René's URL Explorer Experiment


Title: GitHub - pygopher/POPC

Open Graph Title: GitHub - pygopher/POPC

X Title: GitHub - pygopher/POPC

Description: Contribute to pygopher/POPC development by creating an account on GitHub.

Open Graph Description: Contribute to pygopher/POPC development by creating an account on GitHub.

X Description: Contribute to pygopher/POPC development by creating an account on GitHub.

Opengraph URL: https://github.com/pygopher/POPC

X: @github

direct link

Domain: patch-diff.githubusercontent.com

route-pattern/:user_id/:repository
route-controllerfiles
route-actiondisambiguate
fetch-noncev2:81c5c6d8-2e10-fbbe-dc82-cf627fcc18fd
current-catalog-service-hashf3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb
request-id938A:215A:D6FD07:1100547:697F11A8
html-safe-nonceb04f8de1843196783a3d67f26a461daa83d0bc58d92ea885ad32d7085ced04cc
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiI5MzhBOjIxNUE6RDZGRDA3OjExMDA1NDc6Njk3RjExQTgiLCJ2aXNpdG9yX2lkIjoiMjkxNjcwNjM4MjYwODUzNTk3NiIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9
visitor-hmac9589b1b0c825162e7364213654a77fd0a2229751749e01ae142faaa6b148ea35
hovercard-subject-tagrepository:943178356
github-keyboard-shortcutsrepository,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location//
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/pygopher/POPC
twitter:imagehttps://opengraph.githubassets.com/adadf533a77a049ac5695310afcb7d6ae5628f7037053494f228f8131410178c/pygopher/POPC
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/adadf533a77a049ac5695310afcb7d6ae5628f7037053494f228f8131410178c/pygopher/POPC
og:image:altContribute to pygopher/POPC development by creating an account on GitHub.
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
hostnamegithub.com
expected-hostnamegithub.com
None60279d4097367e16897439d16d6bbe4180663db828c666eeed2656988ffe59f6
turbo-cache-controlno-preview
go-importgithub.com/pygopher/POPC git https://github.com/pygopher/POPC.git
octolytics-dimension-user_id54335957
octolytics-dimension-user_loginpygopher
octolytics-dimension-repository_id943178356
octolytics-dimension-repository_nwopygopher/POPC
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forktrue
octolytics-dimension-repository_parent_id815010154
octolytics-dimension-repository_parent_nwoAboSteam/POPC
octolytics-dimension-repository_network_root_id815010154
octolytics-dimension-repository_network_root_nwoAboSteam/POPC
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release7c85641c598ad130c74f7bcc27f58575cac69551
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/pygopher/POPC#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fpygopher%2FPOPC
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fpygopher%2FPOPC
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=pygopher%2FPOPC
Reloadhttps://patch-diff.githubusercontent.com/pygopher/POPC
Reloadhttps://patch-diff.githubusercontent.com/pygopher/POPC
Reloadhttps://patch-diff.githubusercontent.com/pygopher/POPC
pygopher https://patch-diff.githubusercontent.com/pygopher
POPChttps://patch-diff.githubusercontent.com/pygopher/POPC
AboSteam/POPChttps://patch-diff.githubusercontent.com/AboSteam/POPC
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fpygopher%2FPOPC
Fork 0 https://patch-diff.githubusercontent.com/login?return_to=%2Fpygopher%2FPOPC
Star 0 https://patch-diff.githubusercontent.com/login?return_to=%2Fpygopher%2FPOPC
0 stars https://patch-diff.githubusercontent.com/pygopher/POPC/stargazers
1 fork https://patch-diff.githubusercontent.com/pygopher/POPC/forks
Branches https://patch-diff.githubusercontent.com/pygopher/POPC/branches
Tags https://patch-diff.githubusercontent.com/pygopher/POPC/tags
Activity https://patch-diff.githubusercontent.com/pygopher/POPC/activity
Star https://patch-diff.githubusercontent.com/login?return_to=%2Fpygopher%2FPOPC
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fpygopher%2FPOPC
Code https://patch-diff.githubusercontent.com/pygopher/POPC
Pull requests 0 https://patch-diff.githubusercontent.com/pygopher/POPC/pulls
Actions https://patch-diff.githubusercontent.com/pygopher/POPC/actions
Projects 0 https://patch-diff.githubusercontent.com/pygopher/POPC/projects
Security 0 https://patch-diff.githubusercontent.com/pygopher/POPC/security
Insights https://patch-diff.githubusercontent.com/pygopher/POPC/pulse
Code https://patch-diff.githubusercontent.com/pygopher/POPC
Pull requests https://patch-diff.githubusercontent.com/pygopher/POPC/pulls
Actions https://patch-diff.githubusercontent.com/pygopher/POPC/actions
Projects https://patch-diff.githubusercontent.com/pygopher/POPC/projects
Security https://patch-diff.githubusercontent.com/pygopher/POPC/security
Insights https://patch-diff.githubusercontent.com/pygopher/POPC/pulse
Brancheshttps://patch-diff.githubusercontent.com/pygopher/POPC/branches
Tagshttps://patch-diff.githubusercontent.com/pygopher/POPC/tags
https://patch-diff.githubusercontent.com/pygopher/POPC/branches
https://patch-diff.githubusercontent.com/pygopher/POPC/tags
1,140 Commitshttps://patch-diff.githubusercontent.com/pygopher/POPC/commits/main/
https://patch-diff.githubusercontent.com/pygopher/POPC/commits/main/
assetshttps://patch-diff.githubusercontent.com/pygopher/POPC/tree/main/assets
assetshttps://patch-diff.githubusercontent.com/pygopher/POPC/tree/main/assets
29网课交单平台epay.php存在SQL注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/29%E7%BD%91%E8%AF%BE%E4%BA%A4%E5%8D%95%E5%B9%B3%E5%8F%B0epay.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
29网课交单平台epay.php存在SQL注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/29%E7%BD%91%E8%AF%BE%E4%BA%A4%E5%8D%95%E5%B9%B3%E5%8F%B0epay.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
360 新天擎终端安全管理系统存在信息泄露漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/360%20%E6%96%B0%E5%A4%A9%E6%93%8E%E7%BB%88%E7%AB%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
360 新天擎终端安全管理系统存在信息泄露漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/360%20%E6%96%B0%E5%A4%A9%E6%93%8E%E7%BB%88%E7%AB%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
360天擎 - 未授权与sql注入.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/360%E5%A4%A9%E6%93%8E%20-%20%E6%9C%AA%E6%8E%88%E6%9D%83%E4%B8%8Esql%E6%B3%A8%E5%85%A5.md
360天擎 - 未授权与sql注入.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/360%E5%A4%A9%E6%93%8E%20-%20%E6%9C%AA%E6%8E%88%E6%9D%83%E4%B8%8Esql%E6%B3%A8%E5%85%A5.md
AJ-Report开源数据大屏存在远程命令执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/AJ-Report%E5%BC%80%E6%BA%90%E6%95%B0%E6%8D%AE%E5%A4%A7%E5%B1%8F%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
AJ-Report开源数据大屏存在远程命令执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/AJ-Report%E5%BC%80%E6%BA%90%E6%95%B0%E6%8D%AE%E5%A4%A7%E5%B1%8F%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Adobe-ColdFusion%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9ECVE-2024-20767.md
Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Adobe-ColdFusion%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9ECVE-2024-20767.md
Apache ActiveMQ远程命令执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20ActiveMQ%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Apache ActiveMQ远程命令执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20ActiveMQ%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Apache Dubbo 反序列化漏洞(CVE-2023-29234).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Dubbo%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-29234%EF%BC%89.md
Apache Dubbo 反序列化漏洞(CVE-2023-29234).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Dubbo%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-29234%EF%BC%89.md
Apache Dubbo-admin-authorized-bypass (CNVD-2023-96546).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Dubbo-admin-authorized-bypass%20(CNVD-2023-96546).md
Apache Dubbo-admin-authorized-bypass (CNVD-2023-96546).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Dubbo-admin-authorized-bypass%20(CNVD-2023-96546).md
Apache OFBiz SSRF && 任意配置读取.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20OFBiz%20SSRF%20%26%26%20%E4%BB%BB%E6%84%8F%E9%85%8D%E7%BD%AE%E8%AF%BB%E5%8F%96.md
Apache OFBiz SSRF && 任意配置读取.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20OFBiz%20SSRF%20%26%26%20%E4%BB%BB%E6%84%8F%E9%85%8D%E7%BD%AE%E8%AF%BB%E5%8F%96.md
Apache OFBiz 身份验证绕过漏洞 (CVE-2023-51467).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20OFBiz%20%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20(CVE-2023-51467).md
Apache OFBiz 身份验证绕过漏洞 (CVE-2023-51467).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20OFBiz%20%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20(CVE-2023-51467).md
Apache Ofbiz XML-RPC RCE漏洞-CVE-2023-49070.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Ofbiz%20XML-RPC%20RCE%E6%BC%8F%E6%B4%9E-CVE-2023-49070.md
Apache Ofbiz XML-RPC RCE漏洞-CVE-2023-49070.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Ofbiz%20XML-RPC%20RCE%E6%BC%8F%E6%B4%9E-CVE-2023-49070.md
Apache Spark命令执行漏洞(CVE-2023-32007).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Spark%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-32007%EF%BC%89.md
Apache Spark命令执行漏洞(CVE-2023-32007).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Spark%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-32007%EF%BC%89.md
Apache Struts2 CVE-2023-50164.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Struts2%20CVE-2023-50164.md
Apache Struts2 CVE-2023-50164.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Struts2%20CVE-2023-50164.md
Apache Tomcat存在信息泄露漏洞( CVE-2024-21733).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Tomcat%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E(%20CVE-2024-21733).md
Apache Tomcat存在信息泄露漏洞( CVE-2024-21733).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache%20Tomcat%E5%AD%98%E5%9C%A8%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E(%20CVE-2024-21733).md
Apache-ActiveMQ-Jolokia-远程代码执行漏洞-CVE-2022-41678.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache-ActiveMQ-Jolokia-%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E-CVE-2022-41678.md
Apache-ActiveMQ-Jolokia-远程代码执行漏洞-CVE-2022-41678.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache-ActiveMQ-Jolokia-%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E-CVE-2022-41678.md
Apache-HugeGraph-Server远程代码执行漏洞(CVE-2024-27348).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache-HugeGraph-Server%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-27348).md
Apache-HugeGraph-Server远程代码执行漏洞(CVE-2024-27348).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache-HugeGraph-Server%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-27348).md
Apache-OFBiz存在路径遍历导致RCE漏洞(CVE-2024-36104).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache-OFBiz%E5%AD%98%E5%9C%A8%E8%B7%AF%E5%BE%84%E9%81%8D%E5%8E%86%E5%AF%BC%E8%87%B4RCE%E6%BC%8F%E6%B4%9E(CVE-2024-36104).md
Apache-OFBiz存在路径遍历导致RCE漏洞(CVE-2024-36104).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache-OFBiz%E5%AD%98%E5%9C%A8%E8%B7%AF%E5%BE%84%E9%81%8D%E5%8E%86%E5%AF%BC%E8%87%B4RCE%E6%BC%8F%E6%B4%9E(CVE-2024-36104).md
Apache-Submarine-SQL注入漏洞CVE-2023-37924.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache-Submarine-SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9ECVE-2023-37924.md
Apache-Submarine-SQL注入漏洞CVE-2023-37924.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache-Submarine-SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9ECVE-2023-37924.md
Apache_Solr环境变量信息泄漏漏洞(CVE-2023-50290).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache_Solr%E7%8E%AF%E5%A2%83%E5%8F%98%E9%87%8F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E(CVE-2023-50290).md
Apache_Solr环境变量信息泄漏漏洞(CVE-2023-50290).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Apache_Solr%E7%8E%AF%E5%A2%83%E5%8F%98%E9%87%8F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E(CVE-2023-50290).md
Appium Desktop CVE-2023-2479漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Appium%20Desktop%20CVE-2023-2479%E6%BC%8F%E6%B4%9E.md
Appium Desktop CVE-2023-2479漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Appium%20Desktop%20CVE-2023-2479%E6%BC%8F%E6%B4%9E.md
Array VPN任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Array%20VPN%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Array VPN任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Array%20VPN%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
ArubaOS-RCE漏洞(CVE-2024-26304).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/ArubaOS-RCE%E6%BC%8F%E6%B4%9E(CVE-2024-26304).md
ArubaOS-RCE漏洞(CVE-2024-26304).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/ArubaOS-RCE%E6%BC%8F%E6%B4%9E(CVE-2024-26304).md
Atlassian Confluence 远程代码执行漏洞(CVE-2023-22527).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Atlassian%20Confluence%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-22527).md
Atlassian Confluence 远程代码执行漏洞(CVE-2023-22527).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Atlassian%20Confluence%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-22527).md
CERIO-DT系列路由器Save.cgi接口存在命令执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/CERIO-DT%E7%B3%BB%E5%88%97%E8%B7%AF%E7%94%B1%E5%99%A8Save.cgi%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
CERIO-DT系列路由器Save.cgi接口存在命令执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/CERIO-DT%E7%B3%BB%E5%88%97%E8%B7%AF%E7%94%B1%E5%99%A8Save.cgi%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
CVE-2023-4357-Chrome-XXE漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/CVE-2023-4357-Chrome-XXE%E6%BC%8F%E6%B4%9E.md
CVE-2023-4357-Chrome-XXE漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/CVE-2023-4357-Chrome-XXE%E6%BC%8F%E6%B4%9E.md
Check-Point安全网关任意文件读取漏洞(CVE-2024-24919).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Check-Point%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-24919).md
Check-Point安全网关任意文件读取漏洞(CVE-2024-24919).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Check-Point%E5%AE%89%E5%85%A8%E7%BD%91%E5%85%B3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-24919).md
Cisco IOS XE CVE-2023-20198权限提升漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Cisco%20IOS%20XE%20CVE-2023-20198%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E.md
Cisco IOS XE CVE-2023-20198权限提升漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Cisco%20IOS%20XE%20CVE-2023-20198%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E.md
CloudPanel RCE漏洞 CVE-2023-35885.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/CloudPanel%20RCE%E6%BC%8F%E6%B4%9E%20CVE-2023-35885.md
CloudPanel RCE漏洞 CVE-2023-35885.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/CloudPanel%20RCE%E6%BC%8F%E6%B4%9E%20CVE-2023-35885.md
Cobbler存在远程命令执行漏洞(CVE-2021-40323).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Cobbler%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2021-40323).md
Cobbler存在远程命令执行漏洞(CVE-2021-40323).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Cobbler%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2021-40323).md
Confluence 未授权提权访问漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Confluence%20%E6%9C%AA%E6%8E%88%E6%9D%83%E6%8F%90%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
Confluence 未授权提权访问漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Confluence%20%E6%9C%AA%E6%8E%88%E6%9D%83%E6%8F%90%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E.md
Confluence身份认证绕过(CVE-2023-22518).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Confluence%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87(CVE-2023-22518).md
Confluence身份认证绕过(CVE-2023-22518).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Confluence%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87(CVE-2023-22518).md
Confluence远程命令执行漏洞(CVE-2024-21683).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Confluence%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-21683).md
Confluence远程命令执行漏洞(CVE-2024-21683).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Confluence%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-21683).md
Coremail邮件系统未授权访问获取管理员账密.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Coremail%E9%82%AE%E4%BB%B6%E7%B3%BB%E7%BB%9F%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E8%8E%B7%E5%8F%96%E7%AE%A1%E7%90%86%E5%91%98%E8%B4%A6%E5%AF%86.md
Coremail邮件系统未授权访问获取管理员账密.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Coremail%E9%82%AE%E4%BB%B6%E7%B3%BB%E7%BB%9F%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E8%8E%B7%E5%8F%96%E7%AE%A1%E7%90%86%E5%91%98%E8%B4%A6%E5%AF%86.md
Craft CMS远程代码执行漏洞CVE-2023-41892.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Craft%20CMS%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9ECVE-2023-41892.md
Craft CMS远程代码执行漏洞CVE-2023-41892.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Craft%20CMS%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9ECVE-2023-41892.md
CrushFTP服务器端模板注入(CVE-2024-4040).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/CrushFTP%E6%9C%8D%E5%8A%A1%E5%99%A8%E7%AB%AF%E6%A8%A1%E6%9D%BF%E6%B3%A8%E5%85%A5(CVE-2024-4040).md
CrushFTP服务器端模板注入(CVE-2024-4040).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/CrushFTP%E6%9C%8D%E5%8A%A1%E5%99%A8%E7%AB%AF%E6%A8%A1%E6%9D%BF%E6%B3%A8%E5%85%A5(CVE-2024-4040).md
D-LINK-DIR-X4860未授权RCE漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/D-LINK-DIR-X4860%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E.md
D-LINK-DIR-X4860未授权RCE漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/D-LINK-DIR-X4860%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E.md
D-Link-NAS(CVE-2024-3272&&CVE-2024-3273).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/D-Link-NAS(CVE-2024-3272%26%26CVE-2024-3273).md
D-Link-NAS(CVE-2024-3272&&CVE-2024-3273).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/D-Link-NAS(CVE-2024-3272%26%26CVE-2024-3273).md
D-Link_DAR-8000-10上网行为审计网关任意文件上传漏洞(CVE-2023-5154).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/D-Link_DAR-8000-10%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E5%AE%A1%E8%AE%A1%E7%BD%91%E5%85%B3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E(CVE-2023-5154).md
D-Link_DAR-8000-10上网行为审计网关任意文件上传漏洞(CVE-2023-5154).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/D-Link_DAR-8000-10%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E5%AE%A1%E8%AE%A1%E7%BD%91%E5%85%B3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E(CVE-2023-5154).md
D-Link_DAR-8000操作系统命令注入漏洞(CVE-2023-4542).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/D-Link_DAR-8000%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2023-4542).md
D-Link_DAR-8000操作系统命令注入漏洞(CVE-2023-4542).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/D-Link_DAR-8000%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2023-4542).md
DCN有线无线智能一体化控制器WEB管理系统.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/DCN%E6%9C%89%E7%BA%BF%E6%97%A0%E7%BA%BF%E6%99%BA%E8%83%BD%E4%B8%80%E4%BD%93%E5%8C%96%E6%8E%A7%E5%88%B6%E5%99%A8WEB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F.md
DCN有线无线智能一体化控制器WEB管理系统.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/DCN%E6%9C%89%E7%BA%BF%E6%97%A0%E7%BA%BF%E6%99%BA%E8%83%BD%E4%B8%80%E4%BD%93%E5%8C%96%E6%8E%A7%E5%88%B6%E5%99%A8WEB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F.md
DT高清车牌识别摄像机存在任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/DT%E9%AB%98%E6%B8%85%E8%BD%A6%E7%89%8C%E8%AF%86%E5%88%AB%E6%91%84%E5%83%8F%E6%9C%BA%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
DT高清车牌识别摄像机存在任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/DT%E9%AB%98%E6%B8%85%E8%BD%A6%E7%89%8C%E8%AF%86%E5%88%AB%E6%91%84%E5%83%8F%E6%9C%BA%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Dedecms v5.7.111前台tags.php SQL注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Dedecms%20v5.7.111%E5%89%8D%E5%8F%B0tags.php%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Dedecms v5.7.111前台tags.php SQL注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Dedecms%20v5.7.111%E5%89%8D%E5%8F%B0tags.php%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
EasyCVR 视频管理平台存在用户信息泄露.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/EasyCVR%20%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E7%94%A8%E6%88%B7%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
EasyCVR 视频管理平台存在用户信息泄露.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/EasyCVR%20%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E7%94%A8%E6%88%B7%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
EasyCVR视频管理平台存在任意用户添加漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/EasyCVR%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
EasyCVR视频管理平台存在任意用户添加漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/EasyCVR%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E6%B7%BB%E5%8A%A0%E6%BC%8F%E6%B4%9E.md
F-logic_DataCube3存在SQL注入漏洞(CVE-2024-31750).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/F-logic_DataCube3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-31750).md
F-logic_DataCube3存在SQL注入漏洞(CVE-2024-31750).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/F-logic_DataCube3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-31750).md
F-logic_DataCube3存在任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/F-logic_DataCube3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
F-logic_DataCube3存在任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/F-logic_DataCube3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/F5%20BIG-IP%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-46747).md
F5 BIG-IP 远程代码执行漏洞(CVE-2023-46747).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/F5%20BIG-IP%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2023-46747).md
F5-BIG-IP存在SQL注入漏洞(CVE-2024-26026)&(CVE-2024-21793).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/F5-BIG-IP%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-26026)%26(CVE-2024-21793).md
F5-BIG-IP存在SQL注入漏洞(CVE-2024-26026)&(CVE-2024-21793).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/F5-BIG-IP%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-26026)%26(CVE-2024-21793).md
Fortinet-SSL-VPN-CVE-2024-21762.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Fortinet-SSL-VPN-CVE-2024-21762.md
Fortinet-SSL-VPN-CVE-2024-21762.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Fortinet-SSL-VPN-CVE-2024-21762.md
Fortra FileCatalyst Workflow远程代码执行漏漏洞(CVE-2024-25153).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Fortra%20FileCatalyst%20Workflow%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%BC%8F%E6%B4%9E(CVE-2024-25153).md
Fortra FileCatalyst Workflow远程代码执行漏漏洞(CVE-2024-25153).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Fortra%20FileCatalyst%20Workflow%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%BC%8F%E6%B4%9E(CVE-2024-25153).md
GeoServer系统wms接口存在远程命令执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/GeoServer%E7%B3%BB%E7%BB%9Fwms%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
GeoServer系统wms接口存在远程命令执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/GeoServer%E7%B3%BB%E7%BB%9Fwms%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
GitLab任意用户密码重置漏洞(CVE-2023-7028).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/GitLab%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E(CVE-2023-7028).md
GitLab任意用户密码重置漏洞(CVE-2023-7028).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/GitLab%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE%E6%BC%8F%E6%B4%9E(CVE-2023-7028).md
Git远程代码执行漏洞(CVE-2024-32002).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Git%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-32002).md
Git远程代码执行漏洞(CVE-2024-32002).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Git%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-32002).md
Gradio存在任意文件读取漏洞(CVE-2024-1561).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Gradio%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-1561).md
Gradio存在任意文件读取漏洞(CVE-2024-1561).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Gradio%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-1561).md
H3C Magic B1STV100R012 RCE.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C%20Magic%20B1STV100R012%20RCE.md
H3C Magic B1STV100R012 RCE.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C%20Magic%20B1STV100R012%20RCE.md
H3C 用户自助服务平台 dynamiccontent.properties.xhtml存在RCE漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C%20%E7%94%A8%E6%88%B7%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0%20dynamiccontent.properties.xhtml%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md
H3C 用户自助服务平台 dynamiccontent.properties.xhtml存在RCE漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C%20%E7%94%A8%E6%88%B7%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E5%B9%B3%E5%8F%B0%20dynamiccontent.properties.xhtml%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md
H3C-CVM-upload接口前台任意文件上传漏洞复现.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C-CVM-upload%E6%8E%A5%E5%8F%A3%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0.md
H3C-CVM-upload接口前台任意文件上传漏洞复现.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C-CVM-upload%E6%8E%A5%E5%8F%A3%E5%89%8D%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0.md
H3C-SecParh堡垒机任意用户登录漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C-SecParh%E5%A0%A1%E5%9E%92%E6%9C%BA%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
H3C-SecParh堡垒机任意用户登录漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C-SecParh%E5%A0%A1%E5%9E%92%E6%9C%BA%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E.md
H3C-校园网自助服务系统flexfileupload任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C-%E6%A0%A1%E5%9B%AD%E7%BD%91%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Fflexfileupload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
H3C-校园网自助服务系统flexfileupload任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C-%E6%A0%A1%E5%9B%AD%E7%BD%91%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Fflexfileupload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
H3C_magic_R100路由器的UDPserver中存在命令执行漏洞(CVE-2022-34598).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C_magic_R100%E8%B7%AF%E7%94%B1%E5%99%A8%E7%9A%84UDPserver%E4%B8%AD%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2022-34598).md
H3C_magic_R100路由器的UDPserver中存在命令执行漏洞(CVE-2022-34598).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C_magic_R100%E8%B7%AF%E7%94%B1%E5%99%A8%E7%9A%84UDPserver%E4%B8%AD%E5%AD%98%E5%9C%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2022-34598).md
H3C网络管理系统任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C%E7%BD%91%E7%BB%9C%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
H3C网络管理系统任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C%E7%BD%91%E7%BB%9C%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
H3C路由器userLogin.asp信息泄漏漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C%E8%B7%AF%E7%94%B1%E5%99%A8userLogin.asp%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
H3C路由器userLogin.asp信息泄漏漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/H3C%E8%B7%AF%E7%94%B1%E5%99%A8userLogin.asp%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
HFS2.3未经身份验证的远程代码执行(CVE-2024-23692).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/HFS2.3%E6%9C%AA%E7%BB%8F%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%9A%84%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C(CVE-2024-23692).md
HFS2.3未经身份验证的远程代码执行(CVE-2024-23692).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/HFS2.3%E6%9C%AA%E7%BB%8F%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%9A%84%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C(CVE-2024-23692).md
HM发卡网反序列化漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/HM%E5%8F%91%E5%8D%A1%E7%BD%91%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
HM发卡网反序列化漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/HM%E5%8F%91%E5%8D%A1%E7%BD%91%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
HSC-Mailinspector-loader.php存在任意文件读取漏洞(CVE-2024-34470).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/HSC-Mailinspector-loader.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-34470).md
HSC-Mailinspector-loader.php存在任意文件读取漏洞(CVE-2024-34470).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/HSC-Mailinspector-loader.php%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-34470).md
HiKVISION 综合安防管理平台 任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/HiKVISION%20%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
HiKVISION 综合安防管理平台 任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/HiKVISION%20%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Hytec Inter HWL-2511-SS popen.cgi命令注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Hytec%20Inter%20HWL-2511-SS%20popen.cgi%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Hytec Inter HWL-2511-SS popen.cgi命令注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Hytec%20Inter%20HWL-2511-SS%20popen.cgi%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
I Doc View任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/I%20Doc%20View%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
I Doc View任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/I%20Doc%20View%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
IDocView_qJvqhFt接口任意文件读取.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/IDocView_qJvqhFt%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
IDocView_qJvqhFt接口任意文件读取.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/IDocView_qJvqhFt%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
IP-guard WebServer 远程命令执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/IP-guard%20WebServer%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
IP-guard WebServer 远程命令执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/IP-guard%20WebServer%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
IP-guard-WebServer存在权限绕过漏洞(QVD-2024-14103).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/IP-guard-WebServer%E5%AD%98%E5%9C%A8%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(QVD-2024-14103).md
IP-guard-WebServer存在权限绕过漏洞(QVD-2024-14103).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/IP-guard-WebServer%E5%AD%98%E5%9C%A8%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(QVD-2024-14103).md
Ivanti_Connect_Secure远程命令注入漏洞(CVE-2024-21887).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Ivanti_Connect_Secure%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-21887).md
Ivanti_Connect_Secure远程命令注入漏洞(CVE-2024-21887).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Ivanti_Connect_Secure%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E(CVE-2024-21887).md
JAVA Public CMS 后台RCE漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JAVA%20Public%20CMS%20%E5%90%8E%E5%8F%B0RCE%E6%BC%8F%E6%B4%9E.md
JAVA Public CMS 后台RCE漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JAVA%20Public%20CMS%20%E5%90%8E%E5%8F%B0RCE%E6%BC%8F%E6%B4%9E.md
JEEVMS仓库管理系统任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JEEVMS%E4%BB%93%E5%BA%93%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
JEEVMS仓库管理系统任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JEEVMS%E4%BB%93%E5%BA%93%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
JEPaaS低代码平台document存在文件上传致RCE漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JEPaaS%E4%BD%8E%E4%BB%A3%E7%A0%81%E5%B9%B3%E5%8F%B0document%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E8%87%B4RCE%E6%BC%8F%E6%B4%9E.md
JEPaaS低代码平台document存在文件上传致RCE漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JEPaaS%E4%BD%8E%E4%BB%A3%E7%A0%81%E5%B9%B3%E5%8F%B0document%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E8%87%B4RCE%E6%BC%8F%E6%B4%9E.md
JFinalCMS 任意文件读取漏洞(CVE-2023-41599).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JFinalCMS%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2023-41599).md
JFinalCMS 任意文件读取漏洞(CVE-2023-41599).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JFinalCMS%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2023-41599).md
Jan任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Jan%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Jan任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Jan%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
JeePlus低代码开发平台存在SQL注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JeePlus%E4%BD%8E%E4%BB%A3%E7%A0%81%E5%BC%80%E5%8F%91%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
JeePlus低代码开发平台存在SQL注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JeePlus%E4%BD%8E%E4%BB%A3%E7%A0%81%E5%BC%80%E5%8F%91%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Jeecg-jeecgFormDemoController存在JNDI代码执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Jeecg-jeecgFormDemoController%E5%AD%98%E5%9C%A8JNDI%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
Jeecg-jeecgFormDemoController存在JNDI代码执行漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Jeecg-jeecgFormDemoController%E5%AD%98%E5%9C%A8JNDI%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
JeecgBoot漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JeecgBoot%E6%BC%8F%E6%B4%9E.md
JeecgBoot漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JeecgBoot%E6%BC%8F%E6%B4%9E.md
Jeecg任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Jeecg%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Jeecg任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Jeecg%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Jenkins任意文件读取漏洞(CVE-2024-23897).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Jenkins%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-23897).md
Jenkins任意文件读取漏洞(CVE-2024-23897).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Jenkins%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2024-23897).md
JetBrains TeamCity 身份验证绕过漏洞(CVE-2024-27198).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JetBrains%20TeamCity%20%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(CVE-2024-27198).md
JetBrains TeamCity 身份验证绕过漏洞(CVE-2024-27198).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JetBrains%20TeamCity%20%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E(CVE-2024-27198).md
Joomla 未授权漏洞CVE-2023-23752.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Joomla%20%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9ECVE-2023-23752.md
Joomla 未授权漏洞CVE-2023-23752.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Joomla%20%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9ECVE-2023-23752.md
JumpServer(CVE-2024-29201)远程代码执行漏洞&(CVE-2024-29202)Jinin2模板注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JumpServer(CVE-2024-29201)%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%26(CVE-2024-29202)Jinin2%E6%A8%A1%E6%9D%BF%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
JumpServer(CVE-2024-29201)远程代码执行漏洞&(CVE-2024-29202)Jinin2模板注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JumpServer(CVE-2024-29201)%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%26(CVE-2024-29202)Jinin2%E6%A8%A1%E6%9D%BF%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
JumpServer未授权漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JumpServer%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9E.md
JumpServer未授权漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/JumpServer%E6%9C%AA%E6%8E%88%E6%9D%83%E6%BC%8F%E6%B4%9E.md
Kuboard默认口令.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Kuboard%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4.md
Kuboard默认口令.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Kuboard%E9%BB%98%E8%AE%A4%E5%8F%A3%E4%BB%A4.md
LVS精益价值管理系统DownLoad.aspx存在任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/LVS%E7%B2%BE%E7%9B%8A%E4%BB%B7%E5%80%BC%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDownLoad.aspx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
LVS精益价值管理系统DownLoad.aspx存在任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/LVS%E7%B2%BE%E7%9B%8A%E4%BB%B7%E5%80%BC%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FDownLoad.aspx%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
LVS精益价值管理系统LVS.Web.ashx存在SQL注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/LVS%E7%B2%BE%E7%9B%8A%E4%BB%B7%E5%80%BC%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FLVS.Web.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
LVS精益价值管理系统LVS.Web.ashx存在SQL注入漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/LVS%E7%B2%BE%E7%9B%8A%E4%BB%B7%E5%80%BC%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9FLVS.Web.ashx%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
Laykefu客服系统任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Laykefu%E5%AE%A2%E6%9C%8D%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Laykefu客服系统任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Laykefu%E5%AE%A2%E6%9C%8D%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Likeshop-formimage任意文件上传.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Likeshop-formimage%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
Likeshop-formimage任意文件上传.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Likeshop-formimage%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md
LinkWeChat任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/LinkWeChat%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
LinkWeChat任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/LinkWeChat%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Linksys-RE7000%E6%97%A0%E7%BA%BF%E6%89%A9%E5%B1%95%E5%99%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-25852).md
Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Linksys-RE7000%E6%97%A0%E7%BA%BF%E6%89%A9%E5%B1%95%E5%99%A8%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2024-25852).md
LiveGBS存在逻辑缺陷漏洞(CNVD-2023-72138).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/LiveGBS%E5%AD%98%E5%9C%A8%E9%80%BB%E8%BE%91%E7%BC%BA%E9%99%B7%E6%BC%8F%E6%B4%9E(CNVD-2023-72138).md
LiveGBS存在逻辑缺陷漏洞(CNVD-2023-72138).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/LiveGBS%E5%AD%98%E5%9C%A8%E9%80%BB%E8%BE%91%E7%BC%BA%E9%99%B7%E6%BC%8F%E6%B4%9E(CNVD-2023-72138).md
MRCMS3.0任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/MRCMS3.0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
MRCMS3.0任意文件读取漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/MRCMS3.0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
MajorDoMo-thumb.php未授权RCE漏洞复现(CNVD-2024-02175).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/MajorDoMo-thumb.php%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CNVD-2024-02175).md
MajorDoMo-thumb.php未授权RCE漏洞复现(CNVD-2024-02175).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/MajorDoMo-thumb.php%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CNVD-2024-02175).md
MetaCRM客户关系管理系统任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/MetaCRM%E5%AE%A2%E6%88%B7%E5%85%B3%E7%B3%BB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
MetaCRM客户关系管理系统任意文件上传漏洞.mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/MetaCRM%E5%AE%A2%E6%88%B7%E5%85%B3%E7%B3%BB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
Metabase validate 远程命令执行漏洞(CVE-2023-38646).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Metabase%20validate%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-38646%EF%BC%89.md
Metabase validate 远程命令执行漏洞(CVE-2023-38646).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Metabase%20validate%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%EF%BC%88CVE-2023-38646%EF%BC%89.md
Mingsoft-MCMS前台查询文章列表接口SQL注入(CNVD-2024-06148).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Mingsoft-MCMS%E5%89%8D%E5%8F%B0%E6%9F%A5%E8%AF%A2%E6%96%87%E7%AB%A0%E5%88%97%E8%A1%A8%E6%8E%A5%E5%8F%A3SQL%E6%B3%A8%E5%85%A5(CNVD-2024-06148).md
Mingsoft-MCMS前台查询文章列表接口SQL注入(CNVD-2024-06148).mdhttps://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/Mingsoft-MCMS%E5%89%8D%E5%8F%B0%E6%9F%A5%E8%AF%A2%E6%96%87%E7%AB%A0%E5%88%97%E8%A1%A8%E6%8E%A5%E5%8F%A3SQL%E6%B3%A8%E5%85%A5(CNVD-2024-06148).md
READMEhttps://patch-diff.githubusercontent.com/pygopher/POPC
https://patch-diff.githubusercontent.com/pygopher/POPC#漏洞收集
https://patch-diff.githubusercontent.com/pygopher/POPC#20240614-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240611-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240607-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240605-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240602-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240531-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240528-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240525-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240523-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240521-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240518-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240513-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240508-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240502-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240430-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240428-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240427-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240423-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240419-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240416-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240412-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240410-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240406-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240329-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240328-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240327-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240324-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240320-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240314-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240312-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240305-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240301-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240228-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240217-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#2024025-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#2024022-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240126-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240117-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240112-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240109-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240105-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20240103-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231231-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231228-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231226-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231223-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231217-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231215-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231214-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231211-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231208-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231207-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231205-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231203-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231130-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231129-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231128-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231126-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231124-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231123-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231120-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231119-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231117-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231116-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231109-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231108-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231107-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231103-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231031-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231030-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231026-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#20231025-新增漏洞
安美数字酒店宽带运营系统SQL注入漏洞https://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9FSQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
泛微E-MobileServer远程命令执行漏洞https://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/%E6%B3%9B%E5%BE%AEE-MobileServer%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
https://patch-diff.githubusercontent.com/pygopher/POPC#20231021-新增漏洞
海康威视综合安防管理平台信息泄露https://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/%E6%B5%B7%E5%BA%B7%E5%A8%81%E8%A7%86%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
https://patch-diff.githubusercontent.com/pygopher/POPC#20231020-新增漏洞
蓝凌EIS智慧协同平台saveImg接口存在任意文件上传漏洞https://patch-diff.githubusercontent.com/pygopher/POPC/blob/main/%E8%93%9D%E5%87%8CEIS%E6%99%BA%E6%85%A7%E5%8D%8F%E5%90%8C%E5%B9%B3%E5%8F%B0saveImg%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
https://patch-diff.githubusercontent.com/pygopher/POPC#20231018-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#2023926-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#2023922-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#2023919-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#2023914-新增漏洞
https://patch-diff.githubusercontent.com/pygopher/POPC#免责声明
https://starchart.cc/wy876/POC
Readme https://patch-diff.githubusercontent.com/pygopher/POPC#readme-ov-file
Please reload this pagehttps://patch-diff.githubusercontent.com/pygopher/POPC
Activityhttps://patch-diff.githubusercontent.com/pygopher/POPC/activity
0 starshttps://patch-diff.githubusercontent.com/pygopher/POPC/stargazers
0 watchinghttps://patch-diff.githubusercontent.com/pygopher/POPC/watchers
0 forkshttps://patch-diff.githubusercontent.com/pygopher/POPC/forks
Report repository https://patch-diff.githubusercontent.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2Fpygopher%2FPOPC&report=pygopher+%28user%29
Releaseshttps://patch-diff.githubusercontent.com/pygopher/POPC/releases
Packages 0https://patch-diff.githubusercontent.com/users/pygopher/packages?repo_name=POPC
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.