From bde24c23b779d55bcfe3c4efee8713c9daec4bd5 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" Date: Fri, 27 Feb 2026 07:03:43 +0000 Subject: [PATCH] =?UTF-8?q?docs:=20=E6=9B=B4=E6=96=B0=201=20=E7=AF=87?= =?UTF-8?q?=E6=96=87=E7=AB=A0=20-=20=E5=A4=A7=E8=9A=82=E8=9A=81=20(BigAnt)?= =?UTF-8?q?=20=E5=8D=B3=E6=97=B6=E9=80=9A=E8=AE=AF=E7=B3=BB=E7=BB=9F=20mov?= =?UTF-8?q?eDept=20SQL=E6=B3=A8=E5=85=A5=E6=BC=8F=E6=B4=9E=20[skip=20ci]?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 42478dc..c51abeb 100644 --- a/README.md +++ b/README.md @@ -765,6 +765,7 @@ - [九佳易管理系统 picHY.ashx SQL 注入漏洞](https://mrxn.net/jswz/a8erp-HuiYuanDangAn-picHY-sqli.html) - [大蚂蚁 (BigAnt) 即时通讯系统 安装程序二次注入致远程代码执行漏洞](https://mrxn.net/jswz/bigant-install-config-rce.html) - [青龙面板最新版v2.20.1 鉴权绕过致RCE](https://mrxn.net/jswz/qinglong-auth-bypass-rce.html) +- [大蚂蚁 (BigAnt) 即时通讯系统 moveDept SQL注入漏洞](https://mrxn.net/jswz/bigant-dept-moveDept-sqli.html) ## 提权辅助相关