当前位置:网站首页>Sorting out of key vulnerabilities identified by CMS in the peripheral management of red team (I)
Sorting out of key vulnerabilities identified by CMS in the peripheral management of red team (I)
2022-06-24 03:11:00 【xiaochuhe.】
One 、 Open source operation and maintenance monitoring
( One )Jenkins
- Jenkins Path traversal arbitrary file write vulnerability (CVE-2019-10352)
- Jenkins Git client Plug in Command Execution Vulnerability (CVE-2019-10392)
- Jenkins Historical exploiter —— Sploitus | Exploit & Hacktool Search Engine
( Two )Zabbix
- CVE-2020-11800 Zabbix Remote code execution vulnerability
- Zabbix Medium CSRF To RCE(CVE-2021-27927)
- Zabbix 2.2 - 3.0.3 Remote code execution vulnerability
- Zabbix Agent 3.0.1 mysql.size shell Command injection (CVE-2016-4338)
- Zabbix Historical exploiter —— Sploitus | Exploit & Hacktool Search Engine
( 3、 ... and )Nagios
- Nagios XI 5.6.9 Remote code execution vulnerability (CVE-2019-20197)
- nagios-xi-5.7.5 Multiple vulnerabilities (CVE-2021-25296~99)
- Nagios Code injection vulnerability (CVE-2021-3273)
- Nagios XI 5.5.10: XSS to RCE
- Nagios Historical exploiter —— Sploitus | Exploit & Hacktool Search Engine

Two 、 database
️MDAT A variety of mainstream database attack tools
( One )Mysql
- Mysql Raise the right (CVE-2016-6663、CVE-2016-6664 Combined practice )
- Mysql Summary of database penetration and vulnerability utilization
- Mysql Into the album
- Higher version MySQL And UDF Raise the right
- Mysql A collection of historical loopholes —— Sploitus | Exploit & Hacktool Search Engine
Sploitus | Exploit & Hacktool Search Engine
( Two )Mssql
- Mssql Use posture to organize ( The arrangement is quite complete )
- Mssql Summary of database command execution ——https://xz.aliyun.com/t/7534
- utilize mssql Simulate login authorization
- advanced MSSQL Injection techniques ——https://xz.aliyun.com/t/8513
- MSSQL Use CLR Assembly to execute commands ——https://xz.aliyun.com/t/6682
( 3、 ... and )Redis
- Redis Summary of unauthorized access exploit ——https://xz.aliyun.com/t/256
- Redis 4.x RCE——https://xz.aliyun.com/t/5616
- redis Use posture to collect ——redis Use posture to collect – WebShell'S Blog
- Redis A collection of historical loopholes —— Sploitus | Exploit & Hacktool Search Engine
- adopt Redis The master and slave write lossless documents ——https://github.com/r35tart/RedisWriteFile

3、 ... and 、OA System
( One ) Pan Wei (Weaver-Ecology-OA)
- Pan Wei OA E-cology RCE(CNVD-2019-32204)- Affects version 7.0/8.0/8.1/9.0——https://xz.aliyun.com/t/6560
- Pan Wei OA WorkflowCenterTreeData Interface injection ( limit oracle database )—— Pan Wei OA WorkflowCenterTreeData Interface injection recurrence ( Limited to oracle database ) - You know
- Pan Wei ecology OA Database configuration information disclosure —— Pan Wei ecology OA Database configuration information disclosure - Whisper softly - Blog Garden
- Pan Wei OA Cloud Bridge arbitrary file reading - influence 2018-2019 Multiple versions —— Pan Wei OA Cloud Bridge does not authorize any file to read - Falling leaves in the rain - Blog Garden
- Pan Wei e-cology OA The front desk SQL Inject holes —— Pan Wei e-cology OA The front desk SQL Inject holes - syyh-01 - Blog Garden
- Pan Wei OA System com.eweaver.base.security.servlet.LoginAction Parameters keywordid SQL Inject holes ——https://www.seebug.org/vuldb/ssvid-91089
- Pan Wei OA sysinterface/codeEdit.jsp Page arbitrary file upload ——
Pan Wei ecology OA Database configuration information disclosure - Whisper softly - Blog Garden- Pan Wei ecology OA Database configuration information disclosure ——https://www.seebug.org/vuldb/ssvid-90524
( Two ) Zhiyuan (Seeyon)
- Zhiyuan OA A8 htmlofficeservlet getshell Loophole —— Zhiyuan OA A8 htmlofficeservlet getshell Loophole - _nul1 - Blog Garden
- Zhiyuan OA Session Leak vulnerability —— Zhiyuan OA Session Leak vulnerability - Web Security - Zhihui community
- Zhiyuan OA A6 search_result.jsp sql Inject holes —— Application security - Tools | frame - Zhiyuan OA - Vulnerability summary - 7hang - Blog Garden
- Zhiyuan OA A6 setextno.jsp sql Inject holes —— Application security - Tools | frame - Zhiyuan OA - Vulnerability summary - 7hang - Blog Garden
- Zhiyuan OA A6 Reset database account password vulnerability —— Application security - Tools | frame - Zhiyuan OA - Vulnerability summary - 7hang - Blog Garden
- Zhiyuan OA A8 Unauthorized access —— Application security - Tools | frame - Zhiyuan OA - Vulnerability summary - 7hang - Blog Garden
- Zhiyuan OA A8-v5 Any user password change —— Zhiyuan A8-V5 There is an arbitrary user password modification vulnerability | wooyun-2015-0104942| WooYun.org
- Zhiyuan OA A8-m Background universal password
- Zhiyuan OA Sail soft report component The front desk XXE Loophole ——LandGrey's Blog
- Zhiyuan OA Sail soft report component reflective XSS&SSRF Loophole - Thinks:@LandGrey——LandGrey's Blog
( 3、 ... and ) Kingdee OA(Kingdee OA)
Kingdee collaborative office system GETSHELL Loophole ——https://www.seebug.org/vuldb/ssvid-93826
( Four ) Accessible OA(TongDa OA)
- Accessible OA Delete any file & Upload files RCE——https://xz.aliyun.com/t/8430
- Accessible OA Upload any file / File contains GetShell——https://xz.aliyun.com/t/7437
- Accessible OA <11.5 edition Any user login —— Accessible OA Recurrence of arbitrary user login vulnerability – Adminxe's Blog
- Accessible OA 11.2 backstage getshell—— Accessible OA 11.2 backstage getshell Loophole recurrence - Falling leaves in the rain - Blog Garden
- Accessible OA 11.7 backstage sql Inject getshell Loophole —— Accessible OA 11.7 backstage sql Inject getshell Loophole recurrence - Falling leaves in the rain - Blog Garden
- Accessible OA 11.7 unauthorized RCE—— Accessible OA11.7 Use new ideas ( attach EXP)
- Accessible OA 11.8 Background low permission Getshell——https://paper.seebug.org/1499/
边栏推荐
- 2022-2028 global aircraft audio control panel system industry research and trend analysis report
- Where is the cloud game server? Can individuals rent cloud game servers?
- LeetCode 599. Minimum index sum of two lists
- Hunan data security governance Summit Forum was held, and Tencent built the best practice of government enterprise data security
- [51nod] 2653 section XOR
- Tencent cloud CVM starts IPv6
- How do I check the trademark registration number? Where do I need to check?
- Dry goods how to build a data visualization project from scratch?
- What is fortress resource authorization? What is barrier machine?
- How does easydss handle the problem that the sharing page cannot be opened due to cache problems?
猜你喜欢

2022-2028 global medical coating materials industry research and trend analysis report
![[51nod] 3216 Awards](/img/94/fdb32434d1343040d711c76568b281.jpg)
[51nod] 3216 Awards

2022-2028 global aircraft front wheel steering system industry research and trend analysis report

2022-2028 global aircraft audio control panel system industry research and trend analysis report

2022-2028 global cell-based seafood industry research and trend analysis report
![[summary of interview questions] zj6 redis](/img/4b/eadf66ca8d834f049f3546d348fa32.jpg)
[summary of interview questions] zj6 redis

2022-2028 global medical modified polypropylene industry research and trend analysis report

2022-2028 global genome editing mutation detection kit industry survey and trend analysis report

2022-2028 global portable two-way radio equipment industry research and trend analysis report

What is etcd and its application scenarios
随机推荐
Cp/rm/mv parameters
Why should I change my PC to a cloud desktop server? What are the characteristics of this server?
2022-2028 global marine wet exhaust hose industry research and trend analysis report
What are the responsibilities of cloud desktop administrators? How to use cloud desktop?
What is the principle of intelligent image recognition? What are the applications of intelligent image recognition?
Dry goods how to build a data visualization project from scratch?
2022-2028 global high tibial osteotomy plate industry research and trend analysis report
Innovation or hype? Is low code a real artifact or a fake tuyere?
Concise and practical time code
2022-2028 Global Industry Survey and trend analysis report on portable pressure monitors for wards
2022-2028 global third-party data platform industry research and trend analysis report
How do I check the trademark registration number? Where do I need to check?
How much is a fortress machine? Why do you need a fortress machine?
Principle of efficient animation Implementation-A preliminary exploration of jetpack compose
How does the fortress machine connect to the server? Which is easy to use, fortress machine or firewall?
Building a web site -- whether to rent or host a server
Industry ranks first in blackmail attacks, hacker organizations attack Afghanistan and India | global network security hotspot
What aspects does the intelligent identification system include? Is the technology of intelligent identification system mature now?
What is the fortress machine? What role does the fortress machine play?
Ner's past, present and future Overview - past


