# PocList **Repository Path**: aaaasec/PocList ## Basic Information - **Project Name**: PocList - **Description**: Alibaba-Nacos-Unauthorized/ApacheDruid-RCE_CVE-2021-25646/MS-Exchange-SSRF-CVE-2021-26885/Oracle-WebLogic-CVE-2021-2109_RCE/RG-CNVD-2021-14536/RJ-SSL-VPN-UltraVires/Redis-Unauthorized-RCE/TDOA-V11.7-GetOnlineCookie/VMware-vCenter-GetAnyFile/yongyou-GRP-U8-XXE/Oracle-WebLogic-CVE-2020-14883/Oracle-WebLogic-CVE-2020-14882/Apache-Solr-GetAnyFile/F5-BIG-IP-CVE-2021-22986/Sonicwall-SSL-VPN-RCE/GitLab-Graphql-CNVD-2021-14193/D-Link-DCS-CVE-2020-25078/WLAN-AP-WEA453e-RCE/360TianQing-Unauthorized/360TianQing-SQLinjection/FanWeiOA-V8-SQLinjection/QiZhiBaoLeiJi-AnyUserLogin/QiAnXin-WangKangFirewall-RCE/金山-V8-终端安全系统/NCCloud-SQLinjection/ShowDoc-RCE - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 4 - **Created**: 2022-08-19 - **Last Updated**: 2022-08-19 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ## 请使用JDK10或以上版本 ## 编写的POC #### Alibaba-Nacos-Unauthorized
#### ApacheDruid-RCE_CVE-2021-25646
#### MS-Exchange-SSRF-CVE-2021-26885
#### Oracle-WebLogic-CVE-2021-2109_RCE
#### RG-CNVD-2021-14536
#### RJ-SSL-VPN-UltraVires
#### Redis-Unauthorized-RCE
#### TDOA-V11.7-GetOnlineCookie
#### VMware-vCenter-GetAnyFile
#### yongyou-GRP-U8-XXE
#### Oracle-WebLogic-CVE-2020-14883
#### Oracle-WebLogic-CVE-2020-14882
#### Apache-Solr-GetAnyFile
#### F5-BIG-IP-CVE-2021-22986
#### Sonicwall-SSL-VPN-RCE
#### GitLab-Graphql-CNVD-2021-14193
#### D-Link-DCS-CVE-2020-25078
#### WLAN-AP-WEA453e-RCE
#### 360TianQing-Unauthorized
#### 360TianQing-SQLinjection
#### FanWeiOA-V8-SQLinjection
#### QiZhiBaoLeiJi-AnyUserLogin
#### QiAnXin-WangKangFirewall-RCE
#### 金山-V8-终端安全系统RCE
#### NCCloud-SQLinjection
#### ShowDoc-RCE
# [雁不过衡阳的PocList](https://github.com/Yang0615777/PocList) ## 关于POC
这里会把作者在各种环境中遇到的繁琐漏洞简化为POC工具,以便在后续中轻松发现与利用
![hdImg_1b0ab579408b4131cc236bb3cdfa67de16154477928](https://user-images.githubusercontent.com/52184829/110867549-e8456500-8301-11eb-90aa-19429f07ac58.jpg) ## 作者微信
![mmqrcode1615447892452](https://user-images.githubusercontent.com/52184829/110867567-ef6c7300-8301-11eb-8fb9-a55274c820c9.png) ## 关于使用 ### 1.将收集到的地址放入txt文件,每行一个. ![image](https://user-images.githubusercontent.com/52184829/111638853-b2d6d500-8835-11eb-8db8-a59e948baef5.png)
### 2.java -jar xx.jar
![image](https://user-images.githubusercontent.com/52184829/111639477-43151a00-8836-11eb-97ee-b85f3f7f60e5.png)
### 3.输入存放url的绝对路径 ![image](https://user-images.githubusercontent.com/52184829/111639687-6e980480-8836-11eb-9f68-2b9d7603fc1a.png)
### 4.所有的POC都如此做即可 ## 免责声明 此处提供的所有工具仅供授权状态下使用,如发生刑事案件,非授权攻击行为于本人无关.望大家熟知《网络安全法》. ## 感谢⭐ 最后别忘了给一些小星星,你的星星是我前进的动力.
![u=3200983364,1634494944 fm=26 gp=0](https://user-images.githubusercontent.com/52184829/110867728-3490a500-8302-11eb-9d08-df4c6a56b8bd.jpg)