From a27062eba8791e3b659f55904c4ec0e41e607368 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E4=B8=9C=E6=96=B9=E6=9C=89=E9=B1=BC=E5=90=8D=E4=B8=BA?= =?UTF-8?q?=E5=92=B8?= Date: Sun, 23 Mar 2025 18:23:41 +0800 Subject: [PATCH] Update README.md MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit add 万户OA ajax_checkUserNum.jsp SQL注入漏洞 万户OA selectAmountField.jsp SQL注入漏洞 万户OA DocumentHistory.jsp SQL注入漏洞 用友U8 Cloud QuerySoapServlet SQL注入漏洞 万户OA getNextAutoCode.jsp SQL注入漏洞 蓝凌智慧协同平台 fl_define_edit.aspx SQL注入漏洞 泛微OA ReceiveTodoRequestByXml XML实体注入漏洞 --- README.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/README.md b/README.md index 83fd521..e369a78 100644 --- a/README.md +++ b/README.md @@ -2591,6 +2591,13 @@ - [微信“邀请加入群聊”钓鱼卡片简析](./books/微信“邀请加入群聊”钓鱼卡片简析.html) - [记一次绕过阿里云waf与某不知名waf的双waf上传getshell](./books/记一次绕过阿里云waf与某不知名waf的双waf上传getshell.html) - [针对Green VPN及加密文件的逆向实战分析](./books/针对Green%20VPN及加密文件的逆向实战分析.html) +- [万户OA ajax_checkUserNum.jsp SQL注入漏洞](https://mrxn.net/jswz/defaultroot-ezOFFICE-ajax_checkUserNum-sqli.html) +- [万户OA selectAmountField.jsp SQL注入漏洞](https://mrxn.net/jswz/defaultroot-ezOFFICE-selectAmountField-sqli.html) +- [万户OA DocumentHistory.jsp SQL注入漏洞](https://mrxn.net/jswz/defaultroot-ezOFFICE-DocumentHistory-sqli.html) +- [用友U8 Cloud QuerySoapServlet SQL注入漏洞](https://mrxn.net/jswz/yonyou-u8cloud-QuerySoapServlet-sqli.html) +- [万户OA getNextAutoCode.jsp SQL注入漏洞](https://mrxn.net/jswz/defaultroot-ezOFFICE-getNextAutoCode-sqli.html) +- [蓝凌智慧协同平台 fl_define_edit.aspx SQL注入漏洞](https://mrxn.net/jswz/landray-eis-fl_define_edit-sqli.html) +- [泛微OA ReceiveTodoRequestByXml XML实体注入漏洞](https://mrxn.net/jswz/e-cology-ReceiveTodoRequestByXml-xmlToMap-XXE.html) ## 说明