diff --git a/docs/CHANGELOG.md b/docs/CHANGELOG.md index 9802102..f184c75 100644 --- a/docs/CHANGELOG.md +++ b/docs/CHANGELOG.md @@ -268,7 +268,7 @@ ## version 2.7.8 ----------------- -> 部分调整,ofx.py仅作为入口文件使用 +> 部分调整,Blen.py仅作为入口文件使用 ## version 2.7.9 diff --git a/docs/CODING.md b/docs/CODING.md index c995485..0ec8f25 100644 --- a/docs/CODING.md +++ b/docs/CODING.md @@ -1,4 +1,4 @@ -# oFx - POC编写规范及要求说明 +# Blen - POC编写规范及要求说明 ## 概述 @@ -54,7 +54,7 @@ _info = { """, # POC描述,写更新描述,没有就不写 "name" : "Demo", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx @@ -186,7 +186,7 @@ __________POC提交文件夹必须包含以下文件__________ 考虑到每写一个POC都要手动的创建如上目录有点麻烦,因此笔者提供了一个POC目录结构生成器,食用方式如下: ```sh -➜ oFx git:(main) ✗ python3 ofx.py --gen-poc +➜ Blen git:(main) ✗ python3 Blen.py --gen-poc _ ______ ___ | ___|_ __ @@ -194,7 +194,7 @@ __________POC提交文件夹必须包含以下文件__________ | (_) | _| > <__ _Author : jijue \___/|_| __/_/\_\__ __ __Version : 2.9.1 - #*#*# https://github.com/bigblackhat/oFx #*#*# + #*#*# https://github.com/openx-org/BLEN.git #*#*# _-___________________________________-_ @@ -212,7 +212,7 @@ ___________生成POC目录结构如下____________ |__ test_num_1w.txt |__ success_30.txt _________________________________________ -POC路径为/Users/jijue/Documents/GitHub/oFx/poc/Apache_Example/RCE/ +POC路径为/Users/jijue/Documents/GitHub/Blen/poc/Apache_Example/RCE/ ``` diff --git a/lib/__init__.pyc b/lib/__init__.pyc index b91f64f..efa223c 100644 Binary files a/lib/__init__.pyc and b/lib/__init__.pyc differ diff --git a/lib/core/__init__.py b/lib/core/__init__.py index a43e11e..176a18f 100644 --- a/lib/core/__init__.py +++ b/lib/core/__init__.py @@ -5,7 +5,7 @@ try: os.path.dirname(os.path.realpath(__file__)) except Exception: err_msg = "your system does not properly handdle non-Ascii path" - err_msg += "please move this ofx's directory to other location" + err_msg += "please move this Blen's directory to other location" exit(err_msg) from lib.core.data import root_path @@ -13,7 +13,7 @@ from lib.core.data import root_path def check_environment(): from lib.core.data import PYVERSION if PYVERSION.split(".")[0] == "2": - err_msg = "oFx does not support python2" + err_msg = "Blen does not support python2" exit(err_msg) check_environment() @@ -21,7 +21,7 @@ check_environment() def oFx_Refuse_Win(): from lib.core.data import IS_WIN if IS_WIN: - err_msg = "oFx does not support windows system, Kali Linux is recommended" + err_msg = "Blen does not support windows system, Kali Linux is recommended" exit(err_msg) # oFx_Refuse_Win() diff --git a/lib/core/__init__.pyc b/lib/core/__init__.pyc index 8c85422..55d82e8 100644 Binary files a/lib/core/__init__.pyc and b/lib/core/__init__.pyc differ diff --git a/lib/core/center.py b/lib/core/center.py index 6dfc1fd..7142efa 100644 --- a/lib/core/center.py +++ b/lib/core/center.py @@ -56,7 +56,7 @@ class oFxCenter(): def setproxy(self): """ - set the proxy for oFx running + set the proxy for Blen running return:None """ diff --git a/lib/core/common.py b/lib/core/common.py index 7907250..36650bf 100644 --- a/lib/core/common.py +++ b/lib/core/common.py @@ -155,7 +155,7 @@ def get_latest_revision(): lv = None cp = configparser.ConfigParser() try: - req = requests.get("https://raw.githubusercontent.com/bigblackhat/oFx/master/info.ini",timeout = 15) + req = requests.get("https://raw.githubusercontent.com/openx-org/BLEN/master/info.ini",timeout = 15) cp.read_string(req.text) lv = cp["info"]["version"] @@ -247,9 +247,9 @@ def run(POC_Class,target,proxy=False,output=True,PocRemain="",Alive_mode = False pass def GetCommand(): - parser = argparse.ArgumentParser(description="oFx framewark of POC test", - usage="python3 ofx.py -f [target_path] / -u [url] -s [poc_path] --thread 50\n\ - python3 ofx.py --fofa-search") + parser = argparse.ArgumentParser(description="Blen framewark of POC test", + usage="python3 Blen.py -f [target_path] / -u [url] -s [poc_path] --thread 50\n\ + python3 Blen.py --fofa-search") searchengine = parser.add_argument_group("SearchEngine") searchengine.add_argument("--fofa-search",action="store_true",help="Fofa Search模式,该参数不需要跟值") diff --git a/lib/core/common.pyc b/lib/core/common.pyc index 2b39869..c992643 100644 Binary files a/lib/core/common.pyc and b/lib/core/common.pyc differ diff --git a/lib/core/htmloutput.py b/lib/core/htmloutput.py index b01b78c..26a99a2 100644 --- a/lib/core/htmloutput.py +++ b/lib/core/htmloutput.py @@ -25,7 +25,7 @@ html=""" - oFx Report + Blen Report -

oFx Report

+

Blen Report



vuln list

@@ -86,7 +86,7 @@ html="""


-

powered by oFx

+

powered by Blen

diff --git a/lib/core/htmloutput.pyc b/lib/core/htmloutput.pyc index bd6e2b7..5553056 100644 Binary files a/lib/core/htmloutput.pyc and b/lib/core/htmloutput.pyc differ diff --git a/lib/core/output.py b/lib/core/output.py index 7c90efd..0003572 100644 --- a/lib/core/output.py +++ b/lib/core/output.py @@ -17,7 +17,7 @@ def Mkdn_output(filename,output_dict,target_list,actual_list,total_time): global doc doc += "
检测报告
\n\n\n\ ```\n\ -oFx :: order by jijue\n\ +Blen :: order by jijue\n\ ```\n\n" doc += "|条目|数值|\n|-|-|\n|预计测试条数|{target_list_length}|\n|实际测试条数|{actual_list_length}|\n|共计耗时|{total_time}秒|\n\n".format(target_list_length = len(target_list),actual_list_length = len(actual_list),total_time = total_time) for poc_name in output_dict: @@ -38,7 +38,7 @@ csv_doc = """ 检测报告,,,,, ,,,,, ,,,,, -oFx :: order by jijue,,,,, +Blen :: order by jijue,,,,, ,,,,, ,,,,, 条目,数值, diff --git a/poc/ACME/File_Read_mini_httpd_CVE_2018_18778/poc.py b/poc/ACME/File_Read_mini_httpd_CVE_2018_18778/poc.py index 8e01efd..6d005fd 100644 --- a/poc/ACME/File_Read_mini_httpd_CVE_2018_18778/poc.py +++ b/poc/ACME/File_Read_mini_httpd_CVE_2018_18778/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "mini_httpd任意文件读取漏洞(CVE-2018-18778)", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "ACME mini_httpd before 1.30", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Alibaba_Druid/Unauth_Access/poc.pyc b/poc/Alibaba_Druid/Unauth_Access/poc.pyc index 40f4172..e220e4e 100644 Binary files a/poc/Alibaba_Druid/Unauth_Access/poc.pyc and b/poc/Alibaba_Druid/Unauth_Access/poc.pyc differ diff --git a/poc/Alibaba_Nacos/Unauth_Access/poc.pyc b/poc/Alibaba_Nacos/Unauth_Access/poc.pyc index 4e85445..241e773 100644 Binary files a/poc/Alibaba_Nacos/Unauth_Access/poc.pyc and b/poc/Alibaba_Nacos/Unauth_Access/poc.pyc differ diff --git a/poc/Apache_Mod_jk/ACbypass_CVE_2018_11759/poc.py b/poc/Apache_Mod_jk/ACbypass_CVE_2018_11759/poc.py index 6af5175..cc8b8b8 100644 --- a/poc/Apache_Mod_jk/ACbypass_CVE_2018_11759/poc.py +++ b/poc/Apache_Mod_jk/ACbypass_CVE_2018_11759/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Apache Mod_jk 访问控制权限绕过(CVE-2018-11759)", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Apache Mod_jk", # 漏洞应用名称 "AppVersion" : "Apache Mod_jk Connector 1.2.0 ~ 1.2.44", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Apache_Solr/File_Read/poc.py b/poc/Apache_Solr/File_Read/poc.py index 44ac91f..d35d09a 100644 --- a/poc/Apache_Solr/File_Read/poc.py +++ b/poc/Apache_Solr/File_Read/poc.py @@ -21,7 +21,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Apache Solr 任意文件读取漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Apache Solr", # 漏洞应用名称 "AppVersion" : "Apache Solr <= 8.8.1", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/BSPHP/Info_Disclosure/poc.py b/poc/BSPHP/Info_Disclosure/poc.py index a0f8b9b..20c434a 100644 --- a/poc/BSPHP/Info_Disclosure/poc.py +++ b/poc/BSPHP/Info_Disclosure/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "BSPHP 未授权访问 信息泄露漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "BSPHP", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Bithighway_碧海威/Weak_Pass_L7/poc.py b/poc/Bithighway_碧海威/Weak_Pass_L7/poc.py index fda7ba5..47b317a 100644 --- a/poc/Bithighway_碧海威/Weak_Pass_L7/poc.py +++ b/poc/Bithighway_碧海威/Weak_Pass_L7/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "碧海威 L7 弱口令漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "碧海威 L7", # 漏洞应用名称 "AppVersion" : "None", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/China_Mobile_中国移动/Info_Disclosure_Yu_routing_ExportSettings/poc.py b/poc/China_Mobile_中国移动/Info_Disclosure_Yu_routing_ExportSettings/poc.py index 9e62291..899d06b 100644 --- a/poc/China_Mobile_中国移动/Info_Disclosure_Yu_routing_ExportSettings/poc.py +++ b/poc/China_Mobile_中国移动/Info_Disclosure_Yu_routing_ExportSettings/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "中国移动 禹路由 ExportSettings.sh 敏感信息泄露漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "中国移动 禹路由", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/China_TeleCOM_中国电信/RCE_F460_GateWay/poc.py b/poc/China_TeleCOM_中国电信/RCE_F460_GateWay/poc.py index 28362b5..45dd5f1 100644 --- a/poc/China_TeleCOM_中国电信/RCE_F460_GateWay/poc.py +++ b/poc/China_TeleCOM_中国电信/RCE_F460_GateWay/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "电信天翼网关F460 web_shell_cmd.gch 远程命令执行漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "电信天翼网关F460", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2014-03-03", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Confluence/OGNL_Injection_CVE_2021_26084/poc.py b/poc/Confluence/OGNL_Injection_CVE_2021_26084/poc.py index 4605c61..f005b6b 100644 --- a/poc/Confluence/OGNL_Injection_CVE_2021_26084/poc.py +++ b/poc/Confluence/OGNL_Injection_CVE_2021_26084/poc.py @@ -53,7 +53,7 @@ class POC(POCBase): """ vuln = [False,""] url = self.target + "/pages/createpage-entervariables.action?SpaceKey=x" # url自己按需调整 - data = "queryString=ofx\\u0027%2b#{6*666}%2b\\u0027" + data = "queryString=Blen\\u0027%2b#{6*666}%2b\\u0027" headers = {"User-Agent":get_random_ua(), "Connection":"close", @@ -65,7 +65,7 @@ class POC(POCBase): 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 """ req = requests.post(url,data=data,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) - if "ofx{3996=null}" in req.text: + if "Blen{3996=null}" in req.text: vuln = [True,req.text] else: vuln = [False,req.text] diff --git a/poc/Coremail/Conf_Info_Disclosure/poc.py b/poc/Coremail/Conf_Info_Disclosure/poc.py index 0663f4b..fb7ea6b 100644 --- a/poc/Coremail/Conf_Info_Disclosure/poc.py +++ b/poc/Coremail/Conf_Info_Disclosure/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Coremail 配置信息泄露漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Coremail", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/CtCMS_赤兔CMS/Get_Banner/poc.py b/poc/CtCMS_赤兔CMS/Get_Banner/poc.py index c04ba3e..840540d 100644 --- a/poc/CtCMS_赤兔CMS/Get_Banner/poc.py +++ b/poc/CtCMS_赤兔CMS/Get_Banner/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "赤兔CMS banner识别插件", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "赤兔CMS", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/D_Link/RCE_ShareCenter_system_mgr_cgi/poc.py b/poc/D_Link/RCE_ShareCenter_system_mgr_cgi/poc.py index 8fa7c22..0942745 100644 --- a/poc/D_Link/RCE_ShareCenter_system_mgr_cgi/poc.py +++ b/poc/D_Link/RCE_ShareCenter_system_mgr_cgi/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "D-Link ShareCenter DNS-320 system_mgr.cgi 远程命令执行漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "D-Link ShareCenter DNS-320", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/D_Link/Weak_Pass_AC_Manager/poc.py b/poc/D_Link/Weak_Pass_AC_Manager/poc.py index d36937d..7ec186c 100644 --- a/poc/D_Link/Weak_Pass_AC_Manager/poc.py +++ b/poc/D_Link/Weak_Pass_AC_Manager/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "D-Link AC管理系统默认账号密码", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "D-Link AC管理系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/DedeCMS_织梦/RadminPass/poc.py b/poc/DedeCMS_织梦/RadminPass/poc.py index ed21a1f..5ab6e97 100644 --- a/poc/DedeCMS_织梦/RadminPass/poc.py +++ b/poc/DedeCMS_织梦/RadminPass/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "radminpass.php文件暴露", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "dedecms", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/DocCMS/SQLi_keyword/poc.py b/poc/DocCMS/SQLi_keyword/poc.py index 54d3d18..fe4ff61 100644 --- a/poc/DocCMS/SQLi_keyword/poc.py +++ b/poc/DocCMS/SQLi_keyword/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "DocCMS keyword SQL注入漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "DocCMS", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/FLIR_菲力尔/Download_File_AX8/poc.py b/poc/FLIR_菲力尔/Download_File_AX8/poc.py index 32a996a..3269b2e 100644 --- a/poc/FLIR_菲力尔/Download_File_AX8/poc.py +++ b/poc/FLIR_菲力尔/Download_File_AX8/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "FLIR-AX8 download.php 任意文件下载", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "FLIR-AX8", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/H2_DataBase/UnAuth_Access/poc.py b/poc/H2_DataBase/UnAuth_Access/poc.py index 3e05b91..aeb1c32 100644 --- a/poc/H2_DataBase/UnAuth_Access/poc.py +++ b/poc/H2_DataBase/UnAuth_Access/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "H2 数据库 Web控制台未授权访问", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "H2 数据库", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/H3C/File_Download_SecPath_WAF/poc.py b/poc/H3C/File_Download_SecPath_WAF/poc.py index ec7565a..4eccc77 100644 --- a/poc/H3C/File_Download_SecPath_WAF/poc.py +++ b/poc/H3C/File_Download_SecPath_WAF/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "H3C SecPath 下一代防火墙 任意文件下载漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "H3C SecPath 下一代防火墙", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/HIKVISION/File_Down_Gateway_downFile_php/poc.py b/poc/HIKVISION/File_Down_Gateway_downFile_php/poc.py index 90c61a9..b04db0c 100644 --- a/poc/HIKVISION/File_Down_Gateway_downFile_php/poc.py +++ b/poc/HIKVISION/File_Down_Gateway_downFile_php/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "HIKVISION 视频编码设备接入网关 任意文件下载", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "海康威视视频接入网关系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/HIKVISION/Weak_Pass_Stream_Media_Manager/poc.py b/poc/HIKVISION/Weak_Pass_Stream_Media_Manager/poc.py index de772eb..f91693b 100644 --- a/poc/HIKVISION/Weak_Pass_Stream_Media_Manager/poc.py +++ b/poc/HIKVISION/Weak_Pass_Stream_Media_Manager/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "HIKVISION 流媒体管理服务器弱口令", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "HIKVISION 流媒体管理服务器", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/HST_好视通/File_Download/poc.py b/poc/HST_好视通/File_Download/poc.py index cf6e603..05f8662 100644 --- a/poc/HST_好视通/File_Download/poc.py +++ b/poc/HST_好视通/File_Download/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "好视通视频会议平台 任意文件下载", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "好视通视频会议平台", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Huawei/File_Read_HG659_lib/poc.py b/poc/Huawei/File_Read_HG659_lib/poc.py index 28938e5..30a0d26 100644 --- a/poc/Huawei/File_Read_HG659_lib/poc.py +++ b/poc/Huawei/File_Read_HG659_lib/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Huawei HG659 lib 任意文件读取漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Huawei HG659", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/HuiWen_汇文/Weak_Pass/poc.py b/poc/HuiWen_汇文/Weak_Pass/poc.py index 3a260b3..81d6cfb 100644 --- a/poc/HuiWen_汇文/Weak_Pass/poc.py +++ b/poc/HuiWen_汇文/Weak_Pass/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "汇文OPAC弱口令", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "汇文OPAC", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Jetty/FingerPrint/poc.py b/poc/Jetty/FingerPrint/poc.py index 541d1b0..d890545 100644 --- a/poc/Jetty/FingerPrint/poc.py +++ b/poc/Jetty/FingerPrint/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Jetty指纹识别", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Jetty", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Jetty/Info_Disclosure_CVE_2021_28164/poc.py b/poc/Jetty/Info_Disclosure_CVE_2021_28164/poc.py index 1e96166..2d99681 100644 --- a/poc/Jetty/Info_Disclosure_CVE_2021_28164/poc.py +++ b/poc/Jetty/Info_Disclosure_CVE_2021_28164/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Jetty WEB-INF 敏感信息泄露漏洞(CVE-2021-28164)", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Jinher_金和OA/File_Read_download_jsp/poc.py b/poc/Jinher_金和OA/File_Read_download_jsp/poc.py index 24d55be..cb16056 100644 --- a/poc/Jinher_金和OA/File_Read_download_jsp/poc.py +++ b/poc/Jinher_金和OA/File_Read_download_jsp/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "金和OA C6 download.jsp 任意文件读取漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/KEDACOM_数字系统接入网关/File_Read/poc.py b/poc/KEDACOM_数字系统接入网关/File_Read/poc.py index a524753..0bd9ee7 100644 --- a/poc/KEDACOM_数字系统接入网关/File_Read/poc.py +++ b/poc/KEDACOM_数字系统接入网关/File_Read/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "KEDACOM 数字系统接入网关 任意文件读取漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "KEDACOM 数字系统接入网关", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Kingdee_金蝶/Dir_List_server_file/poc.py b/poc/Kingdee_金蝶/Dir_List_server_file/poc.py index 1660553..4adef13 100644 --- a/poc/Kingdee_金蝶/Dir_List_server_file/poc.py +++ b/poc/Kingdee_金蝶/Dir_List_server_file/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "金蝶OA server_file 目录遍历漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "金蝶OA", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/LiPu_利谱第二代防火墙/Info_Disclosure/poc.py b/poc/LiPu_利谱第二代防火墙/Info_Disclosure/poc.py index abee199..a5b1b0b 100644 --- a/poc/LiPu_利谱第二代防火墙/Info_Disclosure/poc.py +++ b/poc/LiPu_利谱第二代防火墙/Info_Disclosure/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "利谱第二代防火墙存在信息泄露漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "利谱第二代防火墙", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/MaiPu_迈普/File_Download_webui/poc.py b/poc/MaiPu_迈普/File_Download_webui/poc.py index ce17d7e..f7967d6 100644 --- a/poc/MaiPu_迈普/File_Download_webui/poc.py +++ b/poc/MaiPu_迈普/File_Download_webui/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "迈普 ISG1000安全网关 任意文件下载漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "迈普 ISG1000安全网关", # 漏洞应用名称 "AppVersion" : "None", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/MailGard_佑友/RCE_ping_FireWall/poc.py b/poc/MailGard_佑友/RCE_ping_FireWall/poc.py index 2f6cff2..e8c57af 100644 --- a/poc/MailGard_佑友/RCE_ping_FireWall/poc.py +++ b/poc/MailGard_佑友/RCE_ping_FireWall/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "佑友防火墙 后台命令执行漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "佑友防火墙", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/MailGard_佑友/Weak_Pass_FireWall/poc.py b/poc/MailGard_佑友/Weak_Pass_FireWall/poc.py index ad7cfbb..20383ba 100644 --- a/poc/MailGard_佑友/Weak_Pass_FireWall/poc.py +++ b/poc/MailGard_佑友/Weak_Pass_FireWall/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "佑友防火墙 弱口令", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "佑友防火墙", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/NetPower_中科网威/UPInfo_DisClosure_Firewall/poc.py b/poc/NetPower_中科网威/UPInfo_DisClosure_Firewall/poc.py index 65bddd0..8274040 100644 --- a/poc/NetPower_中科网威/UPInfo_DisClosure_Firewall/poc.py +++ b/poc/NetPower_中科网威/UPInfo_DisClosure_Firewall/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "中科网威 下一代防火墙控制系统 账号密码泄露漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "中科网威 下一代防火墙控制系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/PHPStudy/Back_Door/poc.py b/poc/PHPStudy/Back_Door/poc.py index fb7408c..6160207 100644 --- a/poc/PHPStudy/Back_Door/poc.py +++ b/poc/PHPStudy/Back_Door/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "PHPStudy 后门检测", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "phpstudy", # 漏洞应用名称 "AppVersion" : "phpStudy2016和phpStudy2018自带的php-5.2.17、php-5.4.45", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Ruijie_锐捷/Dir_List_Cloud_ClassRoom/poc.py b/poc/Ruijie_锐捷/Dir_List_Cloud_ClassRoom/poc.py index 467d133..7780c58 100644 --- a/poc/Ruijie_锐捷/Dir_List_Cloud_ClassRoom/poc.py +++ b/poc/Ruijie_锐捷/Dir_List_Cloud_ClassRoom/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "锐捷云课堂主机 目录遍历漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "锐捷云课堂", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Ruijie_锐捷/File_Read_EG_userAuth/poc.py b/poc/Ruijie_锐捷/File_Read_EG_userAuth/poc.py index d6e9b3b..4441b2c 100644 --- a/poc/Ruijie_锐捷/File_Read_EG_userAuth/poc.py +++ b/poc/Ruijie_锐捷/File_Read_EG_userAuth/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "锐捷EG网关 userAuth.php存在任意文件读取漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "锐捷EG网关", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Ruijie_锐捷/RCE_NBR_1300G/poc.py b/poc/Ruijie_锐捷/RCE_NBR_1300G/poc.py index 4759da0..4cf1f94 100644 --- a/poc/Ruijie_锐捷/RCE_NBR_1300G/poc.py +++ b/poc/Ruijie_锐捷/RCE_NBR_1300G/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "锐捷NBR 1300G 路由器 越权CLI命令执行漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "锐捷NBRNBR1300G 路由器", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Ruijie_锐捷/RCE_SmartWeb_WEB_VMS/poc.py b/poc/Ruijie_锐捷/RCE_SmartWeb_WEB_VMS/poc.py index e9703fd..e068eb9 100644 --- a/poc/Ruijie_锐捷/RCE_SmartWeb_WEB_VMS/poc.py +++ b/poc/Ruijie_锐捷/RCE_SmartWeb_WEB_VMS/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "锐捷Smartweb管理系统 默认账户➕命令执行漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "锐捷网络股份有限公司 无线smartweb管理系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/RuoYi_若依/Weak_Pass/poc.py b/poc/RuoYi_若依/Weak_Pass/poc.py index fe79766..236abf9 100644 --- a/poc/RuoYi_若依/Weak_Pass/poc.py +++ b/poc/RuoYi_若依/Weak_Pass/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "若依后台管理系统 弱口令", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "若依后台管理系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Samsung/RCE_Samsung_WLANAP_WEA453e/poc.py b/poc/Samsung/RCE_Samsung_WLANAP_WEA453e/poc.py index 23e7ed3..d2ad2fd 100644 --- a/poc/Samsung/RCE_Samsung_WLANAP_WEA453e/poc.py +++ b/poc/Samsung/RCE_Samsung_WLANAP_WEA453e/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "三星 WLAN AP WEA453e路由器 远程命令执行漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "三星 WLAN AP WEA453e路由器", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/SeeYon_致远/File_Upload_ajax_do/poc.py b/poc/SeeYon_致远/File_Upload_ajax_do/poc.py index 7567e3b..c4dbcc9 100644 --- a/poc/SeeYon_致远/File_Upload_ajax_do/poc.py +++ b/poc/SeeYon_致远/File_Upload_ajax_do/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "致远OA ajax.do 任意文件上传", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "致远OA", # 漏洞应用名称 "AppVersion" : """ 致远OA V8.0 diff --git a/poc/ShiZiYu_狮子鱼/Sqli_ApiController/poc.py b/poc/ShiZiYu_狮子鱼/Sqli_ApiController/poc.py index d181d4c..db8b0e8 100644 --- a/poc/ShiZiYu_狮子鱼/Sqli_ApiController/poc.py +++ b/poc/ShiZiYu_狮子鱼/Sqli_ApiController/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "狮子鱼CMS ApiController.class.php SQL注入漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "狮子鱼CMS", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/ShiZiYu_狮子鱼/Sqli_ApigoodsController/poc.py b/poc/ShiZiYu_狮子鱼/Sqli_ApigoodsController/poc.py index e50c95c..828c4fd 100644 --- a/poc/ShiZiYu_狮子鱼/Sqli_ApigoodsController/poc.py +++ b/poc/ShiZiYu_狮子鱼/Sqli_ApigoodsController/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "狮子鱼CMS ApigoodsController.class.php SQL注入漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "狮子鱼CMS", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/SonicWall_SSL_VPN/RCE_jarrewrite/poc.py b/poc/SonicWall_SSL_VPN/RCE_jarrewrite/poc.py index da4ed88..4846283 100644 --- a/poc/SonicWall_SSL_VPN/RCE_jarrewrite/poc.py +++ b/poc/SonicWall_SSL_VPN/RCE_jarrewrite/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "SonicWall SSL-VPN 远程命令执行漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "SonicWall SSL-VPN", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/TCC_斗象/Weak_Pass_ARL/poc.py b/poc/TCC_斗象/Weak_Pass_ARL/poc.py index b1dbfec..8aa0353 100644 --- a/poc/TCC_斗象/Weak_Pass_ARL/poc.py +++ b/poc/TCC_斗象/Weak_Pass_ARL/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "斗象资产灯塔系统(ARL) 弱口令检测", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/TVT_同为股份/Dir_Traversal_NVMS_1000/poc.py b/poc/TVT_同为股份/Dir_Traversal_NVMS_1000/poc.py index fa82607..99ccec7 100644 --- a/poc/TVT_同为股份/Dir_Traversal_NVMS_1000/poc.py +++ b/poc/TVT_同为股份/Dir_Traversal_NVMS_1000/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "TVT数码科技 NVMS-1000 路径遍历漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "NVMS-1000", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/TamronOS_IPTV/Info_Disclosure/poc.py b/poc/TamronOS_IPTV/Info_Disclosure/poc.py index 4215c17..a65599c 100644 --- a/poc/TamronOS_IPTV/Info_Disclosure/poc.py +++ b/poc/TamronOS_IPTV/Info_Disclosure/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "TamronOS IPTV系统 后台配置敏感信息", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "TamronOS IPTV系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/TamronOS_IPTV/RCE_api_ping/poc.py b/poc/TamronOS_IPTV/RCE_api_ping/poc.py index f043265..eba2a7f 100644 --- a/poc/TamronOS_IPTV/RCE_api_ping/poc.py +++ b/poc/TamronOS_IPTV/RCE_api_ping/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "TamronOS IPTV系统存在前台命令执行漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "TamronOS IPTV系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/TamronOS_IPTV/User_Add_Submit/poc.py b/poc/TamronOS_IPTV/User_Add_Submit/poc.py index 71d34fc..e1b546c 100644 --- a/poc/TamronOS_IPTV/User_Add_Submit/poc.py +++ b/poc/TamronOS_IPTV/User_Add_Submit/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "TamronOS IPTV系统 submit 任意用户创建漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "TamronOS IPTV系统", # 漏洞应用名称 "AppVersion" : "None", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Thinkphp/RCE_5022_5129/poc.py b/poc/Thinkphp/RCE_5022_5129/poc.py index 193256f..c343be7 100644 --- a/poc/Thinkphp/RCE_5022_5129/poc.py +++ b/poc/Thinkphp/RCE_5022_5129/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "ThinkPHP5 5.0.22/5.1.29 远程代码执行漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "ThinkPHP5", # 漏洞应用名称 "AppVersion" : "ThinkPHP5 5.0.22/5.1.29", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Thinkphp/RCE_5023/poc.py b/poc/Thinkphp/RCE_5023/poc.py index 7624189..f4229f5 100644 --- a/poc/Thinkphp/RCE_5023/poc.py +++ b/poc/Thinkphp/RCE_5023/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "ThinkPHP5 5.0.23 远程代码执行漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "ThinkPHP5", # 漏洞应用名称 "AppVersion" : "ThinkPHP5 <= 5.0.23", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/UTT_艾泰科技/WeakPass_Net_Manager_System/poc.py b/poc/UTT_艾泰科技/WeakPass_Net_Manager_System/poc.py index 0d7e4ab..d606918 100644 --- a/poc/UTT_艾泰科技/WeakPass_Net_Manager_System/poc.py +++ b/poc/UTT_艾泰科技/WeakPass_Net_Manager_System/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "艾泰网络管理系统弱口令", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "艾泰网络管理系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Venustech_启明星辰/SQLi_Reportguide/poc.py b/poc/Venustech_启明星辰/SQLi_Reportguide/poc.py index 541b37c..ee0477b 100644 --- a/poc/Venustech_启明星辰/SQLi_Reportguide/poc.py +++ b/poc/Venustech_启明星辰/SQLi_Reportguide/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "天玥运维网关/网御网络审计 Sql注入漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : """ 天玥运维安全网关V6.0 diff --git a/poc/Weaver_泛微OA/Config_Info_Disclosure_DBconfigReader/poc.py b/poc/Weaver_泛微OA/Config_Info_Disclosure_DBconfigReader/poc.py index 574648a..80250d6 100644 --- a/poc/Weaver_泛微OA/Config_Info_Disclosure_DBconfigReader/poc.py +++ b/poc/Weaver_泛微OA/Config_Info_Disclosure_DBconfigReader/poc.py @@ -22,7 +22,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微 e-cology OA 数据库配置信息泄露漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微 e-cology", # 漏洞应用名称 "AppVersion" : "目前已知为8.100.0531,不排除其他版本,包括不限于EC7.0、EC8.0", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/File_Read_E_Bridge/poc.py b/poc/Weaver_泛微OA/File_Read_E_Bridge/poc.py index a84702e..7ae0ab4 100644 --- a/poc/Weaver_泛微OA/File_Read_E_Bridge/poc.py +++ b/poc/Weaver_泛微OA/File_Read_E_Bridge/poc.py @@ -20,7 +20,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微云桥 e-Bridge 任意文件读取漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微云桥 e-Bridge", # 漏洞应用名称 "AppVersion" : "泛微云桥 e-Bridge 2018-2019 多个版本", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/File_Upload_E_Office_V9_CNVD_2021_49104/poc.py b/poc/Weaver_泛微OA/File_Upload_E_Office_V9_CNVD_2021_49104/poc.py index b819bc3..78caf79 100644 --- a/poc/Weaver_泛微OA/File_Upload_E_Office_V9_CNVD_2021_49104/poc.py +++ b/poc/Weaver_泛微OA/File_Upload_E_Office_V9_CNVD_2021_49104/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微OA E-Office V9文件上传漏洞(CNVD-2021-49104)", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微OA E-Office", # 漏洞应用名称 "AppVersion" : "E-Office V9", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/File_Upload_V9_uploadOperation/poc.py b/poc/Weaver_泛微OA/File_Upload_V9_uploadOperation/poc.py index e2a1c3d..c671f5f 100644 --- a/poc/Weaver_泛微OA/File_Upload_V9_uploadOperation/poc.py +++ b/poc/Weaver_泛微OA/File_Upload_V9_uploadOperation/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微V9 前台文件上传漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微V9", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/Log_Disclosure/poc.py b/poc/Weaver_泛微OA/Log_Disclosure/poc.py index 4f7e82f..27797cc 100644 --- a/poc/Weaver_泛微OA/Log_Disclosure/poc.py +++ b/poc/Weaver_泛微OA/Log_Disclosure/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微OA 日志泄露", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微oa", # 漏洞应用名称 "AppVersion" : "未知", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/RCE_Beanshell/poc.py b/poc/Weaver_泛微OA/RCE_Beanshell/poc.py index f32ea04..d6e7fd0 100644 --- a/poc/Weaver_泛微OA/RCE_Beanshell/poc.py +++ b/poc/Weaver_泛微OA/RCE_Beanshell/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微OA Beanshell 远程代码执行漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微e-cology OA系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/Sql_Inj_E_cology_WorkflowCenterTreeData/poc.py b/poc/Weaver_泛微OA/Sql_Inj_E_cology_WorkflowCenterTreeData/poc.py index e42bdbf..be5b119 100644 --- a/poc/Weaver_泛微OA/Sql_Inj_E_cology_WorkflowCenterTreeData/poc.py +++ b/poc/Weaver_泛微OA/Sql_Inj_E_cology_WorkflowCenterTreeData/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微 E-cology WorkflowCenterTreeData.jsp文件 前台SQL注入漏洞", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微 e-cology OA 系统", # 漏洞应用名称 "AppVersion" : "使用oracle数据库的泛微 e-cology OA 系统", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Zentao_禅道/Getshell_test/poc.py b/poc/Zentao_禅道/Getshell_test/poc.py index cc938be..0e8fb44 100644 --- a/poc/Zentao_禅道/Getshell_test/poc.py +++ b/poc/Zentao_禅道/Getshell_test/poc.py @@ -21,7 +21,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "禅道8.2-9.2.1注入GetShell", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "禅道", # 漏洞应用名称 "AppVersion" : "禅道8.9-9.2.1", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Zyxel/Login_Pass_NBG2105/poc.py b/poc/Zyxel/Login_Pass_NBG2105/poc.py index 9363217..bee4057 100644 --- a/poc/Zyxel/Login_Pass_NBG2105/poc.py +++ b/poc/Zyxel/Login_Pass_NBG2105/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Zyxel NBG2105身份验证绕过", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Zyxel NBG2105", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/common/Apache_Dir_List/poc.py b/poc/common/Apache_Dir_List/poc.py index 06bbd22..089c3ad 100644 --- a/poc/common/Apache_Dir_List/poc.py +++ b/poc/common/Apache_Dir_List/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Apache列目录", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/common/Git_Info_Disclosure/poc.pyc b/poc/common/Git_Info_Disclosure/poc.pyc index 0c45933..7e9f52e 100644 Binary files a/poc/common/Git_Info_Disclosure/poc.pyc and b/poc/common/Git_Info_Disclosure/poc.pyc differ diff --git a/poc/common/Svn_Info_Disclosure/poc.pyc b/poc/common/Svn_Info_Disclosure/poc.pyc index 04401dd..087cc58 100644 Binary files a/poc/common/Svn_Info_Disclosure/poc.pyc and b/poc/common/Svn_Info_Disclosure/poc.pyc differ diff --git a/poc/common/Url_Alive/poc.pyc b/poc/common/Url_Alive/poc.pyc index 53d68f5..dc6f7d4 100644 Binary files a/poc/common/Url_Alive/poc.pyc and b/poc/common/Url_Alive/poc.pyc differ diff --git a/poc/demo/demo/poc.py b/poc/demo/demo/poc.py index 02ac1ec..5b8220d 100644 --- a/poc/demo/demo/poc.py +++ b/poc/demo/demo/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Demo", # 漏洞名称 - "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/jellyfin/File_Read_CVE_2021_21402/poc.pyc b/poc/jellyfin/File_Read_CVE_2021_21402/poc.pyc index fd50364..7f5cb0f 100644 Binary files a/poc/jellyfin/File_Read_CVE_2021_21402/poc.pyc and b/poc/jellyfin/File_Read_CVE_2021_21402/poc.pyc differ diff --git a/poc/php/Backdoor_v8dev/poc.pyc b/poc/php/Backdoor_v8dev/poc.pyc index 22d0293..f315c1f 100644 Binary files a/poc/php/Backdoor_v8dev/poc.pyc and b/poc/php/Backdoor_v8dev/poc.pyc differ