一、OA系统
泛微(Weaver-Ecology-OA)
https://xz.aliyun.com/t/6560
https://zhuanlan.zhihu.com/p/86082614
https://www.cnblogs.com/whoami101/p/13361254.html
https://www.cnblogs.com/yuzly/p/13677238.html
https://www.cnblogs.com/ffx1/p/12653555.html
https://www.seebug.org/vuldb/ssvid-91089
https://www.seebug.org/vuldb/ssvid-90524
致远(Seeyon)
https://www.cnblogs.com/nul1/p/12803555.html
https://www.zhihuifly.com/t/topic/3345
https://www.cnblogs.com/AtesetEnginner/p/12106741.html
https://www.cnblogs.com/AtesetEnginner/p/12106741.html
https://www.cnblogs.com/AtesetEnginner/p/12106741.html
https://www.cnblogs.com/AtesetEnginner/p/12106741.html
http://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2015-0104942
https://www.cnblogs.com/AtesetEnginner/p/12106741.html
https://landgrey.me/blog/8/
蓝凌OA
暂无(希望大佬能提供)
通达OA
https://xz.aliyun.com/t/8430
https://xz.aliyun.com/t/7437
http://www.adminxe.com/1095.html
https://www.cnblogs.com/yuzly/p/13606314.html
https://www.cnblogs.com/yuzly/p/13690737.html
金蝶OA
https://www.seebug.org/vuldb/ssvid-93826
二、E-mail
Exchange
https://srcincite.io/advisories/src-2020-0025/
https://github.com/rapid7/metasploit-framework/pull/14126
https://xz.aliyun.com/t/7321
https://xz.aliyun.com/t/3670
https://sploitus.com/?query=Exchange#exploits
coremail
https://www.lsablog.com/networksec/penetration/coremail-info-leakage-and-webservice-unauthorization-reproduce/
https://www.seebug.org/vuldb/ssvid-94754
https://sploitus.com/?query=Coremail#exploits
三、Web中间件
Apache
https://xz.aliyun.com/t/4422
https://xz.aliyun.com/t/4452
https://xz.aliyun.com/t/5513
https://xz.aliyun.com/t/6700
https://xz.aliyun.com/t/7964
https://www.cnblogs.com/sup3rman/p/13322898.html
https://sploitus.com/?query=Apache#exploits
Tomcat
https://xz.aliyun.com/t/54
https://xz.aliyun.com/t/7683
https://github.com/pyn3rd/CVE-2019-0232
https://blog.csdn.net/weixin_43071873/article/details/109532160
https://blog.csdn.net/jlvsjp/article/details/52776377
https://sploitus.com/?query=tomcat#exploits
Weblogic
https://www.cnblogs.com/Savior-cc/p/13916900.html
https://xz.aliyun.com/t/5024
https://www.cnblogs.com/lijingrong/p/13049569.html
https://www.cnblogs.com/xiaozi/p/8205107.html
https://xz.aliyun.com/t/5078
https://xz.aliyun.com/t/8155
https://sploitus.com/?query=weblogic#exploits
JBoss
https://www.cnblogs.com/null1433/p/12704908.html
https://www.cnblogs.com/kuaile1314/p/12060366.html
https://www.cnblogs.com/iamver/p/11282928.html
https://www.cnblogs.com/Safe3/archive/2010/01/08/1642371.html
https://www.cnblogs.com/rnss/p/13377321.html
https://sploitus.com/?query=JBoss#exploits
四、源代码管理
GitLab
https://github.com/thewhiteh4t/cve-2020-10977
https://xz.aliyun.com/t/2661
https://xz.aliyun.com/t/393
https://sploitus.com/?query=Gitlab#exploits
SVN
https://blog.csdn.net/qq_36869808/article/details/88846945
五、项目管理系统
禅道
https://blog.csdn.net/qq_36197704/article/details/109385695
https://xz.aliyun.com/t/171/
https://www.cnblogs.com/ly584521/p/13962816.html
https://xz.aliyun.com/t/186
https://xz.aliyun.com/t/188
https://anquan.baidu.com/article/996
http://dwz.date/d2G5
Jira
https://caiqiqi.github.io/2019/11/03/Atlassian-Jira%E6%BC%8F%E6%B4%9E%E5%A4%A7%E6%9D%82%E7%83%A9/
https://cloud.tencent.com/developer/article/1529135
https://www.cnblogs.com/backlion/p/11608371.html
https://www.cnblogs.com/backlion/p/11608439.html
https://xz.aliyun.com/t/7219
https://sploitus.com/?query=Jira#exploits
六、数据库
Redis
https://xz.aliyun.com/t/256
https://xz.aliyun.com/t/5616
https://www.webshell.cc/5154.html
https://sploitus.com/?query=redis#exploits
Mysql
https://xz.aliyun.com/t/1122
https://xz.aliyun.com/t/1
https://www.lshack.cn/596/
https://www.cnblogs.com/muxueblog/p/13043768.html
https://xz.aliyun.com/t/2199
https://sploitus.com/?query=mysql#exploits
Mssql
https://forum.ywhack.com/thread-114737-1-1.html
https://xz.aliyun.com/t/7534
https://xz.aliyun.com/t/8195
https://xz.aliyun.com/t/8513
https://xz.aliyun.com/t/6682
本文项目地址:
https://github.com/r0eXpeR/redteam_vul
持续更新中,记得---Star
转自:HACK学习呀
文章来源:Github.com
原创作者:Unomi
END
本文始发于微信公众号(HACK之道):红队中易被攻击的一些重点系统漏洞整理
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论