-2024-42327)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Zabbix/Zabbix%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-42327).md
时空WMS-仓储精细化管理系统ImageAdd.ashx文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%97%B6%E7%A9%BAWMS/%E6%97%B6%E7%A9%BAWMS-%E4%BB%93%E5%82%A8%E7%B2%BE%E7%BB%86%E5%8C%96%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FImageAdd.ashx%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
时空WMS-仓储精细化管理系统SaveCrash.ashx文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%97%B6%E7%A9%BAWMS/%E6%97%B6%E7%A9%BAWMS-%E4%BB%93%E5%82%A8%E7%B2%BE%E7%BB%86%E5%8C%96%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSaveCrash.ashx%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友U8-CRM系统getDeptName存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9FgetDeptName%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC系统接口yerfile_down存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3yerfile_down%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-CRM接口rellistname.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E6%8E%A5%E5%8F%A3rellistname.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友GRP-U8系统taskmanager_login存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8%E7%B3%BB%E7%BB%9Ftaskmanager_login%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
九思OA系统upload_l.jsp存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B9%9D%E6%80%9DOA/%E4%B9%9D%E6%80%9DOA%E7%B3%BB%E7%BB%9Fupload_l.jsp%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
锁群管理系统存在逻辑缺陷漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%81%E7%BE%A4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E9%94%81%E7%BE%A4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E9%80%BB%E8%BE%91%E7%BC%BA%E9%99%B7%E6%BC%8F%E6%B4%9E.md
WordPress插件ElementorPageBuilder存在文件读取漏洞(CVE-2024-9935)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6ElementorPageBuilder%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-9935).md
https://github.com/eeeeeeeeee-code/POC#20241129-新增漏洞
用友NC-cartabletimeline存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-cartabletimeline%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC-process存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-process%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-CRM系统getufvouchdata.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9Fgetufvouchdata.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-CRM系统ajaxgetborrowdata.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9Fajaxgetborrowdata.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
信呼OA办公系统后台api.php接口存在RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BF%A1%E5%91%BCOA/%E4%BF%A1%E5%91%BCOA%E5%8A%9E%E5%85%AC%E7%B3%BB%E7%BB%9F%E5%90%8E%E5%8F%B0api.php%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8RCE.md
海信智能公交企业管理系统AdjustWorkHours.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E4%BF%A1/%E6%B5%B7%E4%BF%A1%E6%99%BA%E8%83%BD%E5%85%AC%E4%BA%A4%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FAdjustWorkHours.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
圣乔ERP系统login.action存在Struts2远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%9C%A3%E4%B9%94ERP/%E5%9C%A3%E4%B9%94ERP%E7%B3%BB%E7%BB%9Flogin.action%E5%AD%98%E5%9C%A8Struts2%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
顺景ERP系统GetFile任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A1%BA%E6%99%AFERP/%E9%A1%BA%E6%99%AFERP%E7%B3%BB%E7%BB%9FGetFile%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
安科瑞环保用电监管云平台GetEnterpriseInfoById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E7%A7%91%E7%91%9E/%E5%AE%89%E7%A7%91%E7%91%9E%E7%8E%AF%E4%BF%9D%E7%94%A8%E7%94%B5%E7%9B%91%E7%AE%A1%E4%BA%91%E5%B9%B3%E5%8F%B0GetEnterpriseInfoById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
安科瑞环保用电监管云平台newLogin存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E7%A7%91%E7%91%9E/%E5%AE%89%E7%A7%91%E7%91%9E%E7%8E%AF%E4%BF%9D%E7%94%A8%E7%94%B5%E7%9B%91%E7%AE%A1%E4%BA%91%E5%B9%B3%E5%8F%B0newLogin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
药业管理软件XSDService.asmx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%BB%84%E8%8D%AF%E5%B8%88/%E8%8D%AF%E4%B8%9A%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6XSDService.asmx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
思普企业运营管理平台apilogin存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%80%9D%E6%99%AE/%E6%80%9D%E6%99%AE%E4%BC%81%E4%B8%9A%E8%BF%90%E8%90%A5%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0apilogin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
昂捷CRM系统cwsfiledown.asmx任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%82%E6%8D%B7ERP/%E6%98%82%E6%8D%B7CRM%E7%B3%BB%E7%BB%9Fcwsfiledown.asmx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
九思OA系统workflowSync.getUserStatusByRole.dwr存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B9%9D%E6%80%9DOA/%E4%B9%9D%E6%80%9DOA%E7%B3%BB%E7%BB%9FworkflowSync.getUserStatusByRole.dwr%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
管家婆订货易在线商城UploadImgNoCheck存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%AE%A1%E5%AE%B6%E5%A9%86/%E7%AE%A1%E5%AE%B6%E5%A9%86%E8%AE%A2%E8%B4%A7%E6%98%93%E5%9C%A8%E7%BA%BF%E5%95%86%E5%9F%8EUploadImgNoCheck%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Apache-HertzBeat开源实时监控系统存在默认口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-HertzBeat%E5%BC%80%E6%BA%90%E5%AE%9E%E6%97%B6%E7%9B%91%E6%8E%A7%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
YourPHPCMS系统login_checkEmail存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/YourPHPCMS/YourPHPCMS%E7%B3%BB%E7%BB%9Flogin_checkEmail%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
YourPHPCMS系统Register_checkEmail存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/YourPHPCMS/YourPHPCMS%E7%B3%BB%E7%BB%9FRegister_checkEmail%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
JeecgBoot接口getTotalData存在未授权SQL注入漏洞(CVE-2024-48307)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JeecgBoot/JeecgBoot%E6%8E%A5%E5%8F%A3getTotalData%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-48307).md
ProjectSend身份认证绕过漏洞(CVE-2024-11680)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/ProjectSend/ProjectSend%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(CVE-2024-11680).md
华天动力OA系统upload.jsp任意文件上传漏洞.mdhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E5%A4%A9%E5%8A%A8%E5%8A%9B/%E5%8D%8E%E5%A4%A9%E5%8A%A8%E5%8A%9BOA%E7%B3%BB%E7%BB%9Fupload.jsp%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Sitecore未授权读取任意文件(CVE-2024-46938)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Sitecore/CVE-2024-46938.md
万能门店小程序管理系统onepic_uploade任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E8%83%BD%E9%97%A8%E5%BA%97%E5%B0%8F%E7%A8%8B%E5%BA%8F/%E4%B8%87%E8%83%BD%E9%97%A8%E5%BA%97%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fonepic_uploade%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
电子资料管理系统ImageUpload.ashx文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%B5%E5%AD%90%E8%B5%84%E6%96%99%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%94%B5%E5%AD%90%E8%B5%84%E6%96%99%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FImageUpload.ashx%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
同享人力管理管理平台ActiveXConnector.asmx信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%90%8C%E4%BA%AB%E4%BA%BA%E5%8A%9B%E7%AE%A1%E7%90%86%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%90%8C%E4%BA%AB%E4%BA%BA%E5%8A%9B%E7%AE%A1%E7%90%86%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0ActiveXConnector.asmx%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20241123-新增漏洞
SRM智联云采系统inquiry存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E4%BA%92%E8%81%94%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/SRM%E6%99%BA%E8%81%94%E4%BA%91%E9%87%87%E7%B3%BB%E7%BB%9Finquiry%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SRM智联云采系统quickReceiptDetail存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E4%BA%92%E8%81%94%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/SRM%E6%99%BA%E8%81%94%E4%BA%91%E9%87%87%E7%B3%BB%E7%BB%9FquickReceiptDetail%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SRM智联云采系统getSuppliers存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E4%BA%92%E8%81%94%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/SRM%E6%99%BA%E8%81%94%E4%BA%91%E9%87%87%E7%B3%BB%E7%BB%9FgetSuppliers%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SRM智联云采系统receiptDetail存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E4%BA%92%E8%81%94%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/SRM%E6%99%BA%E8%81%94%E4%BA%91%E9%87%87%E7%B3%BB%E7%BB%9FreceiptDetail%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SRM智联云采系统statusList存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E4%BA%92%E8%81%94%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/SRM%E6%99%BA%E8%81%94%E4%BA%91%E9%87%87%E7%B3%BB%E7%BB%9FstatusList%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
微信活码系统updateInfos前台未授权任意用户密码修改https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BE%AE%E4%BF%A1%E6%B4%BB%E7%A0%81%E7%B3%BB%E7%BB%9F/%E5%BE%AE%E4%BF%A1%E6%B4%BB%E7%A0%81%E7%B3%BB%E7%BB%9FupdateInfos%E5%89%8D%E5%8F%B0%E6%9C%AA%E6%8E%88%E6%9D%83%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E4%BF%AE%E6%94%B9.md
微信活码系统后台任意内容写入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BE%AE%E4%BF%A1%E6%B4%BB%E7%A0%81%E7%B3%BB%E7%BB%9F/%E5%BE%AE%E4%BF%A1%E6%B4%BB%E7%A0%81%E7%B3%BB%E7%BB%9F%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E5%86%85%E5%AE%B9%E5%86%99%E5%85%A5.md
百择唯供应链存在RankingGoodsList2存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%99%BE%E6%8B%A9%E5%94%AF%E4%BE%9B%E5%BA%94%E9%93%BE/%E7%99%BE%E6%8B%A9%E5%94%AF%E4%BE%9B%E5%BA%94%E9%93%BE%E5%AD%98%E5%9C%A8RankingGoodsList2%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
百择唯供应链存在ReadAfterSaleList存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%99%BE%E6%8B%A9%E5%94%AF%E4%BE%9B%E5%BA%94%E9%93%BE/%E7%99%BE%E6%8B%A9%E5%94%AF%E4%BE%9B%E5%BA%94%E9%93%BE%E5%AD%98%E5%9C%A8ReadAfterSaleList%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
百择唯供应链存在SearchOrderByParams存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%99%BE%E6%8B%A9%E5%94%AF%E4%BE%9B%E5%BA%94%E9%93%BE/%E7%99%BE%E6%8B%A9%E5%94%AF%E4%BE%9B%E5%BA%94%E9%93%BE%E5%AD%98%E5%9C%A8SearchOrderByParams%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
PAN-OS软件中存在权限提升漏洞(CVE-2024-9474)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PAN-OS/CVE-2024-9474.md
数字通云平台的智慧政务系统存在登录绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%95%B0%E5%AD%97%E9%80%9AOA/%E6%95%B0%E5%AD%97%E9%80%9A%E4%BA%91%E5%B9%B3%E5%8F%B0%E7%9A%84%E6%99%BA%E6%85%A7%E6%94%BF%E5%8A%A1%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
万能门店小程序doPageGetFormList存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%87%E8%83%BD%E9%97%A8%E5%BA%97%E5%B0%8F%E7%A8%8B%E5%BA%8F/%E4%B8%87%E8%83%BD%E9%97%A8%E5%BA%97%E5%B0%8F%E7%A8%8B%E5%BA%8FdoPageGetFormList%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
索贝融媒体search存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%88%90%E9%83%BD%E7%B4%A2%E8%B4%9D%E6%95%B0%E7%A0%81%E7%A7%91%E6%8A%80/%E7%B4%A2%E8%B4%9D%E8%9E%8D%E5%AA%92%E4%BD%93search%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
海信智能公交企业管理系统apply.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E4%BF%A1/%E6%B5%B7%E4%BF%A1%E6%99%BA%E8%83%BD%E5%85%AC%E4%BA%A4%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fapply.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
东胜物流软件CertUpload文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6CertUpload%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
任子行网络安全审计系统log_fw_ips_scan_jsondata接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BB%BB%E5%AD%90%E8%A1%8C/%E4%BB%BB%E5%AD%90%E8%A1%8C%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Flog_fw_ips_scan_jsondata%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
D-Link-NAS接口sc_mgr.cgi存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/D-Link/D-Link-NAS%E6%8E%A5%E5%8F%A3sc_mgr.cgi%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Altenergy电力系统控制软件status_zigbee存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%B5%E5%8A%9B%E7%B3%BB%E7%BB%9F%E6%8E%A7%E5%88%B6%E8%BD%AF%E4%BB%B6/Altenergy%E7%94%B5%E5%8A%9B%E7%B3%BB%E7%BB%9F%E6%8E%A7%E5%88%B6%E8%BD%AF%E4%BB%B6status_zigbee%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
任我行协同CRM普及版Edit存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BB%BB%E6%88%91%E8%A1%8C/%E4%BB%BB%E6%88%91%E8%A1%8C%E5%8D%8F%E5%90%8CCRM%E6%99%AE%E5%8F%8A%E7%89%88Edit%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
紫光档案管理系统mergeFile存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%B4%AB%E5%85%89%E7%94%B5%E5%AD%90%E6%A1%A3%E6%A1%88%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%B4%AB%E5%85%89%E6%A1%A3%E6%A1%88%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FmergeFile%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
购物商城系统commodtiy存在任意SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B4%AD%E7%89%A9%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9F/%E8%B4%AD%E7%89%A9%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9Fcommodtiy%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8FSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
微信万能门店小程序系统_requestPost存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E8%83%BD%E9%97%A8%E5%BA%97%E5%B0%8F%E7%A8%8B%E5%BA%8F/%E5%BE%AE%E4%BF%A1%E4%B8%87%E8%83%BD%E9%97%A8%E5%BA%97%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F_requestPost%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
致翔OA系统接口open_juese存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E7%BF%94OA/%E8%87%B4%E7%BF%94OA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3open_juese%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
资产管理运营系统mobilefront2前台文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%84%E7%AE%A1%E4%BA%91/%E8%B5%84%E4%BA%A7%E7%AE%A1%E7%90%86%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9Fmobilefront2%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20241116-新增漏洞
通达OA前台submenu.php存在SQL注入漏洞(CVE-2024-10600)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%E5%89%8D%E5%8F%B0submenu.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-10600).md
D-Link-NAS接口account_mg存在命令执行漏洞(CVE-2024-10914)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/D-Link/D-Link-NAS%E6%8E%A5%E5%8F%A3account_mg%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-10914).md
珠海市安克电子技术有限公司医疗急救管理系统存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E5%85%8B%E7%94%B5%E5%AD%90%E6%8A%80%E6%9C%AF/%E7%8F%A0%E6%B5%B7%E5%B8%82%E5%AE%89%E5%85%8B%E7%94%B5%E5%AD%90%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%8C%BB%E7%96%97%E6%80%A5%E6%95%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友YonBIP高级版yonbiplogin存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BYonBIP%E9%AB%98%E7%BA%A7%E7%89%88yonbiplogin%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
九思OA接口dl.jsp任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B9%9D%E6%80%9DOA/%E4%B9%9D%E6%80%9DOA%E6%8E%A5%E5%8F%A3dl.jsp%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
东胜物流软件GetDataListCA存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6GetDataListCA%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
企望制造ERP系统drawGrid.action存在SQL漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BC%81%E6%9C%9B%E5%88%B6%E9%80%A0ERP/%E4%BC%81%E6%9C%9B%E5%88%B6%E9%80%A0ERP%E7%B3%BB%E7%BB%9FdrawGrid.action%E5%AD%98%E5%9C%A8SQL%E6%BC%8F%E6%B4%9E.md
全新优客API接口管理系统doc存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BC%98%E5%AE%A2API%E6%8E%A5%E5%8F%A3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%85%A8%E6%96%B0%E4%BC%98%E5%AE%A2API%E6%8E%A5%E5%8F%A3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdoc%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
海信智能公交企业管理系统OrgInfoMng.aspx存在SQL注入漏https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E4%BF%A1/%E6%B5%B7%E4%BF%A1%E6%99%BA%E8%83%BD%E5%85%AC%E4%BA%A4%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FOrgInfoMng.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
美团代付微信小程序系统read.php任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BE%8E%E5%9B%A2%E4%BB%A3%E4%BB%98%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F/%E7%BE%8E%E5%9B%A2%E4%BB%A3%E4%BB%98%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9Fread.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
微信公众号商家收银台小程序系统存在前台SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BE%AE%E4%BF%A1%E5%85%AC%E4%BC%97%E5%8F%B7%E5%95%86%E5%AE%B6%E6%94%B6%E9%93%B6%E5%8F%B0%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F/%E5%BE%AE%E4%BF%A1%E5%85%AC%E4%BC%97%E5%8F%B7%E5%95%86%E5%AE%B6%E6%94%B6%E9%93%B6%E5%8F%B0%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
赛普EAP企业适配管理平台Upload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%9B%E6%99%AE/%E8%B5%9B%E6%99%AEEAP%E4%BC%81%E4%B8%9A%E9%80%82%E9%85%8D%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0Upload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
中成科信票务管理系统UploadHandler.ashx任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1%E7%A5%A8%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1%E7%A5%A8%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUploadHandler.ashx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
帕拉迪堡垒机sslvpnservice.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B8%95%E6%8B%89%E8%BF%AA%E5%A0%A1%E5%9E%92%E6%9C%BA/%E5%B8%95%E6%8B%89%E8%BF%AA%E5%A0%A1%E5%9E%92%E6%9C%BAsslvpnservice.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
FortiManager身份认证绕过漏洞(CVE-2024-47575)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/FortiManager/FortiManager%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(CVE-2024-47575).md
WordPress的Meetup插件身份验证绕过漏洞(CVE-2024-50483)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E7%9A%84Meetup%E6%8F%92%E4%BB%B6%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(CVE-2024-50483).md
https://github.com/eeeeeeeeee-code/POC#20241108-新增漏洞
Vben-Admin存在硬编码漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Vben-Admin/Vben-Admin%E5%AD%98%E5%9C%A8%E7%A1%AC%E7%BC%96%E7%A0%81%E6%BC%8F%E6%B4%9E.md
F22服装管理软件系统Load存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E5%B7%9E%E9%94%A6%E9%93%AD%E6%B3%B0%E8%BD%AF%E4%BB%B6/F22%E6%9C%8D%E8%A3%85%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6%E7%B3%BB%E7%BB%9FLoad%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
明源地产ERP系统WFWebService存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%8E%E6%BA%90%E4%BA%91/%E6%98%8E%E6%BA%90%E5%9C%B0%E4%BA%A7ERP%E7%B3%BB%E7%BB%9FWFWebService%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
蓝凌OA-EKP系统接口hrStaffWebService存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8COA-EKP%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3hrStaffWebService%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
泛微E-Cology9平台QRcodeBuildAction存在身份认证绕过导致SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Cology9%E5%B9%B3%E5%8F%B0QRcodeBuildAction%E5%AD%98%E5%9C%A8%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E5%AF%BC%E8%87%B4SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通CDG电子文档安全管理系统DelHookService存在sql注入漏洞(CVE-2024-10660)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9ACDG%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDelHookService%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-10660).md
易思智能物流无人值守系统ExportReport存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81%E6%97%A0%E4%BA%BA%E5%80%BC%E5%AE%88%E7%B3%BB%E7%BB%9F/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81%E6%97%A0%E4%BA%BA%E5%80%BC%E5%AE%88%E7%B3%BB%E7%BB%9FExportReport%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
易思智能物流无人值守系统login存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81%E6%97%A0%E4%BA%BA%E5%80%BC%E5%AE%88%E7%B3%BB%E7%BB%9F/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81%E6%97%A0%E4%BA%BA%E5%80%BC%E5%AE%88%E7%B3%BB%E7%BB%9Flogin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
易思智能物流无人值守系统DownFile任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81%E6%97%A0%E4%BA%BA%E5%80%BC%E5%AE%88%E7%B3%BB%E7%BB%9F/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81%E6%97%A0%E4%BA%BA%E5%80%BC%E5%AE%88%E7%B3%BB%E7%BB%9FDownFile%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
H3C-CVM-fd接口前台任意文件上传漏洞复现https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/H3C/H3C-CVM-fd%E6%8E%A5%E5%8F%A3%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0.md
东胜物流软件AttributeAdapter.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6AttributeAdapter.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
ArcGIS地理信息系统任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/ArcGIS/ArcGIS%E5%9C%B0%E7%90%86%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
EyouCMS文件包含RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EyouCMS/EyouCMS%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%ABRCE%E6%BC%8F%E6%B4%9E.md
宏景人力资源信息管理系统uploadLogo存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AF%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FuploadLogo%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
顺景ERP管理系统UploadInvtSpBuzPlanFile存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A1%BA%E6%99%AFERP/%E9%A1%BA%E6%99%AFERP%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUploadInvtSpBuzPlanFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
顺景ERP管理系统FileUpload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A1%BA%E6%99%AFERP/%E9%A1%BA%E6%99%AFERP%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FFileUpload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
全程云OA系统QCPES.asmx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%A8%E7%A8%8B%E4%BA%91OA/%E5%85%A8%E7%A8%8B%E4%BA%91OA%E7%B3%BB%E7%BB%9FQCPES.asmx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
ZKBioSecurity存在shiro反序列漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/ZKBioSecurity/ZKBioSecurity%E5%AD%98%E5%9C%A8shiro%E5%8F%8D%E5%BA%8F%E5%88%97%E6%BC%8F%E6%B4%9E.md
美特CRM系统接口sync_emp_weixin存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BE%8E%E7%89%B9CRM%E7%B3%BB%E7%BB%9F/%E7%BE%8E%E7%89%B9CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3sync_emp_weixin%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
索贝融媒体存在硬编码漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%88%90%E9%83%BD%E7%B4%A2%E8%B4%9D%E6%95%B0%E7%A0%81%E7%A7%91%E6%8A%80/%E7%B4%A2%E8%B4%9D%E8%9E%8D%E5%AA%92%E4%BD%93%E5%AD%98%E5%9C%A8%E7%A1%AC%E7%BC%96%E7%A0%81%E6%BC%8F%E6%B4%9E.md
金蝶EAS存在appUtil.jsp命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E8%9D%B6/%E9%87%91%E8%9D%B6EAS%E5%AD%98%E5%9C%A8appUtil.jsp%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
明源云ERP接口VisitorWeb_XMLHTTP.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%8E%E6%BA%90%E4%BA%91/%E6%98%8E%E6%BA%90%E4%BA%91ERP%E6%8E%A5%E5%8F%A3VisitorWeb_XMLHTTP.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
聚合支付平台接口sdcustomno存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%81%9A%E5%90%88%E6%94%AF%E4%BB%98/%E8%81%9A%E5%90%88%E6%94%AF%E4%BB%98%E5%B9%B3%E5%8F%B0%E6%8E%A5%E5%8F%A3sdcustomno%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
苹果IOS端IPA签名工具Sign.php前台任意命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%88%86%E5%8F%91%E7%AD%BE%E5%90%8D%E7%B3%BB%E7%BB%9F/%E8%8B%B9%E6%9E%9CIOS%E7%AB%AFIPA%E7%AD%BE%E5%90%8D%E5%B7%A5%E5%85%B7Sign.php%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
和信创天云桌面系统newserver远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%92%8C%E4%BF%A1%E5%88%9B%E5%A4%A9/%E5%92%8C%E4%BF%A1%E5%88%9B%E5%A4%A9%E4%BA%91%E6%A1%8C%E9%9D%A2%E7%B3%BB%E7%BB%9Fnewserver%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
金航网上阅卷系统fileUpload任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EDU/%E8%A1%A1%E6%B0%B4%E9%87%91%E8%88%AA/%E9%87%91%E8%88%AA%E7%BD%91%E4%B8%8A%E9%98%85%E5%8D%B7%E7%B3%BB%E7%BB%9FfileUpload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
HANDLINK-ISS-7000v2网关login_handler.cgi未授权RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%80%9A%E9%9C%96%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/HANDLINK-ISS-7000v2%E7%BD%91%E5%85%B3login_handler.cgi%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E.md
电信网关配置管理后台upload_channels.php接口存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86%E5%90%8E%E5%8F%B0upload_channels.php%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
爱数AnyShare智能内容管理平台Usrm_GetAllUsers信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%8A%E6%B5%B7%E7%88%B1%E6%95%B0%E4%BF%A1%E6%81%AF/%E7%88%B1%E6%95%B0AnyShare%E6%99%BA%E8%83%BD%E5%86%85%E5%AE%B9%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0Usrm_GetAllUsers%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20241102-新增漏洞
万户ezoffice协同办公平台SignatureEditFrm存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7ezoffice%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0SignatureEditFrm%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
禅道20.7后台任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A6%85%E9%81%93/%E7%A6%85%E9%81%9320.7%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
瑞斯康达main.asp未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%91%9E%E6%96%AF%E5%BA%B7%E8%BE%BE/%E7%91%9E%E6%96%AF%E5%BA%B7%E8%BE%BEmain.asp%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
cyberpanel未授权远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/cyberpanel/cyberpanel%E6%9C%AA%E6%8E%88%E6%9D%83%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
金和OA-C6系统接口ApproveRemindSetExec.aspx存在XXE漏洞(CNVD-2024-40568)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8C/%E9%87%91%E5%92%8COA-C6%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3ApproveRemindSetExec.aspx%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E(CNVD-2024-40568).md
北京亚控科技img任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8C%97%E4%BA%AC%E4%BA%9A%E6%8E%A7%E7%A7%91%E6%8A%80/%E5%8C%97%E4%BA%AC%E4%BA%9A%E6%8E%A7%E7%A7%91%E6%8A%80img%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Apache-Solr身份认证绕过导致任意文件读取漏洞复现(CVE-2024-45216)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-Solr%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E5%AF%BC%E8%87%B4%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CVE-2024-45216).md
吉大正元身份认证网关downTools任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%90%89%E5%A4%A7%E6%AD%A3%E5%85%83%E4%BF%A1%E6%81%AF/%E5%90%89%E5%A4%A7%E6%AD%A3%E5%85%83%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BD%91%E5%85%B3downTools%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
赛普EAP企业适配管理平台Download.aspx任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%9B%E6%99%AE/%E8%B5%9B%E6%99%AEEAP%E4%BC%81%E4%B8%9A%E9%80%82%E9%85%8D%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0Download.aspx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
金华迪加现场大屏互动系统mobile.do.php任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%8D%8E%E8%BF%AA%E5%8A%A0/%E9%87%91%E5%8D%8E%E8%BF%AA%E5%8A%A0%E7%8E%B0%E5%9C%BA%E5%A4%A7%E5%B1%8F%E4%BA%92%E5%8A%A8%E7%B3%BB%E7%BB%9Fmobile.do.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud系统接口approveservlet存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3approveservlet%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud系统接口uapbd.refdef.query存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3uapbd.refdef.query%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Teaching在线教学平台getDictItemsByTable存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%8A%E6%B5%B7%E9%B8%BD%E8%9B%8B%E7%BD%91%E7%BB%9C/Teaching%E5%9C%A8%E7%BA%BF%E6%95%99%E5%AD%A6%E5%B9%B3%E5%8F%B0getDictItemsByTable%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
智慧平台SExcelExpErr.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EDU/%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0SExcelExpErr.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友u9系统接口TransWebService存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8Bu9%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3TransWebService%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20241026-新增漏洞
瑞格智慧心理服务平台NPreenSMSList.asmx存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EDU/%E7%91%9E%E6%A0%BC%E6%99%BA%E6%85%A7%E5%BF%83%E7%90%86%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0NPreenSMSList.asmx%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金盘微信管理平台download.jsp任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E7%9B%98/%E9%87%91%E7%9B%98%E5%BE%AE%E4%BF%A1%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0download.jsp%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Grafana表达式远程代码执行(CVE-2024-9264)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Grafana/Grafana%E8%A1%A8%E8%BE%BE%E5%BC%8F%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C(CVE-2024-9264).md
明源云GetErpConfig.aspx信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%8E%E6%BA%90%E4%BA%91/%E6%98%8E%E6%BA%90%E4%BA%91GetErpConfig.aspx%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud系统接口esnserver存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3esnserver%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
分诊叫号后台系统存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8C%97%E4%BA%AC%E7%A5%9E%E5%B7%9E/%E5%88%86%E8%AF%8A%E5%8F%AB%E5%8F%B7%E5%90%8E%E5%8F%B0%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
百易云资产管理运营系统ufile.api.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%84%E7%AE%A1%E4%BA%91/%E7%99%BE%E6%98%93%E4%BA%91%E8%B5%84%E4%BA%A7%E7%AE%A1%E7%90%86%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9Fufile.api.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微e-Mobile移动管理平台error存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-Mobile%E7%A7%BB%E5%8A%A8%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0error%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统存在3处弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A83%E5%A4%84%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
HCM-Cloud云端专业人力资源平台download任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%AA%E6%BD%AE%E4%BA%91/HCM-Cloud%E4%BA%91%E7%AB%AF%E4%B8%93%E4%B8%9A%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E5%B9%B3%E5%8F%B0download%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
高校人力资源管理系统ReportServer存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EDU/%E9%AB%98%E6%A0%A1%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FReportServer%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
Apache-HertzBeat-SnakeYaml反序列化漏洞(CVE-2024-42323)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-HertzBeat-SnakeYaml%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E(CVE-2024-42323).md
CRMEB电商系统PublicController.php反序列化漏洞(CVE-2024-6944)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/CRMEB/CRMEB%E7%94%B5%E5%95%86%E7%B3%BB%E7%BB%9FPublicController.php%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E(CVE-2024-6944).md
锐捷校园网自助服务系统login_judge.jsf任意文件读取漏洞补丁绕过https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E6%A0%A1%E5%9B%AD%E7%BD%91%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Flogin_judge.jsf%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%E8%A1%A5%E4%B8%81%E7%BB%95%E8%BF%87.md
天融信运维安全审计系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E8%9E%8D%E4%BF%A1/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E8%BF%90%E7%BB%B4%E5%AE%89%E5%85%A8%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
甄云SRM云平台SpEL表达式注入漏洞(XVE-2024-18301)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%8A%E6%B5%B7%E7%94%84%E4%BA%91/%E7%94%84%E4%BA%91SRM%E4%BA%91%E5%B9%B3%E5%8F%B0SpEL%E8%A1%A8%E8%BE%BE%E5%BC%8F%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(XVE-2024-18301).md
鸿宇多用户商城scan_list.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%B8%BF%E5%AE%87%E7%A7%91%E6%8A%80/%E9%B8%BF%E5%AE%87%E5%A4%9A%E7%94%A8%E6%88%B7%E5%95%86%E5%9F%8Escan_list.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
易宝OA-ExecuteSqlForDataSet接口处存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E5%AE%9DOA/%E6%98%93%E5%AE%9DOA-ExecuteSqlForDataSet%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
易宝OA-ExecuteQueryNoneResult接口处存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E5%AE%9DOA/%E6%98%93%E5%AE%9DOA-ExecuteQueryNoneResult%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
联达OA接口uploadImg.aspx任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%81%94%E8%BE%BEOA/%E8%81%94%E8%BE%BEOA%E6%8E%A5%E5%8F%A3uploadImg.aspx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
大商创多用户商城wholesale_flow.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%8A%E6%B5%B7%E5%95%86%E5%88%9B/%E5%A4%A7%E5%95%86%E5%88%9B%E5%A4%9A%E7%94%A8%E6%88%B7%E5%95%86%E5%9F%8Ewholesale_flow.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大商创多用户商城系统ajax_dialog.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%8A%E6%B5%B7%E5%95%86%E5%88%9B/%E5%A4%A7%E5%95%86%E5%88%9B%E5%A4%9A%E7%94%A8%E6%88%B7%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9Fajax_dialog.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
NUUO网络视频录像机upload.php任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/NUUO/NUUO%E7%BD%91%E7%BB%9C%E8%A7%86%E9%A2%91%E5%BD%95%E5%83%8F%E6%9C%BAupload.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Smartbi修改用户密码漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Smartbi/Smartbi%E4%BF%AE%E6%94%B9%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20241019-新增漏洞
网动统一通信平台(ActiveUC)接口iactiveEnterMeeting存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E5%8A%A8%E7%BB%9F%E4%B8%80%E9%80%9A%E4%BF%A1%E5%B9%B3%E5%8F%B0/%E7%BD%91%E5%8A%A8%E7%BB%9F%E4%B8%80%E9%80%9A%E4%BF%A1%E5%B9%B3%E5%8F%B0(ActiveUC)%E6%8E%A5%E5%8F%A3iactiveEnterMeeting%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
浙大恩特客户资源管理系统Quotegask_editAction存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9%E5%AE%A2%E6%88%B7%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9%E5%AE%A2%E6%88%B7%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FQuotegask_editAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
好视通云会议upLoad2.jsp接口处存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A5%BD%E8%A7%86%E9%80%9A%E8%A7%86%E9%A2%91%E4%BC%9A%E8%AE%AE%E7%B3%BB%E7%BB%9F/%E5%A5%BD%E8%A7%86%E9%80%9A%E4%BA%91%E4%BC%9A%E8%AE%AEupLoad2.jsp%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友NC系统word.docx存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E7%B3%BB%E7%BB%9Fword.docx%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
志华软件openfile.aspx存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BF%97%E5%8D%8E%E8%BD%AF%E4%BB%B6/%E5%BF%97%E5%8D%8E%E8%BD%AF%E4%BB%B6openfile.aspx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
大华智能云网关注册管理平台SQL注入漏洞(CNVD-2024-38747)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E4%BA%91%E7%BD%91%E5%85%B3%E6%B3%A8%E5%86%8C%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CNVD-2024-38747).md
万户ezEIP企业管理系统productlist.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7ezEIP%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fproductlist.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
智联云采testService存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E4%BA%92%E8%81%94%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%99%BA%E8%81%94%E4%BA%91%E9%87%87testService%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Cloudlog系统接口delete_oqrs_line未授权SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Cloudlog/Cloudlog%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3delete_oqrs_line%E6%9C%AA%E6%8E%88%E6%9D%83SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
灵当CRM系统接口wechatSession文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%81%B5%E5%BD%93CRM/%E7%81%B5%E5%BD%93CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3wechatSession%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
灵当CRM系统接口pdf.php接口处存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%81%B5%E5%BD%93CRM/%E7%81%B5%E5%BD%93CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3pdf.php%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
WordPress插件GutenKit存在任意文件上传漏洞(CVE-2024-9234)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6GutenKit%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E(CVE-2024-9234).md
WordPress插件Tainacan存在前台任意文件读取漏洞(CVE-2024-7135)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6Tainacan%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-7135).md
英飞达医学WebUserLogin.asmx信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%8B%B1%E9%A3%9E%E8%BE%BE%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E5%AD%98%E6%A1%A3%E4%B8%8E%E9%80%9A%E4%BF%A1%E7%B3%BB%E7%BB%9F/%E8%8B%B1%E9%A3%9E%E8%BE%BE%E5%8C%BB%E5%AD%A6WebUserLogin.asmx%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
公交IC卡收单管理系统信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
知识吾爱纯净版小程序系统leibiao存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8F%91%E5%8D%A1%E7%BD%91%E7%B3%BB%E7%BB%9F/%E7%9F%A5%E8%AF%86%E5%90%BE%E7%88%B1%E7%BA%AF%E5%87%80%E7%89%88%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9Fleibiao%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
夜莺开源监控系统存在默认用户漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%9C%E8%8E%BA%E5%BC%80%E6%BA%90%E7%9B%91%E6%8E%A7%E7%B3%BB%E7%BB%9F/%E5%A4%9C%E8%8E%BA%E5%BC%80%E6%BA%90%E7%9B%91%E6%8E%A7%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E7%94%A8%E6%88%B7%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20241013-新增漏洞
大华智慧园区综合管理平台hasSubsystem存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0hasSubsystem%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Palo-Alto-Expedition经过身份验证的命令注入(CVE-2024-9464)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PAN-OS/CVE-2024-9464.md
PAN未授权SQL注入漏洞复现(CVE-2024-9465)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PAN-OS/PAN%E6%9C%AA%E6%8E%88%E6%9D%83SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CVE-2024-9465).md
泛微E-Cology系统接口CptInstock1Ajax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Cology%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3CptInstock1Ajax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Qualitor系统接口checkAcesso.php任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Qualitor/Qualitor%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3checkAcesso.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
方正畅享全媒体新闻采编系统addOrUpdateOrg存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B9%E6%AD%A3%E5%85%A8%E5%AA%92%E4%BD%93/%E6%96%B9%E6%AD%A3%E7%95%85%E4%BA%AB%E5%85%A8%E5%AA%92%E4%BD%93%E6%96%B0%E9%97%BB%E9%87%87%E7%BC%96%E7%B3%BB%E7%BB%9FaddOrUpdateOrg%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
同望OA系统接口tooneAssistantAttachement.jsp任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%90%8C%E6%9C%9BOA/%E5%90%8C%E6%9C%9BOA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3tooneAssistantAttachement.jsp%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
锐明技术Mangrove系统任意用户创建漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AFCrocus%E7%B3%BB%E7%BB%9F/%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AFMangrove%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%88%9B%E5%BB%BA%E6%BC%8F%E6%B4%9E.md
迪普DPTech-VPN任意文件读取(补丁绕过)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%BF%AA%E6%99%AE/%E8%BF%AA%E6%99%AEDPTech-VPN%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96(%E8%A1%A5%E4%B8%81%E7%BB%95%E8%BF%87).md
众智OA办公系统Login存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BC%97%E6%99%BAOA/%E4%BC%97%E6%99%BAOA%E5%8A%9E%E5%85%AC%E7%B3%BB%E7%BB%9FLogin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
致远OA后台表单导入任意文件写入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA%E5%90%8E%E5%8F%B0%E8%A1%A8%E5%8D%95%E5%AF%BC%E5%85%A5%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E.md
迈普pnsr2900x系统接口DOWNLOAD_FILE任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%BF%88%E6%99%AE%E5%A4%9A%E4%B8%9A%E5%8A%A1%E8%9E%8D%E5%90%88%E7%BD%91%E5%85%B3/%E8%BF%88%E6%99%AEpnsr2900x%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3DOWNLOAD_FILE%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20241007-新增漏洞
泛微E-Mobile硬编码口令漏洞(XVE-2024-28095)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Mobile%E7%A1%AC%E7%BC%96%E7%A0%81%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E(XVE-2024-28095).md
用友U8-CRM系统fillbacksetting.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9Ffillbacksetting.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Qualitor系统接口processVariavel.php未授权命令注入漏洞(CVE-2023-47253)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Qualitor/Qualitor%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3processVariavel.php%E6%9C%AA%E6%8E%88%E6%9D%83%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2023-47253).md
中新天达系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EDU/%E4%B8%AD%E6%96%B0%E5%A4%A9%E8%BE%BE%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
孚盟云系统接口ajaxsenddingdingmessage存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AD%9A%E7%9B%9F%E4%BA%91/%E5%AD%9A%E7%9B%9F%E4%BA%91%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3ajaxsenddingdingmessage%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
FLIR-AX8热成像仪applyfirmware存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/FLIR/FLIR-AX8%E7%83%AD%E6%88%90%E5%83%8F%E4%BB%AAapplyfirmware%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
FLIR-AX8热成像仪download.php存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/FLIR/FLIR-AX8%E7%83%AD%E6%88%90%E5%83%8F%E4%BB%AAdownload.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
FLIR-AX8热成像仪palette.php存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/FLIR/FLIR-AX8%E7%83%AD%E6%88%90%E5%83%8F%E4%BB%AApalette.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
FLIR-AX8热成像仪res.php存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/FLIR/FLIR-AX8%E7%83%AD%E6%88%90%E5%83%8F%E4%BB%AAres.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
万豪娱乐存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%8F%A0%E8%8F%9C/%E4%B8%87%E8%B1%AA%E5%A8%B1%E4%B9%90%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Cups-Browsed远程命令执行漏洞(CVE-2024-47177)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/cups-browsed/CVE-2024-47177.md
Spring-Framework路径遍历漏洞(CVE-2024-38816)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Spring/Spring-Framework%E8%B7%AF%E5%BE%84%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E(CVE-2024-38816).md
万户OA系统接口GeneralWeb存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7OA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3GeneralWeb%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
Zimbra远程命令执行漏洞(CVE-2024-45519)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Zimbra/CVE-2024-45519.md
pgAdmin4存在反序列化漏洞(CVE-2024-2044)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/pgAdmin/CVE-2024-2044.md
pgAdmin4敏感信息泄露漏洞(CVE-2024-9014)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/pgAdmin/CVE-2024-9014.md
CVE-2024-8190https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Ivanti/CVE-2024-8190.md
CVE-2024-22024https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Ivanti/CVE-2024-22024.md
微信公众号小说漫画系统前台任意文件写入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%BC%AB%E7%94%BB%E7%B3%BB%E7%BB%9F/%E5%BE%AE%E4%BF%A1%E5%85%AC%E4%BC%97%E5%8F%B7%E5%B0%8F%E8%AF%B4%E6%BC%AB%E7%94%BB%E7%B3%BB%E7%BB%9F%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E.md
微信公众号小说漫画系统fileupload.php存在前台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%BC%AB%E7%94%BB%E7%B3%BB%E7%BB%9F/%E5%BE%AE%E4%BF%A1%E5%85%AC%E4%BC%97%E5%8F%B7%E5%B0%8F%E8%AF%B4%E6%BC%AB%E7%94%BB%E7%B3%BB%E7%BB%9Ffileupload.php%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
金慧综合管理信息系统LoginBegin.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E6%85%A7/%E9%87%91%E6%85%A7%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9FLoginBegin.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240926-新增漏洞
DataGear数据可视化分析平台存在SpEL表达式注入漏洞(CVE-2024-37759)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/DataGear/DataGear%E6%95%B0%E6%8D%AE%E5%8F%AF%E8%A7%86%E5%8C%96%E5%88%86%E6%9E%90%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8SpEL%E8%A1%A8%E8%BE%BE%E5%BC%8F%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-37759).md
Apache-Seata存在Hessian反序列化漏洞(CVE-2024-22399)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-Seata%E5%AD%98%E5%9C%A8Hessian%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E(CVE-2024-22399).md
金和OA系统接口SignUpload.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3SignUpload.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8+CRM系统leadconversion.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8+CRM%E7%B3%BB%E7%BB%9Fleadconversion.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
数字通云平台智慧政务setting存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%95%B0%E5%AD%97%E9%80%9AOA/%E6%95%B0%E5%AD%97%E9%80%9A%E4%BA%91%E5%B9%B3%E5%8F%B0%E6%99%BA%E6%85%A7%E6%94%BF%E5%8A%A1setting%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
EDU智慧平台PersonalDayInOutSchoolData存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EDU/EDU%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0PersonalDayInOutSchoolData%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
EDU某智慧平台ExpDownloadService.aspx任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EDU/EDU%E6%9F%90%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0ExpDownloadService.aspx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
百易云资产管理运营系统ticket.edit.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%84%E7%AE%A1%E4%BA%91/%E7%99%BE%E6%98%93%E4%BA%91%E8%B5%84%E4%BA%A7%E7%AE%A1%E7%90%86%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9Fticket.edit.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
灵当CRM系统接口multipleUpload.php文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%81%B5%E5%BD%93CRM/%E7%81%B5%E5%BD%93CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3multipleUpload.php%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
天融信运维安全审计系统synRequest存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E8%9E%8D%E4%BF%A1/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E8%BF%90%E7%BB%B4%E5%AE%89%E5%85%A8%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9FsynRequest%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
用友畅捷通-TPlus系统接口FileUploadHandler.ashx存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%95%85%E6%8D%B7%E9%80%9A-TPlus%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3FileUploadHandler.ashx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
微信广告任务平台存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BE%AE%E4%BF%A1%E5%B9%BF%E5%91%8A%E4%BB%BB%E5%8A%A1%E5%B9%B3%E5%8F%B0/%E5%BE%AE%E4%BF%A1%E5%B9%BF%E5%91%8A%E4%BB%BB%E5%8A%A1%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
万户ezOFFICE系统接口SendFileCheckTemplateEdit.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7ezOFFICE%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3SendFileCheckTemplateEdit.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
东方通upload接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%9C%E6%96%B9%E9%80%9A/%E4%B8%9C%E6%96%B9%E9%80%9Aupload%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
DataEase存在数据库配置信息暴露漏洞(CVE-2024-30269)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/DataEase/DataEase%E5%AD%98%E5%9C%A8%E6%95%B0%E6%8D%AE%E5%BA%93%E9%85%8D%E7%BD%AE%E4%BF%A1%E6%81%AF%E6%9A%B4%E9%9C%B2%E6%BC%8F%E6%B4%9E(CVE-2024-30269).md
用友U8CRM系统接口setremindtoold.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3setremindtoold.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
WordPress系统插件LearnPress存在SQL注入漏洞(CVE-2024-8522)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E7%B3%BB%E7%BB%9F%E6%8F%92%E4%BB%B6LearnPress%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-8522).md
苹果IOS端IPA签名工具request_post任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%88%86%E5%8F%91%E7%AD%BE%E5%90%8D%E7%B3%BB%E7%BB%9F/%E8%8B%B9%E6%9E%9CIOS%E7%AB%AFIPA%E7%AD%BE%E5%90%8D%E5%B7%A5%E5%85%B7request_post%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统role存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Frole%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统user存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fuser%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统bus存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fbus%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统line存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fline%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统parametercard存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fparametercard%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
点企来客服系统存在硬编码漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%82%B9%E4%BC%81%E6%9D%A5%E5%AE%A2%E6%9C%8D%E7%B3%BB%E7%BB%9F/%E7%82%B9%E4%BC%81%E6%9D%A5%E5%AE%A2%E6%9C%8D%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E7%A1%AC%E7%BC%96%E7%A0%81%E6%BC%8F%E6%B4%9E.md
万户OA-fileUpload.controller任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7OA-fileUpload.controller%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240920-新增漏洞
唯徳知识产权管理系统WSFM.asmx接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%94%AF%E5%BE%B3%E7%9F%A5%E8%AF%86%E4%BA%A7%E6%9D%83%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%94%AF%E5%BE%B3%E7%9F%A5%E8%AF%86%E4%BA%A7%E6%9D%83%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FWSFM.asmx%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
唯徳知识产权管理系统DownloadFileWordTemplate接口存在文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%94%AF%E5%BE%B3%E7%9F%A5%E8%AF%86%E4%BA%A7%E6%9D%83%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%94%AF%E5%BE%B3%E7%9F%A5%E8%AF%86%E4%BA%A7%E6%9D%83%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDownloadFileWordTemplate%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
商混ERP系统接口Operater_Action.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%95%86%E6%B7%B7ERP/%E5%95%86%E6%B7%B7ERP%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3Operater_Action.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
商混ERP系统接口StockreceiveEdit.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%95%86%E6%B7%B7ERP/%E5%95%86%E6%B7%B7ERP%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3StockreceiveEdit.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
商混ERP系统接口TaskCarToQueue.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%95%86%E6%B7%B7ERP/%E5%95%86%E6%B7%B7ERP%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3TaskCarToQueue.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
广联达OA系统接口do.asmx存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E8%81%94%E8%BE%BEOA/%E5%B9%BF%E8%81%94%E8%BE%BEOA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3do.asmx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
广联达OA系统接口do.asmx存在任意文件写入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E8%81%94%E8%BE%BEOA/%E5%B9%BF%E8%81%94%E8%BE%BEOA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3do.asmx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E.md
thinkphp最新CVE-2024-44902反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/thinkphp/thinkphp%E6%9C%80%E6%96%B0CVE-2024-44902%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
誉龙视音频综合管理平台TimeSyn存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%AA%89%E9%BE%99%E6%95%B0%E5%AD%97/%E8%AA%89%E9%BE%99%E8%A7%86%E9%9F%B3%E9%A2%91%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0TimeSyn%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
誉龙视音频综合管理平台FindById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%AA%89%E9%BE%99%E6%95%B0%E5%AD%97/%E8%AA%89%E9%BE%99%E8%A7%86%E9%9F%B3%E9%A2%91%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0FindById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
魅思视频管理系统getOrderStatus存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%AD%85%E6%80%9D%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E9%AD%85%E6%80%9D%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FgetOrderStatus%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
AC集中管理平台未授权漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/AC%E9%9B%86%E4%B8%AD%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9E.md
数字通云平台智慧政务workflow存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%95%B0%E5%AD%97%E9%80%9AOA/%E6%95%B0%E5%AD%97%E9%80%9A%E4%BA%91%E5%B9%B3%E5%8F%B0%E6%99%BA%E6%85%A7%E6%94%BF%E5%8A%A1workflow%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8CRM系统接口relobjreportlist.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3relobjreportlist.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
华望云会议管理平台checkDoubleUserNameForAdd存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E6%9C%9B%E4%BA%91/%E5%8D%8E%E6%9C%9B%E4%BA%91%E4%BC%9A%E8%AE%AE%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0checkDoubleUserNameForAdd%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
地大信息-基础信息平台GetImg任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%9C%B0%E5%A4%A7%E4%BF%A1%E6%81%AF/%E5%9C%B0%E5%A4%A7%E4%BF%A1%E6%81%AF-%E5%9F%BA%E7%A1%80%E4%BF%A1%E6%81%AF%E5%B9%B3%E5%8F%B0GetImg%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
泛微E-Mobile系统接口cdnfile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Mobile%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3cdnfile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
灵当CRM系统接口getOrderList存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%81%B5%E5%BD%93CRM/%E7%81%B5%E5%BD%93CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3getOrderList%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
网御VPN安全网关存在任意文件下载漏洞(CNVD-2024-34014)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E5%BE%A1%E6%98%9F%E4%BA%91/%E7%BD%91%E5%BE%A1VPN%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E(CNVD-2024-34014).md
Nacos未授权下载配置信息https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Nacos/Nacos%E6%9C%AA%E6%8E%88%E6%9D%83%E4%B8%8B%E8%BD%BD%E9%85%8D%E7%BD%AE%E4%BF%A1%E6%81%AF.md
https://github.com/eeeeeeeeee-code/POC#20240914-新增漏洞
DCN防火墙ping.php存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/DCN/DCN%E9%98%B2%E7%81%AB%E5%A2%99ping.php%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
大华智慧园区系统updateOcx_updateCab.action存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%B3%BB%E7%BB%9FupdateOcx_updateCab.action%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
大华智慧园区系统updateOcx_updateZip.action存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%B3%BB%E7%BB%9FupdateOcx_updateZip.action%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友U8-CRM系统chkService.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9FchkService.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
万户ezOFFICE系统接口filesendcheck_gd.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7ezOFFICE%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3filesendcheck_gd.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Hoverfly系统接口simulation任意文件读取漏洞复现(CVE-2024-45388)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Hoverfly/Hoverfly%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3simulation%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CVE-2024-45388).md
NUUO网络视频录像机css_parser.php任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/NUUO/NUUO%E7%BD%91%E7%BB%9C%E8%A7%86%E9%A2%91%E5%BD%95%E5%83%8F%E6%9C%BAcss_parser.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
百易云资产管理运营系统house.save.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%84%E7%AE%A1%E4%BA%91/%E7%99%BE%E6%98%93%E4%BA%91%E8%B5%84%E4%BA%A7%E7%AE%A1%E7%90%86%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9Fhouse.save.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E
科荣AIO系统接口UtilServlet存在代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E8%8D%A3AIO/%E7%A7%91%E8%8D%A3AIO%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3UtilServlet%E5%AD%98%E5%9C%A8%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
imo云办公室接口Imo_DownLoadUI.php任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Imo%E4%BA%91%E5%8A%9E%E5%85%AC/imo%E4%BA%91%E5%8A%9E%E5%85%AC%E5%AE%A4%E6%8E%A5%E5%8F%A3Imo_DownLoadUI.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
顺景ERP管理系统UploadInvtSpFile存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A1%BA%E6%99%AFERP/%E9%A1%BA%E6%99%AFERP%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUploadInvtSpFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
某二开版海外抢单Shua单系统存在任意用户登录漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%8A%A2%E5%8D%95%E5%88%B7%E5%8D%95%E7%B3%BB%E7%BB%9F/%E6%9F%90%E4%BA%8C%E5%BC%80%E7%89%88%E6%B5%B7%E5%A4%96%E6%8A%A2%E5%8D%95Shua%E5%8D%95%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
Array-APV应用交付系统ping_hosts存在任意命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Array-APV/Array-APV%E5%BA%94%E7%94%A8%E4%BA%A4%E4%BB%98%E7%B3%BB%E7%BB%9Fping_hosts%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
哲霖机械ERP接口DownloadInpFile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%93%B2%E9%9C%96%E6%9C%BA%E6%A2%B0ERP/%E5%93%B2%E9%9C%96%E6%9C%BA%E6%A2%B0ERP%E6%8E%A5%E5%8F%A3DownloadInpFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
章管家list.htm存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%AB%A0%E7%AE%A1%E5%AE%B6-%E5%8D%B0%E7%AB%A0%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E7%AB%A0%E7%AE%A1%E5%AE%B6list.htm%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
华望云会议管理平台conflog.inc存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E6%9C%9B%E4%BA%91/%E5%8D%8E%E6%9C%9B%E4%BA%91%E4%BC%9A%E8%AE%AE%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0conflog.inc%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
华望云会议管理平台confmanger.inc存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E6%9C%9B%E4%BA%91/%E5%8D%8E%E6%9C%9B%E4%BA%91%E4%BC%9A%E8%AE%AE%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0confmanger.inc%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
华望云会议管理平台deptactionlist存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E6%9C%9B%E4%BA%91/%E5%8D%8E%E6%9C%9B%E4%BA%91%E4%BC%9A%E8%AE%AE%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0deptactionlist%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
华望云会议管理平台myconflist.in存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E6%9C%9B%E4%BA%91/%E5%8D%8E%E6%9C%9B%E4%BA%91%E4%BC%9A%E8%AE%AE%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0myconflist.in%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
华望云会议管理平台recodemanger.inc存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E6%9C%9B%E4%BA%91/%E5%8D%8E%E6%9C%9B%E4%BA%91%E4%BC%9A%E8%AE%AE%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0recodemanger.inc%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
华望云会议管理平台recodemangerForUser.inc存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E6%9C%9B%E4%BA%91/%E5%8D%8E%E6%9C%9B%E4%BA%91%E4%BC%9A%E8%AE%AE%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0recodemangerForUser.inc%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
华望云会议管理平台syslog.inc存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E6%9C%9B%E4%BA%91/%E5%8D%8E%E6%9C%9B%E4%BA%91%E4%BC%9A%E8%AE%AE%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0syslog.inc%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
华望云会议管理平台useractionlist存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E6%9C%9B%E4%BA%91/%E5%8D%8E%E6%9C%9B%E4%BA%91%E4%BC%9A%E8%AE%AE%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0useractionlist%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240908-新增漏洞
智联云采SRM2.0系统接口autologin身份认证绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E4%BA%92%E8%81%94%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%99%BA%E8%81%94%E4%BA%91%E9%87%87SRM2.0%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3autologin%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
众诚网上订单系统o_sa_order.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BC%97%E8%AF%9A%E8%BD%AF%E4%BB%B6/%E4%BC%97%E8%AF%9A%E7%BD%91%E4%B8%8A%E8%AE%A2%E5%8D%95%E7%B3%BB%E7%BB%9Fo_sa_order.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC-Cloud系统show_download_content接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-Cloud%E7%B3%BB%E7%BB%9Fshow_download_content%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Jenkins-Remoting任意文件读取漏洞(CVE-2024-43044)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Jenkins/Jenkins-Remoting%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-43044).md
WordPress插件GiveWP存在反序列漏洞(CVE-2024-5932)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6GiveWP%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E6%BC%8F%E6%B4%9E(CVE-2024-5932).md
Apache-OFBiz远程代码执行漏洞(CVE-2024-45195)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-OFBiz%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-45195).md
用友U8-Cloud系统接口MultiRepChooseAction存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3MultiRepChooseAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud系统接口AddTaskDataRightAction存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3AddTaskDataRightAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
热网无线监测系统GetMenuItem存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%83%AD%E7%BD%91%E6%97%A0%E7%BA%BF%E7%9B%91%E6%B5%8B%E7%B3%BB%E7%BB%9F/%E7%83%AD%E7%BD%91%E6%97%A0%E7%BA%BF%E7%9B%91%E6%B5%8B%E7%B3%BB%E7%BB%9FGetMenuItem%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240902-新增漏洞
蜂信物联(FastBee)物联网平台download存在任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%9C%82%E4%BF%A1%E7%89%A9%E8%81%94/%E8%9C%82%E4%BF%A1%E7%89%A9%E8%81%94(FastBee)%E7%89%A9%E8%81%94%E7%BD%91%E5%B9%B3%E5%8F%B0download%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
紫光电子档案管理系统selectFileRemote存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%B4%AB%E5%85%89%E7%94%B5%E5%AD%90%E6%A1%A3%E6%A1%88%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%B4%AB%E5%85%89%E7%94%B5%E5%AD%90%E6%A1%A3%E6%A1%88%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FselectFileRemote%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
中兴ZTE-ZSR-V2系列多业务路由器存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%AD%E5%85%B4/%E4%B8%AD%E5%85%B4ZTE-ZSR-V2%E7%B3%BB%E5%88%97%E5%A4%9A%E4%B8%9A%E5%8A%A1%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
珠海新华通软件股份有限公司云平台存在登录绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%8F%A0%E6%B5%B7%E6%96%B0%E5%8D%8E%E9%80%9A%E8%BD%AF%E4%BB%B6%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%8F%A0%E6%B5%B7%E6%96%B0%E5%8D%8E%E9%80%9A%E8%BD%AF%E4%BB%B6%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E4%BA%91%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
Ivanti-Virtual-Traffic-Manager存在身份验证绕过漏洞(CVE-2024-7593)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Ivanti/Ivanti-Virtual-Traffic-Manager%E5%AD%98%E5%9C%A8%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(CVE-2024-7593).md
浪潮云财务系统UploadListFile存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%AA%E6%BD%AE%E4%BA%91/%E6%B5%AA%E6%BD%AE%E4%BA%91%E8%B4%A2%E5%8A%A1%E7%B3%BB%E7%BB%9FUploadListFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
金和OA-C6系统接口jQueryUploadify.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8C/%E9%87%91%E5%92%8COA-C6%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3jQueryUploadify.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud系统接口RepAddToTaskAction存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3RepAddToTaskAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
EOVA未授权doInit接口存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EOVA/EOVA%E6%9C%AA%E6%8E%88%E6%9D%83doInit%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
短剧影视小程序前台base64_image_content任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%9F%AD%E5%89%A7%E5%BD%B1%E8%A7%86%E5%B0%8F%E7%A8%8B%E5%BA%8F/%E7%9F%AD%E5%89%A7%E5%BD%B1%E8%A7%86%E5%B0%8F%E7%A8%8B%E5%BA%8F%E5%89%8D%E5%8F%B0base64_image_content%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
短剧影视小程序前台juhecurl任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%9F%AD%E5%89%A7%E5%BD%B1%E8%A7%86%E5%B0%8F%E7%A8%8B%E5%BA%8F/%E7%9F%AD%E5%89%A7%E5%BD%B1%E8%A7%86%E5%B0%8F%E7%A8%8B%E5%BA%8F%E5%89%8D%E5%8F%B0juhecurl%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
短剧影视小程序前台未授权漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%9F%AD%E5%89%A7%E5%BD%B1%E8%A7%86%E5%B0%8F%E7%A8%8B%E5%BA%8F/%E7%9F%AD%E5%89%A7%E5%BD%B1%E8%A7%86%E5%B0%8F%E7%A8%8B%E5%BA%8F%E5%89%8D%E5%8F%B0%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9E.md
某仿soul欲音社交系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A4%BE%E4%BA%A4%E7%B3%BB%E7%BB%9F/%E6%9F%90%E4%BB%BFsoul%E6%AC%B2%E9%9F%B3%E7%A4%BE%E4%BA%A4%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240828-新增漏洞
朗新天霁智能eHR人力资源管理系统GetE01ByDeptCode存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9C%97%E6%96%B0%E5%A4%A9%E9%9C%81%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%9C%97%E6%96%B0%E5%A4%A9%E9%9C%81%E6%99%BA%E8%83%BDeHR%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetE01ByDeptCode%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
全程云OA接口UploadFile存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%A8%E7%A8%8B%E4%BA%91OA/%E5%85%A8%E7%A8%8B%E4%BA%91OA%E6%8E%A5%E5%8F%A3UploadFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E
Nacos任意文件读写漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Nacos/Nacos%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%86%99%E6%BC%8F%E6%B4%9E.md
畅捷通CRM系统newleadset.php接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%95%85%E6%8D%B7%E9%80%9ACRM%E7%B3%BB%E7%BB%9Fnewleadset.php%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
智能停车管理系统GetPasswayData存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E8%83%BD%E5%81%9C%E8%BD%A6%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%99%BA%E8%83%BD%E5%81%9C%E8%BD%A6%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetPasswayData%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
某U挖矿质押单语言系统imageupload后台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%8C%96%E7%9F%BF%E8%B4%A8%E6%8A%BC%E5%8D%95%E8%AF%AD%E8%A8%80%E7%B3%BB%E7%BB%9F/%E6%9F%90U%E6%8C%96%E7%9F%BF%E8%B4%A8%E6%8A%BC%E5%8D%95%E8%AF%AD%E8%A8%80%E7%B3%BB%E7%BB%9Fimageupload%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
某U挖矿质押单语言系统前台未授权修改管理员密码https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%8C%96%E7%9F%BF%E8%B4%A8%E6%8A%BC%E5%8D%95%E8%AF%AD%E8%A8%80%E7%B3%BB%E7%BB%9F/%E6%9F%90U%E6%8C%96%E7%9F%BF%E8%B4%A8%E6%8A%BC%E5%8D%95%E8%AF%AD%E8%A8%80%E7%B3%BB%E7%BB%9F%E5%89%8D%E5%8F%B0%E6%9C%AA%E6%8E%88%E6%9D%83%E4%BF%AE%E6%94%B9%E7%AE%A1%E7%90%86%E5%91%98%E5%AF%86%E7%A0%81.md
某U挖矿质押单语言系统后台phar反序列漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%8C%96%E7%9F%BF%E8%B4%A8%E6%8A%BC%E5%8D%95%E8%AF%AD%E8%A8%80%E7%B3%BB%E7%BB%9F/%E6%9F%90U%E6%8C%96%E7%9F%BF%E8%B4%A8%E6%8A%BC%E5%8D%95%E8%AF%AD%E8%A8%80%E7%B3%BB%E7%BB%9F%E5%90%8E%E5%8F%B0phar%E5%8F%8D%E5%BA%8F%E5%88%97%E6%BC%8F%E6%B4%9E.md
SPIP-porte_plume插件存在任意PHP执行漏洞(CVE-2024-7954)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SPIP/SPIP-porte_plume%E6%8F%92%E4%BB%B6%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8FPHP%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-7954).md
通天星CMSV6车载定位监控平台getAlarmAppealByGuid存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E5%A4%A9%E6%98%9F/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E5%AE%9A%E4%BD%8D%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0getAlarmAppealByGuid%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
同鑫eHR人力资源管理系统GetFlowDropDownListItems存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%90%8C%E9%91%ABeHR/%E5%90%8C%E9%91%ABeHR%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetFlowDropDownListItems%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240824-新增漏洞
汇智ERP系统Upload.aspx存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B1%87%E6%99%BAERP/%E6%B1%87%E6%99%BAERP%E7%B3%BB%E7%BB%9FUpload.aspx%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
超易企业管理系统Login.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B6%85%E6%98%93%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%B6%85%E6%98%93%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FLogin.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
同享人力管理管理平台SFZService.asmx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%90%8C%E4%BA%AB%E4%BA%BA%E5%8A%9B%E7%AE%A1%E7%90%86%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%90%8C%E4%BA%AB%E4%BA%BA%E5%8A%9B%E7%AE%A1%E7%90%86%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0SFZService.asmx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
九思OA接口WebServiceProxy存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B9%9D%E6%80%9DOA/%E4%B9%9D%E6%80%9DOA%E6%8E%A5%E5%8F%A3WebServiceProxy%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
泛微ecology9系统接口ModeDateService存在SQL漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEecology9%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3ModeDateService%E5%AD%98%E5%9C%A8SQL%E6%BC%8F%E6%B4%9E.md
Oracle-JDEdwards-EnterpriseOne未授权获取管理员密码泄漏https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Oracle/Oracle-JDEdwards-EnterpriseOne%E6%9C%AA%E6%8E%88%E6%9D%83%E8%8E%B7%E5%8F%96%E7%AE%A1%E7%90%86%E5%91%98%E5%AF%86%E7%A0%81%E6%B3%84%E6%BC%8F.md
金和OA-C6协同管理平台DBModules.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA-C6%E5%8D%8F%E5%90%8C%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0DBModules.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
瑞斯康达多业务智能网关list_service_manage.php存在未授权命令注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%91%9E%E6%96%AF%E5%BA%B7%E8%BE%BE/%E7%91%9E%E6%96%AF%E5%BA%B7%E8%BE%BE%E5%A4%9A%E4%B8%9A%E5%8A%A1%E6%99%BA%E8%83%BD%E7%BD%91%E5%85%B3list_service_manage.php%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
南京星源图科技SparkShop存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%97%E4%BA%AC%E6%98%9F%E6%BA%90%E5%9B%BE%E7%A7%91%E6%8A%80/%E5%8D%97%E4%BA%AC%E6%98%9F%E6%BA%90%E5%9B%BE%E7%A7%91%E6%8A%80SparkShop%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
SeaCMS海洋影视管理系统index.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E6%B4%8Bcms/SeaCMS%E6%B5%B7%E6%B4%8B%E5%BD%B1%E8%A7%86%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Findex.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
点企来客服系统getwaitnum存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%82%B9%E4%BC%81%E6%9D%A5%E5%AE%A2%E6%9C%8D%E7%B3%BB%E7%BB%9F/%E7%82%B9%E4%BC%81%E6%9D%A5%E5%AE%A2%E6%9C%8D%E7%B3%BB%E7%BB%9Fgetwaitnum%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
山石网科应用防火墙WAF未授权命令注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B1%B1%E7%9F%B3%E7%BD%91%E7%A7%91%E4%BA%91%E9%89%B4/%E5%B1%B1%E7%9F%B3%E7%BD%91%E7%A7%91%E5%BA%94%E7%94%A8%E9%98%B2%E7%81%AB%E5%A2%99WAF%E6%9C%AA%E6%8E%88%E6%9D%83%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8Cloud系统接口MeasureQResultAction存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8Cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3MeasureQResultAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240821-新增漏洞
JieLink+智能终端操作平台多个接口处存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JieLink/JieLink+%E6%99%BA%E8%83%BD%E7%BB%88%E7%AB%AF%E6%93%8D%E4%BD%9C%E5%B9%B3%E5%8F%B0%E5%A4%9A%E4%B8%AA%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
正方移动信息服务管理系统oaMobile_fjUploadByType存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%AD%A3%E6%96%B9/%E6%AD%A3%E6%96%B9%E7%A7%BB%E5%8A%A8%E4%BF%A1%E6%81%AF%E6%9C%8D%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FoaMobile_fjUploadByType%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
LiveGBS任意用户密码重置漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/LiveGBS/LiveGBS%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E.md
泛微e-cology-v10远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-cology-v10%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
华夏ERPV3.3存在信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E5%A4%8FERP/%E5%8D%8E%E5%A4%8FERPV3.3%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
奥威亚云视频平台UploadFile.aspx存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A5%A5%E5%A8%81%E4%BA%9A%E8%A7%86%E9%A2%91%E4%BA%91%E5%B9%B3%E5%8F%B0/%E5%A5%A5%E5%A8%81%E4%BA%9A%E4%BA%91%E8%A7%86%E9%A2%91%E5%B9%B3%E5%8F%B0UploadFile.aspx%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
万户ezOFFICE协同管理平台receivefile_gd.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7ezOFFICE%E5%8D%8F%E5%90%8C%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0receivefile_gd.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微ecology系统接口BlogService存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEecology%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3BlogService%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Altenergy电力系统控制软件set_timezone接口存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%B5%E5%8A%9B%E7%B3%BB%E7%BB%9F%E6%8E%A7%E5%88%B6%E8%BD%AF%E4%BB%B6/Altenergy%E7%94%B5%E5%8A%9B%E7%B3%BB%E7%BB%9F%E6%8E%A7%E5%88%B6%E8%BD%AF%E4%BB%B6set_timezone%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
私有云管理平台存在登录绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%81%E6%9C%89%E4%BA%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E7%A7%81%E6%9C%89%E4%BA%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
微商城系统api.php存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BE%AE%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9F/%E5%BE%AE%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9Fapi.php%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
微商城系统goods.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BE%AE%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9F/%E5%BE%AE%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9Fgoods.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
某业务管理系统LoginUser存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9F%90%E4%B8%9A%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%9F%90%E4%B8%9A%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FLoginUser%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240817-新增漏洞
易宝OA-BasicService.asmx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E5%AE%9DOA/%E6%98%93%E5%AE%9DOA-BasicService.asmx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
章管家updatePwd.htm存在任意账号密码重置漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%AB%A0%E7%AE%A1%E5%AE%B6-%E5%8D%B0%E7%AB%A0%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E7%AB%A0%E7%AE%A1%E5%AE%B6updatePwd.htm%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E.md
智慧校园(安校易)管理系统FileUpAd.aspx任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E6%85%A7%E6%A0%A1%E5%9B%AD(%E5%AE%89%E6%A0%A1%E6%98%93)%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%99%BA%E6%85%A7%E6%A0%A1%E5%9B%AD(%E5%AE%89%E6%A0%A1%E6%98%93)%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FFileUpAd.aspx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友crm客户关系管理help.php存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8Bcrm%E5%AE%A2%E6%88%B7%E5%85%B3%E7%B3%BB%E7%AE%A1%E7%90%86help.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
方天云智慧平台系统setImg.ashx存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B9%E5%A4%A9%E4%BA%91%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0%E7%B3%BB%E7%BB%9F/%E6%96%B9%E5%A4%A9%E4%BA%91%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0%E7%B3%BB%E7%BB%9FsetImg.ashx%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
乐享智能运维管理平台getToken存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B9%90%E4%BA%AB%E6%99%BA%E8%83%BD%E8%BF%90%E7%BB%B4%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E4%B9%90%E4%BA%AB%E6%99%BA%E8%83%BD%E8%BF%90%E7%BB%B4%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0getToken%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
ZoneMinder系统sort接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/ZoneMinder/ZoneMinder%E7%B3%BB%E7%BB%9Fsort%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
WookTeam轻量级的团队在线协作系统接口searchinfo存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WookTeam%E8%BD%BB%E9%87%8F%E7%BA%A7%E7%9A%84%E5%9B%A2%E9%98%9F%E5%9C%A8%E7%BA%BF%E5%8D%8F%E4%BD%9C%E7%B3%BB%E7%BB%9F/WookTeam%E8%BD%BB%E9%87%8F%E7%BA%A7%E7%9A%84%E5%9B%A2%E9%98%9F%E5%9C%A8%E7%BA%BF%E5%8D%8F%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3searchinfo%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
DeDecms接口sys_verifies.php存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/dede/DeDecms%E6%8E%A5%E5%8F%A3sys_verifies.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
用友U8-CRM系统接口attrlist存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3attrlist%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
红海云eHR系统pc.mob存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BA%A2%E6%B5%B7%E4%BA%91eHR/%E7%BA%A2%E6%B5%B7%E4%BA%91eHR%E7%B3%BB%E7%BB%9Fpc.mob%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC系统FileManager接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E7%B3%BB%E7%BB%9FFileManager%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
杭州三一谦成科技车辆监控服务平台接口platformSql存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9D%AD%E5%B7%9E%E4%B8%89%E4%B8%80%E8%B0%A6%E6%88%90%E7%A7%91%E6%8A%80%E8%BD%A6%E8%BE%86%E7%9B%91%E6%8E%A7%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0/%E6%9D%AD%E5%B7%9E%E4%B8%89%E4%B8%80%E8%B0%A6%E6%88%90%E7%A7%91%E6%8A%80%E8%BD%A6%E8%BE%86%E7%9B%91%E6%8E%A7%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0%E6%8E%A5%E5%8F%A3platformSql%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统logincontroller接口存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Flogincontroller%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统getAllUsers身份绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FgetAllUsers%E8%BA%AB%E4%BB%BD%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
用友U8-CRM系统接口reservationcomplete.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3reservationcomplete.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-CRM接口exportdictionary.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E6%8E%A5%E5%8F%A3exportdictionary.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
方正全媒体采编系统存在syn.do信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B9%E6%AD%A3%E5%85%A8%E5%AA%92%E4%BD%93/%E6%96%B9%E6%AD%A3%E5%85%A8%E5%AA%92%E4%BD%93%E9%87%87%E7%BC%96%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8syn.do%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统LogDownLoadService存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FLogDownLoadService%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC接口download存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E6%8E%A5%E5%8F%A3download%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
科荣AIO管理系统endTime参数存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E8%8D%A3AIO/%E7%A7%91%E8%8D%A3AIO%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FendTime%E5%8F%82%E6%95%B0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
智互联(深圳)科技有限公司SRM智联云采系统download存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E4%BA%92%E8%81%94%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%99%BA%E4%BA%92%E8%81%94(%E6%B7%B1%E5%9C%B3)%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8SRM%E6%99%BA%E8%81%94%E4%BA%91%E9%87%87%E7%B3%BB%E7%BB%9Fdownload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
东华医疗协同办公系统templateFile存在任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%9C%E5%8D%8E%E5%8C%BB%E7%96%97%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E7%B3%BB%E7%BB%9F/%E4%B8%9C%E5%8D%8E%E5%8C%BB%E7%96%97%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E7%B3%BB%E7%BB%9FtemplateFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
智能停车管理系统ToLogin存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E8%83%BD%E5%81%9C%E8%BD%A6%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%99%BA%E8%83%BD%E5%81%9C%E8%BD%A6%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FToLogin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
AVCON-系统管理平台download.action存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/AVCON/AVCON-%E7%B3%BB%E7%BB%9F%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0download.action%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
AVCON-网络视频服务系统editusercommit.php存在任意用户重置密码漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/AVCON/AVCON-%E7%BD%91%E7%BB%9C%E8%A7%86%E9%A2%91%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Feditusercommit.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E9%87%8D%E7%BD%AE%E5%AF%86%E7%A0%81%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240813-新增漏洞
用友U8-Cloud系统BusinessRefAction存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E7%B3%BB%E7%BB%9FBusinessRefAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微e-office10系统schema_mysql.sql敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-office10%E7%B3%BB%E7%BB%9Fschema_mysql.sql%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
某短视频直播打赏系统任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9F%90%E7%9F%AD%E8%A7%86%E9%A2%91%E7%9B%B4%E6%92%AD%E6%89%93%E8%B5%8F%E7%B3%BB%E7%BB%9F/%E6%9F%90%E7%9F%AD%E8%A7%86%E9%A2%91%E7%9B%B4%E6%92%AD%E6%89%93%E8%B5%8F%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
某短视频直播打赏系统后台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9F%90%E7%9F%AD%E8%A7%86%E9%A2%91%E7%9B%B4%E6%92%AD%E6%89%93%E8%B5%8F%E7%B3%BB%E7%BB%9F/%E6%9F%90%E7%9F%AD%E8%A7%86%E9%A2%91%E7%9B%B4%E6%92%AD%E6%89%93%E8%B5%8F%E7%B3%BB%E7%BB%9F%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
章管家listUploadIntelligent接口存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%AB%A0%E7%AE%A1%E5%AE%B6-%E5%8D%B0%E7%AB%A0%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E7%AB%A0%E7%AE%A1%E5%AE%B6listUploadIntelligent%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
中成科信票务管理系统SeatMapHandler.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1%E7%A5%A8%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1%E7%A5%A8%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSeatMapHandler.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
中成科信票务管理系统TicketManager.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1%E7%A5%A8%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1%E7%A5%A8%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FTicketManager.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
喰星云-数字化餐饮服务系统not_finish.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%96%B0%E6%98%9F%E4%BA%91-%E6%95%B0%E5%AD%97%E5%8C%96%E9%A4%90%E9%A5%AE%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9F/%E5%96%B0%E6%98%9F%E4%BA%91-%E6%95%B0%E5%AD%97%E5%8C%96%E9%A4%90%E9%A5%AE%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Fnot_finish.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
喰星云-数字化餐饮服务系统stock.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%96%B0%E6%98%9F%E4%BA%91-%E6%95%B0%E5%AD%97%E5%8C%96%E9%A4%90%E9%A5%AE%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9F/%E5%96%B0%E6%98%9F%E4%BA%91-%E6%95%B0%E5%AD%97%E5%8C%96%E9%A4%90%E9%A5%AE%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Fstock.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
喰星云-数字化餐饮服务系统shelflife.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%96%B0%E6%98%9F%E4%BA%91-%E6%95%B0%E5%AD%97%E5%8C%96%E9%A4%90%E9%A5%AE%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9F/%E5%96%B0%E6%98%9F%E4%BA%91-%E6%95%B0%E5%AD%97%E5%8C%96%E9%A4%90%E9%A5%AE%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Fshelflife.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
安美数字酒店宽带运营系统weather.php任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9Fweather.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
赛蓝企业管理系统GetImportDetailJson存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetImportDetailJson%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金斗云HKMP智慧商业软件queryPrintTemplate存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E6%96%97%E4%BA%91/%E9%87%91%E6%96%97%E4%BA%91HKMP%E6%99%BA%E6%85%A7%E5%95%86%E4%B8%9A%E8%BD%AF%E4%BB%B6queryPrintTemplate%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统SecretKeyService存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSecretKeyService%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
润申信息科技ERP系统CommentStandardHandler.ashx接口存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B6%A6%E7%94%B3%E4%BF%A1%E6%81%AF%E7%A7%91%E6%8A%80ERP%E7%B3%BB%E7%BB%9F/%E6%B6%A6%E7%94%B3%E4%BF%A1%E6%81%AF%E7%A7%91%E6%8A%80ERP%E7%B3%BB%E7%BB%9FCommentStandardHandler.ashx%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
润申信息科技ERP系统DefaultHandler.ashx接口存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B6%A6%E7%94%B3%E4%BF%A1%E6%81%AF%E7%A7%91%E6%8A%80ERP%E7%B3%BB%E7%BB%9F/%E6%B6%A6%E7%94%B3%E4%BF%A1%E6%81%AF%E7%A7%91%E6%8A%80ERP%E7%B3%BB%E7%BB%9FDefaultHandler.ashx%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240810-新增漏洞
H3C-iMC智能管理中心存在远程代码执行漏洞(XVE-2024-4567)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/H3C/H3C-iMC%E6%99%BA%E8%83%BD%E7%AE%A1%E7%90%86%E4%B8%AD%E5%BF%83%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(XVE-2024-4567).md
H3C-iMC智能管理中心autoDeploy.xhtml存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/H3C/H3C-iMC%E6%99%BA%E8%83%BD%E7%AE%A1%E7%90%86%E4%B8%AD%E5%BF%83autoDeploy.xhtml%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
同享人力资源管理系统hdlUploadFile.ashx存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%90%8C%E4%BA%AB%E4%BA%BA%E5%8A%9B%E7%AE%A1%E7%90%86%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%90%8C%E4%BA%AB%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FhdlUploadFile.ashx%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统DecryptionApp存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDecryptionApp%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统docRenewApp存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FdocRenewApp%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统SecureUsbConnection存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSecureUsbConnection%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
IP网络广播服务平台upload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/IP%E7%BD%91%E7%BB%9C%E5%B9%BF%E6%92%AD%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0/IP%E7%BD%91%E7%BB%9C%E5%B9%BF%E6%92%AD%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0upload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
ALR-F800存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/ALR-F800%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Atmail存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Atmail/Atmail%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
ELADMIN后台管理系统存在SSRF漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/ELADMIN/ELADMIN%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8SSRF%E6%BC%8F%E6%B4%9E.md
JeecgBoot系统AviatorScript表达式注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JeecgBoot/JeecgBoot%E7%B3%BB%E7%BB%9FAviatorScript%E8%A1%A8%E8%BE%BE%E5%BC%8F%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Journyx存在未经身份验证的XML外部实体注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Journyx/Journyx%E5%AD%98%E5%9C%A8%E6%9C%AA%E7%BB%8F%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%9A%84XML%E5%A4%96%E9%83%A8%E5%AE%9E%E4%BD%93%E6%B3%A8%E5%85%A5.md
Mtab书签导航程序存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Mtab%E4%B9%A6%E7%AD%BE%E5%AF%BC%E8%88%AA%E7%A8%8B%E5%BA%8F/Mtab%E4%B9%A6%E7%AD%BE%E5%AF%BC%E8%88%AA%E7%A8%8B%E5%BA%8F%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
驰骋BPM系统存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A9%B0%E9%AA%8BBPM/%E9%A9%B0%E9%AA%8BBPM%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统CDGAuthoriseTempletService1存在SQL注入漏洞(XVE-2024-19611)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FCDGAuthoriseTempletService1%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(XVE-2024-19611).md
赛蓝企业管理系统SubmitUploadify存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSubmitUploadify%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友NC系统接口link存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3link%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华DSS系统group_saveGroup存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%E7%B3%BB%E7%BB%9Fgroup_saveGroup%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
H3C-SecPath下一代防火墙local_cert_delete_both存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/H3C/H3C-SecPath%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99local_cert_delete_both%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
科讯一卡通管理系统DataService.asmx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E8%AE%AF%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0/%E7%A7%91%E8%AE%AF%E4%B8%80%E5%8D%A1%E9%80%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDataService.asmx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
三汇网关管理软件debug.php远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%89%E6%B1%87%E7%BD%91%E5%85%B3%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6/%E4%B8%89%E6%B1%87%E7%BD%91%E5%85%B3%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6debug.php%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
万户ezOFFICE系统graph_include.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7ezOFFICE%E7%B3%BB%E7%BB%9Fgraph_include.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240807-新增漏洞
蓝凌EIS智慧协同平台UniformEntry.aspx存在SQL注入漏洞(XVE-2024-19181)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEIS%E6%99%BA%E6%85%A7%E5%8D%8F%E5%90%8C%E5%B9%B3%E5%8F%B0UniformEntry.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(XVE-2024-19181).md
世邦通信SPON-IP网络对讲广播系统addmediadata.php任意文件上传漏洞(XVE-2024-19281)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%96%E9%82%A6%E9%80%9A%E4%BF%A1/%E4%B8%96%E9%82%A6%E9%80%9A%E4%BF%A1SPON-IP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Faddmediadata.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E(XVE-2024-19281).md
泛微云桥(e-Bridge)系统接口addResume存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AE%E4%BA%91%E6%A1%A5(e-Bridge)%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3addResume%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Apache-OFBiz授权不当致代码执行漏洞(CVE-2024-38856)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-OFBiz%E6%8E%88%E6%9D%83%E4%B8%8D%E5%BD%93%E8%87%B4%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-38856).md
易捷OA协同办公软件ShowPic接口存在任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E6%8D%B7OA/%E6%98%93%E6%8D%B7OA%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E8%BD%AF%E4%BB%B6ShowPic%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
SpringBlade系统usual接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SpringBlade/SpringBlade%E7%B3%BB%E7%BB%9Fusual%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
宏景eHR系统ajaxService接口处存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFeHR%E7%B3%BB%E7%BB%9FajaxService%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
满客宝智慧食堂系统selectUserByOrgId存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%BB%A1%E5%AE%A2%E5%AE%9D%E6%99%BA%E6%85%A7%E9%A3%9F%E5%A0%82%E7%B3%BB%E7%BB%9F/%E6%BB%A1%E5%AE%A2%E5%AE%9D%E6%99%BA%E6%85%A7%E9%A3%9F%E5%A0%82%E7%B3%BB%E7%BB%9FselectUserByOrgId%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
蓝凌EKP系统dataxml.tmpl存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEKP%E7%B3%BB%E7%BB%9Fdataxml.tmpl%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
云时空社会化商业ERP系统online存在身份认证绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%91%E6%97%B6%E7%A9%BA/%E4%BA%91%E6%97%B6%E7%A9%BA%E7%A4%BE%E4%BC%9A%E5%8C%96%E5%95%86%E4%B8%9AERP%E7%B3%BB%E7%BB%9Fonline%E5%AD%98%E5%9C%A8%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
PerkinElmer-ProcessPlus存在文件读取漏洞(CVE-2024-6911)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PerkinElmer/PerkinElmer-ProcessPlus%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-6911).md
赛蓝企业管理系统GetCssFile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetCssFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Calibre任意文件读取漏洞(CVE-2024-6781)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Calibre/Calibre%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-6781).md
Calibre远程代码执行漏洞(CVE-2024-6782)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Calibre/Calibre%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-6782).md
https://github.com/eeeeeeeeee-code/POC#20240804-新增漏洞
同享人力管理管理平台UploadHandler存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%90%8C%E4%BA%AB%E4%BA%BA%E5%8A%9B%E7%AE%A1%E7%90%86%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%90%8C%E4%BA%AB%E4%BA%BA%E5%8A%9B%E7%AE%A1%E7%90%86%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0UploadHandler%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
jeecg-boot系统接口jmLink权限绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JeecgBoot/jeecg-boot%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3jmLink%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
章管家前台任意文件上传漏洞(XVE-2024-19042)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%AB%A0%E7%AE%A1%E5%AE%B6-%E5%8D%B0%E7%AB%A0%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E7%AB%A0%E7%AE%A1%E5%AE%B6%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E(XVE-2024-19042).md
灵动业务架构平台(LiveBOS)系统UploadFile.do接口文件上传漏洞(XVE-2023-21708)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/LiveBOS/%E7%81%B5%E5%8A%A8%E4%B8%9A%E5%8A%A1%E6%9E%B6%E6%9E%84%E5%B9%B3%E5%8F%B0(LiveBOS)%E7%B3%BB%E7%BB%9FUploadFile.do%E6%8E%A5%E5%8F%A3%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E(XVE-2023-21708).md
灵动业务架构平台(LiveBOS)系统UploadImage接口文件上传漏洞(XVE-2024-18835)https://github.com/eeeeeeeeee-code/POC/blob/main/LiveBOS/%E7%81%B5%E5%8A%A8%E4%B8%9A%E5%8A%A1%E6%9E%B6%E6%9E%84%E5%B9%B3%E5%8F%B0(LiveBOS)%E7%B3%BB%E7%BB%9FUploadImage.do%E6%8E%A5%E5%8F%A3%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E(XVE-2024-18835).md
PEPM系统Cookie存在远程代码执行漏洞(XVE-2024-16919)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PEPM%E7%B3%BB%E7%BB%9F/PEPM%E7%B3%BB%E7%BB%9FCookie%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(XVE-2024-16919).md
用友NC系统complainjudge接口SQL注入漏洞(XVE-2024-19043)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E7%B3%BB%E7%BB%9Fcomplainjudge%E6%8E%A5%E5%8F%A3SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(XVE-2024-19043).md
群杰印章物联网管理平台rest密码重置漏洞(XVE-2024-18945)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BE%A4%E6%9D%B0%E5%8D%B0%E7%AB%A0%E7%89%A9%E8%81%94%E7%BD%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E7%BE%A4%E6%9D%B0%E5%8D%B0%E7%AB%A0%E7%89%A9%E8%81%94%E7%BD%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0rest%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E(XVE-2024-18945).md
网神SecGate3600未授权添加用户漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E7%A5%9E/%E7%BD%91%E7%A5%9ESecGate3600%E6%9C%AA%E6%8E%88%E6%9D%83%E6%B7%BB%E5%8A%A0%E7%94%A8%E6%88%B7%E6%BC%8F%E6%B4%9E.md
海康威视综合安防管理平台uploadAllPackage任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0uploadAllPackage%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
信呼OA系统index存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BF%A1%E5%91%BCOA/%E4%BF%A1%E5%91%BCOA%E7%B3%BB%E7%BB%9Findex%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微E-Cology系统接口deleteRequestInfoByXml存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Cology%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3deleteRequestInfoByXml%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台SESSION伪造漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E5%A4%A9%E6%98%9F/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0SESSION%E4%BC%AA%E9%80%A0%E6%BC%8F%E6%B4%9E.md
小狐狸Chatgpt付费创作系统存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B0%8F%E7%8B%90%E7%8B%B8Chatgpt%E4%BB%98%E8%B4%B9%E5%88%9B%E4%BD%9C%E7%B3%BB%E7%BB%9F/%E5%B0%8F%E7%8B%90%E7%8B%B8Chatgpt%E4%BB%98%E8%B4%B9%E5%88%9B%E4%BD%9C%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240801-新增漏洞
海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0licenseExpire%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Panalog/%E5%8C%97%E4%BA%AC%E6%B4%BE%E7%BD%91%E8%BD%AF%E4%BB%B6%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Panabit-Panalog%E5%A4%A7%E6%95%B0%E6%8D%AE%E6%97%A5%E5%BF%97%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fsprog_upstatus.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Quicklancer系统接口listing存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Quicklancer/Quicklancer%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3listing%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
KubePi存在JWT验证绕过漏洞(CVE-2024-36111)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/KubePi/KubePi%E5%AD%98%E5%9C%A8JWT%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(CVE-2024-36111).md
Tenda-FH1201存在命令注入漏洞(CVE-2024-41473)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Tenda/Tenda-FH1201%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-41473).md
Tenda-FH1201存在命令注入漏洞(CVE-2024-41468)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Tenda/Tenda-FH1201%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-41468).md
海康威视综合安防管理平台clusters接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0clusters%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
广联达OA系统接口ConfigService.asmx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E8%81%94%E8%BE%BEOA/%E5%B9%BF%E8%81%94%E8%BE%BEOA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3ConfigService.asmx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
广联达OA系统GetSSOStamp接口存在任意用户登录https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E8%81%94%E8%BE%BEOA/%E5%B9%BF%E8%81%94%E8%BE%BEOA%E7%B3%BB%E7%BB%9FGetSSOStamp%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95.md
方天云智慧平台系统Upload.ashx存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B9%E5%A4%A9%E4%BA%91%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0%E7%B3%BB%E7%BB%9F/%E6%96%B9%E5%A4%A9%E4%BA%91%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0%E7%B3%BB%E7%BB%9FUpload.ashx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友NC-Cloud系统queryStaffByName存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-Cloud%E7%B3%BB%E7%BB%9FqueryStaffByName%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-Cloud%E7%B3%BB%E7%BB%9FqueryPsnInfo%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
契约锁电子签章平台ukeysign存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A5%91%E7%BA%A6%E9%94%81%E7%94%B5%E5%AD%90%E7%AD%BE%E7%AB%A0%E7%B3%BB%E7%BB%9F/%E5%A5%91%E7%BA%A6%E9%94%81%E7%94%B5%E5%AD%90%E7%AD%BE%E7%AB%A0%E5%B9%B3%E5%8F%B0ukeysign%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
AspCMS系统commentList.asp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/AspCMS/AspCMS%E7%B3%BB%E7%BB%9FcommentList.asp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%BB%A1%E5%AE%A2%E5%AE%9D%E6%99%BA%E6%85%A7%E9%A3%9F%E5%A0%82%E7%B3%BB%E7%BB%9F/%E6%BB%A1%E5%AE%A2%E5%AE%9D%E6%99%BA%E6%85%A7%E9%A3%9F%E5%A0%82%E7%B3%BB%E7%BB%9FdownloadWebFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(XVE-2024-18926).md
万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7ezOFFICE%E5%8D%8F%E5%90%8C%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0getAutoCode%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(XVE-2024-18749).md
深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B7%B1%E6%BE%9C%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B7%B1%E6%BE%9C%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fbind-ip%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(XVE-2024-18750).md
任我行协同CRM系统UploadFile存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BB%BB%E6%88%91%E8%A1%8C/%E4%BB%BB%E6%88%91%E8%A1%8C%E5%8D%8F%E5%90%8CCRM%E7%B3%BB%E7%BB%9FUploadFile%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B9%E5%A4%A9%E4%BA%91%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0%E7%B3%BB%E7%BB%9F/%E6%96%B9%E5%A4%A9%E4%BA%91%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0%E7%B3%BB%E7%BB%9FGetCustomerLinkman%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8Bu8-cloud%E7%B3%BB%E7%BB%9FESBInvokerServlet%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
3C环境自动监测监控系统ReadLog文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%8E%AF%E5%A2%83%E8%87%AA%E5%8A%A8%E7%9B%91%E6%B5%8B%E7%9B%91%E6%8E%A7%E7%B3%BB%E7%BB%9F/3C%E7%8E%AF%E5%A2%83%E8%87%AA%E5%8A%A8%E7%9B%91%E6%B5%8B%E7%9B%91%E6%8E%A7%E7%B3%BB%E7%BB%9FReadLog%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
ClusterControl存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/ClusterControl/ClusterControl%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Cology%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3ReceiveCCRequestByXml%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
致远互联FE协作办公平台apprvaddNew存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9C%E4%BA%92%E8%81%94FE%E5%8D%8F%E4%BD%9C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0apprvaddNew%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FAuthToken%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E8%B4%A6%E5%8F%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240730-新增漏洞
RAISECOM网关设备list_base_config.php存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/RAISECOM%E7%BD%91%E5%85%B3%E8%AE%BE%E5%A4%87/RAISECOM%E7%BD%91%E5%85%B3%E8%AE%BE%E5%A4%87list_base_config.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
用友时空KSOA系统接口PreviewKPQT.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E6%97%B6%E7%A9%BAKSOA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3PreviewKPQT.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友时空KSOA系统接口PrintZP.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E6%97%B6%E7%A9%BAKSOA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3PrintZP.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友时空KSOA系统接口PrintZPYG.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E6%97%B6%E7%A9%BAKSOA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3PrintZPYG.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友时空KSOA系统接口PrintZPFB.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E6%97%B6%E7%A9%BAKSOA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3PrintZPFB.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友时空KSOA系统接口PrintZPZP.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E6%97%B6%E7%A9%BAKSOA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3PrintZPZP.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友时空KSOA系统接口fillKP.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E6%97%B6%E7%A9%BAKSOA%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3fillKP.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
拓尔思TRS媒资管理系统uploadThumb存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%8B%93%E5%B0%94%E6%80%9DTRS%E5%AA%92%E8%B5%84%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%8B%93%E5%B0%94%E6%80%9DTRS%E5%AA%92%E8%B5%84%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FuploadThumb%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
方天云智慧平台系统GetCompanyItem存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B9%E5%A4%A9%E4%BA%91%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0%E7%B3%BB%E7%BB%9F/%E6%96%B9%E5%A4%A9%E4%BA%91%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0%E7%B3%BB%E7%BB%9FGetCompanyItem%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友畅捷通-TPlus系统接口ajaxpro存在ssrf漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%95%85%E6%8D%B7%E9%80%9A-TPlus%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3ajaxpro%E5%AD%98%E5%9C%A8ssrf%E6%BC%8F%E6%B4%9E.md
泛微e-cology接口HrmService前台SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-cology%E6%8E%A5%E5%8F%A3HrmService%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
杭州雄威餐厅数字化综合管理平台存在存在绕过认证导致任意密码重置漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9D%AD%E5%B7%9E%E9%9B%84%E5%A8%81%E9%A4%90%E5%8E%85%E6%95%B0%E5%AD%97%E5%8C%96%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%9D%AD%E5%B7%9E%E9%9B%84%E5%A8%81%E9%A4%90%E5%8E%85%E6%95%B0%E5%AD%97%E5%8C%96%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E5%AD%98%E5%9C%A8%E7%BB%95%E8%BF%87%E8%AE%A4%E8%AF%81%E5%AF%BC%E8%87%B4%E4%BB%BB%E6%84%8F%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E.md
用友U9系统DoQuery接口存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU9%E7%B3%BB%E7%BB%9FDoQuery%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
泛微ecology系统setup接口存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEecology%E7%B3%BB%E7%BB%9Fsetup%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
SpringBlade系统menu接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SpringBlade/SpringBlade%E7%B3%BB%E7%BB%9Fmenu%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
JeecgBoot反射型XSS漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JeecgBoot/JeecgBoot%E5%8F%8D%E5%B0%84%E5%9E%8BXSS%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240727-新增漏洞
金和OA-C6-GeneralXmlhttpPage.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA-C6-GeneralXmlhttpPage.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
汇智ERP接口filehandle.aspx存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B1%87%E6%99%BAERP/%E6%B1%87%E6%99%BAERP%E6%8E%A5%E5%8F%A3filehandle.aspx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
赛蓝企业管理系统GetJSFile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetJSFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
赛蓝企业管理系统ReadTxtLog存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FReadTxtLog%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
通达OAV11.10接口login.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOAV11.10%E6%8E%A5%E5%8F%A3login.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微e-cology9接口WorkPlanService前台SQL注入漏洞(XVE-2024-18112)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-cology9%E6%8E%A5%E5%8F%A3WorkPlanService%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(XVE-2024-18112).md
宏脉医美行业管理系统DownLoadServerFile任意文件读取下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E8%84%89%E5%8C%BB%E7%BE%8E%E8%A1%8C%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%AE%8F%E8%84%89%E5%8C%BB%E7%BE%8E%E8%A1%8C%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDownLoadServerFile%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
Sharp多功能打印机未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Sharp/Sharp%E5%A4%9A%E5%8A%9F%E8%83%BD%E6%89%93%E5%8D%B0%E6%9C%BA%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
天问物业ERP系统ContractDownLoad存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9F/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9FContractDownLoad%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
金慧综合管理信息系统LoginBegin.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E6%85%A7%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9F/%E9%87%91%E6%85%A7%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9FLoginBegin.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
红海云eHR系统kgFile.mob存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BA%A2%E6%B5%B7%E4%BA%91eHR/%E7%BA%A2%E6%B5%B7%E4%BA%91eHR%E7%B3%BB%E7%BB%9FkgFile.mob%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
华天动力OA系统downloadWpsFile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E5%A4%A9%E5%8A%A8%E5%8A%9B/%E5%8D%8E%E5%A4%A9%E5%8A%A8%E5%8A%9BOA%E7%B3%BB%E7%BB%9FdownloadWpsFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
邦永PM2项目管理平台系统ExcelIn.aspx存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%82%A6%E6%B0%B8PM2%E9%A1%B9%E7%9B%AE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E9%82%A6%E6%B0%B8PM2%E9%A1%B9%E7%9B%AE%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E7%B3%BB%E7%BB%9FExcelIn.aspx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友NC系统接口UserAuthenticationServlet存在反序列化RCE漏洞(XVE-2024-18302)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3UserAuthenticationServlet%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96RCE%E6%BC%8F%E6%B4%9E(XVE-2024-18302).md
用友NC及U8cloud系统接口LoggingConfigServlet存在反序列化漏洞(XVE-2024-18151)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E5%8F%8AU8cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3LoggingConfigServlet%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E(XVE-2024-18151).md
金万维-云联应用系统接入平台GNRemote.dll前台存在RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E4%B8%87%E7%BB%B4-%E4%BA%91%E8%81%94%E5%BA%94%E7%94%A8%E7%B3%BB%E7%BB%9F/%E9%87%91%E4%B8%87%E7%BB%B4-%E4%BA%91%E8%81%94%E5%BA%94%E7%94%A8%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%85%A5%E5%B9%B3%E5%8F%B0GNRemote.dll%E5%89%8D%E5%8F%B0%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md
天问物业ERP系统OwnerVacantDownLoad存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9F/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9FOwnerVacantDownLoad%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
天问物业ERP系统VacantDiscountDownLoad存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9F/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9FVacantDiscountDownLoad%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
浪潮云财务系统xtdysrv.asmx存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%AA%E6%BD%AE%E4%BA%91/%E6%B5%AA%E6%BD%AE%E4%BA%91%E8%B4%A2%E5%8A%A1%E7%B3%BB%E7%BB%9Fxtdysrv.asmx%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
瑞斯康达-多业务智能网关-RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%91%9E%E6%96%AF%E5%BA%B7%E8%BE%BE/%E7%91%9E%E6%96%AF%E5%BA%B7%E8%BE%BE-%E5%A4%9A%E4%B8%9A%E5%8A%A1%E6%99%BA%E8%83%BD%E7%BD%91%E5%85%B3-RCE.md
超级猫签名APP分发平台前台存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B6%85%E7%BA%A7%E7%8C%AB%E7%AD%BE%E5%90%8DAPP%E5%88%86%E5%8F%91%E5%B9%B3%E5%8F%B0/%E8%B6%85%E7%BA%A7%E7%8C%AB%E7%AD%BE%E5%90%8DAPP%E5%88%86%E5%8F%91%E5%B9%B3%E5%8F%B0%E5%89%8D%E5%8F%B0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
超级猫签名APP分发平台前台远程文件写入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B6%85%E7%BA%A7%E7%8C%AB%E7%AD%BE%E5%90%8DAPP%E5%88%86%E5%8F%91%E5%B9%B3%E5%8F%B0/%E8%B6%85%E7%BA%A7%E7%8C%AB%E7%AD%BE%E5%90%8DAPP%E5%88%86%E5%8F%91%E5%B9%B3%E5%8F%B0%E5%89%8D%E5%8F%B0%E8%BF%9C%E7%A8%8B%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E.md
T18-1TOTOLINK-A6000R-远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/T18-1TOTOLINK-A6000R-%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240724-新增漏洞
通天星CMSV6车载视频监控平台disable存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E5%A4%A9%E6%98%9F/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0disable%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
创客13星零售商城系统前台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%88%9B%E5%AE%A213%E6%98%9F%E9%9B%B6%E5%94%AE%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9F/%E5%88%9B%E5%AE%A213%E6%98%9F%E9%9B%B6%E5%94%AE%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9F%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
建文工程管理系统BusinessManger.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BB%BA%E6%96%87%E5%B7%A5%E7%A8%8B%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%BB%BA%E6%96%87%E5%B7%A5%E7%A8%8B%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FBusinessManger.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
天问物业ERP系统AreaAvatarDownLoad.aspx任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9F/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9FAreaAvatarDownLoad.aspx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
致远OA系统constDef接口存在代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA%E7%B3%BB%E7%BB%9FconstDef%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
启明星辰天玥网络安全审计系统SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%90%AF%E6%98%8E%E6%98%9F%E8%BE%B0/%E5%90%AF%E6%98%8E%E6%98%9F%E8%BE%B0%E5%A4%A9%E7%8E%A5%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9FSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Bazarr任意文件读取(CVE-2024-40348)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Bazarr/Bazarr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96(CVE-2024-40348).md
浪潮云财务系统bizintegrationwebservice.asmx存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%AA%E6%BD%AE%E4%BA%91/%E6%B5%AA%E6%BD%AE%E4%BA%91%E8%B4%A2%E5%8A%A1%E7%B3%BB%E7%BB%9Fbizintegrationwebservice.asmx%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
建文工程管理系统desktop.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BB%BA%E6%96%87%E5%B7%A5%E7%A8%8B%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%BB%BA%E6%96%87%E5%B7%A5%E7%A8%8B%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdesktop.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
帆软系统ReportServer存在SQL注入漏洞导致RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B8%86%E8%BD%AF%E6%8A%A5%E8%A1%A8/%E5%B8%86%E8%BD%AF%E7%B3%BB%E7%BB%9FReportServer%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%E5%AF%BC%E8%87%B4RCE.md
WVP视频平台(国标28181)未授权SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WVP%E8%A7%86%E9%A2%91%E5%B9%B3%E5%8F%B0/WVP%E8%A7%86%E9%A2%91%E5%B9%B3%E5%8F%B0(%E5%9B%BD%E6%A0%8728181)%E6%9C%AA%E6%8E%88%E6%9D%83SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC系统querygoodsgridbycode接口code参数存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E7%B3%BB%E7%BB%9Fquerygoodsgridbycode%E6%8E%A5%E5%8F%A3code%E5%8F%82%E6%95%B0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
锐捷RG-NBS2026G-P交换机WEB管理ping.htm未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-NBS2026G-P%E4%BA%A4%E6%8D%A2%E6%9C%BAWEB%E7%AE%A1%E7%90%86ping.htm%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
华磊科技物流modifyInsurance存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E7%A3%8A%E7%A7%91%E6%8A%80%E7%89%A9%E6%B5%81/%E5%8D%8E%E7%A3%8A%E7%A7%91%E6%8A%80%E7%89%A9%E6%B5%81modifyInsurance%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
华磊科技物流getOrderTrackingNumber存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E7%A3%8A%E7%A7%91%E6%8A%80%E7%89%A9%E6%B5%81/%E5%8D%8E%E7%A3%8A%E7%A7%91%E6%8A%80%E7%89%A9%E6%B5%81getOrderTrackingNumber%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微E-Mobile系统接口installOperate.do存在SSRF漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Mobile%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3installOperate.do%E5%AD%98%E5%9C%A8SSRF%E6%BC%8F%E6%B4%9E.md
润乾报表dataSphereServlet接口存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8dataSphereServlet%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
联软安渡系统接口queryLinklnfo存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%81%94%E8%BD%AF/%E8%81%94%E8%BD%AF%E5%AE%89%E6%B8%A1%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3queryLinklnfo%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
科讯一卡通管理系统get_kq_tj_today存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E8%AE%AF%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0/%E7%A7%91%E8%AE%AF%E4%B8%80%E5%8D%A1%E9%80%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fget_kq_tj_today%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
科讯一卡通管理系统dormitoryHealthRanking存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E8%AE%AF%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0/%E7%A7%91%E8%AE%AF%E4%B8%80%E5%8D%A1%E9%80%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FdormitoryHealthRanking%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Apache-CloudStack中的SAML身份验证漏洞(CVE-2024-41107)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-CloudStack%E4%B8%AD%E7%9A%84SAML%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E6%BC%8F%E6%B4%9E(CVE-2024-41107).md
飞讯云MyImportData前台SQL注入(XVE-2024-18113)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E8%AE%AF%E4%BA%91/%E9%A3%9E%E8%AE%AF%E4%BA%91MyImportData%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5(XVE-2024-18113).md
资管云comfileup.php前台文件上传漏洞(XVE-2024-18154)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%84%E7%AE%A1%E4%BA%91/%E8%B5%84%E7%AE%A1%E4%BA%91comfileup.php%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E(XVE-2024-18154).md
https://github.com/eeeeeeeeee-code/POC#20240720-新增漏洞
WebLogic远程代码执行漏洞(CVE-2024-21006)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Weblogic/WebLogic%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-21006).md
广联达OA接口ArchiveWebService存在XML实体注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E8%81%94%E8%BE%BEOA/%E5%B9%BF%E8%81%94%E8%BE%BEOA%E6%8E%A5%E5%8F%A3ArchiveWebService%E5%AD%98%E5%9C%A8XML%E5%AE%9E%E4%BD%93%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统NetSecConfigAjax接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FNetSecConfigAjax%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统NoticeAjax接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FNoticeAjax%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
云课网校系统文件上传漏洞(DVB-2024-6594)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%91%E8%AF%BE%E7%BD%91%E6%A0%A1%E7%B3%BB%E7%BB%9F/%E4%BA%91%E8%AF%BE%E7%BD%91%E6%A0%A1%E7%B3%BB%E7%BB%9F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E(DVB-2024-6594).md
全息AI网络运维平台ajax_cloud_router_config.php存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%A8%E6%81%AFAI%E7%BD%91%E7%BB%9C%E8%BF%90%E7%BB%B4%E5%B9%B3%E5%8F%B0/%E5%85%A8%E6%81%AFAI%E7%BD%91%E7%BB%9C%E8%BF%90%E7%BB%B4%E5%B9%B3%E5%8F%B0ajax_cloud_router_config.php%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
1Panel面板最新前台RCE漏洞(CVE-2024-39911)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/1Panel/1Panel%E9%9D%A2%E6%9D%BF%E6%9C%80%E6%96%B0%E5%89%8D%E5%8F%B0RCE%E6%BC%8F%E6%B4%9E(CVE-2024-39911).md
用友CRM客户关系管理系统import.php存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BCRM%E5%AE%A2%E6%88%B7%E5%85%B3%E7%B3%BB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fimport.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
致远互联AnalyticsCloud分析云存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9C%E4%BA%92%E8%81%94AnalyticsCloud%E5%88%86%E6%9E%90%E4%BA%91%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
海洋CMS后台admin_smtp.php存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E6%B4%8Bcms/%E6%B5%B7%E6%B4%8BCMS%E5%90%8E%E5%8F%B0admin_smtp.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
DedeCMSV5.7.114后台article_template_rand.php存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/dede/DedeCMSV5.7.114%E5%90%8E%E5%8F%B0article_template_rand.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
DedeCMSV5.7.114后台sys_verizes.php存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/dede/DedeCMSV5.7.114%E5%90%8E%E5%8F%B0sys_verizes.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
fogproject系统接口export.php存在远程命令执行漏洞(CVE-2024-39914)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/fogproject/fogproject%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3export.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-39914).md
LiveNVR流媒体服务软件接口存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/LiveNVR%E6%B5%81%E5%AA%92%E4%BD%93%E6%9C%8D%E5%8A%A1%E8%BD%AF%E4%BB%B6/LiveNVR%E6%B5%81%E5%AA%92%E4%BD%93%E6%9C%8D%E5%8A%A1%E8%BD%AF%E4%BB%B6%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
拼团零售商城系统前台任意文件写入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%8B%BC%E5%9B%A2%E9%9B%B6%E5%94%AE%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9F/%E6%8B%BC%E5%9B%A2%E9%9B%B6%E5%94%AE%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9F%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240717-新增漏洞
Nacos远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Nacos/Nacos%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
蓝凌KEP前台RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CKEP%E5%89%8D%E5%8F%B0RCE%E6%BC%8F%E6%B4%9E.md
某自动发卡网alipay_notify.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8F%91%E5%8D%A1%E7%BD%91%E7%B3%BB%E7%BB%9F/%E6%9F%90%E8%87%AA%E5%8A%A8%E5%8F%91%E5%8D%A1%E7%BD%91alipay_notify.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
赛蓝企业管理系统GetExcellTemperature存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetExcellTemperature%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SuiteCRM系统接口responseEntryPoint存在SQL注入漏洞(CVE-2024-36412)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SuiteCRM/SuiteCRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3responseEntryPoint%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-36412).md
Netgear-WN604接口downloadFile.php信息泄露漏洞(CVE-2024-6646)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/Netgear-WN604%E6%8E%A5%E5%8F%A3downloadFile.php%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E(CVE-2024-6646).md
泛微e-cology9接口XmlRpcServlet存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-cology9%E6%8E%A5%E5%8F%A3XmlRpcServlet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
泛微E-office-10接口leave_record.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-office-10%E6%8E%A5%E5%8F%A3leave_record.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友GRP-A-Cloud政府财务云系统接口selectGlaDatasourcePreview存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-A-Cloud%E6%94%BF%E5%BA%9C%E8%B4%A2%E5%8A%A1%E4%BA%91%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3selectGlaDatasourcePreview%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC-Cloud文件服务器用户登陆绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-Cloud%E6%96%87%E4%BB%B6%E6%9C%8D%E5%8A%A1%E5%99%A8%E7%94%A8%E6%88%B7%E7%99%BB%E9%99%86%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240714-新增漏洞
新中新中小学智慧校园信息管理系统Upload接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B0%E4%B8%AD%E6%96%B0%E4%B8%AD%E5%B0%8F%E5%AD%A6%E6%99%BA%E6%85%A7%E6%A0%A1%E5%9B%AD%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%96%B0%E4%B8%AD%E6%96%B0%E4%B8%AD%E5%B0%8F%E5%AD%A6%E6%99%BA%E6%85%A7%E6%A0%A1%E5%9B%AD%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUpload%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
金斗云-HKMP智慧商业软件download任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E6%96%97%E4%BA%91/%E9%87%91%E6%96%97%E4%BA%91-HKMP%E6%99%BA%E6%85%A7%E5%95%86%E4%B8%9A%E8%BD%AF%E4%BB%B6download%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
公众号无限回调系统接口siteUrl存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%AC%E4%BC%97%E5%8F%B7%E6%97%A0%E9%99%90%E5%9B%9E%E8%B0%83%E7%B3%BB%E7%BB%9F/%E5%85%AC%E4%BC%97%E5%8F%B7%E6%97%A0%E9%99%90%E5%9B%9E%E8%B0%83%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3siteUrl%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud系统接口MeasQueryConditionFrameAction存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3MeasQueryConditionFrameAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
ServiceNow-UI存在Jelly模板注入漏洞(CVE-2024-4879)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/ServiceNow%20UI/ServiceNow-UI%E5%AD%98%E5%9C%A8Jelly%E6%A8%A1%E6%9D%BF%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-4879).md
天喻软件数据安全平台DownLoad.ashx存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E5%96%BB%E8%BD%AF%E4%BB%B6%E6%95%B0%E6%8D%AE%E5%AE%89%E5%85%A8%E5%B9%B3%E5%8F%B0/%E5%A4%A9%E5%96%BB%E8%BD%AF%E4%BB%B6%E6%95%B0%E6%8D%AE%E5%AE%89%E5%85%A8%E5%B9%B3%E5%8F%B0DownLoad.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
启明星辰-天清汉马VPN接口download任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%90%AF%E6%98%8E%E6%98%9F%E8%BE%B0/%E5%90%AF%E6%98%8E%E6%98%9F%E8%BE%B0-%E5%A4%A9%E6%B8%85%E6%B1%89%E9%A9%ACVPN%E6%8E%A5%E5%8F%A3download%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
泛微OA-E-Cology接口WorkflowServiceXml存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA-E-Cology%E6%8E%A5%E5%8F%A3WorkflowServiceXml%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
全行业小程序运营系统接口Wxapps.php存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%A8%E8%A1%8C%E4%B8%9A%E5%B0%8F%E7%A8%8B%E5%BA%8F%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F/%E5%85%A8%E8%A1%8C%E4%B8%9A%E5%B0%8F%E7%A8%8B%E5%BA%8F%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3Wxapps.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240712-新增漏洞
泛微E-Cology接口getFileViewUrl存在SSRF漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Cology%E6%8E%A5%E5%8F%A3getFileViewUrl%E5%AD%98%E5%9C%A8SSRF%E6%BC%8F%E6%B4%9E.md
Pyspider-WebUI未授权访问致远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Pyspider%20WebUI/Pyspider-WebUI%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E8%87%B4%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
赛蓝企业管理系统DownloadBuilder任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%B5%9B%E8%93%9D%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDownloadBuilder%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
上讯信息技术股份有限公司运维管理系统RepeatSend存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%8A%E8%AE%AF%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E4%B8%8A%E8%AE%AF%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E8%BF%90%E7%BB%B4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FRepeatSend%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
同享人力管理管理平台DownloadFile存在任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%90%8C%E4%BA%AB%E4%BA%BA%E5%8A%9B%E7%AE%A1%E7%90%86%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%90%8C%E4%BA%AB%E4%BA%BA%E5%8A%9B%E7%AE%A1%E7%90%86%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0DownloadFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
北京中科聚网一体化运营平台importVisualModuleImg接口存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8C%97%E4%BA%AC%E4%B8%AD%E7%A7%91%E8%81%9A%E7%BD%91/%E5%8C%97%E4%BA%AC%E4%B8%AD%E7%A7%91%E8%81%9A%E7%BD%91%E4%B8%80%E4%BD%93%E5%8C%96%E8%BF%90%E8%90%A5%E5%B9%B3%E5%8F%B0importVisualModuleImg%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友NC-Cloud接口blobRefClassSearch存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-Cloud%E6%8E%A5%E5%8F%A3blobRefClassSearch%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
慧学教育科技有限公司Campuswit_uploadFiles存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%85%A7%E5%AD%A6%E6%95%99%E8%82%B2%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%85%A7%E5%AD%A6%E6%95%99%E8%82%B2%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Campuswit_uploadFiles%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
虚拟仿真实验室系统FileUploadServlet存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%99%9A%E6%8B%9F%E4%BB%BF%E7%9C%9F%E5%AE%9E%E9%AA%8C%E5%AE%A4%E7%B3%BB%E7%BB%9F/%E8%99%9A%E6%8B%9F%E4%BB%BF%E7%9C%9F%E5%AE%9E%E9%AA%8C%E5%AE%A4%E7%B3%BB%E7%BB%9FFileUploadServlet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
风速科技统一认证平台存在密码重置漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%8E%E9%80%9F%E7%A7%91%E6%8A%80%E7%BB%9F%E4%B8%80%E8%AE%A4%E8%AF%81%E5%B9%B3%E5%8F%B0/%E9%A3%8E%E9%80%9F%E7%A7%91%E6%8A%80%E7%BB%9F%E4%B8%80%E8%AE%A4%E8%AF%81%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E.md
联奕统一身份认证平台getDataSource存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%81%94%E5%A5%95%E7%BB%9F%E4%B8%80%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E5%B9%B3%E5%8F%B0/%E8%81%94%E5%A5%95%E7%BB%9F%E4%B8%80%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E5%B9%B3%E5%8F%B0getDataSource%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
PowerCreator接口UploadResourcePic.ashx存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PowerCreator/PowerCreator%E6%8E%A5%E5%8F%A3UploadResourcePic.ashx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
数字通OA-智慧政务接口payslip存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%95%B0%E5%AD%97%E9%80%9AOA/%E6%95%B0%E5%AD%97%E9%80%9AOA-%E6%99%BA%E6%85%A7%E6%94%BF%E5%8A%A1%E6%8E%A5%E5%8F%A3payslip%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240709-新增漏洞
申瓯通信在线录音管理系统Thinkphp远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%B3%E7%93%AF%E9%80%9A%E4%BF%A1%E5%9C%A8%E7%BA%BF%E5%BD%95%E9%9F%B3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%94%B3%E7%93%AF%E9%80%9A%E4%BF%A1%E5%9C%A8%E7%BA%BF%E5%BD%95%E9%9F%B3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FThinkphp%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
EduSoho教培系统classropm-course-statistics存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EduSoho/EduSoho%E6%95%99%E5%9F%B9%E7%B3%BB%E7%BB%9Fclassropm-course-statistics%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
深澜计费管理系统proxy存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B7%B1%E6%BE%9C%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B7%B1%E6%BE%9C%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fproxy%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
深澜计费管理系统strategy存在反序列化RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B7%B1%E6%BE%9C%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B7%B1%E6%BE%9C%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fstrategy%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96RCE%E6%BC%8F%E6%B4%9E.md
大唐电信NVS3000综合视频监控平台getDepResList存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%94%90%E7%94%B5%E4%BF%A1/%E5%A4%A7%E5%94%90%E7%94%B5%E4%BF%A1NVS3000%E7%BB%BC%E5%90%88%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0getDepResList%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大唐电信AC集中管理平台敏感信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%94%90%E7%94%B5%E4%BF%A1/%E5%A4%A7%E5%94%90%E7%94%B5%E4%BF%A1AC%E9%9B%86%E4%B8%AD%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
大唐电信NVS3000综合视频监控平台getencoderlist存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%94%90%E7%94%B5%E4%BF%A1/%E5%A4%A7%E5%94%90%E7%94%B5%E4%BF%A1NVS3000%E7%BB%BC%E5%90%88%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0getencoderlist%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
厦门四信通信科技有限公司视频监控管理系统存在逻辑缺陷漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8E%A6%E9%97%A8%E5%9B%9B%E4%BF%A1%E9%80%9A%E4%BF%A1%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%8E%A6%E9%97%A8%E5%9B%9B%E4%BF%A1%E9%80%9A%E4%BF%A1%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E9%80%BB%E8%BE%91%E7%BC%BA%E9%99%B7%E6%BC%8F%E6%B4%9E.md
中科智远科技-综合监管云平台DownFile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%AD%E7%A7%91%E6%99%BA%E8%BF%9C%E7%A7%91%E6%8A%80%E7%BB%BC%E5%90%88%E7%9B%91%E7%AE%A1%E4%BA%91%E5%B9%B3%E5%8F%B0/%E4%B8%AD%E7%A7%91%E6%99%BA%E8%BF%9C%E7%A7%91%E6%8A%80-%E7%BB%BC%E5%90%88%E7%9B%91%E7%AE%A1%E4%BA%91%E5%B9%B3%E5%8F%B0DownFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
亿华人力资源管理系统unloadfile存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E5%8D%8E%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E5%8D%8E%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Funloadfile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
EnjoyRMIS-GetOAById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EnjoyRMIS/EnjoyRMIS-GetOAById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿渡留言管理系统uploadimg存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E6%B8%A1%E7%95%99%E8%A8%80%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E6%B8%A1%E7%95%99%E8%A8%80%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fuploadimg%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
宏脉医美行业管理系统UEditor编辑器存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E8%84%89%E5%8C%BB%E7%BE%8E%E8%A1%8C%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%AE%8F%E8%84%89%E5%8C%BB%E7%BE%8E%E8%A1%8C%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUEditor%E7%BC%96%E8%BE%91%E5%99%A8%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Exam在线考试系统存在前台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Exam/Exam%E5%9C%A8%E7%BA%BF%E8%80%83%E8%AF%95%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
彩票系统存在任意文件preview.php上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%8F%A0%E8%8F%9C/%E5%BD%A9%E7%A5%A8%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6preview.php%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
会捷通云视讯平台fileDownload存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BC%9A%E6%8D%B7%E9%80%9A%E4%BA%91%E8%A7%86%E8%AE%AF%E5%B9%B3%E5%8F%B0/%E4%BC%9A%E6%8D%B7%E9%80%9A%E4%BA%91%E8%A7%86%E8%AE%AF%E5%B9%B3%E5%8F%B0fileDownload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
正方数字化校园平台RzptManage存在任意文件写入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%AD%A3%E6%96%B9/%E6%AD%A3%E6%96%B9%E6%95%B0%E5%AD%97%E5%8C%96%E6%A0%A1%E5%9B%AD%E5%B9%B3%E5%8F%B0RzptManage%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E.md
鲸发卡系统自动发卡网request_post存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8F%91%E5%8D%A1%E7%BD%91%E7%B3%BB%E7%BB%9F/%E9%B2%B8%E5%8F%91%E5%8D%A1%E7%B3%BB%E7%BB%9F%E8%87%AA%E5%8A%A8%E5%8F%91%E5%8D%A1%E7%BD%91request_post%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
用友时空KSOA接口com.sksoft.bill.QueryService存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E6%97%B6%E7%A9%BAKSOA%E6%8E%A5%E5%8F%A3com.sksoft.bill.QueryService%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240706-新增漏洞
宏景eHR人力资源管理系统接口getSdutyTree存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFeHR%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3getSdutyTree%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
宏景eHR人力资源管理系统接口loadtree存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFeHR%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3loadtree%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
宏景eHR人力资源管理系统接口LoadOtherTreeServlet存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFeHR%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3LoadOtherTreeServlet%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
宏景eHR人力资源管理系统接口DownLoadCourseware存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFeHR%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3DownLoadCourseware%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
平升电子水库监管平台GetAllRechargeRecordsBySIMCardId接口处存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%B3%E5%8D%87%E7%94%B5%E5%AD%90%E6%B0%B4%E5%BA%93%E7%9B%91%E7%AE%A1%E5%B9%B3%E5%8F%B0/%E5%B9%B3%E5%8D%87%E7%94%B5%E5%AD%90%E6%B0%B4%E5%BA%93%E7%9B%91%E7%AE%A1%E5%B9%B3%E5%8F%B0GetAllRechargeRecordsBySIMCardId%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Docassemble任意文件读取漏洞(CVE-2024-27292) https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Docassemble/Docassemble%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-27292).md
WordPress插件Recall存在SQL注入漏洞(CVE-2024-32709)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6Recall%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-32709).md
rejetto-HFS-3存在远程命令执行漏洞(CVE-2024-39943)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/HSF/rejetto-HFS-3%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-39943).md
Splunk-Enterprise任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Splunk%20Enterprise/Splunk-Enterprise%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240703-新增漏洞
金和OA_C6_UploadFileDownLoadnew存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA_C6_UploadFileDownLoadnew%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
科荣AIO-moffice接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E8%8D%A3AIO/%E7%A7%91%E8%8D%A3AIO-moffice%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
朗新天霁人力资源管理系统GetMessage存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9C%97%E6%96%B0%E5%A4%A9%E9%9C%81%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%9C%97%E6%96%B0%E5%A4%A9%E9%9C%81%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetMessage%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友u9系统接口GetConnectionString存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8Bu9%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3GetConnectionString%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
YzmCMS接口存在pay_callback远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/YzmCMS/YzmCMS%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8pay_callback%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
美特CRM系统接口anotherValue存在FastJson反序列化RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BE%8E%E7%89%B9CRM%E7%B3%BB%E7%BB%9F/%E7%BE%8E%E7%89%B9CRM%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3anotherValue%E5%AD%98%E5%9C%A8FastJson%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96RCE.md
飞企互联FE企业运营管理平台ajax_codewidget39.jsp接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94FE%E4%BC%81%E4%B8%9A%E8%BF%90%E8%90%A5%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0ajax_codewidget39.jsp%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
飞企互联FE企业运营管理平台checkGroupCode.js接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94FE%E4%BC%81%E4%B8%9A%E8%BF%90%E8%90%A5%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0checkGroupCode.js%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华ICC智能物联综合管理平台heapdump敏感信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EICC%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0heapdump%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
英飞达医学影像存档与通信系统Upload.asmx任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%8B%B1%E9%A3%9E%E8%BE%BE%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E5%AD%98%E6%A1%A3%E4%B8%8E%E9%80%9A%E4%BF%A1%E7%B3%BB%E7%BB%9F/%E8%8B%B1%E9%A3%9E%E8%BE%BE%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E5%AD%98%E6%A1%A3%E4%B8%8E%E9%80%9A%E4%BF%A1%E7%B3%BB%E7%BB%9FUpload.asmx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
GeoServer属性名表达式前台代码执行漏洞(CVE-2024-36401)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/GeoServer/GeoServer%E5%B1%9E%E6%80%A7%E5%90%8D%E8%A1%A8%E8%BE%BE%E5%BC%8F%E5%89%8D%E5%8F%B0%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-36401).md
D-LINK-Go-RT-AC750 GORTAC750_A1_FW_v101b03存在硬编码漏洞(CVE-2024-22853)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/D-Link/D-LINK-Go-RT-AC750%20GORTAC750_A1_FW_v101b03%E5%AD%98%E5%9C%A8%E7%A1%AC%E7%BC%96%E7%A0%81%E6%BC%8F%E6%B4%9E(CVE-2024-22853).md
致远OA-A8-V5接口officeservlet存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA-A8-V5%E6%8E%A5%E5%8F%A3officeservlet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
JieLink+智能终端操作平台存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JieLink/JieLink+%E6%99%BA%E8%83%BD%E7%BB%88%E7%AB%AF%E6%93%8D%E4%BD%9C%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金斗云-HKMP智慧商业软件任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E6%96%97%E4%BA%91/%E9%87%91%E6%96%97%E4%BA%91-HKMP%E6%99%BA%E6%85%A7%E5%95%86%E4%B8%9A%E8%BD%AF%E4%BB%B6%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
热网无线监测系统SystemManager.asmx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%83%AD%E7%BD%91%E6%97%A0%E7%BA%BF%E7%9B%91%E6%B5%8B%E7%B3%BB%E7%BB%9F/%E7%83%AD%E7%BD%91%E6%97%A0%E7%BA%BF%E7%9B%91%E6%B5%8B%E7%B3%BB%E7%BB%9FSystemManager.asmx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
喰星云-数字化餐饮服务系统listuser信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%96%B0%E6%98%9F%E4%BA%91-%E6%95%B0%E5%AD%97%E5%8C%96%E9%A4%90%E9%A5%AE%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9F/%E5%96%B0%E6%98%9F%E4%BA%91-%E6%95%B0%E5%AD%97%E5%8C%96%E9%A4%90%E9%A5%AE%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Flistuser%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
邦永PM2项目管理系统Global_UserLogin.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%82%A6%E6%B0%B8PM2%E9%A1%B9%E7%9B%AE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E9%82%A6%E6%B0%B8PM2%E9%A1%B9%E7%9B%AE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGlobal_UserLogin.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
锐明技术Crocus系统Service.do任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AFCrocus%E7%B3%BB%E7%BB%9F/%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AFCrocus%E7%B3%BB%E7%BB%9FService.do%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240628-新增漏洞
WordPress插件Dokan-Pro存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6Dokan-Pro%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
时空智友ERP系统updater.uploadStudioFile接口处存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%91%E6%97%B6%E7%A9%BA/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8BERP%E7%B3%BB%E7%BB%9Fupdater.uploadStudioFile%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Apache-ServiceComb存在SSRF漏洞(CVE-2023-44313)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-ServiceComb%E5%AD%98%E5%9C%A8SSRF%E6%BC%8F%E6%B4%9E(CVE-2023-44313).md
通天星CMSV6接口pointManage存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E5%A4%A9%E6%98%9F/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E6%8E%A5%E5%8F%A3pointManage%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
用友U8-Cloud-smartweb2.showRPCLoadingTip.d存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud-smartweb2.showRPCLoadingTip.d%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
WordPress-MasterStudy-LMS插件存在SQL注入漏洞(CVE-2024-1512)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress-MasterStudy-LMS%E6%8F%92%E4%BB%B6%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-1512).md
Apache-Kafka的UI中的远程代码执行CVE-2023-52251https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-Kafka%E7%9A%84UI%E4%B8%AD%E7%9A%84%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8CCVE-2023-52251.md
碧海威L7产品confirm存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A2%A7%E6%B5%B7%E5%A8%81/%E7%A2%A7%E6%B5%B7%E5%A8%81L7%E4%BA%A7%E5%93%81confirm%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
万户-ezOFFICE-OA-officeserver.jsp文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7-ezOFFICE-OA-officeserver.jsp%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
医药信息管理系统GetLshByTj存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8C%BB%E8%8D%AF%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%8C%BB%E8%8D%AF%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetLshByTj%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
MSService服务init.do接口处存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/MSService/MSService%E6%9C%8D%E5%8A%A1init.do%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Pear-Admin-Boot存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Pear%20Admin%20Boot/Pear-Admin-Boot%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
福建科立讯通信有限公司指挥调度管理平台uploadgps.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A6%8F%E5%BB%BA%E7%A7%91%E7%AB%8B%E8%AE%AF%E9%80%9A%E4%BF%A1/%E7%A6%8F%E5%BB%BA%E7%A7%91%E7%AB%8B%E8%AE%AF%E9%80%9A%E4%BF%A1%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0uploadgps.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Magento开源电子商务平台接口estimate-shipping-methods存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Magento/Magento%E5%BC%80%E6%BA%90%E7%94%B5%E5%AD%90%E5%95%86%E5%8A%A1%E5%B9%B3%E5%8F%B0%E6%8E%A5%E5%8F%A3estimate-shipping-methods%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
铭飞MCMS接口upload.do存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%93%AD%E9%A3%9E/%E9%93%AD%E9%A3%9EMCMS%E6%8E%A5%E5%8F%A3upload.do%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
OpenCart开源电子商务平台divido.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/OpenCart/OpenCart%E5%BC%80%E6%BA%90%E7%94%B5%E5%AD%90%E5%95%86%E5%8A%A1%E5%B9%B3%E5%8F%B0divido.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
D-LINK-DIR-845L接口bsc_sms_inbox.php存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/D-Link/D-LINK-DIR-845L%E6%8E%A5%E5%8F%A3bsc_sms_inbox.php%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
致远互联FE协作办公平台codeMoreWidget.js存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9C%E4%BA%92%E8%81%94FE%E5%8D%8F%E4%BD%9C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0codeMoreWidget.js%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
飞企互联-FE企业运营管理平台efficientCodewidget39接口SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94-FE%E4%BC%81%E4%B8%9A%E8%BF%90%E8%90%A5%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0_efficientCodewidget39%E6%8E%A5%E5%8F%A3SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金和OA-C6接口DownLoadBgImage存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA-C6%E6%8E%A5%E5%8F%A3DownLoadBgImage%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240621-新增漏洞
真内控国产化开发平台接口preview任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%9C%9F%E5%86%85%E6%8E%A7%E5%9B%BD%E4%BA%A7%E5%8C%96%E5%BC%80%E5%8F%91%E5%B9%B3%E5%8F%B0/%E7%9C%9F%E5%86%85%E6%8E%A7%E5%9B%BD%E4%BA%A7%E5%8C%96%E5%BC%80%E5%8F%91%E5%B9%B3%E5%8F%B0%E6%8E%A5%E5%8F%A3preview%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
华测监测预警系统接口UserEdit.aspx存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E6%B5%8B%E7%9B%91%E6%B5%8B%E9%A2%84%E8%AD%A6%E7%B3%BB%E7%BB%9F/%E5%8D%8E%E6%B5%8B%E7%9B%91%E6%B5%8B%E9%A2%84%E8%AD%A6%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3UserEdit.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
ShokoServer系统withpath任意文件读取漏洞(CVE-2023-43662)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/ShokoServer/ShokoServer%E7%B3%BB%E7%BB%9Fwithpath%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2023-43662).md
契约锁电子签章平台add远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A5%91%E7%BA%A6%E9%94%81%E7%94%B5%E5%AD%90%E7%AD%BE%E7%AB%A0%E7%B3%BB%E7%BB%9F/%E5%A5%91%E7%BA%A6%E9%94%81%E7%94%B5%E5%AD%90%E7%AD%BE%E7%AB%A0%E5%B9%B3%E5%8F%B0add%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Zyxel-NAS设备setCookie未授权命令注入漏洞(CVE-2024-29973)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Zyxe%20NAS/Zyxel-NAS%E8%AE%BE%E5%A4%87setCookie%E6%9C%AA%E6%8E%88%E6%9D%83%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-29973).md
新视窗新一代物业管理系统GetCertificateInfoByStudentId存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B0%E8%A7%86%E7%AA%97%E6%96%B0%E4%B8%80%E4%BB%A3%E7%89%A9%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%96%B0%E8%A7%86%E7%AA%97%E6%96%B0%E4%B8%80%E4%BB%A3%E7%89%A9%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetCertificateInfoByStudentId%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
XWiki-Platform远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/XWiki/XWiki-Platform%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
学分制系统GetCalendarContentById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AD%A6%E5%88%86%E5%88%B6%E7%B3%BB%E7%BB%9F/%E5%AD%A6%E5%88%86%E5%88%B6%E7%B3%BB%E7%BB%9FGetCalendarContentById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
云匣子系统接口ssoToolReport存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%91%E5%8C%A3%E5%AD%90%E5%A0%A1%E5%9E%92%E6%9C%BA/%E4%BA%91%E5%8C%A3%E5%AD%90%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3ssoToolReport%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
泛微E-Cology-KtreeUploadAction任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Cology-KtreeUploadAction%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
极限OA接口video_file.php存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%9E%81%E9%99%90OA/%E6%9E%81%E9%99%90OA%E6%8E%A5%E5%8F%A3video_file.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
锐捷上网行为管理系统static_convert.php存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fstatic_convert.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
佑友防火墙后台接口download存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BD%91%E5%8F%8B%E9%98%B2%E7%81%AB%E5%A2%99/%E4%BD%91%E5%8F%8B%E9%98%B2%E7%81%AB%E5%A2%99%E5%90%8E%E5%8F%B0%E6%8E%A5%E5%8F%A3download%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
佑友防火墙后台接口maintain存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BD%91%E5%8F%8B%E9%98%B2%E7%81%AB%E5%A2%99/%E4%BD%91%E5%8F%8B%E9%98%B2%E7%81%AB%E5%A2%99%E5%90%8E%E5%8F%B0%E6%8E%A5%E5%8F%A3maintain%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
极企智能办公路由接口jumper.php存在RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/%E6%9E%81%E4%BC%81%E6%99%BA%E8%83%BD%E5%8A%9E%E5%85%AC%E8%B7%AF%E7%94%B1%E6%8E%A5%E5%8F%A3jumper.php%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md
用友Ufida-ELTextFile.load.d任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BUfida-ELTextFile.load.d%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
易天智能eHR管理平台任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E5%A4%A9%E6%99%BA%E8%83%BDeHR%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%98%93%E5%A4%A9%E6%99%BA%E8%83%BDeHR%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
多客圈子论坛前台SSRF漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%9A%E5%AE%A2%E5%9C%88%E5%AD%90%E8%AE%BA%E5%9D%9B%E7%B3%BB%E7%BB%9F/%E5%A4%9A%E5%AE%A2%E5%9C%88%E5%AD%90%E8%AE%BA%E5%9D%9B%E5%89%8D%E5%8F%B0SSRF%E6%BC%8F%E6%B4%9E.md
APP分发签名系统index-uplog.php存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%88%86%E5%8F%91%E7%AD%BE%E5%90%8D%E7%B3%BB%E7%BB%9F/APP%E5%88%86%E5%8F%91%E7%AD%BE%E5%90%8D%E7%B3%BB%E7%BB%9Findex-uplog.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240618-新增漏洞
禅道18.5存在后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A6%85%E9%81%93/%E7%A6%85%E9%81%9318.5%E5%AD%98%E5%9C%A8%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Fastadmin框架存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Fastadmin/Fastadmin%E6%A1%86%E6%9E%B6%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
CRMEB开源商城v5.2.2存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/CRMEB/CRMEB%E5%BC%80%E6%BA%90%E5%95%86%E5%9F%8Ev5.2.2%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
AEGON-LIFEv1.0存在SQL注入漏洞(CVE-2024-36597)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/AEGON/AEGON-LIFEv1.0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-36597).md
悦库企业网盘userlogin.html存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%82%A6%E5%BA%93%E4%BC%81%E4%B8%9A%E7%BD%91%E7%9B%98/%E6%82%A6%E5%BA%93%E4%BC%81%E4%B8%9A%E7%BD%91%E7%9B%98userlogin.html%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
仿新浪外汇余额宝时间交易所任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%A4%E6%98%93%E6%89%80%E7%B3%BB%E7%BB%9F/%E4%BB%BF%E6%96%B0%E6%B5%AA%E5%A4%96%E6%B1%87%E4%BD%99%E9%A2%9D%E5%AE%9D%E6%97%B6%E9%97%B4%E4%BA%A4%E6%98%93%E6%89%80%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
申瓯通信在线录音管理系统download任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%B3%E7%93%AF%E9%80%9A%E4%BF%A1%E5%9C%A8%E7%BA%BF%E5%BD%95%E9%9F%B3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%94%B3%E7%93%AF%E9%80%9A%E4%BF%A1%E5%9C%A8%E7%BA%BF%E5%BD%95%E9%9F%B3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdownload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
致远互联FE协作办公平台ncsubjass存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9C%E4%BA%92%E8%81%94FE%E5%8D%8F%E4%BD%9C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0ncsubjass%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
世邦通信SPON-IP网络对讲广播系统my_parser.php任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%96%E9%82%A6%E9%80%9A%E4%BF%A1/%E4%B8%96%E9%82%A6%E9%80%9A%E4%BF%A1SPON-IP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Fmy_parser.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
万户-ezOFFICE-download_ftp.jsp任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7-ezOFFICE-download_ftp.jsp%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
平升水库水文监测系统默认密码https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%B3%E5%8D%87%E7%94%B5%E5%AD%90%E6%B0%B4%E5%BA%93%E7%9B%91%E7%AE%A1%E5%B9%B3%E5%8F%B0/%E5%B9%B3%E5%8D%87%E6%B0%B4%E5%BA%93%E6%B0%B4%E6%96%87%E7%9B%91%E6%B5%8B%E7%B3%BB%E7%BB%9F%E9%BB%98%E8%AE%A4%E5%AF%86%E7%A0%81.md
https://github.com/eeeeeeeeee-code/POC#20240614-新增漏洞
致远oa系统saveFormula4Cloud存在JNDI注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9Coa%E7%B3%BB%E7%BB%9FsaveFormula4Cloud%E5%AD%98%E5%9C%A8JNDI%E6%B3%A8%E5%85%A5.md
用友NC-oacoSchedulerEvents接口存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-oacoSchedulerEvents%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
致远OA帆软组件ReportServer目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA%E5%B8%86%E8%BD%AF%E7%BB%84%E4%BB%B6ReportServer%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
泛微-eoffice-webservice-file-upload任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AE-eoffice-webservice-file-upload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
泛微e-office-mobile_upload_save存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-office-mobile_upload_save%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
泛微e-office-uploadify.php存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-office-uploadify.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
世邦通信SPON-IP网络对讲广播系统addscenedata.php任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%96%E9%82%A6%E9%80%9A%E4%BF%A1/%E4%B8%96%E9%82%A6%E9%80%9A%E4%BF%A1SPON-IP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Faddscenedata.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
电信网关配置管理后台del_file.php接口存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86%E5%90%8E%E5%8F%B0del_file.php%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Ivanti-EPM存在SQL注入漏洞(CVE-2024-29824)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Ivanti/Ivanti-EPM%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-29824).md
JEPaaS低代码平台j_spring_security_check存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JEPaaS%E4%BD%8E%E4%BB%A3%E7%A0%81%E5%B9%B3%E5%8F%B0/JEPaaS%E4%BD%8E%E4%BB%A3%E7%A0%81%E5%B9%B3%E5%8F%B0j_spring_security_check%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
东胜物流软件GetProParentModuTreeList存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6GetProParentModuTreeList%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
锐捷NBR系列路由器存在管理员密码重置漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7NBR%E7%B3%BB%E5%88%97%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AD%98%E5%9C%A8%E7%AE%A1%E7%90%86%E5%91%98%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E.md
海洋CMS-admin_notify.php远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E6%B4%8Bcms/%E6%B5%B7%E6%B4%8BCMS-admin_notify.php%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
SolarWinds-Serv-U目录遍历漏洞(CVE-2024-28995)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SolarWinds%20Serv%20U/SolarWinds-Serv-U%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E(CVE-2024-28995).md
https://github.com/eeeeeeeeee-code/POC#20240611-新增漏洞
海康威视综合安防管理平台keepAlive远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0keepAlive%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
金和OA-C6-download.jsp任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA-C6-download.jsp%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
锐捷校园网自助服务系统login_judge.jsf任意文件读取漏洞(XVE-2024-2116)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E6%A0%A1%E5%9B%AD%E7%BD%91%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Flogin_judge.jsf%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(XVE-2024-2116).md
HFS2.3未经身份验证的远程代码执行(CVE-2024-23692)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/HSF/HFS2.3%E6%9C%AA%E7%BB%8F%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%9A%84%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C(CVE-2024-23692).md
29网课交单平台epay.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E8%AF%BE%E4%BA%A4%E5%8D%95%E5%B9%B3%E5%8F%B0/29%E7%BD%91%E8%AF%BE%E4%BA%A4%E5%8D%95%E5%B9%B3%E5%8F%B0epay.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
多客圈子论坛系统httpGet任意文件读取漏洞复现https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%9A%E5%AE%A2%E5%9C%88%E5%AD%90%E8%AE%BA%E5%9D%9B%E7%B3%BB%E7%BB%9F/%E5%A4%9A%E5%AE%A2%E5%9C%88%E5%AD%90%E8%AE%BA%E5%9D%9B%E7%B3%BB%E7%BB%9FhttpGet%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0.md
https://github.com/eeeeeeeeee-code/POC#20240607-新增漏洞
天智云智造管理平台Usermanager.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E6%99%BA%E4%BA%91/%E5%A4%A9%E6%99%BA%E4%BA%91%E6%99%BA%E9%80%A0%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0Usermanager.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
海康威视综合安防管理平台productFile远程代码执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0productFile%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C.md
海康威视综合安防管理平台applyAutoLoginTicket远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0applyAutoLoginTicket%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
showdoc3.2.4-phar反序列漏洞复现https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/showdoc/showdoc3.2.4-phar%E5%8F%8D%E5%BA%8F%E5%88%97%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0.md
Progress-Telerik-Report-Server身份验证绕过(CVE-2024-4358)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Progress/Progress-Telerik-Report-Server%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87(CVE-2024-4358).md
悟空CRM9.0-fastjson远程代码执行漏洞(CVE-2024-23052)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%82%9F%E7%A9%BACRM/%E6%82%9F%E7%A9%BACRM9.0-fastjson%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-23052).md
PHP-CGI-Windows平台远程代码执行漏洞(CVE-2024-4577)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/php/PHP-CGI-Windows%E5%B9%B3%E5%8F%B0%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-4577).md
用友NC-downCourseWare任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-downCourseWare%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
用友-U9-PatchFile.asmx任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B-U9-PatchFile.asmx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Apache-HugeGraph-Server远程代码执行漏洞(CVE-2024-27348)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-HugeGraph-Server%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-27348).md
https://github.com/eeeeeeeeee-code/POC#20240605-新增漏洞
Symfony-app_dev.php信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Symfony/Symfony-app_dev.php%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
泛微OA-E-cology8-SptmForPortalThumbnail.jsp任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA-E-cology8-SptmForPortalThumbnail.jsp%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
O2OA远程命令执行(CVE-2022-22916)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/O2OA/O2OA%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C(CVE-2022-22916).md
大华DSS城市安防监控平台login_init.action接口存在Struct2-045命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%E5%9F%8E%E5%B8%82%E5%AE%89%E9%98%B2%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0login_init.action%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8Struct2-045%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
H3C-CVM-upload接口前台任意文件上传漏洞复现https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/H3C/H3C-CVM-upload%E6%8E%A5%E5%8F%A3%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0.md
用友NC-pagesServlet存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-pagesServlet%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
宏景HCM-pos_dept_post存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFHCM-pos_dept_post%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
迈普多业务融合网关send_order.cgi存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%BF%88%E6%99%AE%E5%A4%9A%E4%B8%9A%E5%8A%A1%E8%9E%8D%E5%90%88%E7%BD%91%E5%85%B3/%E8%BF%88%E6%99%AE%E5%A4%9A%E4%B8%9A%E5%8A%A1%E8%9E%8D%E5%90%88%E7%BD%91%E5%85%B3send_order.cgi%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
HSC-Mailinspector-loader.php存在任意文件读取漏洞(CVE-2024-34470)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/HSC/HSC-Mailinspector-loader.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-34470).md
Minio-verify信息泄露(CVE-2023-28432)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Minio/Minio-verify%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2(CVE-2023-28432).md
OrangeHRM-viewProjects接口存在SQL注入漏洞(CVE-2024-36428)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/OrangeHRM/OrangeHRM-viewProjects%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-36428).md
ShowDoc3.2.5存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/showdoc/ShowDoc3.2.5%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
mysql2原型污染漏洞(CVE-2024-21512)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/mysql2/mysql2%E5%8E%9F%E5%9E%8B%E6%B1%A1%E6%9F%93%E6%BC%8F%E6%B4%9E(CVE-2024-21512).md
亿赛通-电子文档安全管理系统SaveCDGPermissionFromGFOA接口存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A-%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSaveCDGPermissionFromGFOA%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Apache-OFBiz存在路径遍历导致RCE漏洞(CVE-2024-36104)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-OFBiz%E5%AD%98%E5%9C%A8%E8%B7%AF%E5%BE%84%E9%81%8D%E5%8E%86%E5%AF%BC%E8%87%B4RCE%E6%BC%8F%E6%B4%9E(CVE-2024-36104).md
飞企互联-FE企业运营管理平台treeXml.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94-FE%E4%BC%81%E4%B8%9A%E8%BF%90%E8%90%A5%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0treeXml.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微E-Office-json_common.phpSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Office-json_common.phpSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微E-Office系统login_other.php存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Office%E7%B3%BB%E7%BB%9Flogin_other.php%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240602-新增漏洞
海康威视综合安防download存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2download%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
科讯图书馆综合管理云平台WebCloud.asmx存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E8%AE%AF%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0/%E7%A7%91%E8%AE%AF%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0WebCloud.asmx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
翰智员工服务平台loginByPassword存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BF%B0%E6%99%BA%E5%91%98%E5%B7%A5%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0/%E7%BF%B0%E6%99%BA%E5%91%98%E5%B7%A5%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0loginByPassword%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
DT高清车牌识别摄像机存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/DT/DT%E9%AB%98%E6%B8%85%E8%BD%A6%E7%89%8C%E8%AF%86%E5%88%AB%E6%91%84%E5%83%8F%E6%9C%BA%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
showDoc-uploadImg任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/showdoc/showDoc-uploadImg%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
全程云OA-svc.asmxSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%A8%E7%A8%8B%E4%BA%91OA/%E5%85%A8%E7%A8%8B%E4%BA%91OA-svc.asmxSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微OA-E-Mobile移动管理平台lang2sql任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA-E-Mobile%E7%A7%BB%E5%8A%A8%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0lang2sql%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
金蝶云星空UserService反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E8%9D%B6/%E9%87%91%E8%9D%B6%E4%BA%91%E6%98%9F%E7%A9%BAUserService%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
湖南建研检测系统存在DownLoad2.aspx任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E6%A3%80%E6%B5%8B%E7%B3%BB%E7%BB%9F/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E6%A3%80%E6%B5%8B%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8DownLoad2.aspx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240531-新增漏洞
PHP-Live-Chat代码审计之组合拳GetShellhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PHP%20Live%20Chat/PHP-Live-Chat%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E4%B9%8B%E7%BB%84%E5%90%88%E6%8B%B3GetShell.md
宏景eHR-showmedia.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFeHR-showmedia.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
NextGen-Mirth-Connect-XStream反序列化远程代码执行漏洞(CVE-2023-43208)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/NextGen/NextGen-Mirth-Connect-XStream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-43208).md
用友智石开PLM-getWorkGroups存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E6%99%BA%E7%9F%B3%E5%BC%80PLM-getWorkGroups%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
智邦国际ERP-GetPersonalSealData.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E9%82%A6%E5%9B%BD%E9%99%85ERP/%E6%99%BA%E9%82%A6%E5%9B%BD%E9%99%85ERP-GetPersonalSealData.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
中成科信票务管理系统ReserveTicketManagerPlane.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1%E7%A5%A8%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1%E7%A5%A8%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FReserveTicketManagerPlane.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
JEPaaS低代码平台document存在文件上传致RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JEPaaS%E4%BD%8E%E4%BB%A3%E7%A0%81%E5%B9%B3%E5%8F%B0/JEPaaS%E4%BD%8E%E4%BB%A3%E7%A0%81%E5%B9%B3%E5%8F%B0document%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E8%87%B4RCE%E6%BC%8F%E6%B4%9E.md
大华城市安防监控系统平台管理存在user_edit.action信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E5%9F%8E%E5%B8%82%E5%AE%89%E9%98%B2%E7%9B%91%E6%8E%A7%E7%B3%BB%E7%BB%9F%E5%B9%B3%E5%8F%B0%E7%AE%A1%E7%90%86%E5%AD%98%E5%9C%A8user_edit.action%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
Check-Point安全网关任意文件读取漏洞(CVE-2024-24919)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Check%20Point%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/Check-Point%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-24919).md
电信网关配置管理后台rewrite.php接口存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86%E5%90%8E%E5%8F%B0rewrite.php%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240528-新增漏洞
DCN有线无线智能一体化控制器WEB管理系统https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/DCN/DCN%E6%9C%89%E7%BA%BF%E6%97%A0%E7%BA%BF%E6%99%BA%E8%83%BD%E4%B8%80%E4%BD%93%E5%8C%96%E6%8E%A7%E5%88%B6%E5%99%A8WEB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F.md
用友NC系统linkVoucher存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E7%B3%BB%E7%BB%9FlinkVoucher%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统online.php存在远程代码执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fonline.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C.md
锐捷RG-UAC统一上网行为管理审计系统static_route_edit_ipv6.php存在远程代码执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fstatic_route_edit_ipv6.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C.md
锐捷RG-UAC统一上网行为管理审计系统sub_commit.php存在远程代码执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fsub_commit.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C.md
锐捷RG-UAC统一上网行为管理审计系统user_commit.php存在远程代码执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fuser_commit.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C.md
锐捷RG-UAC统一上网行为管理审计系统vlan_add_commit.php存在远程代码执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fvlan_add_commit.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C.md
大华智慧园区综合管理平台user_getUserInfoByUserName.action未授权任意用户密码读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0user_getUserInfoByUserName.action%E6%9C%AA%E6%8E%88%E6%9D%83%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E8%AF%BB%E5%8F%96.md
锐捷RG-EW1200G无线路由器登录绕过https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-EW1200G%E6%97%A0%E7%BA%BF%E8%B7%AF%E7%94%B1%E5%99%A8%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87.md
Jeecg-jeecgFormDemoController存在JNDI代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JeecgBoot/Jeecg-jeecgFormDemoController%E5%AD%98%E5%9C%A8JNDI%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
WordPress-Dropdown-CF7插件存在sql注入漏洞(CVE-2024-3495)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress-Dropdown-CF7%E6%8F%92%E4%BB%B6%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-3495).md
WordPress-WebDirectory插件存在sql注入(CVE-2024-3552)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress-WebDirectory%E6%8F%92%E4%BB%B6%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5(CVE-2024-3552).md
WordPress的Business-Directory插件存在sql注入漏洞(CVE-2024-4443)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E7%9A%84Business-Directory%E6%8F%92%E4%BB%B6%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-4443).md
因酷教育软件开源网校程序gok4任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%9B%A0%E9%85%B7%E6%95%99%E8%82%B2%E8%BD%AF%E4%BB%B6/%E5%9B%A0%E9%85%B7%E6%95%99%E8%82%B2%E8%BD%AF%E4%BB%B6%E5%BC%80%E6%BA%90%E7%BD%91%E6%A0%A1%E7%A8%8B%E5%BA%8Fgok4%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240525-新增漏洞
瑞星EDR-XSS漏洞可打管理员cookiehttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%91%9E%E6%98%9FEDR/%E7%91%9E%E6%98%9FEDR-XSS%E6%BC%8F%E6%B4%9E%E5%8F%AF%E6%89%93%E7%AE%A1%E7%90%86%E5%91%98cookie.md
金山云EDR任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%B1%B1/%E9%87%91%E5%B1%B1%E4%BA%91EDR%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
HM发卡网反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8F%91%E5%8D%A1%E7%BD%91%E7%B3%BB%E7%BB%9F/HM%E5%8F%91%E5%8D%A1%E7%BD%91%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
Nexus未授权目录穿越漏洞(CVE-2024-4956)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Nexus/Nexus%E6%9C%AA%E6%8E%88%E6%9D%83%E7%9B%AE%E5%BD%95%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E(CVE-2024-4956).md
泛微E-cology-LoginSSO.jsp存在QL注入漏洞(CNVD-2021-33202)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-cology-LoginSSO.jsp%E5%AD%98%E5%9C%A8QL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CNVD-2021-33202).md
万户ezEIP-success.aspx存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7ezEIP-success.aspx%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载定位监控平台SQL注入漏洞(XVE-2023-23744)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E5%A4%A9%E6%98%9F/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E5%AE%9A%E4%BD%8D%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(XVE-2023-23744).md
通天星CMSV6车载视频监控平台getAlser.acion接口处存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E5%A4%A9%E6%98%9F/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0getAlser.acion%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台xz_center信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E5%A4%A9%E6%98%9F/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0xz_center%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
智慧校园(安校易)管理系统FileUpProductupdate.aspx任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E6%85%A7%E6%A0%A1%E5%9B%AD(%E5%AE%89%E6%A0%A1%E6%98%93)%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%99%BA%E6%85%A7%E6%A0%A1%E5%9B%AD(%E5%AE%89%E6%A0%A1%E6%98%93)%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FFileUpProductupdate.aspx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
泛微E-Office10-OfficeServer任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Office10-OfficeServer%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
ArubaOS-RCE漏洞(CVE-2024-26304)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Aruba/ArubaOS-RCE%E6%BC%8F%E6%B4%9E(CVE-2024-26304).md
H3C路由器userLogin.asp信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/H3C/H3C%E8%B7%AF%E7%94%B1%E5%99%A8userLogin.asp%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
用友nc电子采购信息系统securitycheck存在sql注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8Bnc%E7%94%B5%E5%AD%90%E9%87%87%E8%B4%AD%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9Fsecuritycheck%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5.md
用友NC-warningDetailInfo接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-warningDetailInfo%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Confluence远程命令执行漏洞(CVE-2024-21683)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Confluence/Confluence%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-21683).md
蓝海卓越计费管理系统存在debug.php远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8debug.php%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
蓝海卓越计费管理系统存在download.php任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8download.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240523-新增漏洞
致远OAV52019系统properties信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COAV52019%E7%B3%BB%E7%BB%9Fproperties%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
GeoServer系统wms接口存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/GeoServer/GeoServer%E7%B3%BB%E7%BB%9Fwms%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
用友NC-complainbilldetail存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-complainbilldetail%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC-downTax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-downTax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
宏景eHR-OutputCode存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFeHR-OutputCode%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud-linkntb.jsp存在SQL注入漏洞(CNVD-C-2023-708748)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud-linkntb.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CNVD-C-2023-708748).md
懒人网址导航页search.html存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%87%92%E4%BA%BA%E7%BD%91%E5%9D%80%E5%AF%BC%E8%88%AA%E9%A1%B5/%E6%87%92%E4%BA%BA%E7%BD%91%E5%9D%80%E5%AF%BC%E8%88%AA%E9%A1%B5search.html%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
LVS精益价值管理系统LVS.Web.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/LVS%E7%B2%BE%E7%9B%8A%E4%BB%B7%E5%80%BC%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/LVS%E7%B2%BE%E7%9B%8A%E4%BB%B7%E5%80%BC%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FLVS.Web.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
LVS精益价值管理系统DownLoad.aspx存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/LVS%E7%B2%BE%E7%9B%8A%E4%BB%B7%E5%80%BC%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/LVS%E7%B2%BE%E7%9B%8A%E4%BB%B7%E5%80%BC%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDownLoad.aspx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA-E-Cology-Getdata.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
蓝海卓越计费管理系统SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
铭飞CMS-search接口存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%93%AD%E9%A3%9E/%E9%93%AD%E9%A3%9ECMS-search%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240521-新增漏洞
QNAP-QTS溢出导致的未授权RCE漏洞(CVE-2024-27130)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/QNAP/QNAP-QTS%E6%BA%A2%E5%87%BA%E5%AF%BC%E8%87%B4%E7%9A%84%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E(CVE-2024-27130).md
Zabbix-Serve-SQL注入漏洞(CVE-2024-22120)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Zabbix/Zabbix-Serve-SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-22120).md
山东聚恒网络技术有限公司聚恒中台data.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B1%B1%E4%B8%9C%E8%81%9A%E6%81%92%E7%BD%91%E7%BB%9C%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%B1%B1%E4%B8%9C%E8%81%9A%E6%81%92%E7%BD%91%E7%BB%9C%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E8%81%9A%E6%81%92%E4%B8%AD%E5%8F%B0data.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
方正畅享全媒体新闻采编系统binary.do存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B9%E6%AD%A3%E5%85%A8%E5%AA%92%E4%BD%93/%E6%96%B9%E6%AD%A3%E7%95%85%E4%BA%AB%E5%85%A8%E5%AA%92%E4%BD%93%E6%96%B0%E9%97%BB%E9%87%87%E7%BC%96%E7%B3%BB%E7%BB%9Fbinary.do%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Git远程代码执行漏洞(CVE-2024-32002)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Git/Git%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-32002).md
Gradio存在任意文件读取漏洞(CVE-2024-1561)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Gradio/Gradio%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-1561).md
EasyCVR视频管理平台存在任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EasyCVR%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/EasyCVR%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud系统XChangeServlet接口存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E7%B3%BB%E7%BB%9FXChangeServlet%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
emlog后台插件任意文件上传(CVE-2024-33752)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Emlog/emlog%E5%90%8E%E5%8F%B0%E6%8F%92%E4%BB%B6%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0(CVE-2024-33752).md
泛微OA-E-Cology-JqueryFileTree.jsp目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA-E-Cology-JqueryFileTree.jsp%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
cockpit系统upload接口存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/cockpit/cockpit%E7%B3%BB%E7%BB%9Fupload%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
宏景HCM系统fieldsettree接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFHCM%E7%B3%BB%E7%BB%9Ffieldsettree%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240518-新增漏洞
英飞达医学影像存档与通信系统WebJobUpload任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%8B%B1%E9%A3%9E%E8%BE%BE%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E5%AD%98%E6%A1%A3%E4%B8%8E%E9%80%9A%E4%BF%A1%E7%B3%BB%E7%BB%9F/%E8%8B%B1%E9%A3%9E%E8%BE%BE%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E5%AD%98%E6%A1%A3%E4%B8%8E%E9%80%9A%E4%BF%A1%E7%B3%BB%E7%BB%9FWebJobUpload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
佳会视频会议attachment任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BD%B3%E4%BC%9A%E8%A7%86%E9%A2%91%E4%BC%9A%E8%AE%AE/%E4%BD%B3%E4%BC%9A%E8%A7%86%E9%A2%91%E4%BC%9A%E8%AE%AEattachment%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
六零导航页存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%AD%E9%9B%B6%E5%AF%BC%E8%88%AA%E9%A1%B5/%E5%85%AD%E9%9B%B6%E5%AF%BC%E8%88%AA%E9%A1%B5%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
SeaCMS海洋影视管理系统dmku存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E6%B4%8Bcms/SeaCMS%E6%B5%B7%E6%B4%8B%E5%BD%B1%E8%A7%86%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdmku%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友CRM系统uploadfile.php接口存在任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BCRM%E7%B3%BB%E7%BB%9Fuploadfile.php%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
安达通TPN-2G安全网关远程代码执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E8%BE%BE%E9%80%9A/%E5%AE%89%E8%BE%BE%E9%80%9ATPN-2G%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C.md
科拓全智能停车收费系统DoubtCarNoListFrom.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E6%8B%93%E5%85%A8%E6%99%BA%E8%83%BD%E5%81%9C%E8%BD%A6%E6%94%B6%E8%B4%B9%E7%B3%BB%E7%BB%9F/%E7%A7%91%E6%8B%93%E5%85%A8%E6%99%BA%E8%83%BD%E5%81%9C%E8%BD%A6%E6%94%B6%E8%B4%B9%E7%B3%BB%E7%BB%9FDoubtCarNoListFrom.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
科拓全智能停车收费系统Webservice.asmx存在任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E6%8B%93%E5%85%A8%E6%99%BA%E8%83%BD%E5%81%9C%E8%BD%A6%E6%94%B6%E8%B4%B9%E7%B3%BB%E7%BB%9F/%E7%A7%91%E6%8B%93%E5%85%A8%E6%99%BA%E8%83%BD%E5%81%9C%E8%BD%A6%E6%94%B6%E8%B4%B9%E7%B3%BB%E7%BB%9FWebservice.asmx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
D-LINK-DIR-X4860未授权RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/D-Link/D-LINK-DIR-X4860%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240513-新增漏洞
用友NC系统registerServlet接口存在JNDI注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E7%B3%BB%E7%BB%9FregisterServlet%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8JNDI%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
微擎-AccountEdit-file-upload文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BE%AE%E6%93%8E/%E5%BE%AE%E6%93%8E-AccountEdit-file-upload%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
RuvarOA协同办公平台多处存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/RuvarOA%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0/RuvarOA%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0%E5%A4%9A%E5%A4%84%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
微厦在线学习平台OrganSetup存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%BE%AE%E5%8E%A6%E5%9C%A8%E7%BA%BF%E5%AD%A6%E4%B9%A0%E5%B9%B3%E5%8F%B0/%E5%BE%AE%E5%8E%A6%E5%9C%A8%E7%BA%BF%E5%AD%A6%E4%B9%A0%E5%B9%B3%E5%8F%B0OrganSetup%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
泛微E-Cology系统接口SignatureDownLoad存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Cology%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3SignatureDownLoad%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC系统printBill接口存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E7%B3%BB%E7%BB%9FprintBill%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
泛微-OA系统ResourceServlet接口任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AE-OA%E7%B3%BB%E7%BB%9FResourceServlet%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
锐捷网络flwo.control.php存在RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E7%BD%91%E7%BB%9Cflwo.control.php%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统-UploadFileManagerService-任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F-UploadFileManagerService-%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
大华ICC智能物联综合管理平台存在fastjson漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EICC%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8fastjson%E6%BC%8F%E6%B4%9E.md
联软安渡UniNXG安全数据交换系统poserver.zz存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%81%94%E8%BD%AF/%E8%81%94%E8%BD%AF%E5%AE%89%E6%B8%A1UniNXG%E5%AE%89%E5%85%A8%E6%95%B0%E6%8D%AE%E4%BA%A4%E6%8D%A2%E7%B3%BB%E7%BB%9Fposerver.zz%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
世纪信通管理系统DownLoadFiles.ashx存在任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%96%E7%BA%AA%E4%BF%A1%E9%80%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%B8%96%E7%BA%AA%E4%BF%A1%E9%80%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDownLoadFiles.ashx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
亿赛通电子文档安全管理系统downloadfromfile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdownloadfromfile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240508-新增漏洞
用友畅捷通TPlus-keyEdit.aspx接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%95%85%E6%8D%B7%E9%80%9ATPlus-keyEdit.aspx%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友时空KSOA-linkadd.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E6%97%B6%E7%A9%BAKSOA-linkadd.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
MetaCRM客户关系管理系统任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/MetaCRM/MetaCRM%E5%AE%A2%E6%88%B7%E5%85%B3%E7%B3%BB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友U8-CRM客户关系管理系统getemaildata.php任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E5%AE%A2%E6%88%B7%E5%85%B3%E7%B3%BB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fgetemaildata.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
电信网关配置管理后台ipping.php存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86%E5%90%8E%E5%8F%B0ipping.php%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
瑞友天翼应用虚拟化系统appsave接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%91%9E%E5%8F%8B%E5%A4%A9%E7%BF%BC%E5%BA%94%E7%94%A8%E8%99%9A%E6%8B%9F%E5%8C%96%E7%B3%BB%E7%BB%9F/%E7%91%9E%E5%8F%8B%E5%A4%A9%E7%BF%BC%E5%BA%94%E7%94%A8%E8%99%9A%E6%8B%9F%E5%8C%96%E7%B3%BB%E7%BB%9Fappsave%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微OA-E-Cology-FileDownload文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA-E-Cology-FileDownload%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
用友GRPA++Cloud政府财务云存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRPA++Cloud%E6%94%BF%E5%BA%9C%E8%B4%A2%E5%8A%A1%E4%BA%91%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
红海云eHR-PtFjk.mob存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BA%A2%E6%B5%B7%E4%BA%91eHR/%E7%BA%A2%E6%B5%B7%E4%BA%91eHR-PtFjk.mob%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
福建科立讯通信指挥调度管理平台ajax_users.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A6%8F%E5%BB%BA%E7%A7%91%E7%AB%8B%E8%AE%AF%E9%80%9A%E4%BF%A1/%E7%A6%8F%E5%BB%BA%E7%A7%91%E7%AB%8B%E8%AE%AF%E9%80%9A%E4%BF%A1%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0ajax_users.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金和OAC6-FileDownLoad.aspx任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COAC6-FileDownLoad.aspx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
F5-BIG-IP存在SQL注入漏洞(CVE-2024-26026)&(CVE-2024-21793)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/F5-BIG-IP/F5-BIG-IP%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-26026)&(CVE-2024-21793).md
Mura-CMS-processAsyncObject存在SQL注入漏洞(CVE-2024-32640)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Mura/Mura-CMS-processAsyncObject%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-32640).md
中移铁通禹路由器信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/%E4%B8%AD%E7%A7%BB%E9%93%81%E9%80%9A%E7%A6%B9%E8%B7%AF%E7%94%B1%E5%99%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
致远M3敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9CM3%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
Jan任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Jan/Jan%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Jeecg任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JeecgBoot/Jeecg%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
医院挂号系统SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8C%BB%E9%99%A2%E6%8C%82%E5%8F%B7%E7%B3%BB%E7%BB%9F/%E5%8C%BB%E9%99%A2%E6%8C%82%E5%8F%B7%E7%B3%BB%E7%BB%9FSQL%E6%B3%A8%E5%85%A5.md
https://github.com/eeeeeeeeee-code/POC#20240502-新增漏洞
和丰多媒体信息发布系统QH.aspx存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%92%8C%E4%B8%B0%E5%A4%9A%E5%AA%92%E4%BD%93%E4%BF%A1%E6%81%AF%E5%8F%91%E5%B8%83%E7%B3%BB%E7%BB%9F/%E5%92%8C%E4%B8%B0%E5%A4%9A%E5%AA%92%E4%BD%93%E4%BF%A1%E6%81%AF%E5%8F%91%E5%B8%83%E7%B3%BB%E7%BB%9FQH.aspx%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友NC-bill存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-bill%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-CRM客户关系管理系统downloadfile.php存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E5%AE%A2%E6%88%B7%E5%85%B3%E7%B3%BB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdownloadfile.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
OpenMetadata-SpEL注入(CVE-2024-28848)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/OpenMetadata/OpenMetadata-SpEL%E6%B3%A8%E5%85%A5(CVE-2024-28848).md
OpenMetadata命令执行漏洞(CVE-2024-28253)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/OpenMetadata/OpenMetadata%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-28253).md
Ncast高清智能录播系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Ncast%E9%AB%98%E6%B8%85%E6%99%BA%E8%83%BD%E5%BD%95%E6%92%AD%E7%B3%BB%E7%BB%9F/Ncast%E9%AB%98%E6%B8%85%E6%99%BA%E8%83%BD%E5%BD%95%E6%92%AD%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
AJ-Report开源数据大屏存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/AJ-Report/AJ-Report%E5%BC%80%E6%BA%90%E6%95%B0%E6%8D%AE%E5%A4%A7%E5%B1%8F%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台ipms接口存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0ipms%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240430-新增漏洞
亿赛通电子文档安全管理系统-jlockseniordao-findbylockname-sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F-jlockseniordao-findbylockname-sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统-MailMessageLogServices反序列漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F-MailMessageLogServices%E5%8F%8D%E5%BA%8F%E5%88%97%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统RestoreFiles任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FRestoreFiles%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
蓝网科技临床浏览系统-deleteStudy-SQL注入漏洞复现(CVE-2024-4257)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E7%BD%91%E7%A7%91%E6%8A%80%E4%B8%B4%E5%BA%8A%E6%B5%8F%E8%A7%88%E7%B3%BB%E7%BB%9F/%E8%93%9D%E7%BD%91%E7%A7%91%E6%8A%80%E4%B8%B4%E5%BA%8A%E6%B5%8F%E8%A7%88%E7%B3%BB%E7%BB%9F-deleteStudy-SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CVE-2024-4257).md
Pkpmbs建设工程质量监督系统FileUpOrDown.ashx存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Pkpmbs%E5%BB%BA%E8%AE%BE%E5%B7%A5%E7%A8%8B%E8%B4%A8%E9%87%8F%E7%9B%91%E7%9D%A3%E7%B3%BB%E7%BB%9F/Pkpmbs%E5%BB%BA%E8%AE%BE%E5%B7%A5%E7%A8%8B%E8%B4%A8%E9%87%8F%E7%9B%91%E7%9D%A3%E7%B3%BB%E7%BB%9FFileUpOrDown.ashx%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Mingsoft-MCMS前台查询文章列表接口SQL注入(CNVD-2024-06148)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Mingsoft/Mingsoft-MCMS%E5%89%8D%E5%8F%B0%E6%9F%A5%E8%AF%A2%E6%96%87%E7%AB%A0%E5%88%97%E8%A1%A8%E6%8E%A5%E5%8F%A3SQL%E6%B3%A8%E5%85%A5(CNVD-2024-06148).md
广州图书馆集群系统WebBookNew存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E5%B7%9E%E5%9B%BE%E5%88%9B%E5%9B%BE%E4%B9%A6%E9%A6%86%E9%9B%86%E7%BE%A4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%B9%BF%E5%B7%9E%E5%9B%BE%E4%B9%A6%E9%A6%86%E9%9B%86%E7%BE%A4%E7%B3%BB%E7%BB%9FWebBookNew%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Likeshop-formimage任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Likeshop/Likeshop-formimage%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
X2Modbus网关GetUser接口存在信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/X2Modbus/X2Modbus%E7%BD%91%E5%85%B3GetUser%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
WordPress-Automatic插件存在SQL注入漏洞(CVE-2024-27956)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress-Automatic%E6%8F%92%E4%BB%B6%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-27956).md
北京中科聚网一体化运营平台catchByUrl存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8C%97%E4%BA%AC%E4%B8%AD%E7%A7%91%E8%81%9A%E7%BD%91/%E5%8C%97%E4%BA%AC%E4%B8%AD%E7%A7%91%E8%81%9A%E7%BD%91%E4%B8%80%E4%BD%93%E5%8C%96%E8%BF%90%E8%90%A5%E5%B9%B3%E5%8F%B0catchByUrl%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
LiveGBS存在逻辑缺陷漏洞(CNVD-2023-72138)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/LiveGBS/LiveGBS%E5%AD%98%E5%9C%A8%E9%80%BB%E8%BE%91%E7%BC%BA%E9%99%B7%E6%BC%8F%E6%B4%9E(CNVD-2023-72138).md
北京亚控科技KingPortal开发系统漏洞集合https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8C%97%E4%BA%AC%E4%BA%9A%E6%8E%A7%E7%A7%91%E6%8A%80/%E5%8C%97%E4%BA%AC%E4%BA%9A%E6%8E%A7%E7%A7%91%E6%8A%80KingPortal%E5%BC%80%E5%8F%91%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E%E9%9B%86%E5%90%88.md
https://github.com/eeeeeeeeee-code/POC#20240428-新增漏洞
用友GRP-U8-slbmbygr.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-slbmbygr.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友GRP-U8-listSelectDialogServlet存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-listSelectDialogServlet%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
用友GRP-U8-bx_dj_check.jsp存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-bx_dj_check.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
用友GRP-U8-obr_zdybxd_check.jsp存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-obr_zdybxd_check.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
用友GRP-U8-userInfoWeb存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-userInfoWeb%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
用友GRP-U8-dialog_moreUser_check.jsp前台SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-dialog_moreUser_check.jsp%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md
用友GRP-U8-Proxy存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-Proxy%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友GRP-U8-sqcxIndex.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-sqcxIndex.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友GRP-U8-FileUpload任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-FileUpload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
用友GRP-U8-UploadFileData任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-UploadFileData%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
用友GRP-U8-ufgovbank存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-ufgovbank%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
用友GRP-U8-PayReturnForWcp接口存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-PayReturnForWcp%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
用友GRP-U8日志泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8%E6%97%A5%E5%BF%97%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240427-新增漏洞
通达OA-WHERE_STR存在前台SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA-WHERE_STR%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友GRP-U8-obr_zdybxd_check存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-obr_zdybxd_check%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友畅捷通TPlus-InitServerInfo存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%95%85%E6%8D%B7%E9%80%9ATPlus-InitServerInfo%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友畅捷通-TPlus-CheckMutex存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%95%85%E6%8D%B7%E9%80%9A-TPlus-CheckMutex%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友畅捷通TPlus-DownloadProxy.aspx任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%95%85%E6%8D%B7%E9%80%9ATPlus-DownloadProxy.aspx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
用友畅捷通CRM-create_site.phpSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%95%85%E6%8D%B7%E9%80%9ACRM-create_site.phpSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
MajorDoMo-thumb.php未授权RCE漏洞复现(CNVD-2024-02175)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/MajorDoMo/MajorDoMo-thumb.php%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CNVD-2024-02175).md
普元EOS-Platform-eos.jmx存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%AE%E5%85%83EOS-Platform/%E6%99%AE%E5%85%83EOS-Platform-eos.jmx%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
普元EOS-Platform-jmx.jmx存在远程代码执行漏洞(XVE-2023-24691)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%AE%E5%85%83EOS-Platform/%E6%99%AE%E5%85%83EOS-Platform-jmx.jmx%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(XVE-2023-24691).md
用友U8-Cloud-TableInputOperServlet存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud-TableInputOperServlet%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
湖南建研质量监测系统upload.ashx文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E6%A3%80%E6%B5%8B%E7%B3%BB%E7%BB%9F/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E8%B4%A8%E9%87%8F%E7%9B%91%E6%B5%8B%E7%B3%BB%E7%BB%9Fupload.ashx%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
脸爱云一脸通智慧管理平台存在UpLoadPic.ashx文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8UpLoadPic.ashx%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
ZenML服务器远程权限提升漏洞(CVE-2024-25723)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/ZenML/ZenML%E6%9C%8D%E5%8A%A1%E5%99%A8%E8%BF%9C%E7%A8%8B%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E(CVE-2024-25723).md
WordPress插件NotificationX存在sql注入漏洞(CVE-2024-1698)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6NotificationX%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-1698).md
CrushFTP服务器端模板注入(CVE-2024-4040)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/CrushFTP/CrushFTP%E6%9C%8D%E5%8A%A1%E5%99%A8%E7%AB%AF%E6%A8%A1%E6%9D%BF%E6%B3%A8%E5%85%A5(CVE-2024-4040).md
https://github.com/eeeeeeeeee-code/POC#20240423-新增漏洞
网动统一通信平台ActiveUC存在任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E5%8A%A8%E7%BB%9F%E4%B8%80%E9%80%9A%E4%BF%A1%E5%B9%B3%E5%8F%B0/%E7%BD%91%E5%8A%A8%E7%BB%9F%E4%B8%80%E9%80%9A%E4%BF%A1%E5%B9%B3%E5%8F%B0ActiveUC%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
锐捷校园网自助服务系统operatorReportorRoamService存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E6%A0%A1%E5%9B%AD%E7%BD%91%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9FoperatorReportorRoamService%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友政务财务系统FileDownload存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E6%94%BF%E5%8A%A1%E8%B4%A2%E5%8A%A1%E7%B3%BB%E7%BB%9FFileDownload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
F-logic_DataCube3存在SQL注入漏洞(CVE-2024-31750)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/F%20logic%20DataCube3/F-logic_DataCube3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-31750).md
用友移动系统管理uploadApk接口存在任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%A7%BB%E5%8A%A8%E7%B3%BB%E7%BB%9F%E7%AE%A1%E7%90%86uploadApk%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
泛微e-office系统UserSelect接口存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-office%E7%B3%BB%E7%BB%9FUserSelect%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
WIFISKY-7层流控路由器confirm.php接口处存在RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/WIFISKY-7%E5%B1%82%E6%B5%81%E6%8E%A7%E8%B7%AF%E7%94%B1%E5%99%A8confirm.php%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md
泛微E-Office-uploadfile.php任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Office-uploadfile.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
宏景HCM系统infoView处存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFHCM%E7%B3%BB%E7%BB%9FinfoView%E5%A4%84%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
卡车卫星定位系统create存在未授权密码重置漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%A1%E8%BD%A6%E5%8D%AB%E6%98%9F%E5%AE%9A%E4%BD%8D%E7%B3%BB%E7%BB%9F/%E5%8D%A1%E8%BD%A6%E5%8D%AB%E6%98%9F%E5%AE%9A%E4%BD%8D%E7%B3%BB%E7%BB%9Fcreate%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E.md
脸爱云一脸通智慧管理平台存在downloads.aspx信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8downloads.aspx%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
脸爱云一脸通智慧平台SelOperators信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E5%B9%B3%E5%8F%B0SelOperators%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
禅道项目管理系统身份认证绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A6%85%E9%81%93/%E7%A6%85%E9%81%93%E9%A1%B9%E7%9B%AE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240419-新增漏洞
用友U8GRP-fastjsonhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8GRP-fastjson%E6%BC%8F%E6%B4%9E.md
云时空社会化商业ERP系统validateLoginName接口处存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%91%E6%97%B6%E7%A9%BA/%E4%BA%91%E6%97%B6%E7%A9%BA%E7%A4%BE%E4%BC%9A%E5%8C%96%E5%95%86%E4%B8%9AERP%E7%B3%BB%E7%BB%9FvalidateLoginName%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Linksys/Linksys-RE7000%E6%97%A0%E7%BA%BF%E6%89%A9%E5%B1%95%E5%99%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-25852).md
IP-guard-WebServer存在权限绕过漏洞(QVD-2024-14103)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/IP%20guard%20WebServer/IP-guard-WebServer%E5%AD%98%E5%9C%A8%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(QVD-2024-14103).md
用友GRP-U8-operOriztion存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-operOriztion%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
时空智友企业流程化管控系统formservice存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%91%E6%97%B6%E7%A9%BA/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B%E4%BC%81%E4%B8%9A%E6%B5%81%E7%A8%8B%E5%8C%96%E7%AE%A1%E6%8E%A7%E7%B3%BB%E7%BB%9Fformservice%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微E-Office-jx2_config存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Office-jx2_config%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
泛微E-Mobile-messageType.do存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Mobile-messageType.do%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
润乾报表dataSphereServlet任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8dataSphereServlet%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
若依后台定时任务存在SSRF漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/RuoYi/%E8%8B%A5%E4%BE%9D%E5%90%8E%E5%8F%B0%E5%AE%9A%E6%97%B6%E4%BB%BB%E5%8A%A1%E5%AD%98%E5%9C%A8SSRF%E6%BC%8F%E6%B4%9E.md
用友NC-showcontent接口存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-showcontent%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240416-新增漏洞
网康科技NS-ASG应用安全网关add_ikev2.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80NS-ASG%E5%BA%94%E7%94%A8%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3add_ikev2.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
网康科技NS-ASG应用安全网关config_ISCGroupNoCache.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80NS-ASG%E5%BA%94%E7%94%A8%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3config_ISCGroupNoCache.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
网康科技NS-ASG应用安全网关config_Anticrack.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80NS-ASG%E5%BA%94%E7%94%A8%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3config_Anticrack.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
网康科技NS-ASG应用安全网关add_postlogin.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80NS-ASG%E5%BA%94%E7%94%A8%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3add_postlogin.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
广州图创图书馆集群管理系统updOpuserPw接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E5%B7%9E%E5%9B%BE%E5%88%9B%E5%9B%BE%E4%B9%A6%E9%A6%86%E9%9B%86%E7%BE%A4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%B9%BF%E5%B7%9E%E5%9B%BE%E5%88%9B%E5%9B%BE%E4%B9%A6%E9%A6%86%E9%9B%86%E7%BE%A4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FupdOpuserPw%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC-uploadControl接口存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-uploadControl%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
SpringBlade框架dict-biz接口存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SpringBlade/SpringBlade%E6%A1%86%E6%9E%B6dict-biz%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台downloadLogger接口任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E5%A4%A9%E6%98%9F/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0downloadLogger%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Progress-Flowmon命令注入漏洞(CVE-2024-2389)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Progress/Progress-Flowmon%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-2389).md
kkFileView-v4.3.0-RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/kkFileView/kkFileView-v4.3.0-RCE.md
draytek路由器addrouting命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/draytek%E8%B7%AF%E7%94%B1%E5%99%A8addrouting%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
飞企互联-FE企业运营管理平台ProxyServletUti存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94-FE%E4%BC%81%E4%B8%9A%E8%BF%90%E8%90%A5%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0ProxyServletUti%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
富通天下外贸ERP任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AF%8C%E9%80%9A%E5%A4%A9%E4%B8%8B%E5%A4%96%E8%B4%B8ERP/%E5%AF%8C%E9%80%9A%E5%A4%A9%E4%B8%8B%E5%A4%96%E8%B4%B8ERP%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友NC_grouptemplet文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC_grouptemplet%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友NC-avatar接口存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-avatar%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
PAN-OS安全设备存在命令执行漏洞(CVE-2024-3400)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PAN-OS/PAN-OS%E5%AE%89%E5%85%A8%E8%AE%BE%E5%A4%87%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-3400).md
https://github.com/eeeeeeeeee-code/POC#20240412-新增漏洞
新视窗新一代物业管理系统任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B0%E8%A7%86%E7%AA%97%E6%96%B0%E4%B8%80%E4%BB%A3%E7%89%A9%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%96%B0%E8%A7%86%E7%AA%97%E6%96%B0%E4%B8%80%E4%BB%A3%E7%89%A9%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Telesquare路由器RCE(CVE-2024-29269)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/Telesquare%E8%B7%AF%E7%94%B1%E5%99%A8RCE(CVE-2024-29269).md
物业专项维修资金管理系统漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%89%A9%E4%B8%9A%E4%B8%93%E9%A1%B9%E7%BB%B4%E4%BF%AE%E8%B5%84%E9%87%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%89%A9%E4%B8%9A%E4%B8%93%E9%A1%B9%E7%BB%B4%E4%BF%AE%E8%B5%84%E9%87%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E.md
用友NC-ActionServlet存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-ActionServlet%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
潍微科技-水务信息管理平台ChangePwd接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%BD%8D%E5%BE%AE%E7%A7%91%E6%8A%80/%E6%BD%8D%E5%BE%AE%E7%A7%91%E6%8A%80-%E6%B0%B4%E5%8A%A1%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0ChangePwd%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
OpenMetadata命令执行(CVE-2024-28255)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/OpenMetadata/OpenMetadata%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C(CVE-2024-28255).md
魔方网表mailupdate.jsp接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8mailupdate.jsp%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
奇安信VPN任意用户密码重置https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E6%93%8E/%E5%A5%87%E5%AE%89%E4%BF%A1VPN%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE.md
润乾报表平台InputServlet存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8%E5%B9%B3%E5%8F%B0InputServlet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
医院一站式后勤管理系统processApkUpload.upload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8C%BB%E9%99%A2%E4%B8%80%E7%AB%99%E5%BC%8F%E5%90%8E%E5%8B%A4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%8C%BB%E9%99%A2%E4%B8%80%E7%AB%99%E5%BC%8F%E5%90%8E%E5%8B%A4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FprocessApkUpload.upload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240410-新增漏洞
泛微E-Mobile-client.do存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Mobile-client.do%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
致远互联-OA前台fileUpload.do存在绕过文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9C%E4%BA%92%E8%81%94-OA%E5%89%8D%E5%8F%B0fileUpload.do%E5%AD%98%E5%9C%A8%E7%BB%95%E8%BF%87%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
宏景eHR人力资源管理软件showmediainfo存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFeHR%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6showmediainfo%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC接口PaWfm存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E6%8E%A5%E5%8F%A3PaWfm%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC接口ConfigResourceServlet存在反序列漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E6%8E%A5%E5%8F%A3ConfigResourceServlet%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E6%BC%8F%E6%B4%9E.md
用友NC-runStateServlet接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-runStateServlet%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC-workflowImageServlet接口存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-workflowImageServlet%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
畅捷通TPlus-KeyInfoList.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%95%85%E6%8D%B7%E9%80%9ATPlus-KeyInfoList.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%95%85%E6%8D%B7%E9%80%9ATPlus-App_Code.ashx%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
H3C_magic_R100路由器的UDPserver中存在命令执行漏洞(CVE-2022-34598)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/H3C/H3C_magic_R100%E8%B7%AF%E7%94%B1%E5%99%A8%E7%9A%84UDPserver%E4%B8%AD%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2022-34598).md
用友NC_saveImageServlet接口存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC_saveImageServlet%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
泛微e-cology-ProcessOverRequestByXml接口存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-cology-ProcessOverRequestByXml%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
用友crm-swfupload接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8Bcrm-swfupload%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240406-新增漏洞
用友U9-PatchFile.asmx接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU9-PatchFile.asmx%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友NC-Cloud_importhttpscer接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-Cloud_importhttpscer%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
亿赛通DecryptApplicationService2接口任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9ADecryptApplicationService2%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
亿赛通update接口sql注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9Aupdate%E6%8E%A5%E5%8F%A3sql%E6%B3%A8%E5%85%A5.md
用友U8cloud接口MeasureQueryByToolAction存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8cloud%E6%8E%A5%E5%8F%A3MeasureQueryByToolAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
浙大恩特客户资源管理系统-RegulatePriceAction存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9%E5%AE%A2%E6%88%B7%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9%E5%AE%A2%E6%88%B7%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F-RegulatePriceAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
科荣AIO-ReadFile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E8%8D%A3AIO/%E7%A7%91%E8%8D%A3AIO-ReadFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
东方通TongWeb-selectApp.jsp存在任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%9C%E6%96%B9%E9%80%9A/%E4%B8%9C%E6%96%B9%E9%80%9ATongWeb-selectApp.jsp%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
WordPress-js-support-ticket存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress-js-support-ticket%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
WordPress-thimpress_hotel_booking存在代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress-thimpress_hotel_booking%E5%AD%98%E5%9C%A8%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
万户ezOFFICE-wf_printnum.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7ezOFFICE-wf_printnum.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8cloud-ExportUfoFormatAction存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8cloud-ExportUfoFormatAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
JeePlus低代码开发平台存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JeePlus%E4%BD%8E%E4%BB%A3%E7%A0%81%E5%BC%80%E5%8F%91%E5%B9%B3%E5%8F%B0/JeePlus%E4%BD%8E%E4%BB%A3%E7%A0%81%E5%BC%80%E5%8F%91%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
润乾报表InputServlet接口存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8InputServlet%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
D-Link-NAS(CVE-2024-3272&&CVE-2024-3273)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/D-Link/D-Link-NAS(CVE-2024-3272&&CVE-2024-3273).md
https://github.com/eeeeeeeeee-code/POC#20240329-新增漏洞
泛微E-Office10版本小于v10.0_20240222存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-Office10%E7%89%88%E6%9C%AC%E5%B0%8F%E4%BA%8Ev10.0_20240222%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
用友NC接口saveXmlToFIleServlet存在文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E6%8E%A5%E5%8F%A3saveXmlToFIleServlet%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
TP-Link-ER7206存在命令注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/TP-Link-ER7206%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
JumpServer(CVE-2024-29201)远程代码执行漏洞&(CVE-2024-29202)Jinin2模板注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JumpServer/JumpServer(CVE-2024-29201)%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E&(CVE-2024-29202)Jinin2%E6%A8%A1%E6%9D%BF%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud接口FileManageServlet存在反序列漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E6%8E%A5%E5%8F%A3FileManageServlet%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud接口ServiceDispatcherServlet存在反序列漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E6%8E%A5%E5%8F%A3ServiceDispatcherServlet%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E6%BC%8F%E6%B4%9E.md
泛微e-cology接口getLabelByModule存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-cology%E6%8E%A5%E5%8F%A3getLabelByModule%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
WordPress_LayerSlider插件SQL注入漏洞(CVE-2024-2879)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress_LayerSlider%E6%8F%92%E4%BB%B6SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-2879).md
https://github.com/eeeeeeeeee-code/POC#20240328-新增漏洞
通天星-CMSV6-inspect_file-upload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E5%A4%A9%E6%98%9F/%E9%80%9A%E5%A4%A9%E6%98%9F-CMSV6-inspect_file-upload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友U8-Cloud接口FileServlet存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E6%8E%A5%E5%8F%A3FileServlet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
联达OA-UpLoadFile.aspx存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%81%94%E8%BE%BEOA/%E8%81%94%E8%BE%BEOA-UpLoadFile.aspx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
协达OA系统绕过登录认证登陆后台https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8F%E8%BE%BEOA/%E5%8D%8F%E8%BE%BEOA%E7%B3%BB%E7%BB%9F%E7%BB%95%E8%BF%87%E7%99%BB%E5%BD%95%E8%AE%A4%E8%AF%81%E7%99%BB%E9%99%86%E5%90%8E%E5%8F%B0.md
用友U8-nc.bs.sm.login2.RegisterServlet存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-nc.bs.sm.login2.RegisterServlet%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金石工程项目管理系统TianBaoJiLu.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E7%9F%B3%E5%B7%A5%E7%A8%8B%E9%A1%B9%E7%9B%AE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E9%87%91%E7%9F%B3%E5%B7%A5%E7%A8%8B%E9%A1%B9%E7%9B%AE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FTianBaoJiLu.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
易宝OA-BasicService.asmx存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E5%AE%9DOA/%E6%98%93%E5%AE%9DOA-BasicService.asmx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
WordPress Automatic Plugin任意文件下载漏洞(CVE-2024-27954)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%20Automatic%20Plugin%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E(CVE-2024-27954).md
商混ERP-DictionaryEdit.aspxSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%95%86%E6%B7%B7ERP/%E5%95%86%E6%B7%B7ERP-DictionaryEdit.aspxSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240327-新增漏洞
Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Adobe%20ColdFusion/Adobe-ColdFusion%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9ECVE-2024-20767.md
Fortinet-SSL-VPN-CVE-2024-21762https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Fortinet/Fortinet-SSL-VPN-CVE-2024-21762.md
omfyUI follow_symlinks文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/omfyUI/omfyUI%20follow_symlinks%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Fortra FileCatalyst Workflow远程代码执行漏漏洞(CVE-2024-25153)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Fortra/Fortra%20FileCatalyst%20Workflow%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%BC%8F%E6%B4%9E(CVE-2024-25153).md
联达OA uploadLogo.aspx存在任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%81%94%E8%BE%BEOA/%E8%81%94%E8%BE%BEOA%20uploadLogo.aspx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
网络验证系统getInfo参数存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E7%BB%9C%E9%AA%8C%E8%AF%81%E7%B3%BB/%E7%BD%91%E7%BB%9C%E9%AA%8C%E8%AF%81%E7%B3%BB%E7%BB%9FgetInfo%E5%8F%82%E6%95%B0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
致远OA-ucpcLogin密码重置漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA-ucpcLogin%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E.md
Cobbler存在远程命令执行漏洞(CVE-2021-40323)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Cobbler/Cobbler%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2021-40323).md
锐捷网络无线AC命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E7%BD%91%E7%BB%9C%E6%97%A0%E7%BA%BFAC%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
https://github.com/eeeeeeeeee-code/POC#20240324-新增漏洞
飞企互联-FE企业运营管理平台uploadAttachmentServlet存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94-FE%E4%BC%81%E4%B8%9A%E8%BF%90%E8%90%A5%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0uploadAttachmentServlet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Netgear路由器boardDataWW.php存在RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/Netgear%E8%B7%AF%E7%94%B1%E5%99%A8boardDataWW.php%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md
瑞友应用虚拟化系统-RAPAgent存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%91%9E%E5%8F%8B%E5%A4%A9%E7%BF%BC%E5%BA%94%E7%94%A8%E8%99%9A%E6%8B%9F%E5%8C%96%E7%B3%BB%E7%BB%9F/%E7%91%9E%E5%8F%8B%E5%BA%94%E7%94%A8%E8%99%9A%E6%8B%9F%E5%8C%96%E7%B3%BB%E7%BB%9F-RAPAgent%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
福建科立讯通信指挥调度平台get_extension_yl.php存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A6%8F%E5%BB%BA%E7%A7%91%E7%AB%8B%E8%AE%AF%E9%80%9A%E4%BF%A1/%E7%A6%8F%E5%BB%BA%E7%A7%91%E7%AB%8B%E8%AE%AF%E9%80%9A%E4%BF%A1%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0get_extension_yl.php%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友畅捷通RRATableController存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%95%85%E6%8D%B7%E9%80%9ARRATableController%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
用友时空KSOA-imagefield接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E6%97%B6%E7%A9%BAKSOA-imagefield%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
F-logic_DataCube3存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/F%20logic%20DataCube3/F-logic_DataCube3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
泛微getE9DevelopAllNameValue2接口存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEgetE9DevelopAllNameValue2%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
大华DSS城市安防监控平台Struct2-045命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%E5%9F%8E%E5%B8%82%E5%AE%89%E9%98%B2%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0Struct2-045%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240320-新增漏洞
飞鱼星上网行为管理系统企业版前台RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E9%B1%BC%E6%98%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BC%81%E4%B8%9A%E7%89%88%E5%89%8D%E5%8F%B0RCE.md
WordPress_Wholesale_Market插件存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress_Wholesale_Market%E6%8F%92%E4%BB%B6%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
万户ezOFFICE-contract_gd.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7ezOFFICE-contract_gd.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
宏景eHR-report_org_collect_tree.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFeHR-report_org_collect_tree.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
正方教学管理信息服务平台ReportServer存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%AD%A3%E6%96%B9/%E6%AD%A3%E6%96%B9%E6%95%99%E5%AD%A6%E7%AE%A1%E7%90%86%E4%BF%A1%E6%81%AF%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0ReportServer%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
金和OA-C6-IncentivePlanFulfill.aspx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA-C6-IncentivePlanFulfill.aspx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华DSS数字监控系统attachment_clearTempFile.action存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%E6%95%B0%E5%AD%97%E7%9B%91%E6%8E%A7%E7%B3%BB%E7%BB%9Fattachment_clearTempFile.action%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NCCloud系统runScript存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNCCloud%E7%B3%BB%E7%BB%9FrunScript%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240314-新增漏洞
亿赛通-数据泄露防护(DLP)ClientAjax接口存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A-%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4(DLP)ClientAjax%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统DecryptApplication存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDecryptApplication%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
金和OA_jc6_viewConTemplate.action存在FreeMarker模板注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA_jc6_viewConTemplate.action%E5%AD%98%E5%9C%A8FreeMarker%E6%A8%A1%E6%9D%BF%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8_Cloud-base64存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8_Cloud-base64%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台pageJson存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0pageJson%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金蝶云-星空ServiceGateway反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E8%9D%B6/%E9%87%91%E8%9D%B6%E4%BA%91-%E6%98%9F%E7%A9%BAServiceGateway%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
友点建站系统image_upload.php存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8F%8B%E7%82%B9%E5%BB%BA%E7%AB%99%E7%B3%BB%E7%BB%9F/%E5%8F%8B%E7%82%B9%E5%BB%BA%E7%AB%99%E7%B3%BB%E7%BB%9Fimage_upload.php%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
D-Link_DAR-8000操作系统命令注入漏洞(CVE-2023-4542)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/D-Link/D-Link_DAR-8000%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2023-4542).md
D-Link_DAR-8000-10上网行为审计网关任意文件上传漏洞(CVE-2023-5154)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/D-Link/D-Link_DAR-8000-10%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E5%AE%A1%E8%AE%A1%E7%BD%91%E5%85%B3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E(CVE-2023-5154).md
中成科信票务管理平台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1%E7%A5%A8%E5%8A%A1%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%B8%AD%E6%88%90%E7%A7%91%E4%BF%A1%E7%A5%A8%E5%8A%A1%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Springblade默认密钥可伪造凭据https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SpringBlade/Springblade%E9%BB%98%E8%AE%A4%E5%AF%86%E9%92%A5%E5%8F%AF%E4%BC%AA%E9%80%A0%E5%87%AD%E6%8D%AE.md
CERIO-DT系列路由器Save.cgi接口存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/CERIO-DT%E7%B3%BB%E5%88%97%E8%B7%AF%E7%94%B1%E5%99%A8Save.cgi%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240312-新增漏洞
宏景HCM-codesettree接口存在SQL注入漏洞 https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFHCM-codesettree%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBlade blade-log存在SQL 注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SpringBlade/SpringBlade%20blade-log%E5%AD%98%E5%9C%A8SQL%20%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
宏景HCM-downlawbase接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFHCM-downlawbase%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
天问物业ERP系统docfileDownLoad.aspx存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9F/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9FdocfileDownLoad.aspx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
H3C 用户自助服务平台 dynamiccontent.properties.xhtml存在RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/H3C/H3C%20%E7%94%A8%E6%88%B7%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0%20dynamiccontent.properties.xhtml%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md
网康科技 NS-ASG 应用安全网关 SQL注入漏洞(CVE-2024-2330)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80%20NS-ASG%20%E5%BA%94%E7%94%A8%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-2330).md
大华智慧园区clientServer接口SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BAclientServer%E6%8E%A5%E5%8F%A3SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华智慧园区getNewStaypointDetailQuery接口SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BAgetNewStaypointDetailQuery%E6%8E%A5%E5%8F%A3SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
网康NS-ASG应用安全网关singlelogin.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80/%E7%BD%91%E5%BA%B7NS-ASG%E5%BA%94%E7%94%A8%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3singlelogin.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
网康科技NS-ASG应用安全网关list_ipAddressPolicy.php存在SQL注入漏洞(CVE-2024-2022)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80/%E7%BD%91%E5%BA%B7%E7%A7%91%E6%8A%80NS-ASG%E5%BA%94%E7%94%A8%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3list_ipAddressPolicy.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-2022).md
用友NC-saveDoc.ajax存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-saveDoc.ajax%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统NavigationAjax接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FNavigationAjax%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
海康威视综合安防系统detection接口存在RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%B3%BB%E7%BB%9Fdetection%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240305-新增漏洞
H3C-校园网自助服务系统flexfileupload任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/H3C/H3C-%E6%A0%A1%E5%9B%AD%E7%BD%91%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Fflexfileupload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
绿盟日志审计系统存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BB%BF%E7%9B%9F/%E7%BB%BF%E7%9B%9F%E6%97%A5%E5%BF%97%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
JetBrains TeamCity 身份验证绕过漏洞(CVE-2024-27198)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JetBrains/JetBrains%20TeamCity%20%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(CVE-2024-27198).md
H3C-SecParh堡垒机任意用户登录漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/H3C/H3C-SecParh%E5%A0%A1%E5%9E%92%E6%9C%BA%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
红帆ioffice-udfGetDocStep.asmx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BA%A2%E5%B8%86OA/%E7%BA%A2%E5%B8%86ioffice-udfGetDocStep.asmx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
致远前台任意用户密码修改https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9C%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E4%BF%AE%E6%94%B9.md
JEEWMS仓库管理系统任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JEEWMS/JEEWMS%E4%BB%93%E5%BA%93%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
海康威视iVMS综合安防系统resourceOperations接口任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%B3%BB%E7%BB%9FresourceOperations%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
WordPress插件Bricks Builder存在RCE漏洞(CVE-2024-25600)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/WordPress%E6%8F%92%E4%BB%B6Bricks%20Builder%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E(CVE-2024-25600).md
大华EIMS-capture_handle接口远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EEIMS-capture_handle%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
帮管客CRM-jiliyu接口存在SQL漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B8%AE%E7%AE%A1%E5%AE%A2CRM/%E5%B8%AE%E7%AE%A1%E5%AE%A2CRM-jiliyu%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240301-新增漏洞
RG-UAC锐捷统一上网行为管理与审计系统存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/RG-UAC%E9%94%90%E6%8D%B7%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E4%B8%8E%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
RUOYI-v4.7.8存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/RuoYi/RUOYI-v4.7.8%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
西软云XMS-futurehotel-query接口存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%A5%BF%E8%BD%AF%E4%BA%91/%E8%A5%BF%E8%BD%AF%E4%BA%91XMS-futurehotel-query%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
西软云XMS-futurehotel-operate接口存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%A5%BF%E8%BD%AF%E4%BA%91/%E8%A5%BF%E8%BD%AF%E4%BA%91XMS-futurehotel-operate%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
宏景eHR-HCM-DisplayExcelCustomReport接口存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AFeHR-HCM-DisplayExcelCustomReport%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
用友U9-UMWebService.asmx存在文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU9-UMWebService.asmx%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
用友U8 Cloud-KeyWordReportQuery存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8%20Cloud-KeyWordReportQuery%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8 Cloud-ArchiveVerify存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8%20Cloud-ArchiveVerify%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
易宝OA系统DownloadFile接口存在文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E5%AE%9DOA/%E6%98%93%E5%AE%9DOA%E7%B3%BB%E7%BB%9FDownloadFile%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
浙大恩特客户资源管理系统-purchaseaction.entphone接口存在SQL漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9%E5%AE%A2%E6%88%B7%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9%E5%AE%A2%E6%88%B7%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F-purchaseaction.entphone%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%BC%8F%E6%B4%9E.md
惠尔顿-网络安全审计系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%83%A0%E5%B0%94%E9%A1%BF-%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F/%E6%83%A0%E5%B0%94%E9%A1%BF-%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
蓝凌EIS智慧协同平台rpt_listreport_definefield.aspx接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEIS%E6%99%BA%E6%85%A7%E5%8D%8F%E5%90%8C%E5%B9%B3%E5%8F%B0rpt_listreport_definefield.aspx%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240228-新增漏洞
鸿运(通天星CMSV6车载)主动安全监控云平台存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E5%A4%A9%E6%98%9F/%E9%B8%BF%E8%BF%90(%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD)%E4%B8%BB%E5%8A%A8%E5%AE%89%E5%85%A8%E7%9B%91%E6%8E%A7%E4%BA%91%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
万户OA-RhinoScriptEngineService命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7OA-RhinoScriptEngineService%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
宏景 DisplayFiles任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%8F%E6%99%AFOA/%E5%AE%8F%E6%99%AF%20DisplayFiles%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
蓝凌OA-WechatLoginHelper.do存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8COA-WechatLoginHelper.do%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友U8-OA协同工作系统doUpload.jsp任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-OA%E5%8D%8F%E5%90%8C%E5%B7%A5%E4%BD%9C%E7%B3%BB%E7%BB%9FdoUpload.jsp%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
aiohttp存在目录遍历漏洞(CVE-2024-23334)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/aiohttp/aiohttp%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E(CVE-2024-23334).md
https://github.com/eeeeeeeeee-code/POC#20240217-新增漏洞
宝塔最新未授权访问漏洞及sql注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%9D%E5%A1%94/%E5%AE%9D%E5%A1%94%E6%9C%80%E6%96%B0%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E%E5%8F%8Asql%E6%B3%A8%E5%85%A5.md
金盘移动图书馆系统存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E7%9B%98/%E9%87%91%E7%9B%98%E7%A7%BB%E5%8A%A8%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Panalog大数据日志审计系统libres_syn_delete.php存在命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Panalog/Panalog%E5%A4%A7%E6%95%B0%E6%8D%AE%E6%97%A5%E5%BF%97%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Flibres_syn_delete.php%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
WAGO系统远程代码执行漏洞(CVE-2023-1698)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WAGO/WAGO%E7%B3%BB%E7%BB%9F%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-1698).md
山石网科云鉴存在前台任意命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B1%B1%E7%9F%B3%E7%BD%91%E7%A7%91%E4%BA%91%E9%89%B4/%E5%B1%B1%E7%9F%B3%E7%BD%91%E7%A7%91%E4%BA%91%E9%89%B4%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#2024025-新增漏洞
天翼应用虚拟化系统sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E7%BF%BC%E5%BA%94%E7%94%A8%E8%99%9A%E6%8B%9F%E5%8C%96%E7%B3%BB%E7%BB%9F/%E5%A4%A9%E7%BF%BC%E5%BA%94%E7%94%A8%E8%99%9A%E6%8B%9F%E5%8C%96%E7%B3%BB%E7%BB%9Fsql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
LinkWeChat任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/LinkWeChat/LinkWeChat%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Weblogic远程代码执行(CVE-2024-20931)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Weblogic/Weblogic%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C(CVE-2024-20931).md
亿赛通-dataSearch.jsp-SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A-dataSearch.jsp-SQL%E6%B3%A8%E5%85%A5.md
https://github.com/eeeeeeeeee-code/POC#2024022-新增漏洞
亿赛通电子文档安全管理系统 UploadFileToCatalog SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20UploadFileToCatalog%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统GetValidateLoginUserService接口存在XStream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetValidateLoginUserService%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8XStream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统UploadFileList任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUploadFileList%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台bitmap接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0bitmap%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
飞企互联-FE企业运营管理平台publicData.jsp存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94-FE%E4%BC%81%E4%B8%9A%E8%BF%90%E8%90%A5%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0publicData.jsp%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240126-新增漏洞
Jenkins任意文件读取漏洞(CVE-2024-23897)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Jenkins/Jenkins%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-23897).md
SpringBlade export-user SQL 注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SpringBlade/SpringBlade%20export-user%20SQL%20%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
万户OA text2Html接口存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7OA%20text2Html%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统hiddenWatermark文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FhiddenWatermark%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友系统-U9企业版存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%B3%BB%E7%BB%9F-U9%E4%BC%81%E4%B8%9A%E7%89%88%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
广联达-linkworks-gwgdwebservice存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E8%81%94%E8%BE%BEOA/%E5%B9%BF%E8%81%94%E8%BE%BE-linkworks-gwgdwebservice%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
远秋医学培训系统未授权查看密码https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%BF%9C%E7%A7%8B%E5%8C%BB%E5%AD%A6%E5%9F%B9%E8%AE%AD%E7%B3%BB%E7%BB%9F/%E8%BF%9C%E7%A7%8B%E5%8C%BB%E5%AD%A6%E5%9F%B9%E8%AE%AD%E7%B3%BB%E7%BB%9F%E6%9C%AA%E6%8E%88%E6%9D%83%E6%9F%A5%E7%9C%8B%E5%AF%86%E7%A0%81.md
联软安全数据交换系统任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%81%94%E8%BD%AF/%E8%81%94%E8%BD%AF%E5%AE%89%E5%85%A8%E6%95%B0%E6%8D%AE%E4%BA%A4%E6%8D%A2%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
Apache Tomcat存在信息泄露漏洞( CVE-2024-21733)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache%20Tomcat%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E(%20CVE-2024-21733).md
https://github.com/eeeeeeeeee-code/POC#20240117-新增漏洞
Yearning_front任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Yearning/Yearning_front%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
云网OA8.6存在fastjson反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%91%E7%BD%91OA/%E4%BA%91%E7%BD%91OA8.6%E5%AD%98%E5%9C%A8fastjson%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
Apache Dubbo-admin-authorized-bypass (CNVD-2023-96546)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache%20Dubbo-admin-authorized-bypass%20(CNVD-2023-96546).md
先锋WEB燃气收费系统文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%88%E9%94%8BWEB%E7%87%83%E6%B0%94%E6%94%B6%E8%B4%B9%E7%B3%BB%E7%BB%9F/%E5%85%88%E9%94%8BWEB%E7%87%83%E6%B0%94%E6%94%B6%E8%B4%B9%E7%B3%BB%E7%BB%9F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
MRCMS3.0任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/MRCMS/MRCMS3.0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
奇安信天擎rptsvr任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E6%93%8E/%E5%A5%87%E5%AE%89%E4%BF%A1%E5%A4%A9%E6%93%8Erptsvr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
用友GRP-U8-SelectDMJE.jsp_SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BGRP-U8-SelectDMJE.jsp_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Ivanti_Connect_Secure远程命令注入漏洞(CVE-2024-21887)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Ivanti/Ivanti_Connect_Secure%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-21887).md
天擎终端安全管理系统YII_CSRF_TOKEN远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E6%93%8E/%E5%A4%A9%E6%93%8E%E7%BB%88%E7%AB%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FYII_CSRF_TOKEN%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
用友移动系统管理getFileLocal接口存在任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%A7%BB%E5%8A%A8%E7%B3%BB%E7%BB%9F%E7%AE%A1%E7%90%86getFileLocal%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
网神SecGate 3600 防火墙sys_hand_upfile 任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E7%A5%9E/%E7%BD%91%E7%A5%9ESecGate%203600%20%E9%98%B2%E7%81%AB%E5%A2%99sys_hand_upfile%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Atlassian Confluence 远程代码执行漏洞(CVE-2023-22527)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Confluence/Atlassian%20Confluence%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-22527).md
Laykefu客服系统任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Laykefu%E5%AE%A2%E6%9C%8D%E7%B3%BB%E7%BB%9F/Laykefu%E5%AE%A2%E6%9C%8D%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240112-新增漏洞
GitLab任意用户密码重置漏洞(CVE-2023-7028)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/GitLab/GitLab%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E(CVE-2023-7028).md
SpiderFlow爬虫平台远程命令执行漏洞(CVE-2024-0195)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SpiderFlow%E7%88%AC%E8%99%AB%E5%B9%B3%E5%8F%B0/SpiderFlow%E7%88%AC%E8%99%AB%E5%B9%B3%E5%8F%B0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-0195).md
亿赛通电子文档安全管理系统dump接口存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdump%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
金和OA_SAP_B1Config.aspx未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA_SAP_B1Config.aspx%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
致远OA_getAjaxDataServlet接口存在任XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA_getAjaxDataServlet%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BBXXE%E6%BC%8F%E6%B4%9E.md
金和OA_jc6_ntko-upload任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA_jc6_ntko-upload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
蓝凌EIS智慧协同平台多个接口SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEIS%E6%99%BA%E6%85%A7%E5%8D%8F%E5%90%8C%E5%B9%B3%E5%8F%B0%E5%A4%9A%E4%B8%AA%E6%8E%A5%E5%8F%A3SQL%E6%B3%A8%E5%85%A5.md
金和OA_CarCardInfo.aspx_SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA_CarCardInfo.aspx_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金和OA_MailTemplates.aspx_SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA_MailTemplates.aspx_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金和OA_upload_json.asp存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA_upload_json.asp%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
金和OA_uploadfileeditorsave接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA_uploadfileeditorsave%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Ncast盈可视高清智能录播系统存在RCE漏洞(CVE-2024-0305)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Ncast%E9%AB%98%E6%B8%85%E6%99%BA%E8%83%BD%E5%BD%95%E6%92%AD%E7%B3%BB%E7%BB%9F/Ncast%E7%9B%88%E5%8F%AF%E8%A7%86%E9%AB%98%E6%B8%85%E6%99%BA%E8%83%BD%E5%BD%95%E6%92%AD%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E(CVE-2024-0305).md
金和OA_jc6_Upload任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA_jc6_Upload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
Apache_Solr环境变量信息泄漏漏洞(CVE-2023-50290)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache_Solr%E7%8E%AF%E5%A2%83%E5%8F%98%E9%87%8F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E(CVE-2023-50290).md
浙大恩特客户资源管理系统crmbasicaction任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9%E5%AE%A2%E6%88%B7%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9%E5%AE%A2%E6%88%B7%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fcrmbasicaction%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
https://github.com/eeeeeeeeee-code/POC#20240109-新增漏洞
金和OA_HomeService.asmxSQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA_HomeService.asmxSQL%E6%B3%A8%E5%85%A5.md
用友移动管理平台uploadIcon任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%E7%A7%BB%E5%8A%A8%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0uploadIcon%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
捷诚管理信息系统sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%8D%B7%E8%AF%9A%E7%AE%A1%E7%90%86%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9F/%E6%8D%B7%E8%AF%9A%E7%AE%A1%E7%90%86%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9Fsql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
奇安信网康下一代防火墙directdata存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E6%93%8E/%E5%A5%87%E5%AE%89%E4%BF%A1%E7%BD%91%E5%BA%B7%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99directdata%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240105-新增漏洞
用友NC_CLOUD_smartweb2.RPC.d_XML外部实体注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC_CLOUD_smartweb2.RPC.d_XML%E5%A4%96%E9%83%A8%E5%AE%9E%E4%BD%93%E6%B3%A8%E5%85%A5.md
IDocView_qJvqhFt接口任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/iDocView/IDocView_qJvqhFt%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
⻜企互联loginService任意登录https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94/%E2%BB%9C%E4%BC%81%E4%BA%92%E8%81%94loginService%E4%BB%BB%E6%84%8F%E7%99%BB%E5%BD%95.md
全程云OA__ajax.ashxSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%85%A8%E7%A8%8B%E4%BA%91OA/%E5%85%A8%E7%A8%8B%E4%BA%91OA__ajax.ashxSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微移动管理平台lang2sql接口任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AE%E7%A7%BB%E5%8A%A8%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0lang2sql%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
广联达OA任意用户登录https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E8%81%94%E8%BE%BEOA/%E5%B9%BF%E8%81%94%E8%BE%BEOA%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95.md
广联达OA前台任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E8%81%94%E8%BE%BEOA/%E5%B9%BF%E8%81%94%E8%BE%BEOA%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
金蝶EAS_pdfviewlocal任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E8%9D%B6/%E9%87%91%E8%9D%B6EAS_pdfviewlocal%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
PbootCMS全版本后台通杀任意代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/PbootCMS/PbootCMS%E5%85%A8%E7%89%88%E6%9C%AC%E5%90%8E%E5%8F%B0%E9%80%9A%E6%9D%80%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20240103-新增漏洞
天融信TOPSEC_maincgi.cgi远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E8%9E%8D%E4%BF%A1/%E5%A4%A9%E8%9E%8D%E4%BF%A1TOPSEC_maincgi.cgi%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
天融信TOPSEC_static_convert远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E8%9E%8D%E4%BF%A1/%E5%A4%A9%E8%9E%8D%E4%BF%A1TOPSEC_static_convert%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
用友CRM系统reservationcomplete.php存在逻辑漏洞直接登录后台https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BCRM%E7%B3%BB%E7%BB%9Freservationcomplete.php%E5%AD%98%E5%9C%A8%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E%E7%9B%B4%E6%8E%A5%E7%99%BB%E5%BD%95%E5%90%8E%E5%8F%B0.md
亿赛通电子文档uploadFile接口文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3uploadFile%E6%8E%A5%E5%8F%A3%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231231-新增漏洞
OfficeWeb365_任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/OfficeWeb365/OfficeWeb365_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
东华医疗协同办公系统反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%9C%E5%8D%8E%E5%8C%BB%E7%96%97%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E7%B3%BB%E7%BB%9F/%E4%B8%9C%E5%8D%8E%E5%8C%BB%E7%96%97%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E7%B3%BB%E7%BB%9F%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
东华医疗协同办公系统文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%9C%E5%8D%8E%E5%8C%BB%E7%96%97%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E7%B3%BB%E7%BB%9F/%E4%B8%9C%E5%8D%8E%E5%8C%BB%E7%96%97%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E7%B3%BB%E7%BB%9F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
飞企互联-FE企业运营管理平台登录绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94-FE%E4%BC%81%E4%B8%9A%E8%BF%90%E8%90%A5%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
飞企互联Ognl表达式注入导致RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94/%E9%A3%9E%E4%BC%81%E4%BA%92%E8%81%94Ognl%E8%A1%A8%E8%BE%BE%E5%BC%8F%E6%B3%A8%E5%85%A5%E5%AF%BC%E8%87%B4RCE.md
西软云XMS反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%A5%BF%E8%BD%AF%E4%BA%91/%E8%A5%BF%E8%BD%AF%E4%BA%91XMS%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
用友U8_cloud_KeyWordDetailReportQuery_SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8_cloud_KeyWordDetailReportQuery_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
用友NC_Cloud_soapFormat.ajax接口存在XXEhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC_Cloud_soapFormat.ajax%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8XXE.md
https://github.com/eeeeeeeeee-code/POC#20231228-新增漏洞
wordpress listingo 文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/wordpress%20listingo%20%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Apache OFBiz 身份验证绕过漏洞 (CVE-2023-51467)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache%20OFBiz%20%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20(CVE-2023-51467).md
福建科立讯通信有限公司指挥调度管理平台RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A6%8F%E5%BB%BA%E7%A7%91%E7%AB%8B%E8%AE%AF%E9%80%9A%E4%BF%A1/%E7%A6%8F%E5%BB%BA%E7%A7%91%E7%AB%8B%E8%AE%AF%E9%80%9A%E4%BF%A1%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0RCE.md
海康威视-综合安防管理平台-files-文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86-%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0-files-%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
Apache OFBiz SSRF && 任意配置读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache%20OFBiz%20SSRF%20&&%20%E4%BB%BB%E6%84%8F%E9%85%8D%E7%BD%AE%E8%AF%BB%E5%8F%96.md
Apache Dubbo 反序列化漏洞(CVE-2023-29234)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache%20Dubbo%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-29234%EF%BC%89.md
https://github.com/eeeeeeeeee-code/POC#20231226-新增漏洞
大华DSS itcBulletin SQL 注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%20itcBulletin%20SQL%20%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
湖南建研-检测系统 admintool 任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E6%A3%80%E6%B5%8B%E7%B3%BB%E7%BB%9F/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94-%E6%A3%80%E6%B5%8B%E7%B3%BB%E7%BB%9F%20admintool%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
OpenSSH ProxyCommand命令注入漏洞 (CVE-2023-51385)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/OpenSSH/OpenSSH%20ProxyCommand%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20(CVE-2023-51385).md
Salia PLCC cPH2 远程命令执行漏洞(CVE-2023-46359)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Salia/Salia%20PLCC%20cPH2%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-46359).md
金蝶Apusic应用服务器loadTree JNDI注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E8%9D%B6/%E9%87%91%E8%9D%B6Apusic%E5%BA%94%E7%94%A8%E6%9C%8D%E5%8A%A1%E5%99%A8loadTree%20JNDI%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
科荣 AIO任意文件上传-目录遍历-任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%A7%91%E8%8D%A3AIO/%E7%A7%91%E8%8D%A3%20AIO%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0-%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86-%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Secnet安网 智能AC管理系统 actpt_5g 信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Secnet%E5%AE%89%E7%BD%91%E6%99%BA%E8%83%BDAC%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/Secnet%E5%AE%89%E7%BD%91%20%E6%99%BA%E8%83%BDAC%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20actpt_5g%20%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
海康威视安全接入网关任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E5%AE%89%E5%85%A8%E6%8E%A5%E5%85%A5%E7%BD%91%E5%85%B3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
浙江宇视isc网络视频录像机LogReport.php存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%99%E6%B1%9F%E5%AE%87%E8%A7%86/%E6%B5%99%E6%B1%9F%E5%AE%87%E8%A7%86isc%E7%BD%91%E7%BB%9C%E8%A7%86%E9%A2%91%E5%BD%95%E5%83%8F%E6%9C%BALogReport.php%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
海翔ERP SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E7%BF%94ERP/%E6%B5%B7%E7%BF%94ERP%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
脸爱云 一脸通智慧管理平台任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E8%84%B8%E7%88%B1%E4%BA%91%20%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
安恒明御安全网关远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E6%81%92/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231223-新增漏洞
avcon综合管理平台SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/AVCON/avcon%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
致远互联FE协作办公平台editflow_manager存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9C%E4%BA%92%E8%81%94FE%E5%8D%8F%E4%BD%9C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0editflow_manager%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
海康威视CVE-2023-6895 IP网络对讲广播系统远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86CVE-2023-6895%20IP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
铭飞CMS list接口存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%93%AD%E9%A3%9E/%E9%93%AD%E9%A3%9ECMS%20list%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
海康威视IP网络对讲广播系统任意文件下载漏洞CVE-2023-6893https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86IP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9ECVE-2023-6893.md
https://github.com/eeeeeeeeee-code/POC#20231217-新增漏洞
大华智能物联综合管理平台justForTest用户登录漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0justForTest%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
CloudPanel RCE漏洞 CVE-2023-35885https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/CloudPanel/CloudPanel%20RCE%E6%BC%8F%E6%B4%9E%20CVE-2023-35885.md
Smartbi 内置用户登陆绕过https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Smartbi/Smartbi%20%E5%86%85%E7%BD%AE%E7%94%A8%E6%88%B7%E7%99%BB%E9%99%86%E7%BB%95%E8%BF%87.md
金和OA jc6 clobfield SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA%20jc6%20clobfield%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
EasyCVR 视频管理平台存在用户信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/EasyCVR%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/EasyCVR%20%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E7%94%A8%E6%88%B7%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
用友CRM 任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BCRM%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
金蝶星空云K3Cloud反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E8%9D%B6/%E9%87%91%E8%9D%B6%E6%98%9F%E7%A9%BA%E4%BA%91K3Cloud%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231215-新增漏洞
万户ezoffice wpsservlet任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7ezoffice%20wpsservlet%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
万户 ezOFFICE DocumentEdit.jsp SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7%20ezOFFICE%20DocumentEdit.jsp%20SQL%E6%B3%A8%E5%85%A5.md
用友 NC uapws wsdl XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%20NC%20uapws%20wsdl%20XXE%E6%BC%8F%E6%B4%9E.md
iDocView upload接口任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/iDocView/iDocView%20upload%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
Wordpress Backup Migration plugin 代码执行漏洞(CVE-2023-6553)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WordPress/Wordpress%20Backup%20Migration%20plugin%20%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-6553).md
https://github.com/eeeeeeeeee-code/POC#20231214-新增漏洞
泛微云桥 e-Bridge addTaste接口SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AE%E4%BA%91%E6%A1%A5%20e-Bridge%20addTaste%E6%8E%A5%E5%8F%A3SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Tenda路由器账号密码泄露https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Tenda/Tenda%E8%B7%AF%E7%94%B1%E5%99%A8%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2.md
思福迪运维安全管理系统RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%80%9D%E7%A6%8F%E8%BF%AA%E8%BF%90%E7%BB%B4%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%80%9D%E7%A6%8F%E8%BF%AA%E8%BF%90%E7%BB%B4%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FRCE%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231211-新增漏洞
Apache Struts2 CVE-2023-50164https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache%20Struts2%20CVE-2023-50164.md
蓝凌EKP前台授权绕过导致文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEKP%E5%89%8D%E5%8F%B0%E6%8E%88%E6%9D%83%E7%BB%95%E8%BF%87%E5%AF%BC%E8%87%B4%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
通达OA header身份认证绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20header%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231208-新增漏洞
Dedecms v5.7.111前台tags.php SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/dede/Dedecms%20v5.7.111%E5%89%8D%E5%8F%B0tags.php%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
云时空社会化商业ERP任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%91%E6%97%B6%E7%A9%BA/%E4%BA%91%E6%97%B6%E7%A9%BA%E7%A4%BE%E4%BC%9A%E5%8C%96%E5%95%86%E4%B8%9AERP%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
奥威亚视频云平台VideoCover.aspx接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A5%A5%E5%A8%81%E4%BA%9A%E8%A7%86%E9%A2%91%E4%BA%91%E5%B9%B3%E5%8F%B0/%E5%A5%A5%E5%A8%81%E4%BA%9A%E8%A7%86%E9%A2%91%E4%BA%91%E5%B9%B3%E5%8F%B0VideoCover.aspx%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231207-新增漏洞
WeiPHP存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WeiPHP/WeiPHP%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Apache Ofbiz XML-RPC RCE漏洞-CVE-2023-49070https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache%20Ofbiz%20XML-RPC%20RCE%E6%BC%8F%E6%B4%9E-CVE-2023-49070.md
多个防火墙产品RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%98%B2%E7%81%AB%E5%A2%99%E4%BA%A7%E5%93%81/%E5%A4%9A%E4%B8%AA%E9%98%B2%E7%81%AB%E5%A2%99%E4%BA%A7%E5%93%81RCE.md
金蝶Apusic应用服务器任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E8%9D%B6/%E9%87%91%E8%9D%B6Apusic%E5%BA%94%E7%94%A8%E6%9C%8D%E5%8A%A1%E5%99%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
https://github.com/eeeeeeeeee-code/POC#20231205-新增漏洞
速达软件全系产品存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E5%85%A8%E7%B3%BB%E4%BA%A7%E5%93%81%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
易思智能物流无人值守系统5.0存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81%E6%97%A0%E4%BA%BA%E5%80%BC%E5%AE%88%E7%B3%BB%E7%BB%9F/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81%E6%97%A0%E4%BA%BA%E5%80%BC%E5%AE%88%E7%B3%BB%E7%BB%9F5.0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
RuoYi4.6.0 SQL注入漏洞CVE-2023-49371https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/RuoYi/RuoYi4.6.0%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9ECVE-2023-49371.md
https://github.com/eeeeeeeeee-code/POC#20231203-新增漏洞
智跃人力资源管理系统GenerateEntityFromTable.aspx SQL漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%99%BA%E8%B7%83%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%99%BA%E8%B7%83%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGenerateEntityFromTable.aspx%20SQL%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231130-新增漏洞
Apache-ActiveMQ-Jolokia-远程代码执行漏洞-CVE-2022-41678https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-ActiveMQ-Jolokia-%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E-CVE-2022-41678.md
红帆OA iorepsavexml.aspx 文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BA%A2%E5%B8%86OA/%E7%BA%A2%E5%B8%86OA%20iorepsavexml.aspx%20%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231129-新增漏洞
网神防火墙 app_av_import_save文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%BD%91%E7%A5%9E/%E7%BD%91%E7%A5%9E%E9%98%B2%E7%81%AB%E5%A2%99%20app_av_import_save%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
大华智慧园区管理平台任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
通达OA down.php接口存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20down.php%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231128-新增漏洞
新开普掌上校园服务管理平台service.action远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%96%B0%E5%BC%80%E6%99%AE%E6%8E%8C%E4%B8%8A%E6%A0%A1%E5%9B%AD%E6%9C%8D%E5%8A%A1%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%96%B0%E5%BC%80%E6%99%AE%E6%8E%8C%E4%B8%8A%E6%A0%A1%E5%9B%AD%E6%9C%8D%E5%8A%A1%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0service.action%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
易宝OA ExecuteSqlForSingle SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%93%E5%AE%9DOA/%E6%98%93%E5%AE%9DOA%20ExecuteSqlForSingle%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台 deleteFtp 远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%20deleteFtp%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
云匣子堡垒机fastjson漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%BA%91%E5%8C%A3%E5%AD%90%E5%A0%A1%E5%9E%92%E6%9C%BA/%E4%BA%91%E5%8C%A3%E5%AD%90%E5%A0%A1%E5%9E%92%E6%9C%BAfastjson%E6%BC%8F%E6%B4%9E.md
海康威视运行管理中心fastjson漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E8%BF%90%E8%A1%8C%E7%AE%A1%E7%90%86%E4%B8%AD%E5%BF%83fastjson%E6%BC%8F%E6%B4%9E.md
Array VPN任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Array%20VPN/Array%20VPN%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
万户OA-upload任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7OA-upload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231126-新增漏洞
用友NC word.docx任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%20word.docx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
用友NC的download文件存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC%E7%9A%84download%E6%96%87%E4%BB%B6%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
泛微e-cology9_SQL注入-CNVD-2023-12632https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-cology9_SQL%E6%B3%A8%E5%85%A5-CNVD-2023-12632.md
TOTOLINK A3700R命令执行漏洞CVE-2023-46574https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%B7%AF%E7%94%B1%E5%99%A8/TOTOLINK%20A3700R%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9ECVE-2023-46574.md
Splunk-Enterprise远程代码执行漏洞(CVE-2023-46214)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Splunk%20Enterprise/Splunk-Enterprise%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-46214).md
https://github.com/eeeeeeeeee-code/POC#20231124-新增漏洞
华为Auth-Http Serve任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%8D%8E%E4%B8%BAAuth-Http%20Serve/%E5%8D%8E%E4%B8%BAAuth-Http%20Serve%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
昂捷ERP WebService接口 SQL注入漏洞(QVD-2023-45071)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%98%82%E6%8D%B7ERP/%E6%98%82%E6%8D%B7ERP%20WebService%E6%8E%A5%E5%8F%A3%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(QVD-2023-45071).md
好视通视频会议系统 toDownload.do接口 任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A5%BD%E8%A7%86%E9%80%9A%E8%A7%86%E9%A2%91%E4%BC%9A%E8%AE%AE%E7%B3%BB%E7%BB%9F/%E5%A5%BD%E8%A7%86%E9%80%9A%E8%A7%86%E9%A2%91%E4%BC%9A%E8%AE%AE%E7%B3%BB%E7%BB%9F%20toDownload.do%E6%8E%A5%E5%8F%A3%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231123-新增漏洞
大华智能物联ICC综合管理平台readpic任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94ICC%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0readpic%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Apache-Submarine-SQL注入漏洞CVE-2023-37924https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache-Submarine-SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9ECVE-2023-37924.md
H3C网络管理系统任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/H3C/H3C%E7%BD%91%E7%BB%9C%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
广州图创图书馆集群管理系统存在未授权访问https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%B9%BF%E5%B7%9E%E5%9B%BE%E5%88%9B%E5%9B%BE%E4%B9%A6%E9%A6%86%E9%9B%86%E7%BE%A4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%B9%BF%E5%B7%9E%E5%9B%BE%E5%88%9B%E5%9B%BE%E4%B9%A6%E9%A6%86%E9%9B%86%E7%BE%A4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md
I Doc View任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/iDocView/I%20Doc%20View%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
致远OA M3 Server 反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA%20M3%20Server%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
pyLoad远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/pyLoad/pyLoad%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231120-新增漏洞
金蝶OA-EAS系统 uploadLogo.action 任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E8%9D%B6/%E9%87%91%E8%9D%B6OA-EAS%E7%B3%BB%E7%BB%9F%20uploadLogo.action%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
浙大恩特客户资源管理系统 文件上传和sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9%E5%AE%A2%E6%88%B7%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9%E5%AE%A2%E6%88%B7%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E5%92%8Csql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理与审计系统管理员密码泄露https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E4%B8%8E%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F%E7%AE%A1%E7%90%86%E5%91%98%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2.md
Appium Desktop CVE-2023-2479漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Appium%20Desktop/Appium%20Desktop%20CVE-2023-2479%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231119-新增漏洞
用友U8-cloud RegisterServlet接口存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-cloud%20RegisterServlet%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SysAid远程命令执行漏洞(CVE-2023-47246)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/SysAid/SysAid%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-47246%EF%BC%89.md
CVE-2023-4357-Chrome-XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Chrome/CVE-2023-4357-Chrome-XXE%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231117-新增漏洞
金蝶OA云星空 ScpSupRegHandler 任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E8%9D%B6/%E9%87%91%E8%9D%B6OA%E4%BA%91%E6%98%9F%E7%A9%BA%20ScpSupRegHandler%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231116-新增漏洞
迪普DPTech VPN 任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%BF%AA%E6%99%AE/%E8%BF%AA%E6%99%AEDPTech%20VPN%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
蓝凌OAsysUiComponent 文件存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8COAsysUiComponent%20%E6%96%87%E4%BB%B6%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
通达OA get_datas.php前台sql注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20get_datas.php%E5%89%8D%E5%8F%B0sql%E6%B3%A8%E5%85%A5.md
https://github.com/eeeeeeeeee-code/POC#20231109-新增漏洞
IP-guard WebServer 远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/IP%20guard%20WebServer/IP-guard%20WebServer%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231108-新增漏洞
奇安信360天擎getsimilarlistSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E6%93%8E/%E5%A5%87%E5%AE%89%E4%BF%A1360%E5%A4%A9%E6%93%8EgetsimilarlistSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
致远M1 usertokenservice 反序列化RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9CM1%20usertokenservice%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96RCE%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231107-新增漏洞
jshERP信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/jshERP/jshERP%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
致远OA wpsAssistServlet任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA%20wpsAssistServlet%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
金和OA任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%92%8COA/%E9%87%91%E5%92%8COA%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231103-新增漏洞
XXL-JOB默认accessToken身份绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/XXL-JOB/XXL-JOB%E9%BB%98%E8%AE%A4accessToken%E8%BA%AB%E4%BB%BD%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
Confluence身份认证绕过(CVE-2023-22518)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Confluence/Confluence%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87(CVE-2023-22518).md
https://github.com/eeeeeeeeee-code/POC#20231031-新增漏洞
F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/F5-BIG-IP/F5%20BIG-IP%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-46747).md
Cisco IOS XE CVE-2023-20198权限提升漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Cisco/Cisco%20IOS%20XE%20CVE-2023-20198%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231030-新增漏洞
JAVA Public CMS 后台RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Public%20CMS/JAVA%20Public%20CMS%20%E5%90%8E%E5%8F%B0RCE%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231026-新增漏洞
Apache ActiveMQ远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache%20ActiveMQ%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231025-新增漏洞
用友U8-Cloud upload任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%20upload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
安美数字酒店宽带运营系统SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9FSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微E-MobileServer远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEE-MobileServer%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
蓝凌OA treexml.tmpl 远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8COA%20treexml.tmpl%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#20231021-新增漏洞
海康威视综合安防管理平台信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
https://github.com/eeeeeeeeee-code/POC#20231020-新增漏洞
蓝凌EIS智慧协同平台saveImg接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEIS%E6%99%BA%E6%85%A7%E5%8D%8F%E5%90%8C%E5%B9%B3%E5%8F%B0saveImg%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
用友NC-Cloud uploadChunk 任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BNC-Cloud%20uploadChunk%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
深信服下一代防火墙NGAF RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B7%B1%E4%BF%A1%E6%9C%8D/%E6%B7%B1%E4%BF%A1%E6%9C%8D%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99NGAF%20RCE%E6%BC%8F%E6%B4%9E.md
金蝶EAS myUploadFile任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E8%9D%B6/%E9%87%91%E8%9D%B6EAS%20myUploadFile%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
用友 GRP U8 license_check.jsp 存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%20GRP%20U8%20license_check.jsp%20%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
https://github.com/eeeeeeeeee-code/POC#20231018-新增漏洞
360天擎 - 未授权与sql注入https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%A4%A9%E6%93%8E/360%E5%A4%A9%E6%93%8E%20-%20%E6%9C%AA%E6%8E%88%E6%9D%83%E4%B8%8Esql%E6%B3%A8%E5%85%A5.md
深信服SANGFOR终端检测响应平台 - 任意用户免密登录,前台RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B7%B1%E4%BF%A1%E6%9C%8D/%E6%B7%B1%E4%BF%A1%E6%9C%8DSANGFOR%E7%BB%88%E7%AB%AF%E6%A3%80%E6%B5%8B%E5%93%8D%E5%BA%94%E5%B9%B3%E5%8F%B0%20-%20%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%85%8D%E5%AF%86%E7%99%BB%E5%BD%95,%E5%89%8D%E5%8F%B0RCE.md
深信服下一代防火墙NGAF任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B7%B1%E4%BF%A1%E6%9C%8D/%E6%B7%B1%E4%BF%A1%E6%9C%8D%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99NGAF%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Confluence 未授权提权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Confluence/Confluence%20%E6%9C%AA%E6%8E%88%E6%9D%83%E6%8F%90%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
泛微e-office 未授权访问https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEe-office%20%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md
金山终端安全系统V9.0 SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E9%87%91%E5%B1%B1/%E9%87%91%E5%B1%B1%E7%BB%88%E7%AB%AF%E5%AE%89%E5%85%A8%E7%B3%BB%E7%BB%9FV9.0%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#2023926-新增漏洞
JumpServer未授权访问漏洞 CVE-2023-42442https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JumpServer/JumpServer%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9E.md
Craft CMS远程代码执行漏洞 CVE-2023-41892https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Craft/Craft%20CMS%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9ECVE-2023-41892.md
WinRAR CVE-2023-38831 漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/WinRAR/WinRAR%20CVE-2023-38831.md
用友 GRP-U8 bx_historyDataCheck.jsp SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%20GRP-U8%20bx_historyDataCheck.jsp%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
https://github.com/eeeeeeeeee-code/POC#2023922-新增漏洞
Joomla 未授权漏洞CVE-2023-23752https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Joomla/Joomla%20%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9ECVE-2023-23752.md
https://github.com/eeeeeeeeee-code/POC#2023919-新增漏洞
smanga存在未授权远程代码执行漏洞 CVE-2023-36076https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/smanga/smanga%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
JFinalCMS 任意文件读取漏洞(CVE-2023-41599)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/JFinalCMS/JFinalCMS%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2023-41599).md
https://github.com/eeeeeeeeee-code/POC#2023914-新增漏洞
致远OA前台用户重置密码漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9C%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E4%BF%AE%E6%94%B9.md
Apache Spark命令执行漏洞(CVE-2023-32007)https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/Apache/Apache%20Spark%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-32007%EF%BC%89.md
https://starchart.cc/wy876/POChttps://starchart.cc/wy876/POC
https://github.com/eeeeeeeeee-code/POC#补充安云星球漏洞
360天擎终端安全管理系统getsimilarlist存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/360/360%E5%A4%A9%E6%93%8E%E7%BB%88%E7%AB%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fgetsimilarlist%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
360天擎终端安全管理系统loglastsync存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/360/360%E5%A4%A9%E6%93%8E%E7%BB%88%E7%AB%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Floglastsync%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
360天擎终端安全管理系统rptsvcsyncpoint存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/360/360%E5%A4%A9%E6%93%8E%E7%BB%88%E7%AB%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Frptsvcsyncpoint%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
360新天擎终端安全管理系统信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/360/360%E6%96%B0%E5%A4%A9%E6%93%8E%E7%BB%88%E7%AB%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
ACTI-视频监控images存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/ACTI/ACTI-%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7images%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Acmailer邮件系统init_ctl存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Acmailer%E9%82%AE%E4%BB%B6%E7%B3%BB%E7%BB%9F/Acmailer%E9%82%AE%E4%BB%B6%E7%B3%BB%E7%BB%9Finit_ctl%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
AmcrestIPCameraWebSha1Account1账号密码泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Amcrest/AmcrestIPCameraWebSha1Account1%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
ApaceOFBizgetJSONuiLabelArray存在服务端请求伪造ssrf漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Apache/ApachOFBiz/ApaceOFBizgetJSONuiLabelArray%E5%AD%98%E5%9C%A8%E6%9C%8D%E5%8A%A1%E7%AB%AF%E8%AF%B7%E6%B1%82%E4%BC%AA%E9%80%A0ssrf%E6%BC%8F%E6%B4%9E.md
ApacheAPISIX默认密钥漏洞(CVE-2020-13945)https://github.com/eeeeeeeeee-code/POC/blob/main/Apache/ApacheAPISIX/ApacheAPISIX%E9%BB%98%E8%AE%A4%E5%AF%86%E9%92%A5%E6%BC%8F%E6%B4%9E(CVE-2020-13945).md
ApaceDruid存在Log4j远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Apache/ApacheDruid/ApaceDruid%E5%AD%98%E5%9C%A8Log4j%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
ApaceDruid存在任意文件读取漏洞(CVE-2021-36749)https://github.com/eeeeeeeeee-code/POC/blob/main/Apache/ApacheDruid/ApaceDruid%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2021-36749).md
ApaceDruid存在未授权漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Apache/ApacheDruid/ApaceDruid%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9E.md
ApaceDruid存在远程代码执行漏洞(CVE-2021-25646)https://github.com/eeeeeeeeee-code/POC/blob/main/Apache/ApacheDruid/ApaceDruid%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2021-25646).md
ApaceDruid存在远程命令执行漏洞(CVE-2023-25194)https://github.com/eeeeeeeeee-code/POC/blob/main/Apache/ApacheDruid/ApaceDruid%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-25194).md
ApacheSolrVelocity模版注入远程命令执行漏洞(CVE-2019-17558)https://github.com/eeeeeeeeee-code/POC/blob/main/Apache/ApacheSolr/ApacheSolrVelocity%E6%A8%A1%E7%89%88%E6%B3%A8%E5%85%A5%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2019-17558%EF%BC%89.md
Array-Networks-APV应用交付系统ping_hosts存在任意命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Array-Networks-APV/Array-Networks-APV%E5%BA%94%E7%94%A8%E4%BA%A4%E4%BB%98%E7%B3%BB%E7%BB%9Fping_hosts%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
ArrayVPN存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/ArrayVPN/ArrayVPN%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
ArrisTR3300路由器basic_sett存在未授权信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Arris/ArrisTR3300%E8%B7%AF%E7%94%B1%E5%99%A8basic_sett%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
C-Lodop打印服务系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/C-Lodop%E6%89%93%E5%8D%B0%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9F/C-Lodop%E6%89%93%E5%8D%B0%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Canal存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Canal/Canal%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
Canal存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Canal/Canal%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
CellinxNVT摄像机GetFileContent.cgi任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/CellinxNVT%E6%91%84%E5%83%8F%E6%9C%BA/CellinxNVT%E6%91%84%E5%83%8F%E6%9C%BAGetFileContent.cgi%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
CheckPoint安全网关MyCRL存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/CheckPoint/CheckPoint%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3MyCRL%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
CrestronHDaj.html存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Crestron/CrestronHDaj.html%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
CrestronHDaj.html存在账号密码泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Crestron/CrestronHDaj.html%E5%AD%98%E5%9C%A8%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
D-LinkD-View8JWT认证绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/D-Link/D-LinkD-View8JWT%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
D-LinkDAR上网行为审计网关importhtml远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/D-Link/D-LinkDAR%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E5%AE%A1%E8%AE%A1%E7%BD%91%E5%85%B3importhtml%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
D-LinkDCS监控系统getuser存在密码泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/D-Link/D-LinkDCS%E7%9B%91%E6%8E%A7%E7%B3%BB%E7%BB%9Fgetuser%E5%AD%98%E5%9C%A8%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
D-Link下一代防火墙sslvpn_client存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/D-Link/D-Link%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99sslvpn_client%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
DVR设备存在敏感信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/DVR/DVR%E8%AE%BE%E5%A4%87%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
DraytekVigor2960路由器mainfunction任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/DrayTek/DraytekVigor2960%E8%B7%AF%E7%94%B1%E5%99%A8mainfunction%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
DraytekVigor2960路由器mainfunction远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/DrayTek/DraytekVigor2960%E8%B7%AF%E7%94%B1%E5%99%A8mainfunction%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Elasticsearch存在任意文件写入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Elasticsearch/Elasticsearch%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Elasticsearch存在未授权访问导致的RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/Elasticsearch/Elasticsearch%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E5%AF%BC%E8%87%B4%E7%9A%84RCE.md
FortigateSSLVPNfgt_lang存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Fortigate/FortigateSSLVPNfgt_lang%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
FortinetFortiOSmessage存在xss漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Fortigate/FortinetFortiOSmessage%E5%AD%98%E5%9C%A8xss%E6%BC%8F%E6%B4%9E.md
GB28181摄像头管理平台WVP视频平台存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/GB28181%E6%91%84%E5%83%8F%E5%A4%B4%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/GB28181%E6%91%84%E5%83%8F%E5%A4%B4%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0WVP%E8%A7%86%E9%A2%91%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
GB28181摄像头管理平台WVP视频平台存在接口文档信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/GB28181%E6%91%84%E5%83%8F%E5%A4%B4%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/GB28181%E6%91%84%E5%83%8F%E5%A4%B4%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0WVP%E8%A7%86%E9%A2%91%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E6%8E%A5%E5%8F%A3%E6%96%87%E6%A1%A3%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
GB28181摄像头管理平台WVP视频平台存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/GB28181%E6%91%84%E5%83%8F%E5%A4%B4%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/GB28181%E6%91%84%E5%83%8F%E5%A4%B4%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0WVP%E8%A7%86%E9%A2%91%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
GitLabAPI未授权SSRF漏洞(CVE-2021-22214)https://github.com/eeeeeeeeee-code/POC/blob/main/Gitlab/GitLabAPI%E6%9C%AA%E6%8E%88%E6%9D%83SSRF%E6%BC%8F%E6%B4%9E(CVE-2021-22214).md
Grafana存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Grafana/Grafana%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Grafana存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Grafana/Grafana%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
Grafana存在默认口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Grafana/Grafana%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
H2dbconsole未授权访问https://github.com/eeeeeeeeee-code/POC/blob/main/H2DB/H2dbconsole%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md
H3C-H100路由器-信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/H3C/H3C-H100/H3C-H100%E8%B7%AF%E7%94%B1%E5%99%A8-%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
H3CCVM前台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/H3C/H3CCVM/H3CCVM%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
H3CIMC远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/H3C/H3CIMC/H3CIMC%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
H3CSecPath堡垒机data_provider.php远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/H3C/H3CSecPath%E5%A0%A1%E5%9E%92%E6%9C%BA/H3CSecPath%E5%A0%A1%E5%9E%92%E6%9C%BAdata_provider.php%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
H3CWeb网管登录系统aaa_portal_auth_wchat_submit存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/H3C/H3CWeb%E7%BD%91%E7%AE%A1%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9F/H3CWeb%E7%BD%91%E7%AE%A1%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9Faaa_portal_auth_wchat_submit%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
H3CWeb网管登录系统jQuery-1.7.2存在任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/H3C/H3CWeb%E7%BD%91%E7%AE%A1%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9F/H3CWeb%E7%BD%91%E7%AE%A1%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9FjQuery-1.7.2%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
H3CWeb网管登录系统sslvpn_client存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/H3C/H3CWeb%E7%BD%91%E7%AE%A1%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9F/H3CWeb%E7%BD%91%E7%AE%A1%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9Fsslvpn_client%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
H3C多系列路由器存在任意用户登录漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/H3C/H3C%E5%A4%9A%E7%B3%BB%E5%88%97%E8%B7%AF%E7%94%B1%E5%99%A8/H3C%E5%A4%9A%E7%B3%BB%E5%88%97%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
H3C多系列路由器存在前台远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/H3C/H3C%E5%A4%9A%E7%B3%BB%E5%88%97%E8%B7%AF%E7%94%B1%E5%99%A8/H3C%E5%A4%9A%E7%B3%BB%E5%88%97%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
HSCMailinspectorloader存在任意文件读取漏洞(CVE-2024-34470)https://github.com/eeeeeeeeee-code/POC/blob/main/HSC/HSCMailinspectorloader%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-34470).md
HytecInterHWL-2511-SS路由器popen.cgi命令注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/HytecInter/HytecInterHWL-2511-SS%E8%B7%AF%E7%94%B1%E5%99%A8popen.cgi%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
IP-guardWebServer权限绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/IP-guard/IP-guardWebServer%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
IP-guardWebServer远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/IP-guard/IP-guardWebServer%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
JCGJHR-N835R后台存在命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/JCG/JCGJHR-N835R%E5%90%8E%E5%8F%B0%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
JumpServer存在未授权访问漏洞(CVE-2023-42442)https://github.com/eeeeeeeeee-code/POC/blob/main/JumpServer/JumpServer%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-42442%EF%BC%89.md
KEDACOM数字系统接入网关任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/KEDACOM/KEDACOM%E6%95%B0%E5%AD%97%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%85%A5%E7%BD%91%E5%85%B3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Kyan网络监控设备run.php远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Kyan/Kyan%E7%BD%91%E7%BB%9C%E7%9B%91%E6%8E%A7%E8%AE%BE%E5%A4%87run.php%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Kyan网络监控设备密码泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Kyan/Kyan%E7%BD%91%E7%BB%9C%E7%9B%91%E6%8E%A7%E8%AE%BE%E5%A4%87%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
LiveGBSapidoc存在信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/LiveGBS/LiveGBSapidoc%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
LiveGBSlist存在信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/LiveGBS/LiveGBSlist%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
LiveGBSsave存在任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/LiveGBS/LiveGBSsave%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
MSA互联网管理网关msa任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/MSA/MSA%E4%BA%92%E8%81%94%E7%BD%91%E7%AE%A1%E7%90%86%E7%BD%91%E5%85%B3msa%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
MailCow存在Swagger未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/MailCow/MailCow%E5%AD%98%E5%9C%A8Swagger%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
MajorDoMothumb未授权RCE漏洞(CNVD-2024-02175)https://github.com/eeeeeeeeee-code/POC/blob/main/MajorDoMo/MajorDoMothumb%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E(CNVD-2024-02175).md
Milesight-VPN任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Milesight/Milesight-VPN%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
MinIO存在信息泄露漏洞(CVE-2023-28432)https://github.com/eeeeeeeeee-code/POC/blob/main/MinIO/MinIO%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E(CVE-2023-28432).md
MinIO存在默认口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/MinIO/MinIO%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
NETGEARDGND3700v2路由器setup.cgi接口身份认证绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/NETGEAR/NETGEARDGND3700v2%E8%B7%AF%E7%94%B1%E5%99%A8setup.cgi%E6%8E%A5%E5%8F%A3%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
NETGEARProSafeSSLVPNSQL注入(CNNVD-202205-3298)https://github.com/eeeeeeeeee-code/POC/blob/main/NETGEAR/NETGEARProSafeSSLVPNSQL%E6%B3%A8%E5%85%A5%EF%BC%88CNNVD-202205-3298%EF%BC%89.md
NETGEARProSafeSSLVPN任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/NETGEAR/NETGEARProSafeSSLVPN%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
NUUO摄像头存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/NUUO/NUUO%E6%91%84%E5%83%8F%E5%A4%B4%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
NetMizer日志管理系统cmd存在命令执漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/NetMizer/NetMizer%E6%97%A5%E5%BF%97%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fcmd%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E6%BC%8F%E6%B4%9E.md
NetMizer日志管理系统存在前台RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/NetMizer/NetMizer%E6%97%A5%E5%BF%97%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0RCE%E6%BC%8F%E6%B4%9E.md
NetMizer日志管理系统存在目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/NetMizer/NetMizer%E6%97%A5%E5%BF%97%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
NetMizer日志管理系统登录绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/NetMizer/NetMizer%E6%97%A5%E5%BF%97%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
NextGenMirthConnectXStream存在反序列化远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/NextGen/NextGenMirthConnectXStream%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
NocoDB任意文件读取漏洞(CVE-2023-35843)https://github.com/eeeeeeeeee-code/POC/blob/main/NocoDB/NocoDB%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-35843%EF%BC%89.md
OfficeWeb365Pic存在任意读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/OfficeWeb365/OfficeWeb365Pic%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
OfficeWeb365SaveDraw存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/OfficeWeb365/OfficeWeb365SaveDraw%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
OfficeWeb365wordfix存在任意读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/OfficeWeb365/OfficeWeb365wordfix%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
OpenMetadataCVE-2024-28255命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/OpenMetadata/OpenMetadataCVE-2024-28255%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
OracleJDEdwardsEnterpriseOneTools存在未授权获取管理员密码漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Oracle/OracleJDEdwardsEnterpriseOneTools/OracleJDEdwardsEnterpriseOneTools%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%8E%B7%E5%8F%96%E7%AE%A1%E7%90%86%E5%91%98%E5%AF%86%E7%A0%81%E6%BC%8F%E6%B4%9E.md
PEPM系统Cookie请求头存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/PEPM/PEPM%E7%B3%BB%E7%BB%9FCookie%E8%AF%B7%E6%B1%82%E5%A4%B4%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
PHP-8.1.0-devzerodium后门命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/PHP/PHP-8.1.0-devzerodium%E5%90%8E%E9%97%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
PHPCGIWindows平台远程代码执行漏洞(CVE-2024-4577)https://github.com/eeeeeeeeee-code/POC/blob/main/PHP/PHPCGIWindows%E5%B9%B3%E5%8F%B0%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-4577).md
PanabitiXCacheajax_cmd存在后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Panabit/PanabitiXCache/PanabitiXCacheajax_cmd%E5%AD%98%E5%9C%A8%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
PanabitiXCachedate_config存在后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Panabit/PanabitiXCache/PanabitiXCachedate_config%E5%AD%98%E5%9C%A8%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
PanabitiXCache存在默认口令https://github.com/eeeeeeeeee-code/POC/blob/main/Panabit/PanabitiXCache/PanabitiXCache%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4.md
panabit日志审计系统mailcious_down_fornode远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Panabit/panabit%E6%97%A5%E5%BF%97%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F/panabit%E6%97%A5%E5%BF%97%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fmailcious_down_fornode%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
panabit日志审计系统sprog_deletevent存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Panabit/panabit%E6%97%A5%E5%BF%97%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F/panabit%E6%97%A5%E5%BF%97%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fsprog_deletevent%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
panabit日志审计系统任意用户创建漏洞和后台命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/Panabit/panabit%E6%97%A5%E5%BF%97%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F/panabit%E6%97%A5%E5%BF%97%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%88%9B%E5%BB%BA%E6%BC%8F%E6%B4%9E%E5%92%8C%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
panabit日志审计系统存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Panabit/panabit%E6%97%A5%E5%BF%97%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F/panabit%E6%97%A5%E5%BF%97%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
PowerJob信息泄漏漏洞(CVE-2023-29923)https://github.com/eeeeeeeeee-code/POC/blob/main/PowerJob/PowerJob%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-29923%EF%BC%89.md
pythonGradio插件存在任意文件读取漏洞(CVE-2024-1561)https://github.com/eeeeeeeeee-code/POC/blob/main/Python/pythonGradio%E6%8F%92%E4%BB%B6%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-1561).md
pythonaiohttp插件存在目录遍历漏洞(CVE-2024-23334)https://github.com/eeeeeeeeee-code/POC/blob/main/Python/pythonaiohttp%E6%8F%92%E4%BB%B6%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E(CVE-2024-23334).md
QualitorcheckAcesso.php存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Qualitor/QualitorcheckAcesso.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
QualitorprocessVariavel.php存在未授权命令注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Qualitor/QualitorprocessVariavel.php%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Quicklancerlisting存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Quicklancer/Quicklancerlisting%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
RaidenMAILD邮件服务器v.4.9.4存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/RaidenMAILD%E9%82%AE%E4%BB%B6%E6%9C%8D%E5%8A%A1%E5%99%A8/RaidenMAILD%E9%82%AE%E4%BB%B6%E6%9C%8D%E5%8A%A1%E5%99%A8v.4.9.4%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Redis-manager存在SpringBoot未授权漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/RedisManager/Redis-manager%E5%AD%98%E5%9C%A8SpringBoot%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9E.md
Redis-manager存在默认口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/RedisManager/Redis-manager%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
Redis存在未授权访问导致的RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/Redis/Redis%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E5%AF%BC%E8%87%B4%E7%9A%84RCE.md
RejettoHTTP文件服务器search存在命令执行漏洞(CVE-2024-23692)https://github.com/eeeeeeeeee-code/POC/blob/main/Rejetto/RejettoHTTP%E6%96%87%E4%BB%B6%E6%9C%8D%E5%8A%A1%E5%99%A8search%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-23692).md
RichMail企业邮箱敏感信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/RichMail%E4%BC%81%E4%B8%9A%E9%82%AE%E7%AE%B1/RichMail%E4%BC%81%E4%B8%9A%E9%82%AE%E7%AE%B1%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
Roxy-WIoptions.py远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Roxy-WI/Roxy-WIoptions.py%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
SPIP插件porte_plume存在任意PHP执行漏洞(CVE-2024-7954)https://github.com/eeeeeeeeee-code/POC/blob/main/SPIP/SPIP%E6%8F%92%E4%BB%B6porte_plume%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8FPHP%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-7954).md
Secnet安网智能AC管理系统actpt_5g信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/Secnet%E5%AE%89%E7%BD%91/Secnet%E5%AE%89%E7%BD%91%E6%99%BA%E8%83%BDAC%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Factpt_5g%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
ServiceNowUIJelly模板注入漏洞(CVE-2024-4879)https://github.com/eeeeeeeeee-code/POC/blob/main/ServiceNowUI/ServiceNowUIJelly%E6%A8%A1%E6%9D%BF%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-4879).md
ShokoServerwithpath存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/ShokoServer/ShokoServerwithpath%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
ShowDocPageController存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/ShowDoc/ShowDocPageController%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Smangaget-file-flow存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Smanga/Smangaget-file-flow%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
SmangamediaId存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Smanga/SmangamediaId%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Smanga未授权远程代码执行漏洞(CVE-2023-36076)https://github.com/eeeeeeeeee-code/POC/blob/main/Smanga/Smanga%E6%9C%AA%E6%8E%88%E6%9D%83%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-36076).md
SolarWindsServ-U存在目录遍历漏洞(CVE-2024-28995)https://github.com/eeeeeeeeee-code/POC/blob/main/SolarWinds/SolarWindsServ-U%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E(CVE-2024-28995).md
SonatypeNexusRepository3存在目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Sonatype/SonatypeNexusRepository3%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
SpiderFlow爬虫平台存在远程命令执行漏洞(CVE-2024-0195)https://github.com/eeeeeeeeee-code/POC/blob/main/SpiderFlow%E7%88%AC%E8%99%AB%E5%B9%B3%E5%8F%B0/SpiderFlow%E7%88%AC%E8%99%AB%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2024-0195%EF%BC%89.md
SplunkEnterprise任意文件读取漏洞(CVE-2024-36991)https://github.com/eeeeeeeeee-code/POC/blob/main/SplunkEnterprise/SplunkEnterprise%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-36991).md
SpringBladeapi-list存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladeapi-list%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBladeblade-user-list存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladeblade-user-list%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBladecode-list存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladecode-list%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBladedatasource-list存在敏感信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladedatasource-list%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
SpringBladedict-biz-list存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladedict-biz-list%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBladedict-biz存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladedict-biz%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBladeerror_list存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladeerror_list%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBladeexport-user存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladeexport-user%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBlademenu_list存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBlademenu_list%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBladenotice-list存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladenotice-list%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBladeoss-list存在敏感信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladeoss-list%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
SpringBladetenant-list存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladetenant-list%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBladeuser-list存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladeuser-list%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
SpringBladeusual-list存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBladeusual-list%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
SpringBlade存在硬编码密钥漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBlade/SpringBlade%E5%AD%98%E5%9C%A8%E7%A1%AC%E7%BC%96%E7%A0%81%E5%AF%86%E9%92%A5%E6%BC%8F%E6%B4%9E.md
SpringBootjolokiaRealmJNDI远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringBoot/SpringBootjolokiaRealmJNDI%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
SpringDataMongoDBSpEL表达式注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringDataMongoDB/SpringDataMongoDBSpEL%E8%A1%A8%E8%BE%BE%E5%BC%8F%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Springbootgateway存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringDataMongoDB/Springbootgateway%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
SpringEureka存在actuator未授权漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SpringEureka/SpringEureka%E5%AD%98%E5%9C%A8actuator%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9E.md
SuiteCRMresponseEntryPoint存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/SuiteCRM/SuiteCRMresponseEntryPoint%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Supabasequery存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Supabase/Supabasequery%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
TBKDVR硬盘录像机device存在远程代码执行漏洞(CVE-2024-3721)https://github.com/eeeeeeeeee-code/POC/blob/main/TBK/TBKDVR%E7%A1%AC%E7%9B%98%E5%BD%95%E5%83%8F%E6%9C%BAdevice%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-3721).md
TOTOLINK存在泄漏账号密码泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/TOTOLINK/TOTOLINK%E5%AD%98%E5%9C%A8%E6%B3%84%E6%BC%8F%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
TVT数码科技NVMS-1000路径遍历漏洞(CVE-2019-20085)https://github.com/eeeeeeeeee-code/POC/blob/main/TVT%E6%95%B0%E7%A0%81%E7%A7%91%E6%8A%80/TVT%E6%95%B0%E7%A0%81%E7%A7%91%E6%8A%80NVMS-1000%E8%B7%AF%E5%BE%84%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E(CVE-2019-20085).md
TamronOSIPTV系统ping存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/TamronOS/TamronOSIPTV%E7%B3%BB%E7%BB%9Fping%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Teleport堡垒机do-login任意用户登录漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Teleport%E5%A0%A1%E5%9E%92%E6%9C%BA/Teleport%E5%A0%A1%E5%9E%92%E6%9C%BAdo-login%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
Teleport堡垒机get-file后台任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Teleport%E5%A0%A1%E5%9E%92%E6%9C%BA/Teleport%E5%A0%A1%E5%9E%92%E6%9C%BAget-file%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
TelesquareSDT-CW3B1无线路由器admin.cgi远程命令执行漏洞(CVE-2021-46422)https://github.com/eeeeeeeeee-code/POC/blob/main/Telesquare/TelesquareSDT-CW3B1%E6%97%A0%E7%BA%BF%E8%B7%AF%E7%94%B1%E5%99%A8admin.cgi%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2021-46422).md
TelesquareTLR-2005Ksh路由器getUsernamePassword信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Telesquare/TelesquareTLR-2005Ksh%E8%B7%AF%E7%94%B1%E5%99%A8getUsernamePassword%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
Tenda路由器DownloadCfg信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Tenda/Tenda%E8%B7%AF%E7%94%B1%E5%99%A8DownloadCfg%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
TerraMasterTOSexportUser.php远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/TerraMasterTOS/TerraMasterTOSexportUser.php%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
Tosei自助洗衣机web管理端network_test.php文件host参数远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Tosei/Tosei%E8%87%AA%E5%8A%A9%E6%B4%97%E8%A1%A3%E6%9C%BAweb%E7%AE%A1%E7%90%86%E7%AB%AFnetwork_test.php%E6%96%87%E4%BB%B6host%E5%8F%82%E6%95%B0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
TraggoServer任意文件读取漏洞(CVE-2023-34843)https://github.com/eeeeeeeeee-code/POC/blob/main/Traggo/TraggoServer%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2023-34843).md
TurboMail邮件系统viewfile文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/TurboMail%E9%82%AE%E4%BB%B6/TurboMail%E9%82%AE%E4%BB%B6%E7%B3%BB%E7%BB%9Fviewfile%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
ueditor存在SSRF漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Ueditor/ueditor%E5%AD%98%E5%9C%A8SSRF%E6%BC%8F%E6%B4%9E.md
ueditor存在XSS漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Ueditor/ueditor%E5%AD%98%E5%9C%A8XSS%E6%BC%8F%E6%B4%9E.md
ueditor存在任意文件上传漏洞(ASP)https://github.com/eeeeeeeeee-code/POC/blob/main/Ueditor/ueditor%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E(ASP).md
VEXUS多语言货币交易所存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/VEXUS%E5%A4%9A%E8%AF%AD%E8%A8%80%E8%B4%A7%E5%B8%81%E4%BA%A4%E6%98%93%E6%89%80/VEXUS%E5%A4%9A%E8%AF%AD%E8%A8%80%E8%B4%A7%E5%B8%81%E4%BA%A4%E6%98%93%E6%89%80%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
ViessmannVitogateRCE漏洞(CVE-2023-45852)https://github.com/eeeeeeeeee-code/POC/blob/main/Viessmann/ViessmannVitogateRCE%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-45852%EF%BC%89.md
WIFISKY7层流控路由器confirm存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/WIFISKY/WIFISKY7%E5%B1%82%E6%B5%81%E6%8E%A7%E8%B7%AF%E7%94%B1%E5%99%A8confirm%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
WIFISKY7层流控路由器index存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/WIFISKY/WIFISKY7%E5%B1%82%E6%B5%81%E6%8E%A7%E8%B7%AF%E7%94%B1%E5%99%A8index%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
WIFISKY7层流控路由器jumper存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/WIFISKY/WIFISKY7%E5%B1%82%E6%B5%81%E6%8E%A7%E8%B7%AF%E7%94%B1%E5%99%A8jumper%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
WIFISKY7层流控路由器存在后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/WIFISKY/WIFISKY7%E5%B1%82%E6%B5%81%E6%8E%A7%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AD%98%E5%9C%A8%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
WIFISKY7层流控路由器存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/WIFISKY/WIFISKY7%E5%B1%82%E6%B5%81%E6%8E%A7%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
WAVLINKadm.cgi命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Wavlink/WAVLINKadm.cgi%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
WAVLINKlive_api.cgi存在命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/Wavlink/WAVLINKlive_api.cgi%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
WAVLINKmesh.cgi命令执行漏洞(CVE-2022-2486)https://github.com/eeeeeeeeee-code/POC/blob/main/Wavlink/WAVLINKmesh.cgi%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2022-2486%EF%BC%89.md
WAVLINKnightled.cgi命令执行漏洞(CVE-2022-2487)https://github.com/eeeeeeeeee-code/POC/blob/main/Wavlink/WAVLINKnightled.cgi%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2022-2487%EF%BC%89.md
wgcloud存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Wgcloud/wgcloud%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
WookTeamsearchinfo存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/WookTeam/WookTeamsearchinfo%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
XETUX软件dynamiccontent.properties.xhtml远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/XETUX/XETUX%E8%BD%AF%E4%BB%B6dynamiccontent.properties.xhtml%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
XWikiDatabaseSearch存在远程命令执行漏洞(CVE-2024-31982)https://github.com/eeeeeeeeee-code/POC/blob/main/XWiki/XWikiDatabaseSearch%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2024-31982%EF%BC%89.md
XXL-JOB默认accessToken权限绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/XXL-JOB/XXL-JOB%E9%BB%98%E8%AE%A4accessToken%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
Yapi存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/YAPI/Yapi%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Yearningfront接口存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Yearning/Yearningfront%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
YourPHPCMSRegister_checkEmail存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/YourPHP/YourPHPCMSRegister_checkEmail%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
YourPHPCMSlogin_checkEmail存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/YourPHP/YourPHPCMSlogin_checkEmail%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
ZeroShell3.9.0远程命令执行漏洞(CVE-2019-12725)https://github.com/eeeeeeeeee-code/POC/blob/main/ZeroShell/ZeroShell3.9.0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2019-12725).md
Zkteco百傲瑞达安防管理系统平台存在shiro反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/Zkteco%E7%99%BE%E5%82%B2%E7%91%9E%E8%BE%BE%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%B9%B3%E5%8F%B0/Zkteco%E7%99%BE%E5%82%B2%E7%91%9E%E8%BE%BE%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8shiro%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
ZoneMinderindex存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/ZoneMinder/ZoneMinderindex%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
ZyxelNBG2105身份验证绕过https://github.com/eeeeeeeeee-code/POC/blob/main/Zyxel(%E5%90%88%E5%8B%A4)/ZyxelNBG2105%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87.md
Hadoop存在未授权访问导致的RCEhttps://github.com/eeeeeeeeee-code/POC/blob/main/hadoop/Hadoop%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E5%AF%BC%E8%87%B4%E7%9A%84RCE.md
hi-bridge网关download存在文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/hi-bridge/hi-bridge%E7%BD%91%E5%85%B3download%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
iKuai流控路由SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/iKuai/iKuai%E6%B5%81%E6%8E%A7%E8%B7%AF%E7%94%B1SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
laravel开启debug模式信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/laravel/laravel%E5%BC%80%E5%90%AFdebug%E6%A8%A1%E5%BC%8F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
linglong扫描系统存在JWT密钥硬编码登录绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/linglong/linglong%E6%89%AB%E6%8F%8F%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8JWT%E5%AF%86%E9%92%A5%E7%A1%AC%E7%BC%96%E7%A0%81%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
Linksys-RE7000无线扩展器RCE(CVE-2024-25852)https://github.com/eeeeeeeeee-code/POC/blob/main/linksys/Linksys-RE7000%E6%97%A0%E7%BA%BF%E6%89%A9%E5%B1%95%E5%99%A8RCE(CVE-2024-25852).md
maxViewStorageManager系统dynamiccontent.properties.xhtml远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/maxViewStorageManager/maxViewStorageManager%E7%B3%BB%E7%BB%9Fdynamiccontent.properties.xhtml%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
NacosDerby远程命令执行漏洞(QVD-2024-26473)https://github.com/eeeeeeeeee-code/POC/blob/main/nacos/NacosDerby%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(QVD-2024-26473).md
Nacos存在Hessian反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/nacos/Nacos%E5%AD%98%E5%9C%A8Hessian%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
Nacos存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/nacos/Nacos%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Nacos存在SpringbootActuator未授权漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/nacos/Nacos%E5%AD%98%E5%9C%A8SpringbootActuator%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9E.md
Nacos存在serviceSync未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/nacos/Nacos%E5%AD%98%E5%9C%A8serviceSync%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
Nacos存在未授权下载配置信息漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/nacos/Nacos%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E4%B8%8B%E8%BD%BD%E9%85%8D%E7%BD%AE%E4%BF%A1%E6%81%AF%E6%BC%8F%E6%B4%9E.md
Nacos存在版本信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/nacos/Nacos%E5%AD%98%E5%9C%A8%E7%89%88%E6%9C%AC%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
Nacos存在默认口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/nacos/Nacos%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
Nacos未授权访问漏洞(CVE-2021-29441)https://github.com/eeeeeeeeee-code/POC/blob/main/nacos/Nacos%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E(CVE-2021-29441).md
Nacos默认key导致权限绕过登陆漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/nacos/Nacos%E9%BB%98%E8%AE%A4key%E5%AF%BC%E8%87%B4%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E7%99%BB%E9%99%86%E6%BC%8F%E6%B4%9E.md
npsauth_key未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/nps/npsauth_key%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
Openfire身份认证绕过漏洞&getshell(CVE-2023-32315)https://github.com/eeeeeeeeee-code/POC/blob/main/openfire/Openfire%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E&getshell(CVE-2023-32315).md
unitalk存在任意用户删除漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/unitalk/unitalk%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%88%A0%E9%99%A4%E6%BC%8F%E6%B4%9E.md
unitalk存在任意用户密码修改漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/unitalk/unitalk%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E4%BF%AE%E6%94%B9%E6%BC%8F%E6%B4%9E.md
unitalk存在任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/unitalk/unitalk%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
unitalk存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/unitalk/unitalk%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
unitalk存在默认弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/unitalk/unitalk%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
WeiPHP微信开发框架Notice_index接口处存在远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/weiphp/WeiPHP%E5%BE%AE%E4%BF%A1%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6Notice_index%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
万江港利山洪灾害预警系统FileHandler存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%87%E6%B1%9F%E6%B8%AF%E5%88%A9%E5%B1%B1%E6%B4%AA%E7%81%BE%E5%AE%B3%E9%A2%84%E8%AD%A6%E7%B3%BB%E7%BB%9F/%E4%B8%87%E6%B1%9F%E6%B8%AF%E5%88%A9%E5%B1%B1%E6%B4%AA%E7%81%BE%E5%AE%B3%E9%A2%84%E8%AD%A6%E7%B3%BB%E7%BB%9FFileHandler%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
微信万能门店小程序系统存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%87%E8%83%BD%E9%97%A8%E5%BA%97%E5%B0%8F%E7%A8%8B%E5%BA%8F/%E5%BE%AE%E4%BF%A1%E4%B8%87%E8%83%BD%E9%97%A8%E5%BA%97%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
微信万能门店小程序系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%87%E8%83%BD%E9%97%A8%E5%BA%97%E5%B0%8F%E7%A8%8B%E5%BA%8F/%E5%BE%AE%E4%BF%A1%E4%B8%87%E8%83%BD%E9%97%A8%E5%BA%97%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
万豪娱乐存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%87%E8%B1%AA%E5%A8%B1%E4%B9%90/%E4%B8%87%E8%B1%AA%E5%A8%B1%E4%B9%90%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
三星路由器WLANAP任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%89%E6%98%9F/%E4%B8%89%E6%98%9F%E8%B7%AF%E7%94%B1%E5%99%A8WLANAP%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
三星路由器WLANAP远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%89%E6%98%9F/%E4%B8%89%E6%98%9F%E8%B7%AF%E7%94%B1%E5%99%A8WLANAP%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
上海汉塔网络科技有限公司上网行为管理系统存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%8A%E6%B5%B7%E6%B1%89%E5%A1%94%E7%BD%91%E7%BB%9C%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E4%B8%8A%E6%B5%B7%E6%B1%89%E5%A1%94%E7%BD%91%E7%BB%9C%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
上海迅饶自动化科技有限公司X2Modbus网关GetUserList存在敏感信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%8A%E6%B5%B7%E8%BF%85%E9%A5%B6%E8%87%AA%E5%8A%A8%E5%8C%96%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E4%B8%8A%E6%B5%B7%E8%BF%85%E9%A5%B6%E8%87%AA%E5%8A%A8%E5%8C%96%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8X2Modbus%E7%BD%91%E5%85%B3GetUserList%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
上海迅饶自动化科技有限公司X2Modbus网关GetUser存在敏感信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%8A%E6%B5%B7%E8%BF%85%E9%A5%B6%E8%87%AA%E5%8A%A8%E5%8C%96%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E4%B8%8A%E6%B5%B7%E8%BF%85%E9%A5%B6%E8%87%AA%E5%8A%A8%E5%8C%96%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8X2Modbus%E7%BD%91%E5%85%B3GetUser%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
上海迅饶自动化科技有限公司X2Modbus网关任意用户删除漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%8A%E6%B5%B7%E8%BF%85%E9%A5%B6%E8%87%AA%E5%8A%A8%E5%8C%96%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E4%B8%8A%E6%B5%B7%E8%BF%85%E9%A5%B6%E8%87%AA%E5%8A%A8%E5%8C%96%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8X2Modbus%E7%BD%91%E5%85%B3%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%88%A0%E9%99%A4%E6%BC%8F%E6%B4%9E.md
上海迅饶自动化科技有限公司X2Modbus网关任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%8A%E6%B5%B7%E8%BF%85%E9%A5%B6%E8%87%AA%E5%8A%A8%E5%8C%96%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E4%B8%8A%E6%B5%B7%E8%BF%85%E9%A5%B6%E8%87%AA%E5%8A%A8%E5%8C%96%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8X2Modbus%E7%BD%91%E5%85%B3%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
上海迅饶自动化科技有限公司X2Modbus网关未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%8A%E6%B5%B7%E8%BF%85%E9%A5%B6%E8%87%AA%E5%8A%A8%E5%8C%96%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E4%B8%8A%E6%B5%B7%E8%BF%85%E9%A5%B6%E8%87%AA%E5%8A%A8%E5%8C%96%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8X2Modbus%E7%BD%91%E5%85%B3%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
东华医疗协同办公系统connector接口处存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%9C%E5%8D%8E%E5%8C%BB%E7%96%97%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E7%B3%BB%E7%BB%9F/%E4%B8%9C%E5%8D%8E%E5%8C%BB%E7%96%97%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%AC%E7%B3%BB%E7%BB%9Fconnector%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
东胜物流软件GetDataList存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6GetDataList%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
东胜物流软件SaveUserQuerySetting存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6SaveUserQuerySetting%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
东胜物流软件TCodeVoynoAdapter存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6/%E4%B8%9C%E8%83%9C%E7%89%A9%E6%B5%81%E8%BD%AF%E4%BB%B6TCodeVoynoAdapter%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
中兴H108NS路由器存在任意密码修改漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%AD%E5%85%B4/%E4%B8%AD%E5%85%B4H108NS%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E5%AF%86%E7%A0%81%E4%BF%AE%E6%94%B9%E6%BC%8F%E6%B4%9E.md
中兴H108NS路由器存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%AD%E5%85%B4/%E4%B8%AD%E5%85%B4H108NS%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
中国移动禹路由ExportSettings.sh存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%AD%E5%9B%BD%E7%A7%BB%E5%8A%A8/%E7%A6%B9%E8%B7%AF%E7%94%B1/%E4%B8%AD%E5%9B%BD%E7%A7%BB%E5%8A%A8%E7%A6%B9%E8%B7%AF%E7%94%B1ExportSettings.sh%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
中国移动云控制台preview存在任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%AD%E5%9B%BD%E7%A7%BB%E5%8A%A8/%E7%A7%BB%E5%8A%A8%E4%BA%91%E6%8E%A7%E5%88%B6%E5%8F%B0/%E4%B8%AD%E5%9B%BD%E7%A7%BB%E5%8A%A8%E4%BA%91%E6%8E%A7%E5%88%B6%E5%8F%B0preview%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
中新金盾信息安全管理系统存在默认管理员密码漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%AD%E6%96%B0/%E4%B8%AD%E6%96%B0%E9%87%91%E7%9B%BE%E4%BF%A1%E6%81%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E7%AE%A1%E7%90%86%E5%91%98%E5%AF%86%E7%A0%81%E6%BC%8F%E6%B4%9E.md
中科网威下一代防火墙控制系统download存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%AD%E7%A7%91%E7%BD%91%E5%A8%81/%E4%B8%AD%E7%A7%91%E7%BD%91%E5%A8%81%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99%E6%8E%A7%E5%88%B6%E7%B3%BB%E7%BB%9Fdownload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
中科网威下一代防火墙控制系统存在账号密码泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%AD%E7%A7%91%E7%BD%91%E5%A8%81/%E4%B8%AD%E7%A7%91%E7%BD%91%E5%A8%81%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99%E6%8E%A7%E5%88%B6%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
中远麒麟堡垒机admin_commonuserSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%AD%E8%BF%9C%E9%BA%92%E9%BA%9F/%E4%B8%AD%E8%BF%9C%E9%BA%92%E9%BA%9F%E5%A0%A1%E5%9E%92%E6%9C%BAadmin_commonuserSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
中远麒麟堡垒机tokensSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B8%AD%E8%BF%9C%E9%BA%92%E9%BA%9F/%E4%B8%AD%E8%BF%9C%E9%BA%92%E9%BA%9F%E5%A0%A1%E5%9E%92%E6%9C%BAtokensSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
九块九付费进群系统wxselect存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%B9%9D%E5%9D%97%E4%B9%9D%E4%BB%98%E8%B4%B9%E8%BF%9B%E7%BE%A4%E7%B3%BB%E7%BB%9F/%E4%B9%9D%E5%9D%97%E4%B9%9D%E4%BB%98%E8%B4%B9%E8%BF%9B%E7%BE%A4%E7%B3%BB%E7%BB%9Fwxselect%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
云安宝-云匣子config存在fastjson远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%91%E5%AE%89%E5%AE%9D/%E4%BA%91%E5%AE%89%E5%AE%9D-%E4%BA%91%E5%8C%A3%E5%AD%90config%E5%AD%98%E5%9C%A8fastjson%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
云时空社会化商业ERP系统gpy任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%91%E6%97%B6%E7%A9%BA%E7%A4%BE%E4%BC%9A%E5%8C%96%E5%95%86%E4%B8%9AERP%E7%B3%BB%E7%BB%9F/%E4%BA%91%E6%97%B6%E7%A9%BA%E7%A4%BE%E4%BC%9A%E5%8C%96%E5%95%86%E4%B8%9AERP%E7%B3%BB%E7%BB%9Fgpy%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
亿华人力资源管理系统filemanage存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E5%8D%8E%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E5%8D%8E%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Ffilemanage%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
亿华人力资源管理系统filemanage存在目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E5%8D%8E%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E5%8D%8E%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Ffilemanage%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
亿华人力资源管理系统upfile存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E5%8D%8E%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BA%BF%E5%8D%8E%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fupfile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统hiddenWatermark任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%96%B0%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FhiddenWatermark%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统uploadFile任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%96%B0%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FuploadFile%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统AutoSignService1存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FAutoSignService1%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统CDGAuthoriseTempletService1存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FCDGAuthoriseTempletService1%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统ClientAjax任意文件下载https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FClientAjax%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD.md
亿赛通电子文档安全管理系统CreateDocService1存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FCreateDocService1%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统DecryPermissApp存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDecryPermissApp%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统DecryptApplicationService1存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDecryptApplicationService1%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统DecryptApplicationService2接口任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDecryptApplicationService2%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
亿赛通电子文档安全管理系统DecryptionApp存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDecryptionApp%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统DownLoadMail存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDownLoadMail%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统EmailAuditService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FEmailAuditService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统ExamCDGDocService1存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FExamCDGDocService1%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统FileAuditService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FFileAuditService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统FileCountService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FFileCountService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统FileFormatAjax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FFileFormatAjax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统GetMakeOutSendFileInfoService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetMakeOutSendFileInfoService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统GetUsecPolicyService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetUsecPolicyService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统GetUserSafetyPolicyService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetUserSafetyPolicyService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统GetValidateAuthCodeService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetValidateAuthCodeService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统GetValidateLoginUserService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetValidateLoginUserService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统GetValidateServerService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetValidateServerService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统HookInvalidCourse存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FHookInvalidCourse%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统LinkFilterService存在身份认证绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FLinkFilterService%E5%AD%98%E5%9C%A8%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统MailApp存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FMailApp%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统MailMessageLogServices存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FMailMessageLogServices%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统NavigationAjax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FNavigationAjax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统ODMSubmitApplyService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FODMSubmitApplyService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统OfflineApplicationService1存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FOfflineApplicationService1%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统OfflineApplicationService2存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FOfflineApplicationService2%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统OutgoingRestoreApp存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FOutgoingRestoreApp%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统PolicyAjax存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FPolicyAjax%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统PrintAuditService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FPrintAuditService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统PrintLimitApp存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FPrintLimitApp%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统SaveCDGPermissionFromGFOA存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSaveCDGPermissionFromGFOA%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统SecureUsbConnection存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSecureUsbConnection%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统SystemService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSystemService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统UninstallApplicationService1存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUninstallApplicationService1%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统UpdateClientStatus存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUpdateClientStatus%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统UpdatePasswordService存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUpdatePasswordService%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统UpgradeService1存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUpgradeService1%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统UpgradeService2存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUpgradeService2%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统UploadFileFromClientServiceForClient任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUploadFileFromClientServiceForClient%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统UploadFileListServiceForClient存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUploadFileListServiceForClient%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统UploadFileList存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUploadFileList%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统UploadFileToCatalog存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUploadFileToCatalog%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统UserLoginOutService1存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUserLoginOutService1%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统ViewUploadFile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FViewUploadFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统clientMessage存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FclientMessage%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统create_SmartSec_mysql信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fcreate_SmartSec_mysql%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
亿赛通电子文档安全管理系统docRenewApp存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FdocRenewApp%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统dump存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdump%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统formType存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FformType%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统ids存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fids%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统offlineApp存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FofflineApp%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统outgoingServlet存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FoutgoingServlet%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统permissionApp存在xstream反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FpermissionApp%E5%AD%98%E5%9C%A8xstream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统solr远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fsolr%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统syn_user_policy任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fsyn_user_policy%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
亿赛通电子文档安全管理系统updateUserToOrganise存在后台SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%97%A7%E7%89%88/%E4%BA%BF%E8%B5%9B%E9%80%9A%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FupdateUserToOrganise%E5%AD%98%E5%9C%A8%E5%90%8E%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
亿邮电子邮件系统远程命令执行漏洞-(CNVD-2021-26422)https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BA%BF%E9%82%AE/%E4%BA%BF%E9%82%AE%E7%94%B5%E5%AD%90%E9%82%AE%E4%BB%B6%E7%B3%BB%E7%BB%9F%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E-(CNVD-2021-26422).md
任子行网络安全审计系统sslvpn_client存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BB%BB%E5%AD%90%E8%A1%8C/%E4%BB%BB%E5%AD%90%E8%A1%8C%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fsslvpn_client%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
任我行协同CRMSmsDataListSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BB%BB%E6%88%91%E8%A1%8C/%E4%BB%BB%E6%88%91%E8%A1%8C%E5%8D%8F%E5%90%8CCRMSmsDataListSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
任我行管家婆分销ERP系统存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BB%BB%E6%88%91%E8%A1%8C/%E4%BB%BB%E6%88%91%E8%A1%8C%E7%AE%A1%E5%AE%B6%E5%A9%86%E5%88%86%E9%94%80ERP%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
仿抖音短视频网站系统index存在前台SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BB%BF%E6%8A%96%E9%9F%B3%E7%9F%AD%E8%A7%86%E9%A2%91%E7%BD%91%E7%AB%99%E7%B3%BB%E7%BB%9F/%E4%BB%BF%E6%8A%96%E9%9F%B3%E7%9F%AD%E8%A7%86%E9%A2%91%E7%BD%91%E7%AB%99%E7%B3%BB%E7%BB%9Findex%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
企业微信接口未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BC%81%E4%B8%9A%E5%BE%AE%E4%BF%A1/%E4%BC%81%E4%B8%9A%E5%BE%AE%E4%BF%A1%E6%8E%A5%E5%8F%A3%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
企望制造ERPcomboxstore.actionSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BC%81%E6%9C%9B/%E4%BC%81%E6%9C%9B%E5%88%B6%E9%80%A0ERPcomboxstore.actionSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
众诚网上订单系统o_sa_order存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BC%97%E8%AF%9A%E7%BD%91%E4%B8%8A%E8%AE%A2%E5%8D%95%E7%B3%BB%E7%BB%9F/%E4%BC%97%E8%AF%9A%E7%BD%91%E4%B8%8A%E8%AE%A2%E5%8D%95%E7%B3%BB%E7%BB%9Fo_sa_order%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
优客API接口管理系统存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BC%98%E5%AE%A2API%E6%8E%A5%E5%8F%A3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BC%98%E5%AE%A2API%E6%8E%A5%E5%8F%A3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
优客API接口管理系统存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BC%98%E5%AE%A2API%E6%8E%A5%E5%8F%A3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E4%BC%98%E5%AE%A2API%E6%8E%A5%E5%8F%A3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
会捷通云视讯平台任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BC%9A%E6%8D%B7%E9%80%9A%E4%BA%91%E8%A7%86%E8%AE%AF%E5%B9%B3%E5%8F%B0/%E4%BC%9A%E6%8D%B7%E9%80%9A%E4%BA%91%E8%A7%86%E8%AE%AF%E5%B9%B3%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
佑友防火墙存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BD%91%E5%8F%8B/%E4%BD%91%E5%8F%8B%E9%98%B2%E7%81%AB%E5%A2%99%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
佑友防火墙存在后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BD%91%E5%8F%8B/%E4%BD%91%E5%8F%8B%E9%98%B2%E7%81%AB%E5%A2%99%E5%AD%98%E5%9C%A8%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
佑友防火墙存在默认口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E4%BD%91%E5%8F%8B/%E4%BD%91%E5%8F%8B%E9%98%B2%E7%81%AB%E5%A2%99%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
傲盾信息安全管理系统前台远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%82%B2%E7%9B%BE%E7%BD%91%E7%BB%9C%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%82%B2%E7%9B%BE%E4%BF%A1%E6%81%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%89%8D%E5%8F%B0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
先锋WEB燃气收费系统AjaxService存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%85%88%E9%94%8BWEB%E7%87%83%E6%B0%94%E6%94%B6%E8%B4%B9%E7%B3%BB%E7%BB%9F/%E5%85%88%E9%94%8BWEB%E7%87%83%E6%B0%94%E6%94%B6%E8%B4%B9%E7%B3%BB%E7%BB%9FAjaxService%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
全行业小程序运营系统接口_requestPost存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%85%A8%E8%A1%8C%E4%B8%9A%E5%B0%8F%E7%A8%8B%E5%BA%8F%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F/%E5%85%A8%E8%A1%8C%E4%B8%9A%E5%B0%8F%E7%A8%8B%E5%BA%8F%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3_requestPost%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
兰德网络O2OA存在默认口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%85%B0%E5%BE%B7%E7%BD%91%E7%BB%9CO2OA/%E5%85%B0%E5%BE%B7%E7%BD%91%E7%BB%9CO2OA%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
北京亚鸿世纪科技发展有限公司企业侧互联网综合管理平台存在远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E4%BA%9A%E9%B8%BF%E4%B8%96%E7%BA%AA%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%8C%97%E4%BA%AC%E4%BA%9A%E9%B8%BF%E4%B8%96%E7%BA%AA%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E4%BC%81%E4%B8%9A%E4%BE%A7%E4%BA%92%E8%81%94%E7%BD%91%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
北京新网医讯技术有限公司PACS系统web端存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E6%96%B0%E7%BD%91%E5%8C%BB%E8%AE%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/PACS%E7%B3%BB%E7%BB%9F/%E5%8C%97%E4%BA%AC%E6%96%B0%E7%BD%91%E5%8C%BB%E8%AE%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8PACS%E7%B3%BB%E7%BB%9Fweb%E7%AB%AF%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
北京新网医讯技术有限公司PACS系统web端存在万能密码漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E6%96%B0%E7%BD%91%E5%8C%BB%E8%AE%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/PACS%E7%B3%BB%E7%BB%9F/%E5%8C%97%E4%BA%AC%E6%96%B0%E7%BD%91%E5%8C%BB%E8%AE%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8PACS%E7%B3%BB%E7%BB%9Fweb%E7%AB%AF%E5%AD%98%E5%9C%A8%E4%B8%87%E8%83%BD%E5%AF%86%E7%A0%81%E6%BC%8F%E6%B4%9E.md
北京新网医讯技术有限公司PACS系统web端存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E6%96%B0%E7%BD%91%E5%8C%BB%E8%AE%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/PACS%E7%B3%BB%E7%BB%9F/%E5%8C%97%E4%BA%AC%E6%96%B0%E7%BD%91%E5%8C%BB%E8%AE%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8PACS%E7%B3%BB%E7%BB%9Fweb%E7%AB%AF%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
北京新网医讯技术有限公司云端客服管理系统存在万能密码登录漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E6%96%B0%E7%BD%91%E5%8C%BB%E8%AE%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E4%BA%91%E7%AB%AF%E5%AE%A2%E6%9C%8D%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%8C%97%E4%BA%AC%E6%96%B0%E7%BD%91%E5%8C%BB%E8%AE%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E4%BA%91%E7%AB%AF%E5%AE%A2%E6%9C%8D%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%B8%87%E8%83%BD%E5%AF%86%E7%A0%81%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
灵当crmauth-info存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E7%81%B5%E5%BD%93%E4%BA%92%E5%8A%A8%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%81%B5%E5%BD%93crmauth-info%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
灵当crmgetOrderList存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E7%81%B5%E5%BD%93%E4%BA%92%E5%8A%A8%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%81%B5%E5%BD%93crmgetOrderList%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
灵当crmmultipleUpload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E7%81%B5%E5%BD%93%E4%BA%92%E5%8A%A8%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%81%B5%E5%BD%93crmmultipleUpload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
灵当crmpdf存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E7%81%B5%E5%BD%93%E4%BA%92%E5%8A%A8%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%81%B5%E5%BD%93crmpdf%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
灵当crmuploadfile存在文件写入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E7%81%B5%E5%BD%93%E4%BA%92%E5%8A%A8%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%81%B5%E5%BD%93crmuploadfile%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E.md
灵当crmuploadify存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E7%81%B5%E5%BD%93%E4%BA%92%E5%8A%A8%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%81%B5%E5%BD%93crmuploadify%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
灵当crmupload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E7%81%B5%E5%BD%93%E4%BA%92%E5%8A%A8%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%81%B5%E5%BD%93crmupload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
灵当crmwechatSession存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E7%81%B5%E5%BD%93%E4%BA%92%E5%8A%A8%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%81%B5%E5%BD%93crmwechatSession%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
北京雷石天地电子技术有限公司云视频管理系统存在目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%97%E4%BA%AC%E9%9B%B7%E7%9F%B3%E5%A4%A9%E5%9C%B0%E7%94%B5%E5%AD%90%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%8C%97%E4%BA%AC%E9%9B%B7%E7%9F%B3%E5%A4%A9%E5%9C%B0%E7%94%B5%E5%AD%90%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E4%BA%91%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
医药公司登录系统GetLshByTj存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%BB%E8%8D%AF%E5%85%AC%E5%8F%B8%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9F/%E5%8C%BB%E8%8D%AF%E5%85%AC%E5%8F%B8%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9FGetLshByTj%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
医药公司登录系统Login存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%BB%E8%8D%AF%E5%85%AC%E5%8F%B8%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9F/%E5%8C%BB%E8%8D%AF%E5%85%AC%E5%8F%B8%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9FLogin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
医药公司登录系统存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8C%BB%E8%8D%AF%E5%85%AC%E5%8F%B8%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9F/%E5%8C%BB%E8%8D%AF%E5%85%AC%E5%8F%B8%E7%99%BB%E5%BD%95%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
华为Auth-HttpServer1.0存在任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%8E%E4%B8%BA/%E5%8D%8E%E4%B8%BAAuth-HttpServer1.0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
华夏ERPgetAllList存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%8E%E5%A4%8FERP/%E5%8D%8E%E5%A4%8FERPgetAllList%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
华夏ERP敏感信息泄漏漏洞(CNVD-2020-63964)https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%8E%E5%A4%8FERP/%E5%8D%8E%E5%A4%8FERP%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E%EF%BC%88CNVD-2020-63964%EF%BC%89.md
华测监测预警系统任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%8E%E6%B5%8B/%E5%8D%8E%E6%B5%8B%E7%9B%91%E6%B5%8B%E9%A2%84%E8%AD%A6%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
华测监测预警系统数据库信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%8E%E6%B5%8B/%E5%8D%8E%E6%B5%8B%E7%9B%91%E6%B5%8B%E9%A2%84%E8%AD%A6%E7%B3%BB%E7%BB%9F%E6%95%B0%E6%8D%AE%E5%BA%93%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
南京博纳睿通软件科技有限公司医院一站式后勤管理系统processApkUpload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%97%E4%BA%AC%E5%8D%9A%E7%BA%B3%E7%9D%BF%E9%80%9A%E8%BD%AF%E4%BB%B6%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%8D%97%E4%BA%AC%E5%8D%9A%E7%BA%B3%E7%9D%BF%E9%80%9A%E8%BD%AF%E4%BB%B6%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%8C%BB%E9%99%A2%E4%B8%80%E7%AB%99%E5%BC%8F%E5%90%8E%E5%8B%A4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FprocessApkUpload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
博华网龙安全设备cmd.php远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%9A%E5%8D%8E%E7%BD%91%E9%BE%99/%E5%8D%9A%E5%8D%8E%E7%BD%91%E9%BE%99%E5%AE%89%E5%85%A8%E8%AE%BE%E5%A4%87cmd.php%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
博斯软件V6.0存在sql注入https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%9A%E6%96%AF%E8%BD%AF%E4%BB%B6/%E5%8D%9A%E6%96%AF%E8%BD%AF%E4%BB%B6V6.0%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5.md
博达下一代防火墙aaa_portal_auth_local_submit存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%9A%E8%BE%BE/%E5%8D%9A%E8%BE%BE%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99aaa_portal_auth_local_submit%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
博达下一代防火墙sslvpn_client存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%9A%E8%BE%BE/%E5%8D%9A%E8%BE%BE%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99sslvpn_client%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
卡号极团管理系统order存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%A1%E5%8F%B7%E6%9E%81%E5%9B%A2%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%8D%A1%E5%8F%B7%E6%9E%81%E5%9B%A2%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Forder%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
卡号极团管理系统ue_serve存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%A1%E5%8F%B7%E6%9E%81%E5%9B%A2%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%8D%A1%E5%8F%B7%E6%9E%81%E5%9B%A2%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fue_serve%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
卡车卫星定位系统存在密码重置漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8D%A1%E8%BD%A6%E5%8D%AB%E6%98%9F%E5%AE%9A%E4%BD%8D%E7%B3%BB%E7%BB%9F/%E5%8D%A1%E8%BD%A6%E5%8D%AB%E6%98%9F%E5%AE%9A%E4%BD%8D%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E.md
可视化融合指挥调度平台uploadImg存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%8F%AF%E8%A7%86%E5%8C%96%E8%9E%8D%E5%90%88%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E5%8F%AF%E8%A7%86%E5%8C%96%E8%9E%8D%E5%90%88%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0uploadImg%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
吉大正元身份认证网关downtools存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%90%89%E5%A4%A7%E6%AD%A3%E5%85%83%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BD%91%E5%85%B3/%E5%90%89%E5%A4%A7%E6%AD%A3%E5%85%83%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BD%91%E5%85%B3downtools%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
吉林医药系统Login存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%90%89%E6%9E%97%E5%8C%BB%E8%8D%AF%E7%B3%BB%E7%BB%9F/%E5%90%89%E6%9E%97%E5%8C%BB%E8%8D%AF%E7%B3%BB%E7%BB%9FLogin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
向日葵远程代码执行漏洞(CNVD-2022-10270)https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%90%91%E6%97%A5%E8%91%B5/%E5%90%91%E6%97%A5%E8%91%B5%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CNVD-2022-10270%EF%BC%89.md
启明星辰4A统一安全管控平台getMaster.do信息泄漏https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%90%AF%E6%98%8E%E6%98%9F%E8%BE%B0/%E5%90%AF%E6%98%8E%E6%98%9F%E8%BE%B04A%E7%BB%9F%E4%B8%80%E5%AE%89%E5%85%A8%E7%AE%A1%E6%8E%A7%E5%B9%B3%E5%8F%B0getMaster.do%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F.md
启明星辰天玥运维安全网关tagid参数存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%90%AF%E6%98%8E%E6%98%9F%E8%BE%B0/%E5%90%AF%E6%98%8E%E6%98%9F%E8%BE%B0%E5%A4%A9%E7%8E%A5%E8%BF%90%E7%BB%B4%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3tagid%E5%8F%82%E6%95%B0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
启明星辰天玥运维安全网关默认口令https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%90%AF%E6%98%8E%E6%98%9F%E8%BE%B0/%E5%90%AF%E6%98%8E%E6%98%9F%E8%BE%B0%E5%A4%A9%E7%8E%A5%E8%BF%90%E7%BB%B4%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4.md
和信创天云桌面系统upload_file存在任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%92%8C%E4%BF%A1%E5%88%9B%E5%A4%A9/%E5%92%8C%E4%BF%A1%E5%88%9B%E5%A4%A9%E4%BA%91%E6%A1%8C%E9%9D%A2%E7%B3%BB%E7%BB%9Fupload_file%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
医疗安全(不良)事件报告系统membersbyid存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%9B%9B%E5%B7%9D%E9%B1%BC%E5%B0%BE%E5%B7%B4%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%8C%BB%E7%96%97%E5%AE%89%E5%85%A8(%E4%B8%8D%E8%89%AF)%E4%BA%8B%E4%BB%B6%E6%8A%A5%E5%91%8A%E7%B3%BB%E7%BB%9Fmembersbyid%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
医疗安全(不良)事件报告系统members存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%9B%9B%E5%B7%9D%E9%B1%BC%E5%B0%BE%E5%B7%B4%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%8C%BB%E7%96%97%E5%AE%89%E5%85%A8(%E4%B8%8D%E8%89%AF)%E4%BA%8B%E4%BB%B6%E6%8A%A5%E5%91%8A%E7%B3%BB%E7%BB%9Fmembers%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
多客圈子论坛系统httpGet存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%9A%E5%AE%A2%E5%9C%88%E5%AD%90%E8%AE%BA%E5%9D%9B/%E5%A4%9A%E5%AE%A2%E5%9C%88%E5%AD%90%E8%AE%BA%E5%9D%9B%E7%B3%BB%E7%BB%9FhttpGet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
大为计算机软件开发有限公司知识产权协同创新管理系统任意密码重置https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E4%B8%BA%E8%AE%A1%E7%AE%97%E6%9C%BA%E8%BD%AF%E4%BB%B6%E5%BC%80%E5%8F%91%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%A4%A7%E4%B8%BA%E8%AE%A1%E7%AE%97%E6%9C%BA%E8%BD%AF%E4%BB%B6%E5%BC%80%E5%8F%91%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E7%9F%A5%E8%AF%86%E4%BA%A7%E6%9D%83%E5%8D%8F%E5%90%8C%E5%88%9B%E6%96%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE.md
大华DSS视频管理系统attachment_clearTempFile存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fattachment_clearTempFile%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华DSS视频管理系统attachment_downloadByUrlAtt.action任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fattachment_downloadByUrlAtt.action%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
大华DSS视频管理系统attachment_getAttList存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fattachment_getAttList%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华DSS视频管理系统deleteBulletin存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FdeleteBulletin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华DSS视频管理系统user_edit存在密码泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fuser_edit%E5%AD%98%E5%9C%A8%E5%AF%86%E7%A0%81%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
大华DSS视频管理系统存在strust2命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%A4%A7%E5%8D%8EDSS%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8strust2%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台attachment_downloadAtt.action任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0attachment_downloadAtt.action%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
大华智慧园区综合管理平台attachment_downloadByUrlAtt.action任意文件读取https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0attachment_downloadByUrlAtt.action%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
大华智慧园区综合管理平台bitmap任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0bitmap%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台deleteBulletinSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0deleteBulletinSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台deleteFtp接口远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0deleteFtp%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
大华智慧园区综合管理平台devicePoint_addImgIco任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0devicePoint_addImgIco%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台getGroupInfoListByGroupIdSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0getGroupInfoListByGroupIdSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台image存在ssrf漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0image%E5%AD%98%E5%9C%A8ssrf%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台pay远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0pay%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
大华智慧园区综合管理平台poi任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0poi%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台searchJsonSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0searchJsonSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台sendFaceInfo远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0sendFaceInfo%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
大华智慧园区综合管理平台video任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0video%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
大华智慧园区综合管理平台密码泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E5%A4%A7%E5%8D%8E%E6%99%BA%E6%85%A7%E5%9B%AD%E5%8C%BA%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
大华智能物联综合管理平台(ICC)info存在信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0(ICC)/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0(ICC)info%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
大华智能物联综合管理平台(ICC)page存在信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0(ICC)/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0(ICC)page%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
大华智能物联综合管理平台(ICC)randomfastjson远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0(ICC)/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0(ICC)randomfastjson%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
大华智能物联综合管理平台(ICC)存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0(ICC)/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0(ICC)%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
大华智能物联综合管理平台(ICC)存在逻辑漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A7%E5%8D%8E/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0(ICC)/%E5%A4%A7%E5%8D%8E%E6%99%BA%E8%83%BD%E7%89%A9%E8%81%94%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0(ICC)%E5%AD%98%E5%9C%A8%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E.md
天智云制造管理平台存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E6%99%BA(%E8%8B%8F%E5%B7%9E)%E6%99%BA%E8%83%BD%E7%B3%BB%E7%BB%9F%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%A4%A9%E6%99%BA%E4%BA%91%E5%88%B6%E9%80%A0%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统bus存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E6%B4%A5%E7%8E%AF%E7%90%83%E7%A3%81%E5%8D%A1%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fbus%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统line存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E6%B4%A5%E7%8E%AF%E7%90%83%E7%A3%81%E5%8D%A1%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fline%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统parametercard存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E6%B4%A5%E7%8E%AF%E7%90%83%E7%A3%81%E5%8D%A1%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fparametercard%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统role存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E6%B4%A5%E7%8E%AF%E7%90%83%E7%A3%81%E5%8D%A1%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Frole%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统user存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E6%B4%A5%E7%8E%AF%E7%90%83%E7%A3%81%E5%8D%A1%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fuser%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统user存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E6%B4%A5%E7%8E%AF%E7%90%83%E7%A3%81%E5%8D%A1%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fuser%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
公交IC卡收单管理系统存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E6%B4%A5%E7%8E%AF%E7%90%83%E7%A3%81%E5%8D%A1%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%85%AC%E4%BA%A4IC%E5%8D%A1%E6%94%B6%E5%8D%95%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
天维尔消防智能指挥平台API接口页面sql注入https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E7%BB%B4%E5%B0%94%E6%B6%88%E9%98%B2%E6%99%BA%E8%83%BD%E6%8C%87%E6%8C%A5%E5%B9%B3%E5%8F%B0/%E5%A4%A9%E7%BB%B4%E5%B0%94%E6%B6%88%E9%98%B2%E6%99%BA%E8%83%BD%E6%8C%87%E6%8C%A5%E5%B9%B3%E5%8F%B0API%E6%8E%A5%E5%8F%A3%E9%A1%B5%E9%9D%A2sql%E6%B3%A8%E5%85%A5.md
天融信TOPSECCookie远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E8%9E%8D%E4%BF%A1/%E5%A4%A9%E8%9E%8D%E4%BF%A1TOPSECCookie%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
天融信上网行为管理系统存在默认账号密码https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E8%9E%8D%E4%BF%A1/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81.md
天融信上网行为管理远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E8%9E%8D%E4%BF%A1/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
天问物业ERP系统AjaxUpload.aspx前台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9FAjaxUpload.aspx%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
天问物业ERP系统UEditor编辑器存在前台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9FUEditor%E7%BC%96%E8%BE%91%E5%99%A8%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
天问物业ERP系统UpFile.aspx前台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9FUpFile.aspx%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
天问物业ERP系统UploadFile.aspx前台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP/%E5%A4%A9%E9%97%AE%E7%89%A9%E4%B8%9AERP%E7%B3%BB%E7%BB%9FUploadFile.aspx%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
奇安信VPN存在未授权管理用户遍历及任意账号密码修改漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A5%87%E5%AE%89%E4%BF%A1/%E5%A5%87%E5%AE%89%E4%BF%A1VPN%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E7%AE%A1%E7%90%86%E7%94%A8%E6%88%B7%E9%81%8D%E5%8E%86%E5%8F%8A%E4%BB%BB%E6%84%8F%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E4%BF%AE%E6%94%B9%E6%BC%8F%E6%B4%9E.md
契约锁edits存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A5%91%E7%BA%A6%E9%94%81/%E5%A5%91%E7%BA%A6%E9%94%81edits%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
契约锁template存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A5%91%E7%BA%A6%E9%94%81/%E5%A5%91%E7%BA%A6%E9%94%81template%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
契约锁utask存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A5%91%E7%BA%A6%E9%94%81/%E5%A5%91%E7%BA%A6%E9%94%81utask%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
好视通视频会议系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A5%BD%E8%A7%86%E9%80%9A/%E5%A5%BD%E8%A7%86%E9%80%9A%E8%A7%86%E9%A2%91%E4%BC%9A%E8%AE%AE%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
威努特sslvpn_client存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%A8%81%E5%8A%AA%E7%89%B9/%E5%A8%81%E5%8A%AA%E7%89%B9sslvpn_client%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
孚盟云AjaxMethod.ashxSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AD%9A%E7%9B%9F%E4%BA%91/%E5%AD%9A%E7%9B%9F%E4%BA%91AjaxMethod.ashxSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
安徽生命港湾信息技术有限公司服务配置工具存在任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%89%E5%BE%BD%E7%94%9F%E5%91%BD%E6%B8%AF%E6%B9%BE%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%AE%89%E5%BE%BD%E7%94%9F%E5%91%BD%E6%B8%AF%E6%B9%BE%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%9C%8D%E5%8A%A1%E9%85%8D%E7%BD%AE%E5%B7%A5%E5%85%B7%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
安恒下一代防火墙存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%89%E6%81%92/%E5%AE%89%E6%81%92%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99/%E5%AE%89%E6%81%92%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
安恒明御Web应用防火墙任意登录漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%89%E6%81%92/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1Web%E5%BA%94%E7%94%A8%E9%98%B2%E7%81%AB%E5%A2%99/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1Web%E5%BA%94%E7%94%A8%E9%98%B2%E7%81%AB%E5%A2%99%E4%BB%BB%E6%84%8F%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
安恒堡垒机任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%89%E6%81%92/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%A0%A1%E5%9E%92%E6%9C%BA/%E5%AE%89%E6%81%92%E5%A0%A1%E5%9E%92%E6%9C%BA%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
安恒明御安全网关aaa_local_web_preview存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%89%E6%81%92/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3aaa_local_web_preview%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
安恒明御安全网关aaa_portal_auth_config_reset存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%89%E6%81%92/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3aaa_portal_auth_config_reset%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
安恒明御安全网关aaa_portal_auth_local_submit存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%89%E6%81%92/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3aaa_portal_auth_local_submit%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
安恒明御安全网关aaa_portal_auth_wchat_submit存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%89%E6%81%92/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3aaa_portal_auth_wchat_submit%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
安恒明御安全网关sslvpn_client存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%89%E6%81%92/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/%E5%AE%89%E6%81%92%E6%98%8E%E5%BE%A1%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3sslvpn_client%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
安盟华御应用防护系统sslvpn_client存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%89%E7%9B%9F%E5%8D%8E%E5%BE%A1/%E5%AE%89%E7%9B%9F%E5%8D%8E%E5%BE%A1%E5%BA%94%E7%94%A8%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9Fsslvpn_client%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
安美酒店宽带运营系统server_ping远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/wpoc/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F/%E5%AE%89%E7%BE%8E%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9Fserver_ping%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
宏脉医美行业管理系统config存在目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%8F%E8%84%89%E5%8C%BB%E7%BE%8E%E8%A1%8C%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E5%AE%8F%E8%84%89%E5%8C%BB%E7%BE%8E%E8%A1%8C%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fconfig%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
宝塔云WAFserver_name存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AE%9D%E5%A1%94/%E5%AE%9D%E5%A1%94%E4%BA%91WAFserver_name%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
富通天下外贸ERPUploadEmailAttr存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%AF%8C%E9%80%9A%E5%A4%A9%E4%B8%8B%E5%A4%96%E8%B4%B8ERP/%E5%AF%8C%E9%80%9A%E5%A4%A9%E4%B8%8B%E5%A4%96%E8%B4%B8ERPUploadEmailAttr%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
小米路由器任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B0%8F%E7%B1%B3/%E5%B0%8F%E7%B1%B3%E8%B7%AF%E7%94%B1%E5%99%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
山石网科云鉴安全管理系统ajaxActions接口处存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B1%B1%E7%9F%B3%E7%BD%91%E7%A7%91/%E5%B1%B1%E7%9F%B3%E7%BD%91%E7%A7%91%E4%BA%91%E9%89%B4%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FajaxActions%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
帮管客CRMajax_upload_chat存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B8%AE%E7%AE%A1%E5%AE%A2CRM/%E5%B8%AE%E7%AE%A1%E5%AE%A2CRMajax_upload_chat%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
帮管客CRMajax_upload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B8%AE%E7%AE%A1%E5%AE%A2CRM/%E5%B8%AE%E7%AE%A1%E5%AE%A2CRMajax_upload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
帮管客CRMinit信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B8%AE%E7%AE%A1%E5%AE%A2CRM/%E5%B8%AE%E7%AE%A1%E5%AE%A2CRMinit%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
帮管客CRMmessage存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B8%AE%E7%AE%A1%E5%AE%A2CRM/%E5%B8%AE%E7%AE%A1%E5%AE%A2CRMmessage%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
平升电子水库安全监管平台GetRecordsByTableNameAndColumns存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B9%B3%E5%8D%87%E7%94%B5%E5%AD%90%E6%B0%B4%E5%BA%93%E5%AE%89%E5%85%A8%E7%9B%91%E7%AE%A1%E5%B9%B3%E5%8F%B0/%E5%B9%B3%E5%8D%87%E7%94%B5%E5%AD%90%E6%B0%B4%E5%BA%93%E5%AE%89%E5%85%A8%E7%9B%91%E7%AE%A1%E5%B9%B3%E5%8F%B0GetRecordsByTableNameAndColumns%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
员工自助平台loginByPassword存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B9%BF%E5%B7%9E%E7%BF%B0%E6%99%BA%E8%BD%AF%E4%BB%B6%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%91%98%E5%B7%A5%E8%87%AA%E5%8A%A9%E5%B9%B3%E5%8F%B0loginByPassword%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
广州锦铭泰软件科技有限公司F22服装管理软件系统index_login.asp存在信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B9%BF%E5%B7%9E%E9%94%A6%E9%93%AD%E6%B3%B0%E8%BD%AF%E4%BB%B6%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%B9%BF%E5%B7%9E%E9%94%A6%E9%93%AD%E6%B3%B0%E8%BD%AF%E4%BB%B6%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8F22%E6%9C%8D%E8%A3%85%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6%E7%B3%BB%E7%BB%9Findex_login.asp%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
广州锦铭泰软件科技有限公司F22服装管理软件系统openfile.aspx前台任意文件下载https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B9%BF%E5%B7%9E%E9%94%A6%E9%93%AD%E6%B3%B0%E8%BD%AF%E4%BB%B6%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%B9%BF%E5%B7%9E%E9%94%A6%E9%93%AD%E6%B3%B0%E8%BD%AF%E4%BB%B6%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8F22%E6%9C%8D%E8%A3%85%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6%E7%B3%BB%E7%BB%9Fopenfile.aspx%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD.md
广西金中软件集团有限公司智慧医养服务平台DownFile存在任意文件删除漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B9%BF%E8%A5%BF%E9%87%91%E4%B8%AD%E8%BD%AF%E4%BB%B6%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%B9%BF%E8%A5%BF%E9%87%91%E4%B8%AD%E8%BD%AF%E4%BB%B6%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%99%BA%E6%85%A7%E5%8C%BB%E5%85%BB%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0DownFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4%E6%BC%8F%E6%B4%9E.md
广西金中软件集团有限公司智慧医养服务平台UpLoaderAction存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B9%BF%E8%A5%BF%E9%87%91%E4%B8%AD%E8%BD%AF%E4%BB%B6%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%B9%BF%E8%A5%BF%E9%87%91%E4%B8%AD%E8%BD%AF%E4%BB%B6%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%99%BA%E6%85%A7%E5%8C%BB%E5%85%BB%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0UpLoaderAction%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
广西金中软件集团有限公司智慧医养服务平台Uploader存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B9%BF%E8%A5%BF%E9%87%91%E4%B8%AD%E8%BD%AF%E4%BB%B6%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%B9%BF%E8%A5%BF%E9%87%91%E4%B8%AD%E8%BD%AF%E4%BB%B6%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%99%BA%E6%85%A7%E5%8C%BB%E5%85%BB%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0Uploader%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
广西金中软件集团有限公司智慧医养服务平台Uploads存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%B9%BF%E8%A5%BF%E9%87%91%E4%B8%AD%E8%BD%AF%E4%BB%B6%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%B9%BF%E8%A5%BF%E9%87%91%E4%B8%AD%E8%BD%AF%E4%BB%B6%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%99%BA%E6%85%A7%E5%8C%BB%E5%85%BB%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0Uploads%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
微信公众号商家收银台小程序系统存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BE%AE%E4%BF%A1%E5%85%AC%E4%BC%97%E5%8F%B7%E5%95%86%E5%AE%B6%E6%94%B6%E9%93%B6%E5%8F%B0%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F/%E5%BE%AE%E4%BF%A1%E5%85%AC%E4%BC%97%E5%8F%B7%E5%95%86%E5%AE%B6%E6%94%B6%E9%93%B6%E5%8F%B0%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
微信公众号小说漫画系统Upload存在任意文件写入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BE%AE%E4%BF%A1%E5%85%AC%E4%BC%97%E5%8F%B7%E5%B0%8F%E8%AF%B4%E6%BC%AB%E7%94%BB%E7%B3%BB%E7%BB%9F/%E5%BE%AE%E4%BF%A1%E5%85%AC%E4%BC%97%E5%8F%B7%E5%B0%8F%E8%AF%B4%E6%BC%AB%E7%94%BB%E7%B3%BB%E7%BB%9FUpload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E.md
微信公众号小说漫画系统fileupload.php存在任意文件写入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BE%AE%E4%BF%A1%E5%85%AC%E4%BC%97%E5%8F%B7%E5%B0%8F%E8%AF%B4%E6%BC%AB%E7%94%BB%E7%B3%BB%E7%BB%9F/%E5%BE%AE%E4%BF%A1%E5%85%AC%E4%BC%97%E5%8F%B7%E5%B0%8F%E8%AF%B4%E6%BC%AB%E7%94%BB%E7%B3%BB%E7%BB%9Ffileupload.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E.md
微信广告任务平台ajax_upload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BE%AE%E4%BF%A1%E5%B9%BF%E5%91%8A%E4%BB%BB%E5%8A%A1%E5%B9%B3%E5%8F%B0/%E5%BE%AE%E4%BF%A1%E5%B9%BF%E5%91%8A%E4%BB%BB%E5%8A%A1%E5%B9%B3%E5%8F%B0ajax_upload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
微信活码系统index存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BE%AE%E4%BF%A1%E6%B4%BB%E7%A0%81%E7%B3%BB%E7%BB%9F/%E5%BE%AE%E4%BF%A1%E6%B4%BB%E7%A0%81%E7%B3%BB%E7%BB%9Findex%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
微擎微信公众号管理系统系统AccountEdit存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BE%AE%E6%93%8E%E4%BA%91%E8%AE%A1%E7%AE%97%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%BE%AE%E6%93%8E%E5%BE%AE%E4%BF%A1%E5%85%AC%E4%BC%97%E5%8F%B7%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E7%B3%BB%E7%BB%9FAccountEdit%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
心医国际WebPacs系统存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%95%B0%E5%AD%97%E5%8C%BB%E7%96%97/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85WebPacs%E7%B3%BB%E7%BB%9F/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85WebPacs%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
心医国际WebPacs系统存在XSS漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%95%B0%E5%AD%97%E5%8C%BB%E7%96%97/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85WebPacs%E7%B3%BB%E7%BB%9F/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85WebPacs%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8XSS%E6%BC%8F%E6%B4%9E.md
心医国际WebPacs系统存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%95%B0%E5%AD%97%E5%8C%BB%E7%96%97/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85WebPacs%E7%B3%BB%E7%BB%9F/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85WebPacs%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
心医国际系统数据库默认口令https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%95%B0%E5%AD%97%E5%8C%BB%E7%96%97/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85WebPacs%E7%B3%BB%E7%BB%9F/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E7%B3%BB%E7%BB%9F%E6%95%B0%E6%8D%AE%E5%BA%93%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4.md
心医国际医技统计报表系统存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%95%B0%E5%AD%97%E5%8C%BB%E7%96%97/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E5%8C%BB%E6%8A%80%E7%BB%9F%E8%AE%A1%E6%8A%A5%E8%A1%A8%E7%B3%BB%E7%BB%9F/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E5%8C%BB%E6%8A%80%E7%BB%9F%E8%AE%A1%E6%8A%A5%E8%A1%A8%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
心医国际医技统计报表系统存在XSS漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%95%B0%E5%AD%97%E5%8C%BB%E7%96%97/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E5%8C%BB%E6%8A%80%E7%BB%9F%E8%AE%A1%E6%8A%A5%E8%A1%A8%E7%B3%BB%E7%BB%9F/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E5%8C%BB%E6%8A%80%E7%BB%9F%E8%AE%A1%E6%8A%A5%E8%A1%A8%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8XSS%E6%BC%8F%E6%B4%9E.md
心医国际医技统计报表系统存在信息泄露及弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%95%B0%E5%AD%97%E5%8C%BB%E7%96%97/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E5%8C%BB%E6%8A%80%E7%BB%9F%E8%AE%A1%E6%8A%A5%E8%A1%A8%E7%B3%BB%E7%BB%9F/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E5%8C%BB%E6%8A%80%E7%BB%9F%E8%AE%A1%E6%8A%A5%E8%A1%A8%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E5%8F%8A%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
心医国际排队叫号系统SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%95%B0%E5%AD%97%E5%8C%BB%E7%96%97/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%8E%92%E9%98%9F%E5%8F%AB%E5%8F%B7%E7%B3%BB%E7%BB%9F/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%8E%92%E9%98%9F%E5%8F%AB%E5%8F%B7%E7%B3%BB%E7%BB%9FSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
心医国际排队叫号系统敏感信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%95%B0%E5%AD%97%E5%8C%BB%E7%96%97/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%8E%92%E9%98%9F%E5%8F%AB%E5%8F%B7%E7%B3%BB%E7%BB%9F/%E5%BF%83%E5%8C%BB%E5%9B%BD%E9%99%85%E6%8E%92%E9%98%9F%E5%8F%AB%E5%8F%B7%E7%B3%BB%E7%BB%9F%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
快普M6SalaryAccounting存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BF%AB%E6%99%AE/%E5%BF%AB%E6%99%AEM6SalaryAccounting%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
快递微信小程序系统存在前台任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E5%BF%AB%E9%80%92%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F/%E5%BF%AB%E9%80%92%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
思福迪运维安全管理系统GetCaCert存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%80%9D%E7%A6%8F%E8%BF%AA/%E6%80%9D%E7%A6%8F%E8%BF%AA%E8%BF%90%E7%BB%B4%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGetCaCert%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
思福迪运维安全管理系统test_qrcode_b存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%80%9D%E7%A6%8F%E8%BF%AA/%E6%80%9D%E7%A6%8F%E8%BF%AA%E8%BF%90%E7%BB%B4%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Ftest_qrcode_b%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
思迅商旗商业管理系统10SetAiPosItemImage存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%80%9D%E8%BF%85%E5%95%86%E6%97%97/%E6%80%9D%E8%BF%85%E5%95%86%E6%97%97%E5%95%86%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F10SetAiPosItemImage%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
思迅商旗商业管理系统7Cashier存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%80%9D%E8%BF%85%E5%95%86%E6%97%97/%E6%80%9D%E8%BF%85%E5%95%86%E6%97%97%E5%95%86%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F7Cashier%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
思迅商旗商业管理系统7GylOperator存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%80%9D%E8%BF%85%E5%95%86%E6%97%97/%E6%80%9D%E8%BF%85%E5%95%86%E6%97%97%E5%95%86%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F7GylOperator%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
思迅商旗商业管理系统7Operator存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%80%9D%E8%BF%85%E5%95%86%E6%97%97/%E6%80%9D%E8%BF%85%E5%95%86%E6%97%97%E5%95%86%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F7Operator%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
思迅商旗商业管理系统7存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%80%9D%E8%BF%85%E5%95%86%E6%97%97/%E6%80%9D%E8%BF%85%E5%95%86%E6%97%97%E5%95%86%E4%B8%9A%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F7%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
Smartbi内置用户登陆绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%80%9D%E8%BF%88%E7%89%B9/Smartbi%E5%86%85%E7%BD%AE%E7%94%A8%E6%88%B7%E7%99%BB%E9%99%86%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
悟空CRM9.0存在fastjson远程代码执行漏洞(CVE-2024-23052)https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%82%9F%E7%A9%BACRM/%E6%82%9F%E7%A9%BACRM9.0%E5%AD%98%E5%9C%A8fastjson%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-23052).md
悦库网盘aRegisAdmin存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%82%A6%E5%BA%93%E7%BD%91%E7%9B%98/%E6%82%A6%E5%BA%93%E7%BD%91%E7%9B%98aRegisAdmin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
惠尔顿安全审计系统download任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%83%A0%E5%B0%94%E9%A1%BF/%E6%83%A0%E5%B0%94%E9%A1%BF%E5%AE%89%E5%85%A8%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fdownload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
百择唯·供应链RankingGoodsList2存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%87%82%E5%BE%AE%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%EF%BC%88%E4%B8%8A%E6%B5%B7%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%99%BE%E6%8B%A9%E5%94%AF%C2%B7%E4%BE%9B%E5%BA%94%E9%93%BERankingGoodsList2%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
懒人网址导航系统search存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%87%92%E4%BA%BA%E7%BD%91%E5%9D%80%E5%AF%BC%E8%88%AA/%E6%87%92%E4%BA%BA%E7%BD%91%E5%9D%80%E5%AF%BC%E8%88%AA%E7%B3%BB%E7%BB%9Fsearch%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
成都信通网易医疗科技发展有限公司HIS系统getContractSource存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/HIS%E7%B3%BB%E7%BB%9F/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8HIS%E7%B3%BB%E7%BB%9FgetContractSource%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
成都信通网易医疗科技发展有限公司HIS系统getContract存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/HIS%E7%B3%BB%E7%BB%9F/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8HIS%E7%B3%BB%E7%BB%9FgetContract%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
成都信通网易医疗科技发展有限公司PACS(医学影像信息管理系统)dabh存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/PACS%E7%B3%BB%E7%BB%9F/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8PACS(%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F)dabh%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
成都信通网易医疗科技发展有限公司PACS(医学影像信息管理系统)edtJclx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/PACS%E7%B3%BB%E7%BB%9F/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8PACS(%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F)edtJclx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
成都信通网易医疗科技发展有限公司PACS(医学影像信息管理系统)存在XSS跨站脚本漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/PACS%E7%B3%BB%E7%BB%9F/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8PACS(%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F)%E5%AD%98%E5%9C%A8XSS%E8%B7%A8%E7%AB%99%E8%84%9A%E6%9C%AC%E6%BC%8F%E6%B4%9E.md
成都信通网易医疗科技发展有限公司PACS(医学影像信息管理系统)存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/PACS%E7%B3%BB%E7%BB%9F/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8PACS(%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F)%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
成都信通网易医疗科技发展有限公司PACS(医学影像信息管理系统)存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/PACS%E7%B3%BB%E7%BB%9F/%E6%88%90%E9%83%BD%E4%BF%A1%E9%80%9A%E7%BD%91%E6%98%93%E5%8C%BB%E7%96%97%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8PACS(%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F)%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
手机卡号推广商城ssk存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%89%8B%E6%9C%BA%E5%8D%A1%E5%8F%B7%E6%8E%A8%E5%B9%BF%E5%95%86%E5%9F%8E/%E6%89%8B%E6%9C%BA%E5%8D%A1%E5%8F%B7%E6%8E%A8%E5%B9%BF%E5%95%86%E5%9F%8Essk%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
挂号系统login.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%82%E5%8F%B7%E7%B3%BB%E7%BB%9F/%E6%8C%82%E5%8F%B7%E7%B3%BB%E7%BB%9Flogin.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
指挥调度平台ajax_users存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0ajax_users%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
指挥调度平台client_upload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0client_upload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
指挥调度平台event_uploadfile存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0event_uploadfile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
指挥调度平台get_gis_fence_warning存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0get_gis_fence_warning%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
指挥调度平台invite2videoconf存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0invite2videoconf%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
指挥调度平台invite_one_member存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0invite_one_member%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
指挥调度平台invite_one_ptter存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0invite_one_ptter%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
指挥调度平台send_fax存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0send_fax%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
指挥调度平台task_uploadfile存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0task_uploadfile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
指挥调度平台usernumber存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0usernumber%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
指挥调度平台zx_upload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0/%E6%8C%87%E6%8C%A5%E8%B0%83%E5%BA%A6%E5%B9%B3%E5%8F%B0zx_upload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
斐讯路由器PHICOMM-FIR300M型号存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%96%90%E8%AE%AF%E8%B7%AF%E7%94%B1%E5%99%A8/%E6%96%90%E8%AE%AF%E8%B7%AF%E7%94%B1%E5%99%A8PHICOMM-FIR300M%E5%9E%8B%E5%8F%B7%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
方天云ERP系统GetCompanyItem存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%96%B9%E5%A4%A9%E7%A7%91%E6%8A%80(%E6%B7%B1%E5%9C%B3)%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%96%B9%E5%A4%A9%E4%BA%91ERP%E7%B3%BB%E7%BB%9FGetCompanyItem%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
方天云ERP系统GetSalQuatation存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%96%B9%E5%A4%A9%E7%A7%91%E6%8A%80(%E6%B7%B1%E5%9C%B3)%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%96%B9%E5%A4%A9%E4%BA%91ERP%E7%B3%BB%E7%BB%9FGetSalQuatation%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
时空智友企业流程化管控系统formserverSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B%E4%BC%81%E4%B8%9A%E6%B5%81%E7%A8%8B%E5%8C%96%E7%AE%A1%E6%8E%A7%E7%B3%BB%E7%BB%9FformserverSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
时空智友企业流程化管控系统formserver任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B%E4%BC%81%E4%B8%9A%E6%B5%81%E7%A8%8B%E5%8C%96%E7%AE%A1%E6%8E%A7%E7%B3%BB%E7%BB%9Fformserver%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
时空智友企业流程化管控系统login文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B%E4%BC%81%E4%B8%9A%E6%B5%81%E7%A8%8B%E5%8C%96%E7%AE%A1%E6%8E%A7%E7%B3%BB%E7%BB%9Flogin%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
时空智友企业流程化管控系统manage敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B%E4%BC%81%E4%B8%9A%E6%B5%81%E7%A8%8B%E5%8C%96%E7%AE%A1%E6%8E%A7%E7%B3%BB%E7%BB%9Fmanage%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
时空智友企业流程化管控系统wc.db文件信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B/%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B%E4%BC%81%E4%B8%9A%E6%B5%81%E7%A8%8B%E5%8C%96%E7%AE%A1%E6%8E%A7%E7%B3%BB%E7%BB%9Fwc.db%E6%96%87%E4%BB%B6%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
时间精细化管理平台存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%97%B6%E9%97%B4%E7%B2%BE%E7%BB%86%E5%8C%96%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%97%B6%E9%97%B4%E7%B2%BE%E7%BB%86%E5%8C%96%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
昂捷CRMcwsfiledown存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%98%82%E6%8D%B7CRM/%E6%98%82%E6%8D%B7CRMcwsfiledown%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
昂捷CRMcwsuploadpicture存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%98%82%E6%8D%B7CRM/%E6%98%82%E6%8D%B7CRMcwsuploadpicture%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
昆石网络VOS3000任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%98%86%E7%9F%B3%E7%BD%91%E7%BB%9C/%E6%98%86%E7%9F%B3%E7%BD%91%E7%BB%9CVOS3000%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
明源云ERP系统接口管家ApiUpdate.ashx文件存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%98%8E%E6%BA%90%E4%BA%91erp/%E6%98%8E%E6%BA%90%E4%BA%91ERP%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3%E7%AE%A1%E5%AE%B6ApiUpdate.ashx%E6%96%87%E4%BB%B6%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
易思智能物流无人值守系统ImportReport任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81%E6%97%A0%E4%BA%BA%E5%80%BC%E5%AE%88%E7%B3%BB%E7%BB%9FImportReport%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
易思智能物流无人值守系统downfile文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81/%E6%98%93%E6%80%9D%E6%99%BA%E8%83%BD%E7%89%A9%E6%B5%81%E6%97%A0%E4%BA%BA%E5%80%BC%E5%AE%88%E7%B3%BB%E7%BB%9Fdownfile%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
智跃人力资源管理系统GenerateEntityFromTable.aspxSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%99%BA%E8%B7%83%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%99%BA%E8%B7%83%E4%BA%BA%E5%8A%9B%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGenerateEntityFromTable.aspxSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
智邦国际ERPGetPersonalSealData.ashx接口SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%99%BA%E9%82%A6%E5%9B%BD%E9%99%85ERP/%E6%99%BA%E9%82%A6%E5%9B%BD%E9%99%85ERPGetPersonalSealData.ashx%E6%8E%A5%E5%8F%A3SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
月子会所ERP管理云平台AttachedHandler任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0AttachedHandler%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
月子会所ERP管理云平台BasicInfo任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0BasicInfo%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
月子会所ERP管理云平台ContractManager任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0ContractManager%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
月子会所ERP管理云平台ICManager任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0ICManager%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
月子会所ERP管理云平台MicroMall任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0MicroMall%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
月子会所ERP管理云平台ModuleUpHandler任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0ModuleUpHandler%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
月子会所ERP管理云平台SelectUserMangerPrint存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0SelectUserMangerPrint%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
月子会所ERP管理云平台UploadComponent任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0UploadComponent%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
月子会所ERP管理云平台upload任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0upload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
月子会所ERP管理云平台存在目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP/%E6%9C%88%E5%AD%90%E4%BC%9A%E6%89%80ERP%E7%AE%A1%E7%90%86%E4%BA%91%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
圣乔ERP系统存在struts2远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9D%AD%E5%B7%9E%E5%9C%A3%E4%B9%94%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%9C%A3%E4%B9%94ERP%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8struts2%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
帕拉迪堡垒机sslvpnservice.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9D%AD%E5%B7%9E%E5%B8%95%E6%8B%89%E8%BF%AA%E7%BD%91%E7%BB%9C%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%B8%95%E6%8B%89%E8%BF%AA%E5%A0%A1%E5%9E%92%E6%9C%BAsslvpnservice.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
极简云验证系统download存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9E%81%E7%AE%80%E4%BA%91/%E6%9E%81%E7%AE%80%E4%BA%91%E9%AA%8C%E8%AF%81%E7%B3%BB%E7%BB%9Fdownload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
极简云验证系统存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%9E%81%E7%AE%80%E4%BA%91/%E6%9E%81%E7%AE%80%E4%BA%91%E9%AA%8C%E8%AF%81%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
天喻软件数据安全平台Setmng.ashx存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%AD%A6%E6%B1%89%E5%A4%A9%E5%96%BB%E8%BD%AF%E4%BB%B6%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%A4%A9%E5%96%BB%E8%BD%AF%E4%BB%B6%E6%95%B0%E6%8D%AE%E5%AE%89%E5%85%A8%E5%B9%B3%E5%8F%B0/%E5%A4%A9%E5%96%BB%E8%BD%AF%E4%BB%B6%E6%95%B0%E6%8D%AE%E5%AE%89%E5%85%A8%E5%B9%B3%E5%8F%B0Setmng.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
天喻软件数据安全平台存在目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%AD%A6%E6%B1%89%E5%A4%A9%E5%96%BB%E8%BD%AF%E4%BB%B6%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E5%A4%A9%E5%96%BB%E8%BD%AF%E4%BB%B6%E6%95%B0%E6%8D%AE%E5%AE%89%E5%85%A8%E5%B9%B3%E5%8F%B0/%E5%A4%A9%E5%96%BB%E8%BD%AF%E4%BB%B6%E6%95%B0%E6%8D%AE%E5%AE%89%E5%85%A8%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
汉得SRMtomcat.jsp登录绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B1%89%E5%BE%97/%E6%B1%89%E5%BE%97SRMtomcat.jsp%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
江西云本数字科技有限公司云出行后台管理系统未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B1%9F%E8%A5%BF%E4%BA%91%E6%9C%AC%E6%95%B0%E5%AD%97%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B1%9F%E8%A5%BF%E4%BA%91%E6%9C%AC%E6%95%B0%E5%AD%97%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E4%BA%91%E5%87%BA%E8%A1%8C%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
汇智ERPfilehandle存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B1%9F%E9%98%B4%E6%B1%87%E6%99%BA%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B1%87%E6%99%BAERPfilehandle%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
电子文档安全管理系统V6.0存在任意文件下载https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%8E%E5%8D%97%E4%B8%8A%E9%82%A6%E7%94%B5%E5%AD%90%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FV6.0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD.md
浙大恩特CRMAuthorityJudgement存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRM/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRMAuthorityJudgement%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
浙大恩特CRMFollowAction存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRM/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRMFollowAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
浙大恩特CRMT0140_editActionSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRM/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRMT0140_editActionSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
浙大恩特CRMfileupload.jsp任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRM/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRMfileupload.jsp%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
浙大恩特CRMloadFile任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRM/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRMloadFile%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
浙大恩特CRMmachord_doc任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRM/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRMmachord_doc%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
浙大恩特CRMsaveAttaFile任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRM/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRMsaveAttaFile%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
浙大恩特CRMsaveFileByPhone任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRM/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRMsaveFileByPhone%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
浙大恩特CRMzipFileUpload任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRM/%E6%B5%99%E5%A4%A7%E6%81%A9%E7%89%B9CRMzipFileUpload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
浙江宇视媒体服务器-user-信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E6%B1%9F%E5%AE%87%E8%A7%86/%E6%B5%99%E6%B1%9F%E5%AE%87%E8%A7%86%E5%AA%92%E4%BD%93%E6%9C%8D%E5%8A%A1%E5%99%A8-user-%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
浙江宇视科技视频监控main-cgi密码泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E6%B1%9F%E5%AE%87%E8%A7%86/%E6%B5%99%E6%B1%9F%E5%AE%87%E8%A7%86%E7%A7%91%E6%8A%80%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7main-cgi%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
浙江宇视网络视频录像机LogReport.php远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%99%E6%B1%9F%E5%AE%87%E8%A7%86/%E6%B5%99%E6%B1%9F%E5%AE%87%E8%A7%86%E7%BD%91%E7%BB%9C%E8%A7%86%E9%A2%91%E5%BD%95%E5%83%8F%E6%9C%BALogReport.php%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
浪潮GS企业管理软件xtdysrv存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%AA%E6%BD%AE/%E6%B5%AA%E6%BD%AEGS%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6xtdysrv%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
某二开版海外抢单Shua单系统存在任意用户登录漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%A4%96%E6%8A%A2%E5%8D%95%E5%88%B7%E5%8D%95%E7%B3%BB%E7%BB%9F/%E6%9F%90%E4%BA%8C%E5%BC%80%E7%89%88%E6%B5%B7%E5%A4%96%E6%8A%A2%E5%8D%95Shua%E5%8D%95%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
海康威视IP摄像机_NVR设备固件远程代码执行漏洞(CVE-2021-36260)https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86IP%E6%91%84%E5%83%8F%E6%9C%BA_NVR%E8%AE%BE%E5%A4%87%E5%9B%BA%E4%BB%B6/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86IP%E6%91%84%E5%83%8F%E6%9C%BA_NVR%E8%AE%BE%E5%A4%87%E5%9B%BA%E4%BB%B6%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2021-36260).md
海康威视SPONIP网络对讲广播系统addscenedata存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Faddscenedata%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
海康威视SPONIP网络对讲广播系统busyscreenshotpush存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Fbusyscreenshotpush%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
海康威视SPONIP网络对讲广播系统exportrecord存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Fexportrecord%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
海康威视SPONIP网络对讲广播系统getjson存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Fgetjson%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
海康威视SPONIP网络对讲广播系统getuserdata存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Fgetuserdata%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
海康威视SPONIP网络对讲广播系统index存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Findex%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
海康威视SPONIP网络对讲广播系统my_parser存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Fmy_parser%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
海康威视SPONIP网络对讲广播系统rj_get_token存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Frj_get_token%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
海康威视SPONIP网络对讲广播系统uploadjson存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9Fuploadjson%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
海康威视SPONIP网络对讲广播系统存在后门账号漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%90%8E%E9%97%A8%E8%B4%A6%E5%8F%B7%E6%BC%8F%E6%B4%9E.md
海康威视SPONIP网络对讲广播系统存在命令执行漏洞(CVE-2023-6895)https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86SPONIP%E7%BD%91%E7%BB%9C%E5%AF%B9%E8%AE%B2%E5%B9%BF%E6%92%AD%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-6895).md
海康威视iSecureCenter综合安防管理平台center任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0center%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
海康威视iSecureCenter综合安防管理平台config.properties信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0config.properties%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
海康威视iSecureCenter综合安防管理平台download任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0download%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
海康威视iSecureCenter综合安防管理平台env信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0env%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
海康威视iSecureCenter综合安防管理平台files接口存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0files%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
海康威视iSecureCenter综合安防管理平台findcomponent泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0findcomponent%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
海康威视iSecureCenter综合安防管理平台find信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0find%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
海康威视iSecureCenter综合安防管理平台lm任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0lm%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
海康威视iSecureCenter综合安防管理平台meta信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0meta%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
海康威视iSecureCenter综合安防管理平台ssoService远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0ssoService%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
海康威视iSecureCenter综合安防管理平台svm文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0svm%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
海康威视iSecureCenter综合安防管理平台存在applyCTFastjson命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iSecureCenter%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8applyCTFastjson%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
海康威视iVMS-8700综合安防管理平台download任意文件下载https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS-8700%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0download%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD.md
海康威视iVMS-8700综合安防管理平台getAllUserInfo存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS-8700%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0getAllUserInfo%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
海康威视iVMS-8700综合安防管理平台getPic任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS-8700%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0getPic%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
海康威视iVMS-8700综合安防管理平台query存在硬编码漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS-8700%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0query%E5%AD%98%E5%9C%A8%E7%A1%AC%E7%BC%96%E7%A0%81%E6%BC%8F%E6%B4%9E.md
海康威视iVMS-8700综合安防管理平台upload.action任意文件上传https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS-8700%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0upload.action%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
海康威视iVMS-8700综合安防系统resourceOperations任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%B3%BB%E7%BB%9F/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86iVMS-8700%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%B3%BB%E7%BB%9FresourceOperations%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
海康威视流媒体管理服务器user.xml账号密码泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E6%B5%81%E5%AA%92%E4%BD%93%E7%AE%A1%E7%90%86%E6%9C%8D%E5%8A%A1%E5%99%A8/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E6%B5%81%E5%AA%92%E4%BD%93%E7%AE%A1%E7%90%86%E6%9C%8D%E5%8A%A1%E5%99%A8user.xml%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
海康威视视频编码设备接入网关showFile.php任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E8%A7%86%E9%A2%91%E7%BC%96%E7%A0%81%E8%AE%BE%E5%A4%87%E6%8E%A5%E5%85%A5%E7%BD%91%E5%85%B3/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E8%A7%86%E9%A2%91%E7%BC%96%E7%A0%81%E8%AE%BE%E5%A4%87%E6%8E%A5%E5%85%A5%E7%BD%91%E5%85%B3showFile.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
海康威视视频编码设备接入网关userinfodata接口存在信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E8%A7%86%E9%A2%91%E7%BC%96%E7%A0%81%E8%AE%BE%E5%A4%87%E6%8E%A5%E5%85%A5%E7%BD%91%E5%85%B3/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E8%A7%86%E9%A2%91%E7%BC%96%E7%A0%81%E8%AE%BE%E5%A4%87%E6%8E%A5%E5%85%A5%E7%BD%91%E5%85%B3userinfodata%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
成都海翔软件有限公司海翔药业云平台存在sql注入https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B5%B7%E7%BF%94%E8%8D%AF%E4%B8%9A%E4%BA%91%E5%B9%B3%E5%8F%B0/%E6%88%90%E9%83%BD%E6%B5%B7%E7%BF%94%E8%BD%AF%E4%BB%B6%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%B5%B7%E7%BF%94%E8%8D%AF%E4%B8%9A%E4%BA%91%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5.md
润乾报表InputServlet存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8InputServlet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
润乾报表InputServlet存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8/%E6%B6%A6%E4%B9%BE%E6%8A%A5%E8%A1%A8InputServlet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
润申企业标准化管理系统DefaultHandler存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B6%A6%E7%94%B3%E4%BF%A1%E6%81%AF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B6%A6%E7%94%B3%E4%BC%81%E4%B8%9A%E6%A0%87%E5%87%86%E5%8C%96%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDefaultHandler%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
深信服SG上网优化管理系统catjs存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E4%BF%A1%E6%9C%8D/%E6%B7%B1%E4%BF%A1%E6%9C%8DSG%E4%B8%8A%E7%BD%91%E4%BC%98%E5%8C%96%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B7%B1%E4%BF%A1%E6%9C%8DSG%E4%B8%8A%E7%BD%91%E4%BC%98%E5%8C%96%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fcatjs%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
深信服下一代防火墙NGAFloadfile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E4%BF%A1%E6%9C%8D/%E6%B7%B1%E4%BF%A1%E6%9C%8D%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99NGAF/%E6%B7%B1%E4%BF%A1%E6%9C%8D%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99NGAFloadfile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
深信服应用交付管理系统download存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E4%BF%A1%E6%9C%8D/%E6%B7%B1%E4%BF%A1%E6%9C%8D%E5%BA%94%E7%94%A8%E4%BA%A4%E4%BB%98%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B7%B1%E4%BF%A1%E6%9C%8D%E5%BA%94%E7%94%A8%E4%BA%A4%E4%BB%98%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdownload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
深信服应用交付管理系统rep_login远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E4%BF%A1%E6%9C%8D/%E6%B7%B1%E4%BF%A1%E6%9C%8D%E5%BA%94%E7%94%A8%E4%BA%A4%E4%BB%98%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E6%B7%B1%E4%BF%A1%E6%9C%8D%E5%BA%94%E7%94%A8%E4%BA%A4%E4%BB%98%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Frep_login%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
深信服EDR平台存在任意用户登录漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E4%BF%A1%E6%9C%8D/%E6%B7%B1%E4%BF%A1%E6%9C%8D%E7%A7%91%E6%8A%80EDR/%E6%B7%B1%E4%BF%A1%E6%9C%8DEDR%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
深信服EDR平台存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E4%BF%A1%E6%9C%8D/%E6%B7%B1%E4%BF%A1%E6%9C%8D%E7%A7%91%E6%8A%80EDR/%E6%B7%B1%E4%BF%A1%E6%9C%8DEDR%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
深圳亮钻科技有限公司iDS联网数字标牌管理系统存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E4%BA%AE%E9%92%BB%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B7%B1%E5%9C%B3%E4%BA%AE%E9%92%BB%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8iDS%E8%81%94%E7%BD%91%E6%95%B0%E5%AD%97%E6%A0%87%E7%89%8C%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
深圳市子辰视讯科技有限公司酒店智慧营销IPTV系统存在sql注入https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E5%AD%90%E8%BE%B0%E8%A7%86%E8%AE%AF%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B7%B1%E5%9C%B3%E5%B8%82%E5%AD%90%E8%BE%B0%E8%A7%86%E8%AE%AF%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E9%85%92%E5%BA%97%E6%99%BA%E6%85%A7%E8%90%A5%E9%94%80IPTV%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5.md
深圳市拓普泰尔科技有限公司RG2000存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%8B%93%E6%99%AE%E6%B3%B0%E5%B0%94%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%8B%93%E6%99%AE%E6%B3%B0%E5%B0%94%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8RG2000%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
EnjoyRMISEnjoyRMIS_WS存在目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%98%82%E6%8D%B7%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/EnjoyRMISEnjoyRMIS_WS%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
EnjoyRMISGetChildGroupSql1存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%98%82%E6%8D%B7%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/EnjoyRMISGetChildGroupSql1%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
EnjoyRMISGetOAById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%98%82%E6%8D%B7%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/EnjoyRMISGetOAById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
EnjoyRMISGetOCashById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%98%82%E6%8D%B7%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/EnjoyRMISGetOCashById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
EnjoyRMISGetOCgpById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%98%82%E6%8D%B7%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/EnjoyRMISGetOCgpById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
EnjoyRMISGetOCountById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%98%82%E6%8D%B7%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/EnjoyRMISGetOCountById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
EnjoyRMISGetOCpById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%98%82%E6%8D%B7%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/EnjoyRMISGetOCpById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
EnjoyRMISGetODById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%98%82%E6%8D%B7%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/EnjoyRMISGetODById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
EnjoyRMISGetOSpById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%98%82%E6%8D%B7%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/EnjoyRMISGetOSpById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
深圳市朗驰欣创科技股份有限公司视频监控系统存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%9C%97%E9%A9%B0%E6%AC%A3%E5%88%9B%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B7%B1%E5%9C%B3%E5%B8%82%E6%9C%97%E9%A9%B0%E6%AC%A3%E5%88%9B%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
深圳市锐明技术股份有限公司Crocus系统Service.do任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Crocus%E7%B3%BB%E7%BB%9FService.do%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
深圳市锐明技术股份有限公司Crocus系统存在任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Crocus%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
深圳市锐明技术股份有限公司Crocus系统存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Crocus%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
深圳市锐明技术股份有限公司Crocus系统身份认证绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Crocus%E7%B3%BB%E7%BB%9F%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
誉龙数字执法记录仪管理平台FindById存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E8%AA%89%E9%BE%99%E6%95%B0%E5%AD%97%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E8%AA%89%E9%BE%99%E6%95%B0%E5%AD%97%E6%89%A7%E6%B3%95%E8%AE%B0%E5%BD%95%E4%BB%AA%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0FindById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
誉龙数字执法记录仪管理平台TimeSyn远程命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B7%B1%E5%9C%B3%E8%AA%89%E9%BE%99%E6%95%B0%E5%AD%97%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E8%AA%89%E9%BE%99%E6%95%B0%E5%AD%97%E6%89%A7%E6%B3%95%E8%AE%B0%E5%BD%95%E4%BB%AA%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0TimeSyn%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
易天智能eHR管理平台任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B8%A9%E5%B7%9E%E5%B8%82%E6%98%93%E5%A4%A9%E4%BF%A1%E6%81%AF%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%98%93%E5%A4%A9%E6%99%BA%E8%83%BDeHR%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
资产管理运营系统comfileup前台文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B9%96%E5%8D%97%E4%BC%97%E5%90%88%E7%99%BE%E6%98%93%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E8%B5%84%E4%BA%A7%E7%AE%A1%E7%90%86%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9Fcomfileup%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
湖南建研工程质量检测系统Attachment存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E5%B7%A5%E7%A8%8B%E8%B4%A8%E9%87%8F%E6%A3%80%E6%B5%8B%E7%B3%BB%E7%BB%9FAttachment%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
湖南建研工程质量检测系统FileUpload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E5%B7%A5%E7%A8%8B%E8%B4%A8%E9%87%8F%E6%A3%80%E6%B5%8B%E7%B3%BB%E7%BB%9FFileUpload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
湖南建研工程质量检测系统updatefile存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%B9%96%E5%8D%97%E5%BB%BA%E7%A0%94%E5%B7%A5%E7%A8%8B%E8%B4%A8%E9%87%8F%E6%A3%80%E6%B5%8B%E7%B3%BB%E7%BB%9Fupdatefile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
满客宝后台管理系统downloadWebFile任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%BB%A1%E5%AE%A2%E5%AE%9D/%E6%BB%A1%E5%AE%A2%E5%AE%9D%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FdownloadWebFile%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
满客宝智慧食堂预定系统selectUserByOrgId存在未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E6%BB%A1%E5%AE%A2%E5%AE%9D/%E6%BB%A1%E5%AE%A2%E5%AE%9D%E6%99%BA%E6%85%A7%E9%A3%9F%E5%A0%82%E9%A2%84%E5%AE%9A%E7%B3%BB%E7%BB%9FselectUserByOrgId%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
瀚霖科技股份有限公司ISS-7000v2网关login_handler.cgi存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%80%9A%E9%9C%96%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%80%9A%E9%9C%96%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8ISS-7000v2%E7%BD%91%E5%85%B3login_handler.cgi%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
爱数企业云盘存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%88%B1%E6%95%B0%E4%BC%81%E4%B8%9A%E7%BD%91%E7%9B%98/%E7%88%B1%E6%95%B0%E4%BC%81%E4%B8%9A%E4%BA%91%E7%9B%98%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
瑞斯康达多业务智能网关list_base_config存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%91%9E%E6%96%AF%E5%BA%B7%E8%BE%BE%E7%A7%91%E6%8A%80%E5%8F%91%E5%B1%95%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%91%9E%E6%96%AF%E5%BA%B7%E8%BE%BE%E5%A4%9A%E4%B8%9A%E5%8A%A1%E6%99%BA%E8%83%BD%E7%BD%91%E5%85%B3list_base_config%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
申瓯通信设备有限公司在线录音管理系统index存在文件包含漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%94%B3%E7%93%AF%E9%80%9A%E4%BF%A1%E8%AE%BE%E5%A4%87%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%94%B3%E7%93%AF%E9%80%9A%E4%BF%A1%E8%AE%BE%E5%A4%87%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%9C%A8%E7%BA%BF%E5%BD%95%E9%9F%B3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Findex%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E.md
申瓯通信设备有限公司在线录音管理系统存在任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%94%B3%E7%93%AF%E9%80%9A%E4%BF%A1%E8%AE%BE%E5%A4%87%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%94%B3%E7%93%AF%E9%80%9A%E4%BF%A1%E8%AE%BE%E5%A4%87%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%9C%A8%E7%BA%BF%E5%BD%95%E9%9F%B3%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
电信网关配置管理系统rewrite存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Frewrite%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
电信网关配置管理系统存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%94%B5%E4%BF%A1%E7%BD%91%E5%85%B3%E9%85%8D%E7%BD%AE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
电子文档安全管理系统backup存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fbackup%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
百为智能流控路由器存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%99%BE%E4%B8%BA%E6%B5%81%E6%8E%A7/%E7%99%BE%E4%B8%BA%E6%99%BA%E8%83%BD%E6%B5%81%E6%8E%A7%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
百卓SmartSQL命令注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%99%BE%E5%8D%93/%E7%99%BE%E5%8D%93SmartSQL%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
百卓Smartuploadfile存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%99%BE%E5%8D%93/%E7%99%BE%E5%8D%93Smartuploadfile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
百卓Smart后台任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%99%BE%E5%8D%93/%E7%99%BE%E5%8D%93Smart%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
皓峰防火墙login.php存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%9A%93%E5%B3%B0/%E7%9A%93%E5%B3%B0%E9%98%B2%E7%81%AB%E5%A2%99login.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
皓峰防火墙setdomain存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%9A%93%E5%B3%B0/%E7%9A%93%E5%B3%B0%E9%98%B2%E7%81%AB%E5%A2%99setdomain%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
皓峰防火墙存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%9A%93%E5%B3%B0/%E7%9A%93%E5%B3%B0%E9%98%B2%E7%81%AB%E5%A2%99%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
盲盒抽奖小程序系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%9B%B2%E7%9B%92%E6%8A%BD%E5%A5%96%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F/%E7%9B%B2%E7%9B%92%E6%8A%BD%E5%A5%96%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
真内控国产化平台preview存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%9C%9F%E5%86%85%E6%8E%A7%E5%9B%BD%E4%BA%A7%E5%8C%96%E5%B9%B3%E5%8F%B0/%E7%9C%9F%E5%86%85%E6%8E%A7%E5%9B%BD%E4%BA%A7%E5%8C%96%E5%B9%B3%E5%8F%B0preview%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
知识吾爱纯净版小程序系统leibiao存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%9F%A5%E8%AF%86%E5%90%BE%E7%88%B1%E7%BA%AF%E5%87%80%E7%89%88%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F/%E7%9F%A5%E8%AF%86%E5%90%BE%E7%88%B1%E7%BA%AF%E5%87%80%E7%89%88%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9Fleibiao%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
短视频系统视频知识付费系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%9F%AD%E8%A7%86%E9%A2%91%E7%B3%BB%E7%BB%9F%E8%A7%86%E9%A2%91%E7%9F%A5%E8%AF%86%E4%BB%98%E8%B4%B9%E7%B3%BB%E7%BB%9F/%E7%9F%AD%E8%A7%86%E9%A2%91%E7%B3%BB%E7%BB%9F%E8%A7%86%E9%A2%91%E7%9F%A5%E8%AF%86%E4%BB%98%E8%B4%B9%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
碧海威L7多款产品confirm存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%A2%A7%E6%B5%B7%E5%A8%81/%E7%A2%A7%E6%B5%B7%E5%A8%81L7%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81confirm%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
碧海威L7多款产品index存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%A2%A7%E6%B5%B7%E5%A8%81/%E7%A2%A7%E6%B5%B7%E5%A8%81L7%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81index%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
碧海威L7多款产品jumper存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%A2%A7%E6%B5%B7%E5%A8%81/%E7%A2%A7%E6%B5%B7%E5%A8%81L7%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81jumper%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
碧海威L7多款产品存在后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%A2%A7%E6%B5%B7%E5%A8%81/%E7%A2%A7%E6%B5%B7%E5%A8%81L7%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81%E5%AD%98%E5%9C%A8%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
碧海威L7多款产品存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%A2%A7%E6%B5%B7%E5%A8%81/%E7%A2%A7%E6%B5%B7%E5%A8%81L7%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
禅道16.5accountSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%A6%85%E9%81%93/%E7%A6%85%E9%81%9316.5accountSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
禅道开源项目管理软件信息收集https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%A6%85%E9%81%93/%E7%A6%85%E9%81%93%E5%BC%80%E6%BA%90%E9%A1%B9%E7%9B%AE%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86.md
科荣AIO管理系统ReportServlet存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%A7%91%E8%8D%A3AIO%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%A7%91%E8%8D%A3AIO%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FReportServlet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
科荣AIO管理系统ReportServlet存在目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%A7%91%E8%8D%A3AIO%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%A7%91%E8%8D%A3AIO%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FReportServlet%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
科荣AIO管理系统UtilServlet存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%A7%91%E8%8D%A3AIO%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%A7%91%E8%8D%A3AIO%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUtilServlet%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
科荣AIO管理系统UtilServlet存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%A7%91%E8%8D%A3AIO%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%A7%91%E8%8D%A3AIO%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FUtilServlet%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
竞优(广州)信息技术有限公司商业租赁管理系统存在Trace信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%AB%9E%E4%BC%98%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%AB%9E%E4%BC%98%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%95%86%E4%B8%9A%E7%A7%9F%E8%B5%81%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8Trace%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
竞优(广州)信息技术有限公司商业租赁管理系统存在account信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%AB%9E%E4%BC%98%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E7%AB%9E%E4%BC%98%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%95%86%E4%B8%9A%E7%A7%9F%E8%B5%81%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8account%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
章管家Druid未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%AB%A0%E7%AE%A1%E5%AE%B6/%E7%AB%A0%E7%AE%A1%E5%AE%B6Druid%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
EasyImagedown.php任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%AE%80%E5%8D%95%E5%9B%BE%E5%BA%8A/EasyImagedown.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
紫光档案管理系统WorkFlow存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%B4%AB%E5%85%89%E6%A1%A3%E6%A1%88%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%B4%AB%E5%85%89%E6%A1%A3%E6%A1%88%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FWorkFlow%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
紫光档案管理系统editPass存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%B4%AB%E5%85%89%E6%A1%A3%E6%A1%88%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E7%B4%AB%E5%85%89%E6%A1%A3%E6%A1%88%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FeditPass%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
绿盟SAS堡垒机Exec远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BB%BF%E7%9B%9F/%E7%BB%BF%E7%9B%9FSAS%E5%A0%A1%E5%9E%92%E6%9C%BAExec%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
绿盟SAS堡垒机GetFile任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BB%BF%E7%9B%9F/%E7%BB%BF%E7%9B%9FSAS%E5%A0%A1%E5%9E%92%E6%9C%BAGetFile%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
绿盟SAS堡垒机local_user.php任意用户登录漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BB%BF%E7%9B%9F/%E7%BB%BF%E7%9B%9FSAS%E5%A0%A1%E5%9E%92%E6%9C%BAlocal_user.php%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
网动统一通信平台iactiveEnterMeeting存在密钥泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E5%8A%A8%E7%BB%9F%E4%B8%80%E9%80%9A%E4%BF%A1%E5%B9%B3%E5%8F%B0/%E7%BD%91%E5%8A%A8%E7%BB%9F%E4%B8%80%E9%80%9A%E4%BF%A1%E5%B9%B3%E5%8F%B0iactiveEnterMeeting%E5%AD%98%E5%9C%A8%E5%AF%86%E9%92%A5%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
网动统一通信平台meetingShow存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E5%8A%A8%E7%BB%9F%E4%B8%80%E9%80%9A%E4%BF%A1%E5%B9%B3%E5%8F%B0/%E7%BD%91%E5%8A%A8%E7%BB%9F%E4%B8%80%E9%80%9A%E4%BF%A1%E5%B9%B3%E5%8F%B0meetingShow%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
网动统一通信平台存在默认口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E5%8A%A8%E7%BB%9F%E4%B8%80%E9%80%9A%E4%BF%A1%E5%B9%B3%E5%8F%B0/%E7%BD%91%E5%8A%A8%E7%BB%9F%E4%B8%80%E9%80%9A%E4%BF%A1%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
网康NS-ASG应用安全网关存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E5%BA%B7/%E7%BD%91%E5%BA%B7NS-ASG%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/%E7%BD%91%E5%BA%B7NS-ASG%E5%BA%94%E7%94%A8%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
网康NS-ASG应用安全网关源代码泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E5%BA%B7/%E7%BD%91%E5%BA%B7NS-ASG%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/%E7%BD%91%E5%BA%B7NS-ASG%E5%BA%94%E7%94%A8%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3%E6%BA%90%E4%BB%A3%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
网康下一代防火墙远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E5%BA%B7/%E7%BD%91%E5%BA%B7%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99/%E7%BD%91%E5%BA%B7%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
网御ACM上网行为管理系统bottomframe.cgiSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E5%BE%A1%E6%98%9F%E4%BA%91/%E7%BD%91%E5%BE%A1ACM%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fbottomframe.cgiSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
网神SecGata3600安全网关authManageSet.cgi接口登录绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E7%A5%9E/%E7%BD%91%E7%A5%9ESecGata3600%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/%E7%BD%91%E7%A5%9ESecGata3600%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3authManageSet.cgi%E6%8E%A5%E5%8F%A3%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
网神SecGata3600防火墙app_av_import_save任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E7%A5%9E/%E7%BD%91%E7%A5%9ESecGata3600%E9%98%B2%E7%81%AB%E5%A2%99/%E7%BD%91%E7%A5%9ESecGata3600%E9%98%B2%E7%81%AB%E5%A2%99app_av_import_save%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
网神SecGata3600防火墙obj_app_upfile任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E7%A5%9E/%E7%BD%91%E7%A5%9ESecGata3600%E9%98%B2%E7%81%AB%E5%A2%99/%E7%BD%91%E7%A5%9ESecGata3600%E9%98%B2%E7%81%AB%E5%A2%99obj_app_upfile%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
网神SecGata3600防火墙sec_ssl_agent_import_save任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E7%A5%9E/%E7%BD%91%E7%A5%9ESecGata3600%E9%98%B2%E7%81%AB%E5%A2%99/%E7%BD%91%E7%A5%9ESecGata3600%E9%98%B2%E7%81%AB%E5%A2%99sec_ssl_agent_import_save%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
网神SecGata3600防火墙sys_hand_upfile任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E7%A5%9E/%E7%BD%91%E7%A5%9ESecGata3600%E9%98%B2%E7%81%AB%E5%A2%99/%E7%BD%91%E7%A5%9ESecGata3600%E9%98%B2%E7%81%AB%E5%A2%99sys_hand_upfile%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
网神SecGata3600防火墙存在任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E7%A5%9E/%E7%BD%91%E7%A5%9ESecGata3600%E9%98%B2%E7%81%AB%E5%A2%99/%E7%BD%91%E7%A5%9ESecGata3600%E9%98%B2%E7%81%AB%E5%A2%99%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
网课交单平台epay存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E8%AF%BE%E4%BA%A4%E5%8D%95%E5%B9%B3%E5%8F%B0/%E7%BD%91%E8%AF%BE%E4%BA%A4%E5%8D%95%E5%B9%B3%E5%8F%B0epay%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
网课交单平台存在默认口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BD%91%E8%AF%BE%E4%BA%A4%E5%8D%95%E5%B9%B3%E5%8F%B0/%E7%BD%91%E8%AF%BE%E4%BA%A4%E5%8D%95%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
美团代付微信小程序系统read存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E7%BE%8E%E5%9B%A2%E4%BB%A3%E4%BB%98%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F/%E7%BE%8E%E5%9B%A2%E4%BB%A3%E4%BB%98%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9Fread%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
脸爱云一脸通智慧管理平台MoneyMng存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%84%B8%E7%88%B1%E4%BA%91/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0MoneyMng%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
脸爱云一脸通智慧管理平台SelOperators存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%84%B8%E7%88%B1%E4%BA%91/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0SelOperators%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
脸爱云一脸通智慧管理平台SystemMng存在任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%84%B8%E7%88%B1%E4%BA%91/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0SystemMng%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
脸爱云一脸通智慧管理平台SystemMng存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%84%B8%E7%88%B1%E4%BA%91/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0SystemMng%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
脸爱云一脸通智慧管理平台UpLoadPic存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%84%B8%E7%88%B1%E4%BA%91/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0UpLoadPic%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
脸爱云一脸通智慧管理平台UserMng存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%84%B8%E7%88%B1%E4%BA%91/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0UserMng%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
脸爱云一脸通智慧管理平台downloads存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%84%B8%E7%88%B1%E4%BA%91/%E8%84%B8%E7%88%B1%E4%BA%91%E4%B8%80%E8%84%B8%E9%80%9A%E6%99%BA%E6%85%A7%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0downloads%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
腾狐TOS行为管理系统存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%85%BE%E7%8B%90/%E8%85%BE%E7%8B%90TOS%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
自助打印微信小程序系统存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%87%AA%E5%8A%A9%E6%89%93%E5%8D%B0%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F/%E8%87%AA%E5%8A%A9%E6%89%93%E5%8D%B0%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
艾科思(霆智科技)应用接入系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%89%BE%E7%A7%91%E6%80%9D/%E8%89%BE%E7%A7%91%E6%80%9D%EF%BC%88%E9%9C%86%E6%99%BA%E7%A7%91%E6%8A%80%EF%BC%89%E5%BA%94%E7%94%A8%E6%8E%A5%E5%85%A5%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
苏州科达科技股份有限公司多媒体录播系统存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%8B%8F%E5%B7%9E%E7%A7%91%E8%BE%BE%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E8%8B%8F%E5%B7%9E%E7%A7%91%E8%BE%BE%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%A4%9A%E5%AA%92%E4%BD%93%E5%BD%95%E6%92%AD%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
英飞达影像存档与通讯(PACS)系统INFINITTPACSWebJobUpload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%8B%B1%E9%A3%9E%E8%BE%BE%E8%BD%AF%E4%BB%B6%EF%BC%88%E4%B8%8A%E6%B5%B7%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E8%8B%B1%E9%A3%9E%E8%BE%BE%E5%BD%B1%E5%83%8F%E5%AD%98%E6%A1%A3%E4%B8%8E%E9%80%9A%E8%AE%AF(PACS)%E7%B3%BB%E7%BB%9FINFINITTPACSWebJobUpload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
苹果IOS端IPA签名工具request_post任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%8B%B9%E6%9E%9CIOS%E7%AB%AFIPA%E7%AD%BE%E5%90%8D%E5%B7%A5%E5%85%B7/%E8%8B%B9%E6%9E%9CIOS%E7%AB%AFIPA%E7%AD%BE%E5%90%8D%E5%B7%A5%E5%85%B7request_post%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
荷花商品混凝土ERP系统DictionaryEdit.aspx页面存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%8D%B7%E8%8A%B1%E5%95%86%E5%93%81%E6%B7%B7%E5%87%9D%E5%9C%9FERP%E7%B3%BB%E7%BB%9F/%E8%8D%B7%E8%8A%B1%E5%95%86%E5%93%81%E6%B7%B7%E5%87%9D%E5%9C%9FERP%E7%B3%BB%E7%BB%9FDictionaryEdit.aspx%E9%A1%B5%E9%9D%A2%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
FLIR-AX8热成像仪res.php远程命令执行漏洞(CVE-2022-37061)https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%8F%B2%E5%8A%9B%E5%B0%94%EF%BC%88FLIR%EF%BC%89/FLIR-AX8%E7%83%AD%E6%88%90%E5%83%8F%E4%BB%AAres.php%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2022-37061%EF%BC%89.md
蓝海卓越计费管理系统agent_setstat存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fagent_setstat%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
蓝海卓越计费管理系统debug存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fdebug%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
蓝海卓越计费管理系统loaduser存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Floaduser%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
蓝海卓越计费管理系统picUpLoad存在任意文件删除漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FpicUpLoad%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4%E6%BC%8F%E6%B4%9E.md
蓝海卓越计费管理系统任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
蓝海卓越计费管理系统多漏洞导致getshellhttps://github.com/eeeeeeeeee-code/POC/blob/main/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%A4%9A%E6%BC%8F%E6%B4%9E%E5%AF%BC%E8%87%B4getshell.md
蓝海卓越计费管理系统存在弱口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A/%E8%93%9D%E6%B5%B7%E5%8D%93%E8%B6%8A%E8%AE%A1%E8%B4%B9%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E5%BC%B1%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
西软云XMSFoxLookupInvoker接口存在反序列化漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%A5%BF%E8%BD%AF%E4%BA%91XMS/%E8%A5%BF%E8%BD%AF%E4%BA%91XMSFoxLookupInvoker%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
西软云XMSoperate接口存在XXE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%A5%BF%E8%BD%AF%E4%BA%91XMS/%E8%A5%BF%E8%BD%AF%E4%BA%91XMSoperate%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8XXE%E6%BC%8F%E6%B4%9E.md
证书查询系统存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%AF%81%E4%B9%A6%E6%9F%A5%E8%AF%A2%E7%B3%BB%E7%BB%9F/%E8%AF%81%E4%B9%A6%E6%9F%A5%E8%AF%A2%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
费浦门禁出入口安防平台aDKManageUser存在未授权访问https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%B4%B9%E6%B5%A6/%E8%B4%B9%E6%B5%A6%E9%97%A8%E7%A6%81%E5%87%BA%E5%85%A5%E5%8F%A3%E5%AE%89%E9%98%B2%E5%B9%B3%E5%8F%B0aDKManageUser%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md
辰信景云终端安全管理系统login存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%BE%B0%E4%BF%A1%E6%99%AF%E4%BA%91/%E8%BE%B0%E4%BF%A1%E6%99%AF%E4%BA%91%E7%BB%88%E7%AB%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Flogin%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
迈普安全网关sslvpn_client存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%BF%88%E6%99%AE/%E8%BF%88%E6%99%AE%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3sslvpn_client%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
远秋医学培训报名系统User存在未授权账号密码泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%BF%9C%E7%A7%8B%E5%8C%BB%E5%AD%A6%E5%9C%A8%E7%BA%BF%E8%80%83%E8%AF%95%E7%B3%BB%E7%BB%9F/%E8%BF%9C%E7%A7%8B%E5%8C%BB%E5%AD%A6%E5%9F%B9%E8%AE%AD%E6%8A%A5%E5%90%8D%E7%B3%BB%E7%BB%9FUser%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
远秋医学培训报名系统v1.0ManagerList存在未授权账号密码泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%BF%9C%E7%A7%8B%E5%8C%BB%E5%AD%A6%E5%9C%A8%E7%BA%BF%E8%80%83%E8%AF%95%E7%B3%BB%E7%BB%9F/%E8%BF%9C%E7%A7%8B%E5%8C%BB%E5%AD%A6%E5%9F%B9%E8%AE%AD%E6%8A%A5%E5%90%8D%E7%B3%BB%E7%BB%9Fv1.0ManagerList%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
远秋医学培训报名系统v1.0NewsDetailPage存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%BF%9C%E7%A7%8B%E5%8C%BB%E5%AD%A6%E5%9C%A8%E7%BA%BF%E8%80%83%E8%AF%95%E7%B3%BB%E7%BB%9F/%E8%BF%9C%E7%A7%8B%E5%8C%BB%E5%AD%A6%E5%9F%B9%E8%AE%AD%E6%8A%A5%E5%90%8D%E7%B3%BB%E7%BB%9Fv1.0NewsDetailPage%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
迪威讯Focus6100音视频通讯平台存在任意用户删除https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%BF%AA%E5%A8%81%E8%AE%AF/%E8%BF%AA%E5%A8%81%E8%AE%AFFocus6100%E9%9F%B3%E8%A7%86%E9%A2%91%E9%80%9A%E8%AE%AF%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%88%A0%E9%99%A4.md
迪威讯Focus6100音视频通讯平台存在任意用户密码修改漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%BF%AA%E5%A8%81%E8%AE%AF/%E8%BF%AA%E5%A8%81%E8%AE%AFFocus6100%E9%9F%B3%E8%A7%86%E9%A2%91%E9%80%9A%E8%AE%AF%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E4%BF%AE%E6%94%B9%E6%BC%8F%E6%B4%9E.md
迪威讯Focus6100音视频通讯平台存在任意用户添加漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%BF%AA%E5%A8%81%E8%AE%AF/%E8%BF%AA%E5%A8%81%E8%AE%AFFocus6100%E9%9F%B3%E8%A7%86%E9%A2%91%E9%80%9A%E8%AE%AF%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
迪威讯Focus6100音视频通讯平台存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%BF%AA%E5%A8%81%E8%AE%AF/%E8%BF%AA%E5%A8%81%E8%AE%AFFocus6100%E9%9F%B3%E8%A7%86%E9%A2%91%E9%80%9A%E8%AE%AF%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
迪威讯Focus6100音视频通讯平台存在默认口令https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%BF%AA%E5%A8%81%E8%AE%AF/%E8%BF%AA%E5%A8%81%E8%AE%AFFocus6100%E9%9F%B3%E8%A7%86%E9%A2%91%E9%80%9A%E8%AE%AF%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4.md
迪普VPN文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E8%BF%AA%E6%99%AE/%E8%BF%AA%E6%99%AEVPN%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台MobileAction_downLoad存在任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0MobileAction_downLoad%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台SelectDevAction_loadServerLoggerFile存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0SelectDevAction_loadServerLoggerFile%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台SelectDevAction_loadWebLoggerFile存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0SelectDevAction_loadWebLoggerFile%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台StandardApiAction_findCompanyList存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0StandardApiAction_findCompanyList%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台StandardApiAction_vehicleTTS存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0StandardApiAction_vehicleTTS%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台StandardLoginAction_getAllUser存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0StandardLoginAction_getAllUser%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台StandardReportMediaAction_getImage存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0StandardReportMediaAction_getImage%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台complex存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0complex%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台disable存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0disable%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台dismiss_disable存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0dismiss_disable%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台downloadLogger任意文件下载https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0downloadLogger%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD.md
通天星CMSV6车载视频监控平台druid存在默认口令漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0druid%E5%AD%98%E5%9C%A8%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台edu_class_delete存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0edu_class_delete%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台edu_course_publish_revoke存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0edu_course_publish_revoke%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台edu_plan_publish_revoke存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0edu_plan_publish_revoke%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台getAlarmAppealByGuid存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0getAlarmAppealByGuid%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台inspect_file存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0inspect_file%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台kq_schedule存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0kq_schedule%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台line_manage存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0line_manage%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台list存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0list%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台list存在信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0list%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台merge存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0merge%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台muck_vehi_certificate存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0muck_vehi_certificate%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台run_stop_delete存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0run_stop_delete%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
通天星CMSV6车载视频监控平台task_record_detail_delete存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6/%E9%80%9A%E5%A4%A9%E6%98%9FCMSV6%E8%BD%A6%E8%BD%BD%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0task_record_detail_delete%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
速达软件技术(广州)有限公司多款产品doGetAccsetList存在JNID注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81doGetAccsetList%E5%AD%98%E5%9C%A8JNID%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
速达软件技术(广州)有限公司多款产品doSavePrintTpl存在JNID注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81doSavePrintTpl%E5%AD%98%E5%9C%A8JNID%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
速达软件技术(广州)有限公司多款产品doSavePrintTpl存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81doSavePrintTpl%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
速达软件技术(广州)有限公司多款产品home_jsontest存在JNID注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81home_jsontest%E5%AD%98%E5%9C%A8JNID%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
速达软件技术(广州)有限公司多款产品voucherauditdo存在JNID注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81voucherauditdo%E5%AD%98%E5%9C%A8JNID%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
速达软件技术(广州)有限公司多款产品存在代码执行https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81%E5%AD%98%E5%9C%A8%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C.md
速达软件技术(广州)有限公司多款产品存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E9%80%9F%E8%BE%BE%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%EF%BC%88%E5%B9%BF%E5%B7%9E%EF%BC%89%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%A4%9A%E6%AC%BE%E4%BA%A7%E5%93%81%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
邦永PM2项目管理系统Global_UserLogin.aspxSQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%82%A6%E6%B0%B8PM2/%E9%82%A6%E6%B0%B8PM2%E9%A1%B9%E7%9B%AE%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FGlobal_UserLogin.aspxSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
时空WMS-仓储精细化管理系统ImageAdd存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%83%91%E5%B7%9E%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%97%B6%E7%A9%BAWMS-%E4%BB%93%E5%82%A8%E7%B2%BE%E7%BB%86%E5%8C%96%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FImageAdd%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
时空WMS-仓储精细化管理系统SaveCrash存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%83%91%E5%B7%9E%E6%97%B6%E7%A9%BA%E6%99%BA%E5%8F%8B%E4%BF%A1%E6%81%AF%E6%8A%80%E6%9C%AF%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E6%97%B6%E7%A9%BAWMS-%E4%BB%93%E5%82%A8%E7%B2%BE%E7%BB%86%E5%8C%96%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FSaveCrash%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
金华迪加网络科技有限公司现场大屏互动系统mobile.do.php接口存在文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%87%91%E5%8D%8E%E8%BF%AA%E5%8A%A0%E7%BD%91%E7%BB%9C%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/%E9%87%91%E5%8D%8E%E8%BF%AA%E5%8A%A0%E7%BD%91%E7%BB%9C%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E7%8E%B0%E5%9C%BA%E5%A4%A7%E5%B1%8F%E4%BA%92%E5%8A%A8%E7%B3%BB%E7%BB%9Fmobile.do.php%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
金山VGM防毒墙downFile存在任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%87%91%E5%B1%B1/%E9%87%91%E5%B1%B1VGM%E9%98%B2%E6%AF%92%E5%A2%99downFile%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
金山终端安全系统V9.0SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%87%91%E5%B1%B1/%E9%87%91%E5%B1%B1%E7%BB%88%E7%AB%AF%E5%AE%89%E5%85%A8%E7%B3%BB%E7%BB%9FV9.0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金慧综合管理信息系统LoginBegin存在sql注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%87%91%E6%85%A7/%E9%87%91%E6%85%A7%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9FLoginBegin%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
金盘图书馆系统doUpload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%87%91%E7%9B%98/%E9%87%91%E7%9B%98%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%B3%BB%E7%BB%9F/%E9%87%91%E7%9B%98%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%B3%BB%E7%BB%9FdoUpload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
金盘图书馆系统download存在任意文件下载漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%87%91%E7%9B%98/%E9%87%91%E7%9B%98%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%B3%BB%E7%BB%9F/%E9%87%91%E7%9B%98%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%B3%BB%E7%BB%9Fdownload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
金盘微信管理平台getsysteminfo接口未授权访问漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%87%91%E7%9B%98/%E9%87%91%E7%9B%98%E5%BE%AE%E4%BF%A1%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E9%87%91%E7%9B%98%E5%BE%AE%E4%BF%A1%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0getsysteminfo%E6%8E%A5%E5%8F%A3%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
鑫塔第二代防火墙sslvpn_client存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%91%AB%E5%A1%94/%E9%91%AB%E5%A1%94%E7%AC%AC%E4%BA%8C%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99sslvpn_client%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
星网锐捷DMB-BSLED屏信息发布系统taskexport接口处存在敏感信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E6%98%9F%E7%BD%91%E9%94%90%E6%8D%B7/%E6%98%9F%E7%BD%91%E9%94%90%E6%8D%B7DMB-BSLED%E5%B1%8F%E4%BF%A1%E6%81%AF%E5%8F%91%E5%B8%83%E7%B3%BB%E7%BB%9Ftaskexport%E6%8E%A5%E5%8F%A3%E5%A4%84%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
星网锐捷视频话机设备pwdsetting管理密码泄漏https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E6%98%9F%E7%BD%91%E9%94%90%E6%8D%B7/%E6%98%9F%E7%BD%91%E9%94%90%E6%8D%B7%E8%A7%86%E9%A2%91%E8%AF%9D%E6%9C%BA%E8%AE%BE%E5%A4%87pwdsetting%E7%AE%A1%E7%90%86%E5%AF%86%E7%A0%81%E6%B3%84%E6%BC%8F.md
锐捷AC无线控制器存在命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7AC%E6%97%A0%E7%BA%BF%E6%8E%A7%E5%88%B6%E5%99%A8/%E9%94%90%E6%8D%B7AC%E6%97%A0%E7%BA%BF%E6%8E%A7%E5%88%B6%E5%99%A8%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷EG易网关branch_import存在后台远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3branch_import%E5%AD%98%E5%9C%A8%E5%90%8E%E5%8F%B0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷EG易网关branch_passw.php远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3branch_passw.php%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷EG易网关cli存在后台远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3cli%E5%AD%98%E5%9C%A8%E5%90%8E%E5%8F%B0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷EG易网关download.php后台任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3download.php%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
锐捷EG易网关export后台任意文件写入https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3export%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5.md
锐捷EG易网关login.php敏感信息泄露https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3login.php%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
锐捷EG易网关networksafe远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3networksafe%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷EG易网关phpinfo.view.php信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3phpinfo.view.php%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
锐捷EG易网关timeout.php后台任意文件读取漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3timeout.php%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
锐捷EG易网关vpn_quickset_service远程代码执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3vpn_quickset_service%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷EG易网关wifi.php存在后台远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3wifi.php%E5%AD%98%E5%9C%A8%E5%90%8E%E5%8F%B0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷EG易网关管理员账号密码泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3%E7%AE%A1%E7%90%86%E5%91%98%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
锐捷RG-ISG账号密码泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-ISG/%E9%94%90%E6%8D%B7RG-ISG%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC应用网关nmc_sync.php前台RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3nmc_sync.php%E5%89%8D%E5%8F%B0RCE%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC应用网关online_check.php前台RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3online_check.php%E5%89%8D%E5%8F%B0RCE%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC应用网关static_convert.php前台RCE漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3static_convert.php%E5%89%8D%E5%8F%B0RCE%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统detail后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fdetail%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统gre_add_commit后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fgre_add_commit%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统gre_edit后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fgre_edit%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统interface_commit后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Finterface_commit%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统ip_addr_add_commit后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fip_addr_add_commit%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统oldipmask后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Foldipmask%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统static_route_edit_commit后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Fstatic_route_edit_commit%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统text_ip_addr后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Ftext_ip_addr%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统text_prefixlen后台命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9Ftext_prefixlen%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
锐捷RG-UAC统一上网行为管理审计系统账号密码泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7RG-UAC%E5%BA%94%E7%94%A8%E7%BD%91%E5%85%B3/%E9%94%90%E6%8D%B7RG-UAC%E7%BB%9F%E4%B8%80%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E5%AE%A1%E8%AE%A1%E7%B3%BB%E7%BB%9F%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
锐捷RGSSLVPN垂直越权漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7SSLVPN/%E9%94%90%E6%8D%B7RGSSLVPN%E5%9E%82%E7%9B%B4%E8%B6%8A%E6%9D%83%E6%BC%8F%E6%B4%9E.md
锐捷Smartweb管理系统命令注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7Smartweb%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AF%86%E7%A0%81/%E9%94%90%E6%8D%B7Smartweb%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
锐捷Smartweb管理系统密码信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7Smartweb%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AF%86%E7%A0%81/%E9%94%90%E6%8D%B7Smartweb%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AF%86%E7%A0%81%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
锐捷云课堂主机存在目录遍历漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E4%BA%91%E8%AF%BE%E5%A0%82%E4%B8%BB%E6%9C%BA/%E9%94%90%E6%8D%B7%E4%BA%91%E8%AF%BE%E5%A0%82%E4%B8%BB%E6%9C%BA%E5%AD%98%E5%9C%A8%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
锐捷Smartweb管理系统密码信息泄露漏洞CNVD-2021-17369https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E4%BA%A4%E6%8D%A2%E6%9C%BAWEB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E9%94%90%E6%8D%B7Smartweb%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AF%86%E7%A0%81%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9ECNVD-2021-17369.md
锐捷交换机WEB管理系统EXCU_SHELL密码信息泄漏漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E4%BA%A4%E6%8D%A2%E6%9C%BAWEB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E9%94%90%E6%8D%B7%E4%BA%A4%E6%8D%A2%E6%9C%BAWEB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FEXCU_SHELL%E5%AF%86%E7%A0%81%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
锐捷网络股份有限公司校园网自助服务系统findOperatorOnlineUserCount24Hours存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E7%BD%91%E7%BB%9C%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%A0%A1%E5%9B%AD%E7%BD%91%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9F/%E9%94%90%E6%8D%B7%E7%BD%91%E7%BB%9C%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%A0%A1%E5%9B%AD%E7%BD%91%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9FfindOperatorOnlineUserCount24Hours%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
锐捷网络股份有限公司校园网自助服务系统queryAccountNumReportDataDetail存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E7%BD%91%E7%BB%9C%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%A0%A1%E5%9B%AD%E7%BD%91%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9F/%E9%94%90%E6%8D%B7%E7%BD%91%E7%BB%9C%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E6%A0%A1%E5%9B%AD%E7%BD%91%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9FqueryAccountNumReportDataDetail%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
锐捷EWEBflwo.contro存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E8%B7%AF%E7%94%B1%E5%99%A8/%E9%94%90%E6%8D%B7EWEBflwo.contro%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷EWEB路由器auth远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E8%B7%AF%E7%94%B1%E5%99%A8/%E9%94%90%E6%8D%B7EWEB%E8%B7%AF%E7%94%B1%E5%99%A8auth%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷NBR系列多款路由器存在管理员密码重置漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E8%B7%AF%E7%94%B1%E5%99%A8/%E9%94%90%E6%8D%B7NBR%E7%B3%BB%E5%88%97%E5%A4%9A%E6%AC%BE%E8%B7%AF%E7%94%B1%E5%99%A8%E5%AD%98%E5%9C%A8%E7%AE%A1%E7%90%86%E5%91%98%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E.md
锐捷NBR路由器fileupload.php任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E8%B7%AF%E7%94%B1%E5%99%A8/%E9%94%90%E6%8D%B7NBR%E8%B7%AF%E7%94%B1%E5%99%A8fileupload.php%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
锐捷NBR路由器guestIsUp.php远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E8%B7%AF%E7%94%B1%E5%99%A8/%E9%94%90%E6%8D%B7NBR%E8%B7%AF%E7%94%B1%E5%99%A8guestIsUp.php%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
锐捷RG-BCR860路由器命令执行漏洞(CVE-2023-3450)https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E8%B7%AF%E7%94%B1%E5%99%A8/%E9%94%90%E6%8D%B7RG-BCR860%E8%B7%AF%E7%94%B1%E5%99%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-3450%EF%BC%89.md
锐捷RG-EW1200G路由器后台命令执行https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E8%B7%AF%E7%94%B1%E5%99%A8/%E9%94%90%E6%8D%B7RG-EW1200G%E8%B7%AF%E7%94%B1%E5%99%A8%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C.md
锐捷RG-EW1200G路由器未授权任意密码修改https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E8%B7%AF%E7%94%B1%E5%99%A8/%E9%94%90%E6%8D%B7RG-EW1200G%E8%B7%AF%E7%94%B1%E5%99%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E4%BB%BB%E6%84%8F%E5%AF%86%E7%A0%81%E4%BF%AE%E6%94%B9.md
锐捷RG-EW1200G路由器登录绕过(CVE-2023-4415)https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7%E8%B7%AF%E7%94%B1%E5%99%A8/%E9%94%90%E6%8D%B7RG-EW1200G%E8%B7%AF%E7%94%B1%E5%99%A8%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%EF%BC%88CVE-2023-4415%EF%BC%89.md
青铜器RDM研发管理平台upload存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%9D%92%E9%93%9C%E5%99%A8RDM%E7%A0%94%E5%8F%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0/%E9%9D%92%E9%93%9C%E5%99%A8RDM%E7%A0%94%E5%8F%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0upload%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
飞讯云供应链平台MyImportData前台SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%A3%9E%E8%AE%AF%E4%BA%91/%E9%A3%9E%E8%AE%AF%E4%BA%91%E4%BE%9B%E5%BA%94%E9%93%BE%E5%B9%B3%E5%8F%B0MyImportData%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md
飞鱼星下一代防火墙安全网关aaa_portal_auth_wchat_submit存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%A3%9E%E9%B1%BC%E6%98%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3/%E9%A3%9E%E9%B1%BC%E6%98%9F%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E5%A2%99%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3aaa_portal_auth_wchat_submit%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
飞鱼星家用智能路由存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%A3%9E%E9%B1%BC%E6%98%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%E5%AE%B6%E7%94%A8%E6%99%BA%E8%83%BD%E8%B7%AF%E7%94%B1/%E9%A3%9E%E9%B1%BC%E6%98%9F%E5%AE%B6%E7%94%A8%E6%99%BA%E8%83%BD%E8%B7%AF%E7%94%B1%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
飞鱼星家用智能路由存在权限绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%A3%9E%E9%B1%BC%E6%98%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%E5%AE%B6%E7%94%A8%E6%99%BA%E8%83%BD%E8%B7%AF%E7%94%B1/%E9%A3%9E%E9%B1%BC%E6%98%9F%E5%AE%B6%E7%94%A8%E6%99%BA%E8%83%BD%E8%B7%AF%E7%94%B1%E5%AD%98%E5%9C%A8%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
飞鱼星智能上网行为管理系统send_order存在远程命令执行漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%A3%9E%E9%B1%BC%E6%98%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%E6%99%BA%E8%83%BD%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%E6%99%BA%E8%83%BD%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9Fsend_order%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
飞鱼星智能上网行为管理系统存在敏感信息泄露漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%A3%9E%E9%B1%BC%E6%98%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%E6%99%BA%E8%83%BD%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%E6%99%BA%E8%83%BD%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
飞鱼星智能上网行为管理系统存在权限绕过漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%A3%9E%E9%B1%BC%E6%98%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%E6%99%BA%E8%83%BD%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%E6%99%BA%E8%83%BD%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
驰骋BPMRunSQL_Init存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%A9%B0%E9%AA%8BBPM/%E9%A9%B0%E9%AA%8BBPMRunSQL_Init%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
魅思视频管理系统getOrderStatus存在SQL注入漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%AD%85%E6%80%9D/%E9%AD%85%E6%80%9D%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FgetOrderStatus%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
魔方网表mailupdate接口存在任意文件上传漏洞https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8mailupdate%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
龙采商城系统后台_goods_getcate存在SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%BE%99%E9%87%87%E7%A7%91%E6%8A%80%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E8%B4%A3%E4%BB%BB%E5%85%AC%E5%8F%B8/%E9%BE%99%E9%87%87%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9F%E5%90%8E%E5%8F%B0_goods_getcate%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
龙采商城系统存在未授权修改文章titlehttps://github.com/eeeeeeeeee-code/POC/blob/main/%E9%BE%99%E9%87%87%E7%A7%91%E6%8A%80%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E8%B4%A3%E4%BB%BB%E5%85%AC%E5%8F%B8/%E9%BE%99%E9%87%87%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E4%BF%AE%E6%94%B9%E6%96%87%E7%AB%A0title.md
龙采商城系统存在未授权添加会员登录https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%BE%99%E9%87%87%E7%A7%91%E6%8A%80%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E8%B4%A3%E4%BB%BB%E5%85%AC%E5%8F%B8/%E9%BE%99%E9%87%87%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83%E6%B7%BB%E5%8A%A0%E4%BC%9A%E5%91%98%E7%99%BB%E5%BD%95.md
龙采商城系统新人礼包权限开关处存在未授权SQL注入https://github.com/eeeeeeeeee-code/POC/blob/main/%E9%BE%99%E9%87%87%E7%A7%91%E6%8A%80%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E8%B4%A3%E4%BB%BB%E5%85%AC%E5%8F%B8/%E9%BE%99%E9%87%87%E5%95%86%E5%9F%8E%E7%B3%BB%E7%BB%9F%E6%96%B0%E4%BA%BA%E7%A4%BC%E5%8C%85%E6%9D%83%E9%99%90%E5%BC%80%E5%85%B3%E5%A4%84%E5%AD%98%E5%9C%A8%E6%9C%AA%E6%8E%88%E6%9D%83SQL%E6%B3%A8%E5%85%A5.md
Readme https://github.com/eeeeeeeeee-code/POC#readme-ov-file
Please reload this pagehttps://github.com/eeeeeeeeee-code/POC
Activityhttps://github.com/eeeeeeeeee-code/POC/activity
1.8k starshttps://github.com/eeeeeeeeee-code/POC/stargazers
55 watchinghttps://github.com/eeeeeeeeee-code/POC/watchers
480 forkshttps://github.com/eeeeeeeeee-code/POC/forks
Report repository https://github.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2Feeeeeeeeee-code%2FPOC&report=eeeeeeeeee-code+%28user%29
Releaseshttps://github.com/eeeeeeeeee-code/POC/releases
Packages 0https://github.com/users/eeeeeeeeee-code/packages?repo_name=POC
Contributors 2https://github.com/eeeeeeeeee-code/POC/graphs/contributors
Please reload this pagehttps://github.com/eeeeeeeeee-code/POC
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.