export const DATA = {
  g_site_id: '616413867dc93b06853eb07f',
  kscan_event_list: [
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441823,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u914d\u7f6e\u98ce\u9669',
        display_name: '\u4f1a\u8bddCookie\u4e2d\u7f3a\u5c11HttpOnly\u5c5e\u6027',
        name: 'cookie_without_httponly',
        url: 'http://10.0.8.151:32853/',
        affects: 'http://10.0.8.151:32853/',
        detail:
          '\u53d1\u73b0\u4f1a\u8bddcookie\u4e2d\u7f3a\u5c11HttpOnly\u5c5e\u6027\u3002 Cookie \u540d\u79f0:PHPSESSID',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'cookie_without_httponly',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441824,
      user_id: 2,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: null,
        extra_detail:
          "\u53d1\u73b0 Apache Solr dataimport RCE \u6f0f\u6d1e(CVE-2019-0193)\uff0cURI:'http://10.0.8.151:8983/solr/test/dataimport' ",
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4ee3\u7801\u6267\u884c',
        display_name: 'Apache Solr dataimport RCE \u6f0f\u6d1e(CVE-2019-0193)',
        name: 'solr_dataimport_rce_cve_2019_0193',
        url: 'http://10.0.8.151:8983/solr/test/dataimport',
        affects: 'http://10.0.8.151:8983/solr/test/dataimport',
        detail:
          "\u53d1\u73b0 Apache Solr dataimport RCE \u6f0f\u6d1e(CVE-2019-0193)\uff0cURI:'http://10.0.8.151:8983/solr/test/dataimport' ",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'solr_dataimport_rce_cve_2019_0193',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441825,
      user_id: 3,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u6587\u4ef6\u4e0a\u4f20',
        display_name: '\u53d1\u73b0\u6587\u4ef6\u4e0a\u4f20',
        name: 'file_upload',
        url: 'http://10.0.8.151:32853/vul/unsafeupload/clientcheck.php',
        affects: 'http://10.0.8.151:32853/vul/unsafeupload/clientcheck.php',
        detail:
          "\u53d1\u73b0\u6587\u4ef6\u4e0a\u4f20 url:'http://10.0.8.151:32853/vul/unsafeupload/clientcheck.php' \u53c2\u6570: uploadfile \u5f15\u7528\u9875\u9762:'http://10.0.8.151:32853/vul/unsafeupload/clientcheck.php'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'file_upload',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441826,
      user_id: 4,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u6587\u4ef6\u4e0a\u4f20',
        display_name: '\u53d1\u73b0\u6587\u4ef6\u4e0a\u4f20',
        name: 'file_upload',
        url: 'http://10.0.8.151:32853/vul/unsafeupload/servercheck.php',
        affects: 'http://10.0.8.151:32853/vul/unsafeupload/servercheck.php',
        detail:
          "\u53d1\u73b0\u6587\u4ef6\u4e0a\u4f20 url:'http://10.0.8.151:32853/vul/unsafeupload/servercheck.php' \u53c2\u6570: uploadfile \u5f15\u7528\u9875\u9762:'http://10.0.8.151:32853/vul/unsafeupload/servercheck.php'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'file_upload',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441827,
      user_id: 5,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u6587\u4ef6\u4e0a\u4f20',
        display_name: '\u53d1\u73b0\u6587\u4ef6\u4e0a\u4f20',
        name: 'file_upload',
        url: 'http://10.0.8.151:32853/vul/unsafeupload/getimagesize.php',
        affects: 'http://10.0.8.151:32853/vul/unsafeupload/getimagesize.php',
        detail:
          "\u53d1\u73b0\u6587\u4ef6\u4e0a\u4f20 url:'http://10.0.8.151:32853/vul/unsafeupload/getimagesize.php' \u53c2\u6570: uploadfile \u5f15\u7528\u9875\u9762:'http://10.0.8.151:32853/vul/unsafeupload/getimagesize.php'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'file_upload',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441828,
      user_id: 6,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u914d\u7f6e\u98ce\u9669',
        display_name: 'HTTP \u660e\u6587\u4f20\u8f93',
        name: 'http_transmission',
        url: 'http://10.0.8.151:32853/',
        affects: 'http://10.0.8.151:32853/',
        detail: '\u53d1\u73b0 HTTP \u4f20\u8f93\uff0c\u9a8c\u8bc1 URL: http://10.0.8.151:32853/',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'http_transmission',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441829,
      user_id: 7,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name:
          '\u9519\u8bef\u9875\u9762Web\u5e94\u7528\u670d\u52a1\u5668\u7248\u672c\u6cc4\u9732',
        name: 'error_page_web_server_version_disclosure',
        url: 'http://10.0.8.151:32853/xYMzgcxCtL',
        affects: 'http://10.0.8.151:32853/xYMzgcxCtL',
        detail:
          '\u53d1\u73b0\u9519\u8bef\u9875\u9762Web\u670d\u52a1\u5668\u7248\u672c\u6cc4\u6f0f: Apache/2.4.29 (Ubuntu) Server at 10.0.8.151 Port 32853',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'error_page_web_server_version_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441830,
      user_id: 8,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u914d\u7f6e\u98ce\u9669',
        display_name: 'X-Frame-Options Header\u672a\u914d\u7f6e',
        name: 'clickjacking_x_frame_options',
        url: 'http://10.0.8.151:32853/',
        affects: 'http://10.0.8.151:32853/',
        detail:
          '\u53d1\u73b0\u9632\u6b62\u70b9\u51fb\u52ab\u6301\u7684http\u5934\u90e8 `X-Frame-Options` \u7f3a\u5931',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'clickjacking_x_frame_options',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441831,
      user_id: 8,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u8868\u5355\u5f31\u53e3\u4ee4',
        name: 'html_form_weak_credentials',
        url: 'http://10.0.8.151:32853/pkxss/pkxss_login.php',
        affects: 'http://10.0.8.151:32853/pkxss/pkxss_login.php',
        detail:
          '\u7528\u6237\u540d:[admin] \u5bc6\u7801:[123456] \u767b\u5f55\u5730\u5740:[http://10.0.8.151:32853/pkxss/pkxss_login.php]',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'html_form_weak_credentials',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441832,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_get_login.php',
        affects: 'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_get_login.php',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441833,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: 'GIT\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u4fe1\u606f\u6cc4\u6f0f',
        name: 'git_repository',
        url: 'http://10.0.8.151:32853/.git/config',
        affects: 'http://10.0.8.151:32853/.git/config',
        detail:
          "\u53d1\u73b0GIT\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u6587\u4ef6: 'http://10.0.8.151:32853/.git/config'\u3002 \u6cc4\u6f0f\u7528\u6237\u540d: root@localhost.localdomain",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'git_repository',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441834,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata:
          'username=aSdFh1&phonenum=555-666-0606&submit=submit&sex=male&add=1&password=g00dPassw0rD1&email=sample%40email.tst',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload:
          'username=aSdFh1&phonenum=555-666-0606&submit=submit&sex=male&add=1&password=g00dPassw0rD1&email=12345%27%22%5C%27%5C%22%29%3B%7C%5D%2A%2500%7B%250d%250a%3C%2500%3E%25bf%2527%27%F0%9F%92%A9',
        category: '\u6ce8\u5165\u6f0f\u6d1e',
        display_name: 'SQL\u6ce8\u5165\u6f0f\u6d1e',
        name: 'sql_injection',
        url: 'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_reg.php',
        affects: 'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_reg.php',
        detail:
          "\u53d1\u73b0SQL\u6ce8\u5165\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_reg.php' \u62a5\u9519\u4fe1\u606f\uff1aYou have an error in your SQL syntax;",
        from_type: 'plugin',
        httpmethod: 'POST',
        place: 'POST',
        parameter: 'email',
      },
      group_id: 2062,
      type: 'sql_injection',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441835,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:30',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/inc/',
        affects: 'http://10.0.8.151:32853/inc/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/inc/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441836,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u53d1\u73b0\u654f\u611f\u76ee\u5f55',
        name: 'sensitive_dirs',
        url: 'http://10.0.8.151:32853/phpmyadmin/',
        affects: 'http://10.0.8.151:32853/phpmyadmin/',
        detail:
          "\u53d1\u73b0\u654f\u611f\u76ee\u5f55\u4fe1\u606f\u6cc4\u6f0f: 'http://10.0.8.151:32853/phpmyadmin/'\u3002",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'sensitive_dirs',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441837,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/inc/',
        affects: 'http://10.0.8.151:32853/inc/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441838,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/',
        affects: 'http://10.0.8.151:32853/vul/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441839,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/',
        affects: 'http://10.0.8.151:32853/vul/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441840,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/assets/',
        affects: 'http://10.0.8.151:32853/assets/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/assets/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441841,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/assets/',
        affects: 'http://10.0.8.151:32853/assets/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441842,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/csrf/',
        affects: 'http://10.0.8.151:32853/vul/csrf/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/csrf/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441843,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/csrf/',
        affects: 'http://10.0.8.151:32853/vul/csrf/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441844,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/assets/css/',
        affects: 'http://10.0.8.151:32853/assets/css/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/assets/css/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441845,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/assets/css/',
        affects: 'http://10.0.8.151:32853/assets/css/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441846,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/burteforce/',
        affects: 'http://10.0.8.151:32853/vul/burteforce/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/burteforce/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441847,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/burteforce/',
        affects: 'http://10.0.8.151:32853/vul/burteforce/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441848,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/unserilization/',
        affects: 'http://10.0.8.151:32853/vul/unserilization/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/unserilization/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441849,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/unserilization/',
        affects: 'http://10.0.8.151:32853/vul/unserilization/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441850,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/infoleak/',
        affects: 'http://10.0.8.151:32853/vul/infoleak/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/infoleak/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441851,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/infoleak/',
        affects: 'http://10.0.8.151:32853/vul/infoleak/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441852,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/xxe/',
        affects: 'http://10.0.8.151:32853/vul/xxe/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/xxe/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441853,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/xxe/',
        affects: 'http://10.0.8.151:32853/vul/xxe/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441854,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/fileinclude/',
        affects: 'http://10.0.8.151:32853/vul/fileinclude/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/fileinclude/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441855,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/fileinclude/',
        affects: 'http://10.0.8.151:32853/vul/fileinclude/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441856,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/unsafedownload/',
        affects: 'http://10.0.8.151:32853/vul/unsafedownload/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/unsafedownload/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441857,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:31',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/unsafedownload/',
        affects: 'http://10.0.8.151:32853/vul/unsafedownload/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441858,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/assets/images/',
        affects: 'http://10.0.8.151:32853/assets/images/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/assets/images/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441859,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/assets/images/',
        affects: 'http://10.0.8.151:32853/assets/images/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441860,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/unsafeupload/',
        affects: 'http://10.0.8.151:32853/vul/unsafeupload/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/unsafeupload/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441861,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/unsafeupload/',
        affects: 'http://10.0.8.151:32853/vul/unsafeupload/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441862,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/overpermission/',
        affects: 'http://10.0.8.151:32853/vul/overpermission/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/overpermission/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441863,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/overpermission/',
        affects: 'http://10.0.8.151:32853/vul/overpermission/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441864,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/assets/js/',
        affects: 'http://10.0.8.151:32853/assets/js/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/assets/js/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441865,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/assets/js/',
        affects: 'http://10.0.8.151:32853/assets/js/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441866,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/xss/',
        affects: 'http://10.0.8.151:32853/vul/xss/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/xss/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441867,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/xss/',
        affects: 'http://10.0.8.151:32853/vul/xss/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441868,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/urlredirect/',
        affects: 'http://10.0.8.151:32853/vul/urlredirect/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/urlredirect/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441869,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/urlredirect/',
        affects: 'http://10.0.8.151:32853/vul/urlredirect/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441870,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/assets/font-awesome/',
        affects: 'http://10.0.8.151:32853/assets/font-awesome/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/assets/font-awesome/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441871,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/assets/font-awesome/',
        affects: 'http://10.0.8.151:32853/assets/font-awesome/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441872,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/sqli/',
        affects: 'http://10.0.8.151:32853/vul/sqli/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/sqli/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441873,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/sqli/',
        affects: 'http://10.0.8.151:32853/vul/sqli/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441874,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/rce/',
        affects: 'http://10.0.8.151:32853/vul/rce/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/rce/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441875,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/rce/',
        affects: 'http://10.0.8.151:32853/vul/rce/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441876,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/dir/',
        affects: 'http://10.0.8.151:32853/vul/dir/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/dir/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441877,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:32',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/dir/',
        affects: 'http://10.0.8.151:32853/vul/dir/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441878,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/ssrf/',
        affects: 'http://10.0.8.151:32853/vul/ssrf/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/ssrf/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441879,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/ssrf/',
        affects: 'http://10.0.8.151:32853/vul/ssrf/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441880,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/csrf/csrfget/',
        affects: 'http://10.0.8.151:32853/vul/csrf/csrfget/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/csrf/csrfget/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441881,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/csrf/csrfget/',
        affects: 'http://10.0.8.151:32853/vul/csrf/csrfget/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441882,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/csrf/csrfpost/',
        affects: 'http://10.0.8.151:32853/vul/csrf/csrfpost/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/csrf/csrfpost/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441883,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/csrf/csrfpost/',
        affects: 'http://10.0.8.151:32853/vul/csrf/csrfpost/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441884,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/sqli/sqli_iu/',
        affects: 'http://10.0.8.151:32853/vul/sqli/sqli_iu/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/sqli/sqli_iu/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441885,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/sqli/sqli_iu/',
        affects: 'http://10.0.8.151:32853/vul/sqli/sqli_iu/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441886,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/csrf/csrftoken/',
        affects: 'http://10.0.8.151:32853/vul/csrf/csrftoken/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/csrf/csrftoken/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441887,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/csrf/csrftoken/',
        affects: 'http://10.0.8.151:32853/vul/csrf/csrftoken/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441888,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/overpermission/op1/',
        affects: 'http://10.0.8.151:32853/vul/overpermission/op1/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/overpermission/op1/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441889,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/overpermission/op1/',
        affects: 'http://10.0.8.151:32853/vul/overpermission/op1/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441890,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/assets/images/avatars/',
        affects: 'http://10.0.8.151:32853/assets/images/avatars/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/assets/images/avatars/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441891,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/assets/images/avatars/',
        affects: 'http://10.0.8.151:32853/assets/images/avatars/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441892,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/unsafedownload/download/',
        affects: 'http://10.0.8.151:32853/vul/unsafedownload/download/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/unsafedownload/download/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441893,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/unsafedownload/download/',
        affects: 'http://10.0.8.151:32853/vul/unsafedownload/download/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441894,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/overpermission/op2/',
        affects: 'http://10.0.8.151:32853/vul/overpermission/op2/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/overpermission/op2/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441895,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/overpermission/op2/',
        affects: 'http://10.0.8.151:32853/vul/overpermission/op2/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441896,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/xss/xssblind/',
        affects: 'http://10.0.8.151:32853/vul/xss/xssblind/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/xss/xssblind/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441897,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/xss/xssblind/',
        affects: 'http://10.0.8.151:32853/vul/xss/xssblind/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441898,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/xss/xsspost/',
        affects: 'http://10.0.8.151:32853/vul/xss/xsspost/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/xss/xsspost/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441899,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:33',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/assets/font-awesome/4.5.0/',
        affects: 'http://10.0.8.151:32853/assets/font-awesome/4.5.0/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/assets/font-awesome/4.5.0/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441900,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/xss/xsspost/',
        affects: 'http://10.0.8.151:32853/vul/xss/xsspost/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441901,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/assets/font-awesome/4.5.0/',
        affects: 'http://10.0.8.151:32853/assets/font-awesome/4.5.0/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441902,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/vul/sqli/sqli_header/',
        affects: 'http://10.0.8.151:32853/vul/sqli/sqli_header/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/vul/sqli/sqli_header/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441903,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/vul/sqli/sqli_header/',
        affects: 'http://10.0.8.151:32853/vul/sqli/sqli_header/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441904,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u76ee\u5f55\u6d4f\u89c8',
        display_name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
        name: 'directory_listing',
        url: 'http://10.0.8.151:32853/assets/font-awesome/4.5.0/css/',
        affects: 'http://10.0.8.151:32853/assets/font-awesome/4.5.0/css/',
        detail:
          "\u53d1\u73b0\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8: 'http://10.0.8.151:32853/assets/font-awesome/4.5.0/css/' \u5339\u914d\u89c4\u5219\uff1a'<a href=\"?C=N;O=D\">Name</a>'",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'directory_listing',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441905,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 1,
        postdata: null,
        extra_detail: null,
        report_type: 'uri',
        parameter_value: null,
        payload: 'None',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
        name: 'internal_ip_address_disclosure',
        url: 'http://10.0.8.151:32853/assets/font-awesome/4.5.0/css/',
        affects: 'http://10.0.8.151:32853/assets/font-awesome/4.5.0/css/',
        detail: '10.0.8.151',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: null,
        parameter: null,
      },
      group_id: 2062,
      type: 'internal_ip_address_disclosure',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441906,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'submit=1&filename=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd',
        category: '\u76ee\u5f55\u7a7f\u8d8a',
        display_name: '\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
        name: 'directory_traversal',
        url: 'http://10.0.8.151:32853/vul/fileinclude/fi_remote.php?submit=1&filename=',
        affects: 'http://10.0.8.151:32853/vul/fileinclude/fi_remote.php',
        detail: '\u53d1\u73b0\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e\u3002',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'filename',
      },
      group_id: 2062,
      type: 'directory_traversal',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441907,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'message=<ScRiPt>confirm(3378)</ScRiPt>&submit=submit',
        category: '\u8de8\u7ad9\u811a\u672c\u653b\u51fb',
        display_name: '\u8de8\u7ad9\u811a\u672c\u653b\u51fb',
        name: 'xss',
        url: 'http://10.0.8.151:32853/vul/xss/xss_01.php',
        affects: 'http://10.0.8.151:32853/vul/xss/xss_01.php',
        detail:
          "\u53d1\u73b0\u8de8\u7ad9\u811a\u672c\u653b\u51fb\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/xss/xss_01.php' ",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'get_xss',
        parameter: 'message',
      },
      group_id: 2062,
      type: 'xss',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441908,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'http://www.target.com',
        category: '\u914d\u7f6e\u98ce\u9669',
        display_name: 'URL\u91cd\u5b9a\u5411',
        name: 'url_redirection',
        url: 'http://10.0.8.151:32853/vul/urlredirect/urlredirect.php?url=i',
        affects: 'http://10.0.8.151:32853/vul/urlredirect/urlredirect.php',
        detail:
          "\u53d1\u73b0URL\u91cd\u5b9a\u5411\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/urlredirect/urlredirect.php?url=i'\u3002",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'url',
      },
      group_id: 2062,
      type: 'url_redirection',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441909,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'http://rndHBywekVrMg.dns.9b5501a3.axss.xyz',
        category: '\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020',
        display_name: '\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020',
        name: 'ssrf',
        url: 'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php?url=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info1.php',
        affects: 'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php',
        detail:
          "\u53d1\u73b0\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020\u653b\u51fb\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php?url=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info1.php' ",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'url',
      },
      group_id: 2062,
      type: 'ssrf',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441910,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'url=file%3A%2F%2F%2Fetc%2Fpasswd',
        category: '\u76ee\u5f55\u7a7f\u8d8a',
        display_name: '\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
        name: 'directory_traversal',
        url: 'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php?url=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info1.php',
        affects: 'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php',
        detail: '\u53d1\u73b0\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e\u3002',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'url',
      },
      group_id: 2062,
      type: 'directory_traversal',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441911,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'url=Http://testasp.vulnweb.com/t/fit.txt',
        category: '\u6587\u4ef6\u5305\u542b',
        display_name: '\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e',
        name: 'file_inclusion',
        url: 'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php?url=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info1.php',
        affects: 'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php',
        detail:
          "\u53d1\u73b0\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php?url=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info1.php' ",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'url',
      },
      group_id: 2062,
      type: 'file_inclusion',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441912,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'title=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd',
        category: '\u76ee\u5f55\u7a7f\u8d8a',
        display_name: '\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
        name: 'directory_traversal',
        url: 'http://10.0.8.151:32853/vul/dir/dir_list.php?title=jarheads.php',
        affects: 'http://10.0.8.151:32853/vul/dir/dir_list.php',
        detail: '\u53d1\u73b0\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e\u3002',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'title',
      },
      group_id: 2062,
      type: 'directory_traversal',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441913,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: null,
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload:
          'name=12345%27%22%5C%27%5C%22%29%3B%7C%5D%2A%2500%7B%250d%250a%3C%2500%3E%25bf%2527%27%F0%9F%92%A9&submit=%25E6%2590%259C%25E7%25B4%25A2',
        category: '\u6ce8\u5165\u6f0f\u6d1e',
        display_name: 'SQL\u6ce8\u5165\u6f0f\u6d1e',
        name: 'sql_injection',
        url: 'http://10.0.8.151:32853/vul/sqli/sqli_search.php?name=aSdFh1&submit=%E6%90%9C%E7%B4%A2',
        affects: 'http://10.0.8.151:32853/vul/sqli/sqli_search.php',
        detail:
          "\u53d1\u73b0SQL\u6ce8\u5165\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/sqli/sqli_search.php?name=aSdFh1&submit=%E6%90%9C%E7%B4%A2' \u62a5\u9519\u4fe1\u606f\uff1aYou have an error in your SQL syntax;",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'name',
      },
      group_id: 2062,
      type: 'sql_injection',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441914,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload:
          'name=12345%27%22%5C%27%5C%22%29%3B%7C%5D%2A%2500%7B%250d%250a%3C%2500%3E%25bf%2527%27%F0%9F%92%A9&submit=%25E6%2590%259C%25E7%25B4%25A2',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: 'Web\u5e94\u7528\u7a0b\u5e8f\u9519\u8bef\u4fe1\u606f',
        name: 'application_error_message',
        url: 'http://10.0.8.151:32853/vul/sqli/sqli_search.php?name=aSdFh1&submit=%E6%90%9C%E7%B4%A2',
        affects: 'http://10.0.8.151:32853/vul/sqli/sqli_search.php',
        detail: 'You have an error in your SQL syntax',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'name',
      },
      group_id: 2062,
      type: 'application_error_message',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441915,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload:
          "name='1<ScRiPt/ksc%20src%3d//axss.xyz/t/xss.js%3f985739></ScRiPt>&submit=%E6%90%9C%E7%B4%A2",
        category: '\u8de8\u7ad9\u811a\u672c\u653b\u51fb',
        display_name: '\u8de8\u7ad9\u811a\u672c\u653b\u51fb',
        name: 'xss',
        url: 'http://10.0.8.151:32853/vul/sqli/sqli_search.php',
        affects: 'http://10.0.8.151:32853/vul/sqli/sqli_search.php',
        detail:
          "\u53d1\u73b0\u8de8\u7ad9\u811a\u672c\u653b\u51fb\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/sqli/sqli_search.php' ",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'get_xss',
        parameter: 'name',
      },
      group_id: 2062,
      type: 'xss',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441916,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: null,
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload:
          "name=aSdFh1' AND (SELECT * FROM (SELECT(SLEEP(8)))DkWg) AND 'Vqjk'='Vqjk&submit=%E6%9F%A5%E8%AF%A2",
        category: '\u6ce8\u5165\u6f0f\u6d1e',
        display_name: 'SQL\u6ce8\u5165\u6f0f\u6d1e',
        name: 'sql_injection',
        url: 'http://10.0.8.151:32853/vul/sqli/sqli_blind_t.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
        affects: 'http://10.0.8.151:32853/vul/sqli/sqli_blind_t.php',
        detail:
          "\u53d1\u73b0SQL\u6ce8\u5165\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/sqli/sqli_blind_t.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2' ",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'name',
      },
      group_id: 2062,
      type: 'sql_injection',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441917,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 2,
        postdata:
          'username=aSdFh1&phonenum=555-666-0606&submit=submit&sex=male&add=1&password=g00dPassw0rD1&email=sample%40email.tst',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload:
          'username=12345%27%22%5C%27%5C%22%29%3B%7C%5D%2A%2500%7B%250d%250a%3C%2500%3E%25bf%2527%27%F0%9F%92%A9&phonenum=555-666-0606&submit=submit&sex=male&add=1&password=g00dPassw0rD1&email=sample%2540email.tst',
        category: '\u4fe1\u606f\u6cc4\u6f0f',
        display_name: 'Web\u5e94\u7528\u7a0b\u5e8f\u9519\u8bef\u4fe1\u606f',
        name: 'application_error_message',
        url: 'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_reg.php',
        affects: 'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_reg.php',
        detail: 'You have an error in your SQL syntax',
        from_type: 'plugin',
        httpmethod: 'POST',
        place: 'POST',
        parameter: 'username',
      },
      group_id: 2062,
      type: 'application_error_message',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441918,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'filename=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd',
        category: '\u76ee\u5f55\u7a7f\u8d8a',
        display_name: '\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
        name: 'directory_traversal',
        url: 'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=sks.png',
        affects: 'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php',
        detail: '\u53d1\u73b0\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e\u3002',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'filename',
      },
      group_id: 2062,
      type: 'directory_traversal',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441919,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'message=javascript:alert(7626)&submit=submit',
        category: '\u8de8\u7ad9\u811a\u672c\u653b\u51fb',
        display_name: '\u8de8\u7ad9\u811a\u672c\u653b\u51fb',
        name: 'xss',
        url: 'http://10.0.8.151:32853/vul/xss/xss_02.php',
        affects: 'http://10.0.8.151:32853/vul/xss/xss_02.php',
        detail:
          "\u53d1\u73b0\u8de8\u7ad9\u811a\u672c\u653b\u51fb\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/xss/xss_02.php' ",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'get_xss',
        parameter: 'message',
      },
      group_id: 2062,
      type: 'xss',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441920,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'message=</script><ScRiPt>confirm(6871)</ScRiPt>&submit=submit',
        category: '\u8de8\u7ad9\u811a\u672c\u653b\u51fb',
        display_name: '\u8de8\u7ad9\u811a\u672c\u653b\u51fb',
        name: 'xss',
        url: 'http://10.0.8.151:32853/vul/xss/xss_04.php',
        affects: 'http://10.0.8.151:32853/vul/xss/xss_04.php',
        detail:
          "\u53d1\u73b0\u8de8\u7ad9\u811a\u672c\u653b\u51fb\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/xss/xss_04.php' ",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'get_xss',
        parameter: 'message',
      },
      group_id: 2062,
      type: 'xss',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441921,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:34',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'file=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd',
        category: '\u76ee\u5f55\u7a7f\u8d8a',
        display_name: '\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
        name: 'directory_traversal',
        url: 'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php?file=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info2.php',
        affects: 'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php',
        detail: '\u53d1\u73b0\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e\u3002',
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'file',
      },
      group_id: 2062,
      type: 'directory_traversal',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441922,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:35',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'file=Http://testasp.vulnweb.com/t/fit.txt',
        category: '\u6587\u4ef6\u5305\u542b',
        display_name: '\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e',
        name: 'file_inclusion',
        url: 'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php?file=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info2.php',
        affects: 'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php',
        detail:
          "\u53d1\u73b0\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php?file=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info2.php' ",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'file',
      },
      group_id: 2062,
      type: 'file_inclusion',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441923,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 19:43:35',
      site_id: 278953,
      module: 'kscan',
      ignore: false,
      value: {
        risk: 3,
        postdata: '',
        extra_detail: null,
        report_type: 'parameter',
        parameter_value: null,
        payload: 'http://rndnOgFlijaBC.dns.9b5501a3.axss.xyz',
        category: '\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020',
        display_name: '\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020',
        name: 'ssrf',
        url: 'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php?file=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info2.php',
        affects: 'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php',
        detail:
          "\u53d1\u73b0\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020\u653b\u51fb\u6f0f\u6d1e: 'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php?file=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info2.php' ",
        from_type: 'plugin',
        httpmethod: 'GET',
        place: 'GET',
        parameter: 'file',
      },
      group_id: 2062,
      type: 'ssrf',
    },
  ],
  kscan_weakness: true,
  global: true,
  site: {
    siteinfo: { site_id: 278954, start_at: '2021-10-11 18:36:21', end_at: '2021-10-11 18:38:01' },
    availability: {
      site_id: 278955,
      start_at: '2021-10-11 18:36:21',
      end_at: '2021-10-11 18:36:31',
    },
    content: { site_id: 278952, start_at: '2021-10-11 18:36:21', end_at: '2021-10-11 18:44:22' },
    weakness: { site_id: 278953, start_at: '2021-10-11 18:36:21', end_at: '2021-10-11 19:43:35' },
  },
  init_tree: [
    ['url_tree_root jstree-closed', 'http://10.0.8.151:32853/', '', 'http://10.0.8.151:32853/'],
  ],
  availability: {
    dns: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278955,
      summary: {},
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    dns_hijack: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278955,
      summary: {},
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    ping: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278955,
      summary: {},
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    http_get: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278955,
      summary: {},
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    http_get_full_time: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278955,
      summary: {},
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    http_cloud: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278955,
      summary: {},
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    trend: [
      {
        v_group_id: '616413867dc93b06853eb07e',
        g_site_id: '616413867dc93b06853eb07f',
        _id: 441156,
        user_id: 1,
        task_id: 243963,
        created_at: '2021-10-11 18:36:25',
        site_id: 278955,
        module: 'availability',
        ignore: false,
        value: {
          dns_hijack: { enabled: true, hijacked: false },
          dns: { time: 1, enabled: true, address: ['10.0.8.151'] },
          http_cloud: { enabled: false },
          ping: { enabled: true, time: 1 },
          http_get: { status: 200, enabled: true, time: 38 },
          http_get_full_time: { enabled: true, time: 14 },
        },
        group_id: 2064,
        type: 'availability',
      },
    ],
  },
  scan_ui_version: '5.3.9.0.12a48f5.N',
  show_ignore: false,
  awvs: [
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441163,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerScheme/Code_Execution.script',
        affects_url: 'http://10.0.8.151:32853/vul/rce/rce_ping.php',
        vt_id: '2648b2a5-e4dc-ca70-cbb5-b7513459c75a',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'Code execution',
        request:
          'POST /vul/rce/rce_ping.php HTTP/1.1\r\nContent-Type: application/x-www-form-urlencoded\r\nConnection: keep-alive\r\nCookie: PHPSESSID=22op9h1ii3q6ricu2qgc7qh29o;SignonSession=2cu1ockouaakbm8co51lra8ng8;bf[vcode]=v33puh\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nContent-Length: 37\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\nipaddress=set%7Cset%26set&submit=ping',
      },
      group_id: 2062,
      type: '2648b2a5-e4dc-ca70-cbb5-b7513459c75a',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441164,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerScheme/XSS.script',
        affects_url: 'http://10.0.8.151:32853/vul/xss/xss_04.php',
        vt_id: '7a2fa5a4-7125-1062-0651-ed5219f05809',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'Cross site scripting',
        request:
          "GET /vul/xss/xss_04.php?message=209818'();}]9426&submit=submit HTTP/1.1\r\nReferer: http://10.0.8.151:32853/\r\nConnection: keep-alive\r\nCookie: PHPSESSID=22op9h1ii3q6ricu2qgc7qh29o;SignonSession=2cu1ockouaakbm8co51lra8ng8;bf[vcode]=v33puh\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\n",
      },
      group_id: 2062,
      type: '7a2fa5a4-7125-1062-0651-ed5219f05809',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441165,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerScheme/XSS.script',
        affects_url: 'http://10.0.8.151:32853/vul/xss/xss_04.php',
        vt_id: '7a2fa5a4-7125-1062-0651-ed5219f05809',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'Cross site scripting',
        request:
          "GET /vul/xss/xss_04.php?message=209231'();}]9358&submit=submit HTTP/1.1\r\nReferer: http://10.0.8.151:32853/\r\nConnection: keep-alive\r\nCookie: PHPSESSID=22op9h1ii3q6ricu2qgc7qh29o;SignonSession=2cu1ockouaakbm8co51lra8ng8;bf[vcode]=v33puh\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\n",
      },
      group_id: 2062,
      type: '7a2fa5a4-7125-1062-0651-ed5219f05809',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441166,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerScheme/XSS.script',
        affects_url: 'http://10.0.8.151:32853/vul/sqli/sqli_del.php',
        vt_id: '7a2fa5a4-7125-1062-0651-ed5219f05809',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'Cross site scripting',
        request:
          'GET /vul/sqli/sqli_del.php?id=56\'"()%26%25<acx><ScRiPt%20>PuHB(9255)</ScRiPt> HTTP/1.1\r\nReferer: http://10.0.8.151:32853/\r\nConnection: keep-alive\r\nCookie: PHPSESSID=22op9h1ii3q6ricu2qgc7qh29o;SignonSession=2cu1ockouaakbm8co51lra8ng8;bf[vcode]=v33puh\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\n',
      },
      group_id: 2062,
      type: '7a2fa5a4-7125-1062-0651-ed5219f05809',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441167,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerScheme/XSS.script',
        affects_url: 'http://10.0.8.151:32853/vul/sqli/sqli_x.php',
        vt_id: '7a2fa5a4-7125-1062-0651-ed5219f05809',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'Cross site scripting',
        request:
          'GET /vul/sqli/sqli_x.php?name=ncMUFCMU\'"()%26%25<acx><ScRiPt%20>Yb9b(9560)</ScRiPt>&submit=%E6%9F%A5%E8%AF%A2 HTTP/1.1\r\nReferer: http://10.0.8.151:32853/\r\nConnection: keep-alive\r\nCookie: PHPSESSID=22op9h1ii3q6ricu2qgc7qh29o;SignonSession=2cu1ockouaakbm8co51lra8ng8;bf[vcode]=v33puh\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\n',
      },
      group_id: 2062,
      type: '7a2fa5a4-7125-1062-0651-ed5219f05809',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441168,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerScheme/XSS.script',
        affects_url: 'http://10.0.8.151:32853/vul/sqli/sqli_x.php',
        vt_id: '7a2fa5a4-7125-1062-0651-ed5219f05809',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'Cross site scripting',
        request:
          'GET /vul/sqli/sqli_x.php?name=ncMUFCMU\'"()%26%25<acx><ScRiPt%20>QiyA(9765)</ScRiPt>&submit=%E6%9F%A5%E8%AF%A2 HTTP/1.1\r\nReferer: http://10.0.8.151:32853/\r\nConnection: keep-alive\r\nCookie: PHPSESSID=22op9h1ii3q6ricu2qgc7qh29o;SignonSession=2cu1ockouaakbm8co51lra8ng8;bf[vcode]=v33puh\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\n',
      },
      group_id: 2062,
      type: '7a2fa5a4-7125-1062-0651-ed5219f05809',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441169,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerScheme/XSS.script',
        affects_url: 'http://10.0.8.151:32853/vul/sqli/sqli_del.php',
        vt_id: '7a2fa5a4-7125-1062-0651-ed5219f05809',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'Cross site scripting',
        request:
          'POST /vul/sqli/sqli_del.php?id=20\'"()%26%25<acx><ScRiPt%20>fUXa(9119)</ScRiPt> HTTP/1.1\r\nContent-Type: application/x-www-form-urlencoded\r\nReferer: http://10.0.8.151:32853/\r\nConnection: keep-alive\r\nCookie: PHPSESSID=22op9h1ii3q6ricu2qgc7qh29o;SignonSession=2cu1ockouaakbm8co51lra8ng8;bf[vcode]=v33puh\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nContent-Length: 24\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\nmessage=submit=submit&56',
      },
      group_id: 2062,
      type: '7a2fa5a4-7125-1062-0651-ed5219f05809',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441170,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerScheme/Directory_Traversal.script',
        affects_url: 'http://10.0.8.151:32853/vul/dir/dir_list.php',
        vt_id: '50e81dee-de35-8172-d57e-5edd0fde360c',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'Directory traversal',
        request:
          'GET /vul/dir/dir_list.php?title=../../../../../../../../../../etc/passwd HTTP/1.1\r\nReferer: http://10.0.8.151:32853/\r\nConnection: keep-alive\r\nCookie: PHPSESSID=22op9h1ii3q6ricu2qgc7qh29o;SignonSession=2cu1ockouaakbm8co51lra8ng8;bf[vcode]=v33puh\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\n',
      },
      group_id: 2062,
      type: '50e81dee-de35-8172-d57e-5edd0fde360c',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441171,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerScheme/Directory_Traversal.script',
        affects_url: 'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php',
        vt_id: '50e81dee-de35-8172-d57e-5edd0fde360c',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'Directory traversal',
        request:
          'GET /vul/ssrf/ssrf_fgc.php?file=../../../../../../../../../../etc/passwd HTTP/1.1\r\nReferer: http://10.0.8.151:32853/\r\nConnection: keep-alive\r\nCookie: PHPSESSID=22op9h1ii3q6ricu2qgc7qh29o;SignonSession=2cu1ockouaakbm8co51lra8ng8;bf[vcode]=v33puh\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\n',
      },
      group_id: 2062,
      type: '50e81dee-de35-8172-d57e-5edd0fde360c',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441172,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerScheme/Script_Source_Code_Disclosure.script',
        affects_url: 'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php',
        vt_id: 'be88ca37-79f7-bb85-f765-e957c60941d0',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'File inclusion',
        request:
          'GET /vul/ssrf/ssrf_fgc.php?file=ssrf_fgc.php HTTP/1.1\r\nConnection: keep-alive\r\nCookie: PHPSESSID=22op9h1ii3q6ricu2qgc7qh29o;SignonSession=2cu1ockouaakbm8co51lra8ng8;bf[vcode]=v33puh\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\n',
      },
      group_id: 2062,
      type: 'be88ca37-79f7-bb85-f765-e957c60941d0',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441173,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerFolder/GIT_Repository.script',
        affects_url: 'http://10.0.8.151:32853/',
        vt_id: 'd4b48cfc-be42-03bf-fcdf-822909b4ab3e',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'Git repository found',
        request:
          'GET /.git/config HTTP/1.1\r\nConnection: keep-alive\r\nCookie: PHPSESSID=7ubc6pi05taunigd9omq2mcvnu\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\n',
      },
      group_id: 2062,
      type: 'd4b48cfc-be42-03bf-fcdf-822909b4ab3e',
    },
    {
      v_group_id: '616413867dc93b06853eb07e',
      g_site_id: '616413867dc93b06853eb07f',
      _id: 441174,
      user_id: 1,
      feedback: false,
      task_id: 243961,
      created_at: '2021-10-11 18:41:48',
      site_id: 278953,
      module: 'awvs',
      ignore: false,
      value: {
        source: '/Scripts/PerScheme/PHP_Code_Injection.script',
        affects_url: 'http://10.0.8.151:32853/vul/rce/rce_eval.php',
        vt_id: '38507657-34e5-f283-ca2b-e9ecedd5a530',
        target_id: '9c8d2f89-5239-41ad-95be-6a9b7bf46e55',
        vt_name: 'PHP code injection',
        request:
          'POST /vul/rce/rce_eval.php HTTP/1.1\r\nContent-Type: application/x-www-form-urlencoded\r\nConnection: keep-alive\r\nCookie: PHPSESSID=22op9h1ii3q6ricu2qgc7qh29o;SignonSession=2cu1ockouaakbm8co51lra8ng8;bf[vcode]=v33puh\r\nAccept: */*\r\nAccept-Encoding: gzip,deflate\r\nContent-Length: 49\r\nHost: 10.0.8.151:32853\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\r\n\r\nsubmit=%E6%8F%90%E4%BA%A4&txt=;print(md5(31337));',
      },
      group_id: 2062,
      type: '38507657-34e5-f283-ca2b-e9ecedd5a530',
    },
  ],
  vul_dict: {
    file_upload: {
      impact_en:
        'It may be possible for an attacker to use this vulnerability to execute arbitrary code.',
      reference: ['http://www.owasp.org/index.php/Unrestricted_File_Upload'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u63a5\u53d7\u9650\u5236\u4e0a\u4f20\u6587\u4ef6\u7c7b\u578b\uff1a\u68c0\u67e5\u6587\u4ef6\u7684\u6269\u5c55\u540d\uff0c\u5e76\u53ea\u5141\u8bb8\u4e0a\u4f20\u67d0\u4e9b\u6587\u4ef6\u3002\u4f7f\u7528\u767d\u540d\u5355\u7684\u65b9\u5f0f\uff0c\u800c\u4e0d\u662f\u9ed1\u540d\u5355\u3002\u68c0\u67e5\u53cc\u6269\u5c55\uff0c\u5982.php.png\u3002\u6539\u53d8\u4e0a\u4f20\u6587\u4ef6\u5939\u7684\u6743\u9650\uff0c\u4ee5\u4fbf\u5728\u5b83\u7684\u6587\u4ef6\u4e0d\u4f1a\u88ab\u6267\u884c\u3002\u91cd\u547d\u540d\u4e0a\u4f20\u7684\u6587\u4ef6\u3002',
      wasc: ['WASC-15'],
      id: '5bed0d527dc93b08352e90ad',
      findtime: '2004-03-27 00:00:00',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u53ef\u80fd\u5229\u7528\u6587\u4ef6\u4e0a\u4f20\u529f\u80fd\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002',
      poc_check: true,
      vul_id: 1984,
      is_scanv: '1',
      cwe: ['CWE-552'],
      is0day: false,
      description:
        '\u8fd9\u4e2a\u811a\u672c\u53ef\u80fd\u5305\u542b\u4e0d\u53d7\u9650\u5236\u7684\u6587\u4ef6\u4e0a\u4f20\u3002\u5404\u79cdWeb\u5e94\u7528\u7a0b\u5e8f\u5141\u8bb8\u7528\u6237\u4e0a\u4f20\u6587\u4ef6\uff08\u5982\u56fe\u7247\uff0c\u56fe\u50cf\uff0c\u58f0\u97f3\uff0c...\uff09\u3002\u4e0a\u4f20\u7684\u6587\u4ef6\u53ef\u80fd\u4f1a\u9020\u6210\u5b89\u5168\u98ce\u9669\uff0c\u5982\u679c\u6ca1\u6709\u6b63\u786e\u7684\u5904\u7406\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u7528\u4e00\u4e2a\u7279\u5236\u7684\u6587\u4ef6\u540d\u6216MIME\u7c7b\u578b\u53d1\u9001\u7684multipart / form-data\u8bf7\u6c42\uff0c\u4e0a\u4f20\u5e76\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002',
      short_name: '',
      tag_id: [42],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This script is possibly vulnerable to unrestricted file upload. Various web applications allow users to upload files (such as pictures, images, sounds, ...). Uploaded files may pose a significant risk if not handled correctly. A remote attacker could send a multipart/form-data POST request with a specially-crafted filename or mime type and execute arbitrary code.',
      key: 'file_upload',
      name_en: 'File upload found',
      msfpath: '',
      updatetime: '2021-07-19 00:00:00',
      name: '\u53d1\u73b0\u6587\u4ef6\u4e0a\u4f20',
      level: 2,
      owasp_level: ['2013A6', '2017A3'],
      rule: '',
      test_data: '',
      recommendation_en:
        'Restrict file types accepted for upload: check the file extension and only allow certain files to be uploaded. Use a whitelist approach instead of a blacklist. Check for double extensions such as .php.png. Check for files without a filename like .htaccess (on ASP.NET, check for configuration files like web.config). Change the permissions on the upload folder so the files within it are not executable. If possible, rename the files that are uploaded.',
    },
    error_page_web_server_version_disclosure: {
      impact_en: 'Possible sensitive information disclosure.',
      reference: ['http://httpd.apache.org/docs/1.3/custom-error.html'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5982\u679c\u60a8\u4f7f\u7528\u7684\u662fApache\uff0c\u4f60\u53ef\u4ee5\u8bbe\u7f6e\u4e00\u4e2a\u81ea\u5b9a\u4e49\u7684404\u9875\u9762\u3002',
      wasc: ['WASC-15'],
      id: '5bed0d537dc93b08352e916c',
      findtime: '2010-01-29 00:00:00',
      cnvd_info: [],
      impact: '\u53ef\u80fd\u9020\u6210\u654f\u611f\u4fe1\u606f\u6cc4\u6f0f\u3002',
      poc_check: true,
      vul_id: 2177,
      is_scanv: '1',
      cwe: ['CWE-209'],
      is0day: false,
      description:
        '\u901a\u8fc7\u8bf7\u6c42\u4e0d\u5b58\u5728\u7684\u9875\u9762\u65f6\uff0c\u4f1a\u8fd4\u56de\u9519\u8bef\u9875\u9762\u3002\u8fd9\u4e2a\u9519\u8bef\u9875\u9762\u5305\u542bWeb\u670d\u52a1\u5668\u7684\u7248\u672c\u53f7\u548c\u8be5\u670d\u52a1\u5668\u4e0a\u542f\u7528\u7684\u6a21\u5757\u5217\u8868\u3002\u8fd9\u4e2a\u4fe1\u606f\u53ef\u4ee5\u88ab\u7528\u6765\u8fdb\u884c\u8fdb\u4e00\u6b65\u7684\u653b\u51fb\u3002',
      short_name: '',
      tag_id: [48, 310],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "By requesting a page that doesn't exist, an error page was returned. This error page contains the web server version number and a list of modules enabled on this server. This information can be used to conduct further attacks.",
      key: 'error_page_web_server_version_disclosure',
      name_en: 'Error page web server version disclosure',
      msfpath: '',
      updatetime: '2021-07-19 00:00:00',
      name: '\u9519\u8bef\u9875\u9762Web\u5e94\u7528\u670d\u52a1\u5668\u7248\u672c\u6cc4\u9732',
      level: 2,
      owasp_level: ['2013A5', '2017A6'],
      rule: '',
      test_data: '',
      recommendation_en:
        'If you are using Apache, you can setup a custom 404 page by following the instructions provided in the References section.',
    },
    '38507657-34e5-f283-ca2b-e9ecedd5a530': {
      impact_en: 'An attacker can execute any PHP code on your server.',
      reference: [
        'http://seclists.org/lists/fulldisclosure/2006/May/0035.html',
        'http://www.owasp.org/index.php/PHP_Top_5',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u60a8\u7684\u811a\u672c\u5e94\u6b63\u786e\u6e05\u7406\u7528\u6237\u8f93\u5165\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa01e3',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u53ef\u4ee5\u5728\u60a8\u7684\u670d\u52a1\u5668\u4e0a\u6267\u884c\u4efb\u4f55PHP\u4ee3\u7801\u3002',
      poc_check: false,
      vul_id: '38507657-34e5-f283-ca2b-e9ecedd5a530',
      is_scanv: '2',
      cwe: ['CWE-94'],
      is0day: false,
      description:
        '\u6b64\u811a\u672c\u6613\u53d7PHP\u4ee3\u7801\u6ce8\u5165\u7684\u5f71\u54cd\u3002  PHP\u4ee3\u7801\u6ce8\u5165\u662f\u4e00\u4e2a\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5c06\u81ea\u5b9a\u4e49\u4ee3\u7801\u6ce8\u5165\u670d\u52a1\u5668\u7aef\u811a\u672c\u5f15\u64ce\u3002\u5f53\u653b\u51fb\u8005\u53ef\u4ee5\u63a7\u5236\u6216\u90e8\u5206\u8f93\u5165\u5230eval\uff08\uff09\u51fd\u6570\u8c03\u7528\u7684\u8f93\u5165\u5b57\u7b26\u4e32\u65f6\uff0c\u4f1a\u53d1\u751f\u6b64\u6f0f\u6d1e\u3002Eval\u5c06\u6267\u884c\u53c2\u6570\u4f5c\u4e3a\u4ee3\u7801\u3002',
      short_name: '',
      tag_id: ['316'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This script is vulnerable to PHP code injection.PHP code injection is a vulnerability that allows an attacker to inject custom code into the server side scripting engine. This vulnerability occurs when an attacker can control\nall or part of an input string that is fed into an eval() function call. Eval will execute the argument as code.',
      key: '38507657-34e5-f283-ca2b-e9ecedd5a530',
      name_en: 'PHP code injection',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: 'PHP\u4ee3\u7801\u6ce8\u5165',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Your script should properly sanitize user input.',
    },
    directory_listing: {
      impact_en:
        'A user can view a list of all files from this directory possibly exposing sensitive information.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u914d\u7f6eWeb\u670d\u52a1\u5668\u4e0d\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8\u6216\u8005\u786e\u4fdd\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8\u7684\u76ee\u5f55\u4e0d\u4f1a\u6cc4\u6f0f\u4efb\u4f55\u654f\u611f\u4fe1\u606f\u6216\u6587\u4ef6\u3002',
      wasc: ['WASC-16'],
      id: '5bed0d527dc93b08352e90a2',
      findtime: '2004-03-27 00:00:00',
      cnvd_info: [],
      impact:
        '\u8bbf\u95ee\u7f51\u7ad9\u7684\u7528\u6237\u80fd\u591f\u67e5\u770b\u670d\u52a1\u5668\u76ee\u5f55\u4e2d\u7684\u6240\u6709\u6587\u4ef6\u7684\u94fe\u63a5\uff0c\u5b58\u5728\u654f\u611f\u4fe1\u606f\u6cc4\u6f0f\u7684\u98ce\u9669\u3002',
      poc_check: true,
      vul_id: 1973,
      is_scanv: '1',
      cwe: ['CWE-538'],
      is0day: false,
      description:
        'Web\u670d\u52a1\u5668\u914d\u7f6e\u4e3a\u5141\u8bb8\u76ee\u5f55\u904d\u5386\u3002\u8fd9\u6837\u914d\u7f6e\u5b58\u5728\u5b89\u5168\u98ce\u9669\uff0c\u4f1a\u6cc4\u6f0f\u7f51\u7ad9\u672c\u8eab\u4e0d\u53ef\u6293\u53d6\u7684\u94fe\u63a5\uff0c\u4f8b\u5982\u5305\u542b\u654f\u611f\u4fe1\u606f\u7684\u6587\u6863\uff0c\u6253\u5305\u6587\u4ef6\uff0c\u6570\u636e\u5e93\u6587\u4ef6\u7b49\u3002',
      short_name: '',
      tag_id: [310, 48],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'The web server is configured to display the list of files contained in this directory. This is not recommended because the directory may contain files that are not normally exposed through links on the web site.',
      key: 'directory_listing',
      name_en: 'Directory listing',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
      level: 5,
      owasp_level: ['2013A6', '2017A3'],
      rule: '',
      test_data: '',
      recommendation_en:
        'You should make sure the directory does not contain sensitive information or you may want to restrict directory listings from the web server configuration.',
    },
    ssrf: {
      impact_en: 'Attackers can send hacker forged requests through a vulnerable web application',
      reference: ['https://www.freebuf.com/column/157466.html'],
      bugtraq_info: [],
      disabled: true,
      recommendation:
        '1. \u9650\u5236\u534f\u8bae\u4e3aHTTP\u3001HTTPS  2. \u4e0d\u7528\u9650\u5236302\u91cd\u5b9a\u5411  3. \u8bbe\u7f6eURL\u767d\u540d\u5355\u6216\u8005\u9650\u5236\u5185\u7f51IP',
      wasc: [],
      id: '5eb538df7dc93b0ebe050a4a',
      findtime: '2004-03-27 00:00:00',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u80fd\u591f\u901a\u8fc7\u5b58\u5728\u6f0f\u6d1e\u7684 web \u5e94\u7528\u7a0b\u5e8f\u53d1\u9001\u9ed1\u5ba2\u4f2a\u9020\u7684\u8bf7\u6c42',
      poc_check: true,
      vul_id: 2481,
      is_scanv: '1',
      cwe: [],
      is0day: false,
      description:
        'SSRF\uff0c\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020\uff0c\u662f\u4e00\u79cd\u7531\u653b\u51fb\u8005\u6784\u9020\u5f62\u6210\u7531\u670d\u52a1\u5668\u7aef\u53d1\u8d77\u8bf7\u6c42\u7684\u4e00\u4e2a\u6f0f\u6d1e\u3002\u4e00\u822c\u60c5\u51b5\u4e0b\uff0cSSRF \u653b\u51fb\u7684\u76ee\u6807\u662f\u4ece\u5916\u7f51\u65e0\u6cd5\u8bbf\u95ee\u7684\u5185\u90e8\u7cfb\u7edf\u3002\u6f0f\u6d1e\u5f62\u6210\u7684\u539f\u56e0\u5927\u591a\u662f\u56e0\u4e3a\u670d\u52a1\u7aef\u63d0\u4f9b\u4e86\u4ece\u5176\u4ed6\u670d\u52a1\u5668\u5e94\u7528\u83b7\u53d6\u6570\u636e\u7684\u529f\u80fd\u4e14\u6ca1\u6709\u5bf9\u76ee\u6807\u5730\u5740\u4f5c\u6b63\u786e\u7684\u8fc7\u6ee4\u548c\u9650\u5236',
      short_name: '',
      tag_id: [],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'SSRF\uff0cServer-Side Request Forgery is a vulnerability formed by attackers to initiate requests from the server side. In general, the target of SSRF attack is the internal system that cannot be accessed from the external network. Most of the reasons for the vulnerability are that the server provides the function of obtaining data from other server applications without proper filtering and restriction on the target address',
      key: 'ssrf',
      name_en: 'ssrf',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: '\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        '1. Restrict protocols to HTTP and HTTPS 2. Do not restrict 302 redirection 3. Set URL white list or restrict intranet IP',
    },
    '2de737e4-b4a0-15bf-ff79-930e2daef736': {
      impact_en: 'Possible sensitive information disclosure.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation: '\u9632\u6b62\u5c06\u6b64\u4fe1\u606f\u663e\u793a\u7ed9\u7528\u6237\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa021b',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact: '\u53ef\u80fd\u7684\u654f\u611f\u4fe1\u606f\u62ab\u9732\u3002',
      poc_check: false,
      vul_id: '2de737e4-b4a0-15bf-ff79-930e2daef736',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        '\u5728\u6b64\u9875\u9762\u4e0a\u627e\u5230\u4e0e\u5185\u90e8IPv4\u5730\u5740\u5339\u914d\u7684\u5b57\u7b26\u4e32\u3002\u8fd9\u53ef\u4ee5\u516c\u5f00\u5173\u4e8e\u5185\u90e8\u7f51\u7edc\u7684IP\u5bfb\u5740\u65b9\u6848\u7684\u4fe1\u606f\u3002\u6b64\u4fe1\u606f\u53ef\u7528\u4e8e\u8fdb\u884c\u8fdb\u4e00\u6b65\u653b\u51fb\u3002   \u6b64\u8b66\u62a5\u53ef\u80fd\u662f\u8bef\u62a5\uff0c\u9700\u8981\u624b\u52a8\u786e\u8ba4 ',
      short_name: '',
      tag_id: ['48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing scheme of the internal network. This information can be used to conduct further attacks.This alert may be a false positive, manual confirmation is required.',
      key: '2de737e4-b4a0-15bf-ff79-930e2daef736',
      name_en: 'Possible internal IP address disclosure',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u53ef\u80fd\u7684\u5185\u90e8IP\u5730\u5740\u6cc4\u9732',
      level: 0,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Prevent this information from being displayed to the user.',
    },
    directory_traversal: {
      impact_en:
        'By exploiting directory traversal vulnerabilities, attackers step out of the root directory and access files in other directories. As a result, attackers might view restricted files or execute commands, leading to a full compromise of the Web server.',
      reference: ['http://www.acunetix.com/websitesecurity/directory-traversal.htm'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        "Web\u5e94\u7528\u7a0b\u5e8f\u5e94\u8be5\u5bf9\u5916\u90e8\u7528\u6237\u7684\u8f93\u5165\u6570\u636e\u505a\u6709\u6548\u8fc7\u6ee4\uff0c\u4f8b\u5982\u8fc7\u6ee4 '../','..%2f','.\\','%00' \u7b49\u7279\u6b8a\u5b57\u7b26\u3002",
      wasc: ['WASC-33'],
      id: '5bed0d527dc93b08352e90a3',
      findtime: '2004-03-27 00:00:00',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u53ef\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\u4ee5Web\u670d\u52a1\u5668\u7684\u8fd0\u884c\u6743\u9650\u8bfb\u53d6\u670d\u52a1\u5668\u4e0a\u53d7\u9650\u8bbf\u95ee\u7684\u6587\u4ef6\u751a\u81f3\u5728\u670d\u52a1\u5668\u4e0a\u6267\u884c\u7cfb\u7edf\u547d\u4ee4\u3002',
      poc_check: true,
      vul_id: 1974,
      is_scanv: '1',
      cwe: ['CWE-22'],
      is0day: false,
      description:
        '\u653b\u51fb\u8005\u5229\u7528\u670d\u52a1\u5668\u7684\u7279\u6027\uff0c\u6bd4\u5982\u901a\u8fc7\u7279\u6b8a\u7b26\u53f7\u201c~/\u201d\uff0c\u201c/..\u201d\u7b49\u8fdb\u884c\u76ee\u5f55\u8df3\u8f6c\u56de\u6eaf\uff0c\u4ece\u800c\u53ef\u4ee5\u8d8a\u6743\u8bbf\u95ee\u6216\u8005\u8986\u76d6\u654f\u611f\u6570\u636e\uff0c\u5982\u7f51\u7ad9\u7684\u914d\u7f6e\u6587\u4ef6\u3001\u7cfb\u7edf\u7684\u6838\u5fc3\u6587\u4ef6\uff0c\u751a\u81f3\u6267\u884c\u7cfb\u7edf\u547d\u4ee4\u3002',
      short_name: '',
      tag_id: [318],
      cve_info: [],
      cnnvd_info: [],
      description_en: 'This script is possibly vulnerable to directory traversal attacks',
      key: 'directory_traversal',
      name_en: 'Directory traversal',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: '\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
      level: 8,
      owasp_level: ['2013A4', '2017A5'],
      rule: '',
      test_data: '',
      recommendation_en: 'Your script should filter metacharacters from user input.',
    },
    'd33f9ab3-d5d2-a378-9779-905b8618ba9c': {
      impact_en:
        'An attacker may attempt to discover a weak password by systematically trying every possible combination of letters, numbers, and symbols until it discovers the one correct combination that works.',
      reference: ['http://www.owasp.org/index.php/Blocking_Brute_Force_Attacks'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5efa\u8bae\u5728\u5b9a\u4e49\u7684\u9519\u8bef\u5bc6\u7801\u5c1d\u8bd5\u6b21\u6570\u540e\u5b9e\u65bd\u67d0\u79cd\u7c7b\u578b\u7684\u5e10\u6237\u9501\u5b9a\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa0187',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u53ef\u80fd\u4f1a\u5c1d\u8bd5\u901a\u8fc7\u7cfb\u7edf\u5730\u5c1d\u8bd5\u6bcf\u4e2a\u53ef\u80fd\u7684\u5b57\u6bcd\uff0c\u6570\u5b57\u548c\u7b26\u53f7\u7ec4\u5408\u6765\u53d1\u73b0\u5f31\u5bc6\u7801\uff0c\u76f4\u5230\u5b83\u53d1\u73b0\u4e00\u4e2a\u6b63\u5e38\u7684\u7ec4\u5408\u6709\u6548\u3002',
      poc_check: false,
      vul_id: 'd33f9ab3-d5d2-a378-9779-905b8618ba9c',
      is_scanv: '2',
      cwe: ['CWE-307'],
      is0day: false,
      description:
        'Web\u5f00\u53d1\u4eba\u5458\u9762\u4e34\u7684\u4e00\u4e2a\u5e38\u89c1\u5a01\u80c1\u662f\u79f0\u4e3a\u66b4\u529b\u653b\u51fb\u7684\u5bc6\u7801\u731c\u6d4b\u653b\u51fb\u3002\u86ee\u529b\u653b\u51fb\u662f\u8bd5\u56fe\u901a\u8fc7\u7cfb\u7edf\u5730\u5c1d\u8bd5\u6bcf\u4e2a\u53ef\u80fd\u7684\u5b57\u6bcd\uff0c\u6570\u5b57\u548c\u7b26\u53f7\u7ec4\u5408\u6765\u53d1\u73b0\u5bc6\u7801\uff0c\u76f4\u5230\u60a8\u53d1\u73b0\u4e00\u4e2a\u6709\u6548\u7684\u6b63\u786e\u7ec4\u5408\u3002 \u6b64\u767b\u5f55\u9875\u9762\u6ca1\u6709\u4efb\u4f55\u9488\u5bf9\u5bc6\u7801\u731c\u6d4b\u653b\u51fb\uff08\u66b4\u529b\u653b\u51fb\uff09\u7684\u4fdd\u62a4\u3002\u5efa\u8bae\u5728\u5b9a\u4e49\u7684\u9519\u8bef\u5bc6\u7801\u5c1d\u8bd5\u6b21\u6570\u540e\u5b9e\u65bd\u67d0\u79cd\u7c7b\u578b\u7684\u5e10\u6237\u9501\u5b9a\u3002\u6709\u5173\u89e3\u51b3\u6b64\u95ee\u9898\u7684\u8be6\u7ec6\u4fe1\u606f\uff0c\u8bf7\u53c2\u9605Web\u5f15\u7528\u3002',
      short_name: '',
      tag_id: ['16', '17', '310'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. \n\nThis login page doesn't have any protection against password-guessing attacks (brute force attacks). It's recommended to implement some type of account lockout after a defined number of incorrect password attempts. Consult Web references for more information about fixing this problem.",
      key: 'd33f9ab3-d5d2-a378-9779-905b8618ba9c',
      name_en: 'Login page password-guessing attack',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u767b\u5f55\u9875\u9762\u5bc6\u7801\u731c\u6d4b\u653b\u51fb',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        "It's recommended to implement some type of account lockout after a defined number of incorrect password attempts.",
    },
    '04b4867e-5297-23ff-c810-97acf15ed71a': {
      impact_en: 'Cookies can be accessed by client-side scripts.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5982\u679c\u53ef\u80fd\uff0c\u60a8\u5e94\u8be5\u4e3a\u6b64cookie\u8bbe\u7f6eHttpOnly\u6807\u5fd7\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff48',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact: '\u5ba2\u6237\u7aef\u811a\u672c\u53ef\u4ee5\u8bbf\u95eeCookie\u3002',
      poc_check: false,
      vul_id: '04b4867e-5297-23ff-c810-97acf15ed71a',
      is_scanv: '2',
      cwe: ['CWE-16'],
      is0day: false,
      description:
        '\u6b64cookie\u6ca1\u6709\u8bbe\u7f6eHttpOnly\u6807\u5fd7\u3002\u5f53\u4f7f\u7528HttpOnly\u6807\u5fd7\u8bbe\u7f6ecookie\u65f6\uff0c\u5b83\u4f1a\u6307\u793a\u6d4f\u89c8\u5668cookie\u53ea\u80fd\u7531\u670d\u52a1\u5668\u8bbf\u95ee\uff0c\u800c\u4e0d\u80fd\u7531\u5ba2\u6237\u7aef\u811a\u672c\u8bbf\u95ee\u3002\u8fd9\u662f\u4f1a\u8bddcookie\u7684\u91cd\u8981\u5b89\u5168\u4fdd\u62a4\u3002',
      short_name: '',
      tag_id: ['310'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This cookie does not have the HttpOnly flag set. When a cookie is set with the HttpOnly flag, it instructs the browser that the cookie can only be accessed by the server and not by client-side scripts. This is an important security protection for session cookies.',
      key: '04b4867e-5297-23ff-c810-97acf15ed71a',
      name_en: 'Cookie(s) without HttpOnly flag set',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u6ca1\u6709HttpOnly\u6807\u5fd7\u8bbe\u7f6e\u7684Cookie',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'If possible, you should set the HttpOnly flag for this cookie.',
    },
    '705e9c7a-bb83-d5be-807c-7fae5cd268d7': {
      impact_en:
        'This directory may expose sensitive information that could help a malicious user to prepare more advanced attacks.',
      reference: ['http://www.Attacker.com/websitesecurity/webserver-security/'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u9650\u5236\u5bf9\u6b64\u76ee\u5f55\u7684\u8bbf\u95ee\u6216\u5c06\u5176\u4ece\u7f51\u7ad9\u4e2d\u5220\u9664\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa021d',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u6b64\u76ee\u5f55\u53ef\u80fd\u4f1a\u6cc4\u9732\u53ef\u5e2e\u52a9\u6076\u610f\u7528\u6237\u51c6\u5907\u66f4\u9ad8\u7ea7\u653b\u51fb\u7684\u654f\u611f\u4fe1\u606f\u3002',
      poc_check: false,
      vul_id: '705e9c7a-bb83-d5be-807c-7fae5cd268d7',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        '\u627e\u5230\u4e86\u53ef\u80fd\u7684\u654f\u611f\u76ee\u5f55\u3002\u6b64\u76ee\u5f55\u672a\u76f4\u63a5\u4ece\u7f51\u7ad9\u94fe\u63a5\u3002\u6b64\u68c0\u67e5\u67e5\u627e\u5e38\u89c1\u7684\u654f\u611f\u8d44\u6e90\uff0c\u5982\u5907\u4efd\u76ee\u5f55\uff0c\u6570\u636e\u5e93\u8f6c\u50a8\uff0c\u7ba1\u7406\u9875\u9762\uff0c\u4e34\u65f6\u76ee\u5f55\u3002\u8fd9\u4e9b\u76ee\u5f55\u4e2d\u7684\u6bcf\u4e00\u4e2a\u90fd\u53ef\u4ee5\u5e2e\u52a9\u653b\u51fb\u8005\u66f4\u591a\u5730\u4e86\u89e3\u4ed6\u7684\u76ee\u6807\u3002',
      short_name: '',
      tag_id: ['48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these directories could help an attacker to learn more about his target.',
      key: '705e9c7a-bb83-d5be-807c-7fae5cd268d7',
      name_en: 'Possible sensitive directories',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u53ef\u80fd\u7684\u654f\u611f\u76ee\u5f55',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Restrict access to this directory or remove it from the website.',
    },
    file_inclusion: {
      impact_en:
        'It is possible for a remote attacker to include a file from local or remote resources and/or execute arbitrary script code with the privileges of the web-server.',
      reference: [
        'http://en.wikipedia.org/wiki/Remote_file_inclusion\nhttp://www.php.net/manual/en/features.remote-files.php',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        'Web\u5e94\u7528\u7a0b\u5e8f\u5e94\u8be5\u5bf9\u5916\u90e8\u7528\u6237\u7684\u8f93\u5165\u6570\u636e\u505a\u6709\u6548\u8fc7\u6ee4\uff0c\u5bf9\u8981\u5305\u542b\u7684\u6587\u4ef6\u540d\u4f7f\u7528\u767d\u540d\u5355\u3002',
      wasc: ['WASC-05'],
      id: '5bed0d527dc93b08352e90ac',
      findtime: '2004-03-27 00:00:00',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u901a\u8fc7\u6f0f\u6d1e\u53ef\u4ee5\u5305\u542b\u4e00\u4e2a\u672c\u5730\u6216\u8fdc\u7a0b\u6587\u4ef6\u4ee5Web\u670d\u52a1\u5668\u7684\u6743\u9650\u6267\u884c\u5305\u542b\u7684\u6076\u610f\u4ee3\u7801\u6587\u4ef6\u3002',
      poc_check: true,
      vul_id: 1983,
      is_scanv: '1',
      cwe: ['CWE-98'],
      is0day: false,
      description:
        '\u670d\u52a1\u5668\u901a\u8fc7\u7f16\u7a0b\u8bed\u8a00\u7684\u7279\u6027\uff08\u51fd\u6570\uff09\u53bb\u5305\u542b\u5176\u4ed6\u6587\u4ef6\u65f6\uff0c\u7531\u4e8e\u8981\u5305\u542b\u7684\u8fd9\u4e2a\u6587\u4ef6\u8fc7\u6ee4\u4e0d\u4e25\uff0c\u4ece\u800c\u53ef\u4ee5\u53bb\u5305\u542b\u4e00\u4e2a\u6076\u610f\u6587\u4ef6\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u6784\u9020\u8fd9\u4e2a\u8981\u5305\u542b\u7684\u6076\u610f\u6587\u4ef6\u4ece\u800c\u53ef\u4ee5\u6267\u884c\u7cfb\u7edf\u547d\u4ee4\uff0c\u63a7\u5236Web\u670d\u52a1\u5668\u3002',
      short_name: '',
      tag_id: [324],
      cve_info: [],
      cnnvd_info: [],
      description_en: 'This script is possibly vulnerable to file inclusion attacks.',
      key: 'file_inclusion',
      name_en: 'File inclusion',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: '\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Edit the source code to ensure that input is properly validated. Where is possible, it is recommended to make a list of accepted filenames and restrict the input to that list.',
    },
    'be88ca37-79f7-bb85-f765-e957c60941d0': {
      impact_en:
        'It is possible for a remote attacker to include a file from local or remote resources and/or execute arbitrary script code with the privileges of the web-server.',
      reference: [
        'http://www.php.net/manual/en/features.remote-files.php',
        'http://www.owasp.org/index.php/PHP_Top_5',
        'http://en.wikipedia.org/wiki/Remote_file_inclusion',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u7f16\u8f91\u6e90\u4ee3\u7801\u4ee5\u786e\u4fdd\u6b63\u786e\u9a8c\u8bc1\u8f93\u5165\u3002\u5728\u53ef\u80fd\u7684\u60c5\u51b5\u4e0b\uff0c\u5efa\u8bae\u5217\u51fa\u5df2\u63a5\u53d7\u7684\u6587\u4ef6\u540d\u5e76\u5c06\u8f93\u5165\u9650\u5236\u5728\u8be5\u5217\u8868\u4e2d\u3002 \u5bf9\u4e8ePHP\uff0c\u9009\u9879 allow_url_fopen \u901a\u5e38\u5141\u8bb8\u7a0b\u5e8f\u5458\u6253\u5f00\uff0c\u5305\u542b\u6216\u4ee5\u5176\u4ed6\u65b9\u5f0f\u4f7f\u7528URL\u800c\u4e0d\u662f\u672c\u5730\u6587\u4ef6\u8def\u5f84\u4f7f\u7528\u8fdc\u7a0b\u6587\u4ef6\u3002\u5efa\u8bae\u4ecephp.ini\u4e2d\u7981\u7528\u6b64\u9009\u9879\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa003c',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u80fd\u5305\u542b\u6765\u81ea\u672c\u5730\u6216\u8fdc\u7a0b\u8d44\u6e90\u7684\u6587\u4ef6\u548c/\u6216\u4f7f\u7528Web\u670d\u52a1\u5668\u7684\u7279\u6743\u6267\u884c\u4efb\u610f\u811a\u672c\u4ee3\u7801\u3002',
      poc_check: false,
      vul_id: 'be88ca37-79f7-bb85-f765-e957c60941d0',
      is_scanv: '2',
      cwe: ['CWE-20'],
      is0day: false,
      description:
        '\u6b64\u811a\u672c\u53ef\u80fd\u5bb9\u6613\u53d7\u5230\u6587\u4ef6\u5305\u542b\u653b\u51fb\u3002\u8be5\u811a\u672c\u4f3c\u4e4e\u5305\u542b\u4e00\u4e2a\u6587\u4ef6\uff0c\u8be5\u6587\u4ef6\u7684\u540d\u79f0\u662f\u4f7f\u7528\u7528\u6237\u63d0\u4f9b\u7684\u6570\u636e\u786e\u5b9a\u7684\u3002\u5728\u4f20\u9012\u7ed9include\u51fd\u6570\u4e4b\u524d\uff0c\u6b64\u6570\u636e\u672a\u6b63\u786e\u9a8c\u8bc1\u3002',
      short_name: '',
      tag_id: ['324'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This script is possibly vulnerable to file inclusion attacks. It seems that this script includes a file which name is determined using user-supplied data. This data is not properly validated before being passed to the include function. ',
      key: 'be88ca37-79f7-bb85-f765-e957c60941d0',
      name_en: 'File inclusion',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u6587\u4ef6\u5305\u542b',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Edit the source code to ensure that input is properly validated. Where is possible, it is recommended to make a list of accepted filenames and restrict the input to that list.\nFor PHP, the option allow_url_fopen would normally allow a programmer to open, include or otherwise use a remote file using a URL rather than a local file path. It is recommended to disable this option from php.ini.',
    },
    '760d5a01-dc58-fcbe-6c21-4f04c64a2467': {
      impact_en:
        'Error messages may disclose sensitive information which can be used to escalate attacks.',
      reference: [
        'http://www.php.net/manual/en/errorfunc.configuration.php#ini.display-errors',
        'https://www.owasp.org/index.php/Improper_Error_Handling',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u9a8c\u8bc1\u6b64\u9875\u9762\u662f\u5426\u516c\u5f00\u9519\u8bef\u6216\u8b66\u544a\u6d88\u606f\uff0c\u5e76\u6b63\u786e\u914d\u7f6e\u5e94\u7528\u7a0b\u5e8f\u4ee5\u5c06\u9519\u8bef\u8bb0\u5f55\u5230\u6587\u4ef6\u800c\u4e0d\u662f\u5411\u7528\u6237\u663e\u793a\u9519\u8bef\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9fee1',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u9519\u8bef\u6d88\u606f\u53ef\u80fd\u4f1a\u6cc4\u9732\u53ef\u7528\u4e8e\u5347\u7ea7\u653b\u51fb\u7684\u654f\u611f\u4fe1\u606f\u3002',
      poc_check: false,
      vul_id: '760d5a01-dc58-fcbe-6c21-4f04c64a2467',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        ' \u6b64\u8b66\u62a5\u9700\u8981\u624b\u52a8\u786e\u8ba4  \u5e94\u7528\u7a0b\u5e8f\u9519\u8bef\u6216\u8b66\u544a\u6d88\u606f\u53ef\u80fd\u4f1a\u6cc4\u9732\u6709\u5173\u5e94\u7528\u7a0b\u5e8f\u5185\u90e8\u7684\u654f\u611f\u4fe1\u606f\u5bf9\u653b\u51fb\u8005\u7684\u64cd\u4f5c\u3002  Attacker\u53d1\u73b0\u4e86\u53ef\u80fd\u6cc4\u9732\u654f\u611f\u4fe1\u606f\u7684\u9519\u8bef\u6216\u8b66\u544a\u4fe1\u606f\u3002\u8be5\u6d88\u606f\u8fd8\u53ef\u80fd\u5305\u542b\u751f\u6210\u672a\u5904\u7406\u5f02\u5e38\u7684\u6587\u4ef6\u7684\u4f4d\u7f6e\u3002\u6709\u5173\u53d7\u5f71\u54cd\u9875\u9762\u7684\u8be6\u7ec6\u4fe1\u606f\uff0c\u8bf7\u53c2\u9605\u201c\u653b\u51fb\u8be6\u7ec6\u4fe1\u606f\u201d\u90e8\u5206\u3002',
      short_name: '',
      tag_id: ['48', '315'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "This alert requires manual confirmation\n\nApplication error or warning messages may expose sensitive information about an application's internal workings to an attacker.\n\nAttacker found an error or warning message that may disclose sensitive information. The message may also contain the location of the file that produced an unhandled exception. Consult the 'Attack details' section for more information about the affected page.",
      key: '760d5a01-dc58-fcbe-6c21-4f04c64a2467',
      name_en: 'Application error message',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u5e94\u7528\u7a0b\u5e8f\u9519\u8bef\u6d88\u606f',
      level: 6,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Verify that this page is disclosing error or warning messages and properly configure the application to log errors to a file instead of displaying the error to the user.',
    },
    '376b6959-afe1-462a-4970-a6d09fd5d8fb': {
      impact_en: 'Possible sensitive information disclosure.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5e94\u5728\u654f\u611f\u5e94\u7528\u7a0b\u5e8f\u4e2d\u7981\u7528\u5bc6\u7801\u81ea\u52a8\u5b8c\u6210\u3002\u8981\u7981\u7528\u81ea\u52a8\u5b8c\u6210\uff0c\u60a8\u53ef\u4ee5\u4f7f\u7528\u7c7b\u4f3c\u4e8e\u4ee5\u4e0b\u7684\u4ee3\u7801\uff1a \uff06lt; INPUT TYPE =\uff06quot; password\uff06quot;\u00a0AUTOCOMPLETE = QUOT;\u8131\uff06QUOT;\uff06GT;  ',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff57',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact: '\u53ef\u80fd\u7684\u654f\u611f\u4fe1\u606f\u62ab\u9732\u3002',
      poc_check: false,
      vul_id: '376b6959-afe1-462a-4970-a6d09fd5d8fb',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        '\u5f53\u5728\u8868\u5355\u4e2d\u8f93\u5165\u65b0\u540d\u79f0\u548c\u5bc6\u7801\u5e76\u63d0\u4ea4\u8868\u5355\u65f6\uff0c\u6d4f\u89c8\u5668\u4f1a\u8be2\u95ee\u662f\u5426\u5e94\u4fdd\u5b58\u5bc6\u7801\u3002\u6b64\u540e\u663e\u793a\u8868\u5355\u65f6\uff0c\u540d\u79f0\u548c\u5bc6\u7801\u4f1a\u81ea\u52a8\u586b\u5199\u6216\u5728\u8f93\u5165\u540d\u79f0\u65f6\u5b8c\u6210\u3002\u5177\u6709\u672c\u5730\u8bbf\u95ee\u6743\u9650\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u4ece\u6d4f\u89c8\u5668\u7f13\u5b58\u4e2d\u83b7\u53d6\u660e\u6587\u5bc6\u7801\u3002',
      short_name: '',
      tag_id: ['48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is entered. An attacker with local access could obtain the cleartext password from the browser cache.',
      key: '376b6959-afe1-462a-4970-a6d09fd5d8fb',
      name_en: 'Password type input with auto-complete enabled',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u542f\u7528\u81ea\u52a8\u5b8c\u6210\u7684\u5bc6\u7801\u7c7b\u578b\u8f93\u5165',
      level: 0,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'The password auto-complete should be disabled in sensitive applications. To disable auto-complete, you may use a code similar to: &lt;INPUT TYPE=&quot;password&quot; AUTOCOMPLETE=&quot;off&quot;&gt;',
    },
    '9d6dfac0-c237-b12a-c1d3-5dc9b953a15c': {
      impact_en: 'Possible sensitive information disclosure.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u4ece\u60a8\u7684\u7f51\u7ad9\u5220\u9664\u6b64\u6587\u4ef6\u6216\u66f4\u6539\u5176\u6743\u9650\u4ee5\u5220\u9664\u8bbf\u95ee\u6743\u9650\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa021f',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact: '\u53ef\u80fd\u7684\u654f\u611f\u4fe1\u606f\u62ab\u9732\u3002',
      poc_check: false,
      vul_id: '9d6dfac0-c237-b12a-c1d3-5dc9b953a15c',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        '\u5728\u6b64\u6587\u4ef6\u4e2d\u627e\u5230\u4e86\u7528\u6237\u540d\u548c/\u6216\u5bc6\u7801\u3002\u6b64\u4fe1\u606f\u53ef\u80fd\u5f88\u654f\u611f\u3002   \u6b64\u8b66\u62a5\u53ef\u80fd\u662f\u8bef\u62a5\uff0c\u9700\u8981\u624b\u52a8\u786e\u8ba4\u3002 ',
      short_name: '',
      tag_id: ['48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'A username and/or password was found in this file. This information could be sensitive.This alert may be a false positive, manual confirmation is required.',
      key: '9d6dfac0-c237-b12a-c1d3-5dc9b953a15c',
      name_en: 'Possible username or password disclosure',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u53ef\u80fd\u7684\u7528\u6237\u540d\u6216\u5bc6\u7801\u6cc4\u9732',
      level: 0,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Remove this file from your website or change its permissions to remove access.',
    },
    '601be85c-708f-2089-cead-f0937957ed5e': {
      impact_en: 'The impact of this vulnerability depends on the affected web application.',
      reference: [
        'http://www.Attacker.com/blog/web-security-zone/html-form-found-in-redirect-page/',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u786e\u4fdd\u5728\u5c06\u7528\u6237\u91cd\u5b9a\u5411\u5230\u53e6\u4e00\u4e2a\u9875\u9762\u540e\u7ec8\u6b62\u811a\u672c\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa0069',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u6b64\u6f0f\u6d1e\u7684\u5f71\u54cd\u53d6\u51b3\u4e8e\u53d7\u5f71\u54cd\u7684Web\u5e94\u7528\u7a0b\u5e8f\u3002',
      poc_check: false,
      vul_id: '601be85c-708f-2089-cead-f0937957ed5e',
      is_scanv: '2',
      cwe: ['CWE-287'],
      is0day: false,
      description:
        ' \u6b64\u8b66\u62a5\u9700\u8981\u624b\u52a8\u786e\u8ba4\u3002  \u5728\u54cd\u5e94\u6b63\u6587\u4e2d\u627e\u5230\u4e86\u4e00\u4e2aHTML\u8868\u5355\u8fd9\u4e00\u9875\u3002\u4f46\u662f\uff0c\u5f53\u524d\u9875\u9762\u901a\u8fc7\u8fd4\u56deHTTP\u72b6\u6001\u4ee3\u7801301/302\u5c06\u8bbf\u95ee\u8005\u91cd\u5b9a\u5411\u5230\u53e6\u4e00\u4e2a\u9875\u9762\u3002\u56e0\u6b64\uff0c\u6240\u6709\u6d4f\u89c8\u5668\u7528\u6237\u90fd\u4e0d\u4f1a\u770b\u5230\u6b64\u9875\u9762\u7684\u5185\u5bb9\uff0c\u4e5f\u65e0\u6cd5\u4e0eHTML\u8868\u5355\u8fdb\u884c\u4ea4\u4e92\u3002 \u6709\u65f6\u7a0b\u5e8f\u5458\u5728\u5c06\u7528\u6237\u91cd\u5b9a\u5411\u5230\u53e6\u4e00\u4e2a\u9875\u9762\u540e\u6ca1\u6709\u6b63\u786e\u7ec8\u6b62\u811a\u672c\u3002\u4f8b\u5982\uff1a \uff06lt;\uff1fphp if\uff08\uff01isset\uff08$ _ SESSION [\uff06quot; authenticated\uff06quot;]\uff09\uff09{header\uff08\uff06quot; Location\uff1aauth.php\uff06quot;\uff09;\u00a0}\uff06gt;\uff06lt; title\uff06gt;\u7ba1\u7406\u9875\u9762\uff06lt; / title\uff06gt;\uff06lt; form action =\uff06quot; / admin / action\uff06quot;\u00a0\u65b9\u6cd5= QUOT;\u4ea4\uff06QUOT;\uff06GT;\u00a0\uff06lt ;! - ...\u8868\u5355\u8f93\u5165... - \uff06gt;\uff06lt; / form\uff06gt;\u00a0\uff06lt ;! - ...\u7ba1\u7406\u9875\u9762\u7684\u5176\u4f59\u90e8\u5206... - \uff06gt;  \u6b64\u811a\u672c\u4e0d\u6b63\u786e\uff0c\u56e0\u4e3a\u811a\u672c\u672a\u5728\u201cheader\uff08\uff06quot; Location\uff1aauth\uff09\u201d\u540e\u7ec8\u6b62.PHP\uff06QUOT;\uff09;\uff06QUOT;\u00a0\u7ebf\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u4f7f\u7528\u4e0d\u9075\u5faa\u91cd\u5b9a\u5411\u7684HTTP\u5ba2\u6237\u7aef\uff08\u5982HTTP\u7f16\u8f91\u5668\uff09\u8bbf\u95ee\u7ba1\u7406\u9875\u9762\u4e2d\u7684\u5185\u5bb9\u3002\u8fd9\u4f1a\u521b\u5efa\u8eab\u4efd\u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e\u3002\u6b63\u786e\u7684\u4ee3\u7801\u662f \uff06lt;\uff1fphp if\uff08\uff01isset\uff08$ _ SESSION [auth]\uff09\uff09{header\uff08\uff06quot; Location\uff1aauth.php\uff06quot;\uff09;\u00a0\u51fa\u53e3\uff08\uff09;\u00a0}\uff06gt;\uff06lt; title\uff06gt;\u7ba1\u7406\u9875\u9762\uff06lt; / title\uff06gt;\uff06lt; form action =\uff06quot; / admin / action\uff06quot;\u00a0\u65b9\u6cd5= QUOT;\u4ea4\uff06QUOT;\uff06GT;\u00a0\uff06lt ;! - ...\u8868\u5355\u8f93\u5165... - \uff06gt;\uff06lt; / form\uff06gt;\u00a0\uff06lt;\uff01 - ......\u7ba1\u7406\u9875\u9762\u7684\u5176\u4f59\u90e8\u5206...... - \uff06gt;  ',
      short_name: '',
      tag_id: ['16', '48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "Manual confirmation is required for this alert.\nAn HTML form was found in the response body of this page. However, the current page redirects the visitor to another page by returning an HTTP status code of 301/302. Therefore, all browser users will not see the contents of this page and will not be able to interact with the HTML form. \n\nSometimes programmers don't properly terminate the script after redirecting the user to another page. For example:\n\n\n\n&lt;?php\n    if (!isset($_SESSION[&quot;authenticated&quot;])) {\n        header(&quot;Location: auth.php&quot;);\n    }\n?&gt;\n&lt;title&gt;Administration page&lt;/title&gt;\n&lt;form action=&quot;/admin/action&quot; method=&quot;post&quot;&gt;\n    &lt;!-- ...  form inputs ...  --&gt;\n&lt;/form&gt;\n  \n&lt;!-- ...  the rest of the administration page ...  --&gt;\n\n\n\nThis script is incorrect because the script is not terminated after the &quot;header(&quot;Location: auth.php&quot;);&quot; line. An attacker can access the content the administration page by using an HTTP client that doesn't follow redirection (like HTTP Editor). This creates an authentication bypass vulnerability. \n\nThe correct code would be \n\n\n&lt;?php\n    if (!isset($_SESSION[auth])) {\n        header(&quot;Location: auth.php&quot;);\n        exit();\n    }\n?&gt;\n&lt;title&gt;Administration page&lt;/title&gt;\n&lt;form action=&quot;/admin/action&quot; method=&quot;post&quot;&gt;\n    &lt;!-- ...  form inputs ...  --&gt;\n&lt;/form&gt;\n    \n&lt;!-- ...  the rest of the administration page ...  --&gt;\n\n",
      key: '601be85c-708f-2089-cead-f0937957ed5e',
      name_en: 'HTML Form found in redirect page',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u5728\u91cd\u5b9a\u5411\u9875\u9762\u4e2d\u627e\u5230\u7684HTML\u8868\u5355',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Make sure the script is terminated after redirecting the user to another page.',
    },
    '55602219-992f-5669-1663-e8cf908b3181': {
      impact_en:
        'These files may disclose sensitive information. This information can be used to launch further attacks.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5220\u9664\u6216\u9650\u5236\u5bf9Internet\u4e0a\u53ef\u8bbf\u95ee\u7684\u6240\u6709\u914d\u7f6e\u6587\u4ef6\u7684\u8bbf\u95ee\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff6b',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u8fd9\u4e9b\u6587\u4ef6\u53ef\u80fd\u4f1a\u6cc4\u9732\u654f\u611f\u4fe1\u606f\u3002\u6b64\u4fe1\u606f\u53ef\u7528\u4e8e\u53d1\u52a8\u8fdb\u4e00\u6b65\u7684\u653b\u51fb\u3002',
      poc_check: false,
      vul_id: '55602219-992f-5669-1663-e8cf908b3181',
      is_scanv: '2',
      cwe: ['CWE-538'],
      is0day: false,
      description:
        '\u5728\u6b64\u76ee\u5f55\u4e2d\u627e\u5230\u4e86\u914d\u7f6e\u6587\u4ef6\uff08\u4f8b\u5982Vagrantfile\uff0cGemfile\uff0cRakefile\uff0c...\uff09\u3002\u6b64\u6587\u4ef6\u53ef\u80fd\u4f1a\u6cc4\u9732\u53ef\u80fd\u6709\u52a9\u4e8e\u6076\u610f\u7528\u6237\u51c6\u5907\u66f4\u9ad8\u7ea7\u653b\u51fb\u7684\u654f\u611f\u4fe1\u606f\u3002\u5efa\u8bae\u4ece\u751f\u4ea7\u7cfb\u7edf\u4e2d\u5220\u9664\u6216\u9650\u5236\u5bf9\u6b64\u7c7b\u6587\u4ef6\u7684\u8bbf\u95ee\u3002',
      short_name: '',
      tag_id: ['48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "A configuration file (e.g. Vagrantfile, Gemfile, Rakefile, ...) was found in this directory. This file may expose sensitive information that could help a malicious user to prepare more advanced attacks.  It's recommended to remove or restrict access to this type of files from production systems.",
      key: '55602219-992f-5669-1663-e8cf908b3181',
      name_en: 'Development configuration file',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u5f00\u53d1\u914d\u7f6e\u6587\u4ef6',
      level: 6,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Remove or restrict access to all configuration files acessible from internet.',
    },
    'd4b48cfc-be42-03bf-fcdf-822909b4ab3e': {
      impact_en:
        'These files may expose sensitive information that may help an malicious user to prepare more advanced attacks.',
      reference: [
        'http://www.ducea.com/2006/08/11/apache-tips-tricks-deny-access-to-some-folders/',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u4ece\u751f\u4ea7\u7cfb\u7edf\u4e2d\u5220\u9664\u8fd9\u4e9b\u6587\u4ef6\u6216\u9650\u5236\u5bf9.git\u76ee\u5f55\u7684\u8bbf\u95ee\u3002\u8981\u62d2\u7edd\u8bbf\u95ee\u6240\u6709.git\u6587\u4ef6\u5939\uff0c\u60a8\u9700\u8981\u5728\u76f8\u5e94\u7684\u4e0a\u4e0b\u6587\uff08\u5168\u5c40\u914d\u7f6e\uff0cvhost /\u76ee\u5f55\u6216.htaccess\uff09\u4e2d\u6dfb\u52a0\u4ee5\u4e0b\u884c\uff1a \uff06lt; Directory~\uff06quot; \\\u3002 git\uff06quot;\uff06gt;\u8ba2\u5355\u5141\u8bb8\uff0cdenyDeny\u6765\u81ea\u6240\u6709\uff06lt; /\u76ee\u5f55\uff06gt;  ',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa0055',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u8fd9\u4e9b\u6587\u4ef6\u53ef\u80fd\u4f1a\u6cc4\u9732\u53ef\u80fd\u6709\u52a9\u4e8e\u6076\u610f\u7528\u6237\u51c6\u5907\u66f4\u9ad8\u7ea7\u653b\u51fb\u7684\u654f\u611f\u4fe1\u606f\u3002',
      poc_check: false,
      vul_id: 'd4b48cfc-be42-03bf-fcdf-822909b4ab3e',
      is_scanv: '2',
      cwe: ['CWE-538'],
      is0day: false,
      description:
        '\u5728\u6b64\u6587\u4ef6\u5939\u4e2d\u627e\u5230Git\u5143\u6570\u636e\u76ee\u5f55\uff08.git\uff09\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7\u8bf7\u6c42\u7248\u672c\u63a7\u5236\u5de5\u5177Git\u521b\u5efa\u7684\u9690\u85cf\u5143\u6570\u636e\u76ee\u5f55\u6765\u63d0\u53d6\u654f\u611f\u4fe1\u606f\u3002\u5143\u6570\u636e\u76ee\u5f55\u7528\u4e8e\u5f00\u53d1\u76ee\u7684\uff0c\u4ee5\u4fbf\u5728\u5c06\u6e90\u4ee3\u7801\u63d0\u4ea4\u56de\u4e2d\u592e\u5b58\u50a8\u5e93\u4e4b\u524d\u8ddf\u8e2a\u4e00\u7ec4\u6e90\u4ee3\u7801\u7684\u5f00\u53d1\u66f4\u6539\uff08\u53cd\u4e4b\u4ea6\u7136\uff09\u3002\u5f53\u4ee3\u7801\u4ece\u5b58\u50a8\u5e93\u6eda\u52a8\u5230\u5b9e\u65f6\u670d\u52a1\u5668\u65f6\uff0c\u5b83\u5e94\u8be5\u4f5c\u4e3a\u5bfc\u51fa\u800c\u4e0d\u662f\u672c\u5730\u5de5\u4f5c\u526f\u672c\u5b8c\u6210\uff0c\u56e0\u6b64\u8fd9\u4e2a\u95ee\u9898\u3002',
      short_name: '',
      tag_id: ['48', '307', '317'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'Git metadata directory (.git) was found in this folder. An attacker can extract sensitive information by requesting the hidden metadata directory that version control tool Git creates. The metadata directories are used for development purposes to keep track of development changes to a set of source code before it is committed back to a central repository (and vice-versa). When code is rolled to a live server from a repository, it is supposed to be done as an export rather than as a local working copy, and hence this problem.',
      key: 'd4b48cfc-be42-03bf-fcdf-822909b4ab3e',
      name_en: 'Git repository found',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u627e\u5230Git\u5b58\u50a8\u5e93',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Remove these files from production systems or restrict access to the .git directory. To deny access to all the .git folders you need to add the following lines in the appropriate context (either global config, or vhost/directory, or from .htaccess):\n\n&lt;Directory ~ &quot;\\.git&quot;&gt;\nOrder allow,deny\nDeny from all\n&lt;/Directory&gt;\n',
    },
    'be51ec83-1af0-9961-fbf3-5db05859eecb': {
      impact_en: 'An attacker may access the contents of the password-protected page.',
      reference: [
        'http://en.wikipedia.org/wiki/Password_strength',
        'http://www.Attacker.com/websitesecurity/authentication/',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5b9e\u65bd\u5f3a\u5bc6\u7801\u7b56\u7565\u3002\u4e0d\u5141\u8bb8\u57fa\u4e8e\u5b57\u5178\u5355\u8bcd\u7684\u5f31\u5bc6\u7801\u6216\u5bc6\u7801\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa02e5',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u53ef\u80fd\u4f1a\u8bbf\u95ee\u53d7\u5bc6\u7801\u4fdd\u62a4\u7684\u9875\u9762\u7684\u5185\u5bb9\u3002',
      poc_check: false,
      vul_id: 'be51ec83-1af0-9961-fbf3-5db05859eecb',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        '\u6b64\u9875\u9762\u4f7f\u7528\u7684\u662f\u5f31\u5bc6\u7801\u3002Attacker\u80fd\u591f\u731c\u51fa\u8bbf\u95ee\u6b64\u9875\u9762\u6240\u9700\u7684\u51ed\u636e\u3002\u5f31\u5bc6\u7801\u662f\u77ed\u7684\uff0c\u5e38\u89c1\u7684\uff0c\u7cfb\u7edf\u9ed8\u8ba4\u7684\uff0c\u6216\u8005\u53ef\u4ee5\u901a\u8fc7\u4f7f\u7528\u6240\u6709\u53ef\u80fd\u5bc6\u7801\u7684\u5b50\u96c6\u6267\u884c\u66b4\u529b\u653b\u51fb\u800c\u5feb\u901f\u731c\u5230\u7684\u4e1c\u897f\uff0c\u4f8b\u5982\u5b57\u5178\u4e2d\u7684\u5355\u8bcd\uff0c\u4e13\u6709\u540d\u79f0\uff0c\u57fa\u4e8e\u7528\u6237\u540d\u7684\u5355\u8bcd\u6216\u8fd9\u4e9b\u4e3b\u9898\u7684\u5e38\u89c1\u53d8\u5316\u3002',
      short_name: '',
      tag_id: ['48', '310', '325'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This page is using a weak password. Attacker was able to guess the credentials required to access this page. A weak password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common variations on these themes.',
      key: 'be51ec83-1af0-9961-fbf3-5db05859eecb',
      name_en: 'Weak password',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u5bc6\u7801\u5f3a\u5ea6\u4f4e',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        "Enforce a strong password policy. Don't permit weak passwords or passwords based on dictionary words.",
    },
    '93ba8e7d-8061-f137-e30f-ac662a5d82e8': {
      impact_en:
        "On older versions of Internet Explorer it's possible to execute arbitrary JavaScript code using Internet Explorer's expression() function. An attacker can also extract the page source and potentially steal CSRF tokens using CSS selectors.",
      reference: ['http://www.thespanner.co.uk/2014/03/21/rpo/'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5982\u679c\u53ef\u80fd\uff0c\u5efa\u8bae\u4f7f\u7528\u7edd\u5bf9\u94fe\u63a5\u8fdb\u884cCSS\u5bfc\u5165\u3002\u901a\u8fc7\u9632\u6b62\u6846\u67b6\u53ef\u4ee5\u90e8\u5206\u5730\u7f13\u89e3\u8fd9\u4e2a\u95ee\u9898\u3002\u8981\u9632\u6b62\u6210\u5e27\uff0c\u8bf7\u5c06Web\u670d\u52a1\u5668\u914d\u7f6e\u4e3a\u5728\u6240\u6709\u9875\u9762\u4e0a\u5305\u542bX-Frame-Options\uff1adeny\u6807\u5934\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa0238',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u5728\u65e7\u7248\u672c\u7684Internet Explorer\u4e0a\uff0c\u53ef\u4ee5\u4f7f\u7528Internet Explorer\u7684expression\uff08\uff09\u51fd\u6570\u6267\u884c\u4efb\u610fJavaScript\u4ee3\u7801\u3002\u653b\u51fb\u8005\u8fd8\u53ef\u4ee5\u4f7f\u7528CSS\u9009\u62e9\u5668\u63d0\u53d6\u9875\u9762\u6e90\u5e76\u53ef\u80fd\u7a83\u53d6CSRF\u4ee4\u724c\u3002',
      poc_check: false,
      vul_id: '93ba8e7d-8061-f137-e30f-ac662a5d82e8',
      is_scanv: '2',
      cwe: ['CWE-20'],
      is0day: false,
      description:
        ' \u6b64\u8b66\u62a5\u9700\u8981\u624b\u52a8\u786e\u8ba4\u3002   Gareth Heyes\u4ecb\u7ecd\u4e86\u4e00\u79cd\u5229\u7528CSS\u7684\u6280\u672f\u901a\u8fc7\u8986\u76d6\u76ee\u6807\u6587\u4ef6\u5bfc\u5165\u76f8\u5bf9URL\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u4f7f\u7528\u6b64\u6280\u672f\u8bf1\u9a97\u6d4f\u89c8\u5668\u5c06HTML\u9875\u9762\u5bfc\u5165\u4e3aCSS\u6837\u5f0f\u8868\u3002\u5982\u679c\u653b\u51fb\u8005\u53ef\u4ee5\u63a7\u5236\u5bfc\u5165\u7684HTML\u9875\u9762\u7684\u4e00\u90e8\u5206\uff0c\u4ed6\u53ef\u4ee5\u6ee5\u7528\u6b64\u95ee\u9898\u6765\u6ce8\u5165\u4efb\u610fCSS\u89c4\u5219\u3002',
      short_name: '',
      tag_id: ['16'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'Manual confirmation is required for this alert.\nGareth Heyes introduced a technique to take advantage of CSS imports with relative URLs by overwriting their target file. This technique can be used by an attacker to trick browsers into importing HTML pages as CSS stylesheets. If the attacker can control a part of the imported HTML pages he can abuse this issue to inject arbitrary CSS rules.\n',
      key: '93ba8e7d-8061-f137-e30f-ac662a5d82e8',
      name_en: 'Possible relative path overwrite',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u53ef\u80fd\u7684\u76f8\u5bf9\u8def\u5f84\u8986\u76d6',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        "If possible, it's recommended to use absolute links for CSS imports. The problem can be partially mitigated by preventing framing. To prevent framing configure your web server to include an  X-Frame-Options: deny header on all pages.",
    },
    '92a2df52-5f25-bff6-2e5b-64717a2a417e': {
      impact_en:
        'A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u7531\u4e8e\u7528\u6237\u51ed\u636e\u88ab\u89c6\u4e3a\u654f\u611f\u4fe1\u606f\uff0c\u56e0\u6b64\u5e94\u59cb\u7ec8\u901a\u8fc7\u52a0\u5bc6\u8fde\u63a5\uff08HTTPS\uff09\u5c06\u5176\u4f20\u8f93\u5230\u670d\u52a1\u5668\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff5b',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u7b2c\u4e09\u65b9\u53ef\u80fd\u80fd\u591f\u901a\u8fc7\u62e6\u622a\u672a\u52a0\u5bc6\u7684HTTP\u8fde\u63a5\u6765\u8bfb\u53d6\u7528\u6237\u51ed\u8bc1\u3002',
      poc_check: false,
      vul_id: '92a2df52-5f25-bff6-2e5b-64717a2a417e',
      is_scanv: '2',
      cwe: ['CWE-310'],
      is0day: false,
      description:
        '\u7528\u6237\u51ed\u636e\u901a\u8fc7\u672a\u52a0\u5bc6\u7684\u901a\u9053\u4f20\u8f93\u3002\u5e94\u59cb\u7ec8\u901a\u8fc7\u52a0\u5bc6\u901a\u9053\uff08HTTPS\uff09\u4f20\u8f93\u6b64\u4fe1\u606f\uff0c\u4ee5\u907f\u514d\u88ab\u6076\u610f\u7528\u6237\u62e6\u622a\u3002',
      short_name: '',
      tag_id: [],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'User credentials are transmitted over an unencrypted channel. This information should always be transferred via an encrypted channel (HTTPS) to avoid being intercepted by malicious users.',
      key: '92a2df52-5f25-bff6-2e5b-64717a2a417e',
      name_en: 'User credentials are sent in clear text',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u7528\u6237\u51ed\u636e\u4ee5\u660e\u6587\u5f62\u5f0f\u53d1\u9001',
      level: 6,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Because user credentials are considered sensitive information, should always be transferred to the server over an encrypted connection (HTTPS).',
    },
    cookie_without_httponly: {
      impact_en: 'None',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5982\u679c\u53ef\u80fd\u7684\u8bdd\uff0c\u5e94\u8be5\u8bbe\u7f6eCookie\u4e2d\u7684HttpOnly\u5c5e\u6027\u3002',
      wasc: ['WASC-15'],
      id: '5bed0d537dc93b08352e9169',
      findtime: '2008-03-07 00:00:00',
      cnvd_info: [],
      impact: '\u65e0',
      poc_check: true,
      vul_id: 2174,
      is_scanv: '1',
      cwe: ['CWE-16'],
      is0day: false,
      description:
        '\u5f53Cookie\u88ab\u8bbe\u5b9aHttpOnly\u6807\u5fd7\uff0c\u90a3\u4e48\u8be5Cookie\u53ea\u80fd\u7531\u670d\u52a1\u5668\u800c\u4e0d\u662f\u7531\u5ba2\u6237\u7aef\u6d4f\u89c8\u5668\u811a\u672c\u8bbf\u95ee\u548c\u8bbe\u7f6e\u3002\u8fd9\u662f\u4f1a\u8bddcookie\u7684\u4e00\u4e2a\u91cd\u8981\u7684\u5b89\u5168\u4fdd\u62a4\u3002',
      short_name: '',
      tag_id: [310],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This cookie does not have the HTTPOnly flag set. When a cookie is set with the HTTPOnly flag, it instructs the browser that the cookie can only be accessed by the server and not by client-side scripts. This is an important security protection for session cookies.',
      key: 'cookie_without_httponly',
      name_en: 'Cookie without HttpOnly flag set',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: '\u4f1a\u8bddCookie\u4e2d\u7f3a\u5c11HttpOnly\u5c5e\u6027',
      level: 2,
      owasp_level: ['2013A5', '2017A6'],
      rule: '',
      test_data: '',
      recommendation_en: 'If possible, you should set the HTTPOnly flag for this cookie.',
    },
    '011055fc-94f1-ab96-56ac-53117c56fb4d': {
      impact_en:
        'CSP can be used to prevent and/or mitigate attacks that involve content/code injection, such as cross-site scripting/XSS attacks, attacks that require embedding a malicious resource, attacks that involve malicious use of iframes, such as clickjacking attacks, and others. ',
      reference: [
        'https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP',
        'https://hacks.mozilla.org/2016/02/implementing-content-security-policy/',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5efa\u8bae\u5728Web\u5e94\u7528\u7a0b\u5e8f\u4e2d\u5b9e\u65bd\u5185\u5bb9\u5b89\u5168\u7b56\u7565\uff08CSP\uff09\u3002\u914d\u7f6e\u5185\u5bb9\u5b89\u5168\u7b56\u7565\u6d89\u53ca\u5c06 Content-Security-Policy  HTTP\u6807\u5934\u6dfb\u52a0\u5230\u7f51\u9875\uff0c\u5e76\u4e3a\u5176\u63d0\u4f9b\u503c\u4ee5\u63a7\u5236\u5141\u8bb8\u7528\u6237\u4ee3\u7406\u4e3a\u8be5\u9875\u9762\u52a0\u8f7d\u7684\u8d44\u6e90\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff62',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        'CSP\u53ef\u7528\u4e8e\u9632\u6b62\u548c/\u6216\u7f13\u89e3\u6d89\u53ca\u5185\u5bb9/\u4ee3\u7801\u6ce8\u5165\u7684\u653b\u51fb\uff0c\u4f8b\u5982\u8de8\u7ad9\u70b9\u811a\u672c/ XSS\u653b\u51fb\uff0c\u9700\u8981\u5d4c\u5165\u6076\u610f\u8d44\u6e90\u7684\u653b\u51fb\uff0c\u6d89\u53ca\u6076\u610f\u4f7f\u7528iframe\u7684\u653b\u51fb\uff0c\u4f8b\u5982\u70b9\u51fb\u52ab\u6301\u653b\u51fb\uff0c\u4ee5\u53ca\u5176\u4ed6\u3002',
      poc_check: false,
      vul_id: '011055fc-94f1-ab96-56ac-53117c56fb4d',
      is_scanv: '2',
      cwe: ['CWE-16'],
      is0day: false,
      description:
        "\u5185\u5bb9\u5b89\u5168\u7b56\u7565\uff08CSP\uff09\u662f\u4e00\u4e2a\u589e\u52a0\u7684\u5b89\u5168\u5c42\uff0c\u53ef\u5e2e\u52a9\u68c0\u6d4b\u548c\u7f13\u89e3\u67d0\u4e9b\u7c7b\u578b\u7684\u653b\u51fb\uff0c\u5305\u62ec\u8de8\u7ad9\u70b9\u811a\u672c\uff08XSS\uff09\u548c\u6570\u636e\u6ce8\u5165\u653b\u51fb\u3002 \u5185\u5bb9\u5b89\u5168\u7b56\u7565\uff08CSP\uff09\u53ef\u4ee5\u901a\u8fc7\u6dfb\u52a0 Content-Security-Policy \u6807\u5934\u6765\u5b9e\u73b0\u3002\u6b64\u6807\u5934\u7684\u503c\u662f\u4e00\u4e2a\u5b57\u7b26\u4e32\uff0c\u5176\u4e2d\u5305\u542b\u63cf\u8ff0\u5185\u5bb9\u5b89\u5168\u7b56\u7565\u7684\u7b56\u7565\u6307\u4ee4\u3002\u8981\u5b9e\u65bdCSP\uff0c\u60a8\u5e94\u8be5\u4e3a\u7ad9\u70b9\u4f7f\u7528\u7684\u6240\u6709\u7c7b\u578b\u7684\u8d44\u6e90\u5b9a\u4e49\u5141\u8bb8\u7684\u6765\u6e90\u5217\u8868\u3002\u4f8b\u5982\uff0c\u5982\u679c\u60a8\u6709\u4e00\u4e2a\u7b80\u5355\u7684\u7ad9\u70b9\u9700\u8981\u52a0\u8f7d\u672c\u5730\u6258\u7ba1\u7684\u811a\u672c\uff0c\u6837\u5f0f\u8868\u548c\u56fe\u50cf\uff0c\u4ee5\u53ca\u6765\u81ea\u5176CDN\u7684jQuery\u5e93\uff0c\u5219CSP\u5934\u90e8\u53ef\u80fd\u5982\u4e0b\u6240\u793a\uff1a  Content-\u5b89\u5168\u7b56\u7565\uff1adefault-src'self';\u00a0script-src'self'https://code.jquery.com;    \u68c0\u6d4b\u5230\u60a8\u7684Web\u5e94\u7528\u7a0b\u5e8f\u672a\u5b9e\u73b0\u5185\u5bb9\u5b89\u5168\u7b56\u7565\uff08CSP\uff09\u54cd\u5e94\u4e2d\u7f3a\u5c11CSP\u6807\u5934\u3002\u5efa\u8bae\u5728Web\u5e94\u7528\u7a0b\u5e8f\u4e2d\u5b9e\u65bd\u5185\u5bb9\u5b89\u5168\u7b56\u7565\uff08CSP\uff09\u3002",
      short_name: '',
      tag_id: ['310'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. \n\nContent Security Policy (CSP) can be implemented by adding a Content-Security-Policy header. The value of this header is a string containing the policy directives describing your Content Security Policy. To implement CSP, you should define lists of allowed origins for the all of the types of resources that your site utilizes. For example, if you have a simple site that needs to load scripts, stylesheets, and images hosted locally, as well as from the jQuery library from their CDN, the CSP header could look like the following:\n\n\nContent-Security-Policy:\n    default-src 'self';\n    script-src 'self' https://code.jquery.com;\n\n\n\n\nIt was detected that your web application doesn't implement Content Security Policy (CSP) as the CSP header is missing from the response. It's recommended to implement Content Security Policy (CSP) into your web application.",
      key: '011055fc-94f1-ab96-56ac-53117c56fb4d',
      name_en: 'Content Security Policy (CSP) not implemented',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u5185\u5bb9\u5b89\u5168\u7b56\u7565\uff08CSP\uff09\u672a\u5b9e\u73b0',
      level: 0,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        "It's recommended to implement Content Security Policy (CSP) into your web application. Configuring Content Security Policy involves adding the Content-Security-Policy HTTP header to a web page and giving it values to control resources the user agent is allowed to load for that page. ",
    },
    '61125d6e-3fdf-a73d-1c2d-1bf8a3bef84d': {
      impact_en:
        'An attacker can gather sensitive information (database connection strings, application logic) by analyzing the source code. This information can be used to conduct further attacks.',
      reference: ['http://www.imperva.com/resources/glossary?term=source_code_disclosure'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u4ece\u60a8\u7684\u7f51\u7ad9\u5220\u9664\u6b64\u6587\u4ef6\u6216\u66f4\u6539\u5176\u6743\u9650\u4ee5\u5220\u9664\u8bbf\u95ee\u6743\u9650\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa0261',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7\u5206\u6790\u6e90\u4ee3\u7801\u6765\u6536\u96c6\u654f\u611f\u4fe1\u606f\uff08\u6570\u636e\u5e93\u8fde\u63a5\u5b57\u7b26\u4e32\uff0c\u5e94\u7528\u7a0b\u5e8f\u903b\u8f91\uff09\u3002\u6b64\u4fe1\u606f\u53ef\u7528\u4e8e\u8fdb\u884c\u8fdb\u4e00\u6b65\u653b\u51fb\u3002',
      poc_check: false,
      vul_id: '61125d6e-3fdf-a73d-1c2d-1bf8a3bef84d',
      is_scanv: '2',
      cwe: ['CWE-538'],
      is0day: false,
      description:
        '\u770b\u8d77\u6765\u8fd9\u4e2a\u811a\u672c\u7684\u6e90\u4ee3\u7801\u662f\u53ef\u7528\u7684\u3002\u6b64\u68c0\u67e5\u4f7f\u7528\u6a21\u5f0f\u5339\u914d\u6765\u786e\u5b9a\u662f\u5426\u5728\u6587\u4ef6\u4e2d\u627e\u5230\u670d\u52a1\u5668\u7aef\u6807\u8bb0\u3002\u5728\u67d0\u4e9b\u60c5\u51b5\u4e0b\uff0c\u6b64\u8b66\u62a5\u53ef\u80fd\u4f1a\u4ea7\u751f\u8bef\u62a5\u3002',
      short_name: '',
      tag_id: ['327', '48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are found in the file. In some cases this alert may generate false positives.',
      key: '61125d6e-3fdf-a73d-1c2d-1bf8a3bef84d',
      name_en: 'Source code disclosure',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u6e90\u4ee3\u7801\u62ab\u9732',
      level: 6,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Remove this file from your website or change its permissions to remove access.',
    },
    http_transmission: {
      impact_en:
        'HTTP protocol is an insecure protocol. In the process of transmission, there is no encrypted communication, which is easy to cause man in the middle attack to obtain sensitive user credentials.',
      reference: [],
      bugtraq_info: [],
      disabled: true,
      recommendation: '\u4f7f\u7528 HTTPS \u534f\u8bae\u8fdb\u884c\u901a\u4fe1\u3002',
      wasc: [],
      id: '5eb542197dc93b2e301f7177',
      findtime: '2009-08-08 00:00:00',
      cnvd_info: [],
      impact:
        'HTTP \u534f\u8bae\u662f\u4e0d\u5b89\u5168\u7684\u534f\u8bae\uff0c\u5728\u4f20\u8f93\u8fc7\u7a0b\u4e2d\u672a\u8fdb\u884c\u52a0\u5bc6\u901a\u4fe1\uff0c\u5bb9\u6613\u5bfc\u81f4\u4e2d\u95f4\u4eba\u653b\u51fb\u83b7\u53d6\u5230\u654f\u611f\u7528\u6237\u51ed\u8bc1\u7b49\u3002',
      poc_check: true,
      vul_id: 2492,
      is_scanv: '1',
      cwe: [],
      is0day: false,
      description:
        '\u7f51\u7ad9\u672a\u4f7f\u7528 HTTPS \u534f\u8bae\uff0cHTTP \u534f\u8bae\u662f\u4e0d\u5b89\u5168\u7684\u534f\u8bae\uff0c\u5728\u4f20\u8f93\u8fc7\u7a0b\u4e2d\u672a\u8fdb\u884c\u52a0\u5bc6\u901a\u4fe1\uff0c\u5bb9\u6613\u5bfc\u81f4\u4e2d\u95f4\u4eba\u653b\u51fb\u83b7\u53d6\u5230\u654f\u611f\u7528\u6237\u51ed\u8bc1\u7b49\u3002',
      short_name: '',
      tag_id: [],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'The website does not use HTTPS protocol, HTTP protocol is an insecure protocol, there is no encrypted communication in the transmission process, which is easy to cause man in the middle attack to obtain sensitive user credentials.',
      key: 'http_transmission',
      name_en: 'HTTP Transmission',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: 'HTTP \u660e\u6587\u4f20\u8f93',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Use HTTPS protocol for communication.',
    },
    application_error_message: {
      impact_en:
        'The error messages may disclose sensitive information. This information can be used to launch further attacks.',
      reference: ['http://www.php.net/manual/en/errorfunc.configuration.php#ini.display-errors'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5ba1\u8ba1\u76f8\u5173\u4ee3\u7801\u6587\u4ef6\uff0c\u5173\u95ed\u7a0b\u5e8f\u7684\u5f02\u5e38\u4fe1\u606f\u5728\u9875\u9762\u4e2d\u7684\u663e\u793a\u3002',
      wasc: ['WASC-13'],
      id: '5bed0d527dc93b08352e908a',
      findtime: '2004-03-27 00:00:00',
      cnvd_info: [],
      impact:
        '\u9875\u9762\u9519\u8bef\u4fe1\u606f\u4f1a\u6cc4\u6f0f\u654f\u611f\u4fe1\u606f\uff0c\u653b\u51fb\u8005\u53ef\u83b7\u53d6\u8fd9\u4e9b\u4fe1\u606f\u53d1\u8d77\u8fdb\u4e00\u6b65\u7684\u653b\u51fb\u3002',
      poc_check: true,
      vul_id: 1949,
      is_scanv: '1',
      cwe: ['CWE-209'],
      is0day: false,
      description:
        'Web\u9875\u9762\u4e2d\u7684\u9519\u8bef\u3001\u8b66\u544a \u4fe1\u606f\u4f1a\u6cc4\u6f0f\u5e94\u7528\u7a0b\u5e8f\u7684\u654f\u611f\u4fe1\u606f\uff0c\u4f8b\u5982\u6cc4\u6f0f\u7f51\u7ad9\u7edd\u5bf9\u8def\u5f84\uff0c\u76f8\u5173\u5904\u7406\u51fd\u6570\u53ca\u73af\u5883\u53d8\u91cf\u4fe1\u606f\u7b49\u3002\u5982\u679c\u662f\u6587\u6863\u9875\u9762\uff0c\u53ef\u80fd\u5b58\u5728\u8bef\u62a5\u3002',
      short_name: '',
      tag_id: [48, 315],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This page contains an error/warning message that may disclose sensitive information. The message can also contain the location of the file that produced the unhandled exception.This may be a false positive if the error message is found in documentation pages.',
      key: 'application_error_message',
      name_en: 'Application error message',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: 'Web\u5e94\u7528\u7a0b\u5e8f\u9519\u8bef\u4fe1\u606f',
      level: 5,
      owasp_level: ['2013A5', '2017A6'],
      rule: '',
      test_data: '',
      recommendation_en: 'Review the source code for this script.',
    },
    '555af421-ba31-1924-5f7c-14c347d5fda1': {
      impact_en:
        'Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them.\nAn attacker can steal the session cookie and take over the account, impersonating the user.\nIt is also possible to modify the content of the page presented to the user.',
      reference: [
        'http://www.Attacker.com/websitesecurity/cross-site-scripting.htm',
        'http://www.Attacker.com/blog/web-security-zone/video-how-cross-site-scripting-xss-works/',
        'http://www.cgisecurity.com/xss-faq.html',
        'http://www.owasp.org/index.php/Cross_Site_Scripting',
        'https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet',
        'http://www.owasp.org/index.php/PHP_Top_5',
        'http://msdn.microsoft.com/en-us/library/ms998274.aspx',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u60a8\u7684\u670d\u52a1\u5668\u7aef\u4ee3\u7801\u5e94\u9a8c\u8bc1\u662f\u5426\u5141\u8bb8\u68c0\u7d22\u548c\u663e\u793a\u6765\u81ea\u7528\u6237\u8f93\u5165\u7684URL\uff0c\u6216\u8005\u6839\u636eURL\u7684\u663e\u793a\u4e0a\u4e0b\u6587\u8fc7\u6ee4\u6765\u81eaURL\u7684\u54cd\u5e94\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa0239',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u6076\u610f\u7528\u6237\u53ef\u80fd\u4f1a\u5c06JavaScript\uff0cVBScript\uff0cActiveX\uff0cHTML\u6216Flash\u6ce8\u5165\u6613\u53d7\u653b\u51fb\u7684\u5e94\u7528\u7a0b\u5e8f\uff0c\u4ee5\u6b3a\u9a97\u7528\u6237\u4ee5\u4fbf\u4ece\u4e2d\u6536\u96c6\u6570\u636e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u7a83\u53d6\u4f1a\u8bddcookie\u5e76\u63a5\u7ba1\u5e10\u6237\uff0c\u5192\u5145\u7528\u6237\u3002\u4e5f\u53ef\u4ee5\u4fee\u6539\u5448\u73b0\u7ed9\u7528\u6237\u7684\u9875\u9762\u5185\u5bb9\u3002',
      poc_check: false,
      vul_id: '555af421-ba31-1924-5f7c-14c347d5fda1',
      is_scanv: '2',
      cwe: ['CWE-79'],
      is0day: false,
      description:
        '\u6b64\u811a\u672c\u53ef\u80fd\u5bb9\u6613\u53d7\u5230\u8de8\u7ad9\u70b9\u811a\u672c\uff08XSS\uff09\u653b\u51fb\u3002 \u8de8\u7ad9\u70b9\u811a\u672c\uff08\u4e5f\u79f0\u4e3aXSS\uff09\u662f\u4e00\u4e2a\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u53d1\u9001\u6076\u610f\u4ee3\u7801\uff08\u901a\u5e38\u4ee5Javascript\u7684\u5f62\u5f0f\uff09\u5230\u53e6\u4e00\u4e2a\u7528\u6237\u3002\u670d\u52a1\u5668\u6253\u5f00\u4efb\u610fURL\uff0c\u5e76\u5c06\u4eceURL\u68c0\u7d22\u7684\u5185\u5bb9\u653e\u5165\u54cd\u5e94\u4e2d\u800c\u4e0d\u8fdb\u884c\u8fc7\u6ee4\u3002',
      short_name: '',
      tag_id: ['309'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This script is possibly vulnerable to Cross Site Scripting (XSS) attacks.\nCross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user.\nThe server opens arbitrary URLs and puts the content retrieved from the URL into the response without filtering.',
      key: '555af421-ba31-1924-5f7c-14c347d5fda1',
      name_en: 'Remote file inclusion XSS',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u8fdc\u7a0b\u6587\u4ef6\u5305\u542bXSS',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Your server side code should verify if the URL from the user input is allowed to be retrieved and displayed or filter the response from the URL according to the context in which it is displayed.',
    },
    'ca60589c-1efb-d051-e098-92c2569f5cb4': {
      impact_en: 'Possible sensitive information disclosure.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5bc6\u7801\u5b57\u6bb5\u5e94\u901a\u8fc7POST\u800c\u4e0d\u662fGET\u63d0\u4ea4\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff58',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact: '\u53ef\u80fd\u7684\u654f\u611f\u4fe1\u606f\u62ab\u9732\u3002',
      poc_check: false,
      vul_id: 'ca60589c-1efb-d051-e098-92c2569f5cb4',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        '\u6b64\u9875\u9762\u5305\u542b\u5e26\u6709\u5bc6\u7801\u5b57\u6bb5\u7684\u8868\u5355\u3002\u6b64\u8868\u5355\u4f7f\u7528GET\u65b9\u6cd5\u63d0\u4ea4\u7528\u6237\u6570\u636e\uff0c\u56e0\u6b64\u5bc6\u7801\u5b57\u6bb5\u7684\u5185\u5bb9\u5c06\u663e\u793a\u5728URL\u4e2d\u3002\u4e0d\u5e94\u901a\u8fc7URL\u4f20\u9012\u654f\u611f\u4fe1\u606f\u3002\u53ef\u4ee5\u901a\u8fc7Referer\u6807\u5934\u8bb0\u5f55\u6216\u6cc4\u9732URL\u3002',
      short_name: '',
      tag_id: ['48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This page contains a form with a password field. This form submits user data using the GET method, therefore the contents of the password field will appear in the URL.Sensitive information should not be passed via the URL. URLs could be logged or leaked via the Referer header.',
      key: 'ca60589c-1efb-d051-e098-92c2569f5cb4',
      name_en: 'Password field submitted using GET method',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u4f7f\u7528GET\u65b9\u6cd5\u63d0\u4ea4\u7684\u5bc6\u7801\u5b57\u6bb5',
      level: 6,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'The password field should be submitted through POST instead of GET.',
    },
    '50e81dee-de35-8172-d57e-5edd0fde360c': {
      impact_en:
        'By exploiting directory traversal vulnerabilities, attackers step out of the root directory and access files in other directories. As a result, attackers might view restricted files or execute commands, leading to a full compromise of the Web server.',
      reference: ['http://www.Attacker.com/websitesecurity/directory-traversal/'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u60a8\u7684\u811a\u672c\u5e94\u8be5\u4ece\u7528\u6237\u8f93\u5165\u4e2d\u8fc7\u6ee4\u5143\u5b57\u7b26\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff6f',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u901a\u8fc7\u5229\u7528\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u8d70\u51fa\u6839\u76ee\u5f55\u5e76\u8bbf\u95ee\u5176\u4ed6\u76ee\u5f55\u4e2d\u7684\u6587\u4ef6\u3002\u56e0\u6b64\uff0c\u653b\u51fb\u8005\u53ef\u80fd\u4f1a\u67e5\u770b\u53d7\u9650\u6587\u4ef6\u6216\u6267\u884c\u547d\u4ee4\uff0c\u4ece\u800c\u5bfc\u81f4Web\u670d\u52a1\u5668\u5b8c\u5168\u53d7\u635f\u3002',
      poc_check: false,
      vul_id: '50e81dee-de35-8172-d57e-5edd0fde360c',
      is_scanv: '2',
      cwe: ['CWE-22'],
      is0day: false,
      description:
        '\u6b64\u811a\u672c\u53ef\u80fd\u5bb9\u6613\u53d7\u5230\u76ee\u5f55\u904d\u5386\u653b\u51fb\u3002 \u76ee\u5f55\u904d\u5386\u662f\u4e00\u4e2a\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u8bbf\u95ee\u53d7\u9650\u76ee\u5f55\u5e76\u8bfb\u53d6Web\u670d\u52a1\u5668\u6839\u76ee\u5f55\u4e4b\u5916\u7684\u6587\u4ef6\u3002',
      short_name: '',
      tag_id: ['40'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "This script is possibly vulnerable to directory traversal attacks.Directory Traversal is a vulnerability which allows attackers to access restricted directories and read files outside of the web server's root directory.",
      key: '50e81dee-de35-8172-d57e-5edd0fde360c',
      name_en: 'Directory traversal',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u76ee\u5f55\u904d\u5386',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Your script should filter metacharacters from user input.',
    },
    internal_ip_address_disclosure: {
      impact_en: 'Possible sensitive information disclosure.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u963b\u6b62\u5185\u7f51IP\u5730\u5740\u4fe1\u606f\u76f4\u63a5\u5c55\u793a\u5728\u4e92\u8054\u7f51',
      wasc: [],
      id: '5bed0d527dc93b08352e90ca',
      findtime: '2006-06-08 00:00:00',
      cnvd_info: [],
      impact: '\u53ef\u80fd\u9020\u6210\u5185\u7f51\u62d3\u6251\u4fe1\u606f\u6cc4\u6f0f',
      poc_check: true,
      vul_id: 2014,
      is_scanv: '1',
      cwe: [],
      is0day: false,
      description: '\u9875\u9762\u4e2d\u5339\u914d\u5230\u5185\u7f51IP\u5730\u5740.',
      short_name: '',
      tag_id: [48],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing scheme of the internal network.',
      key: 'internal_ip_address_disclosure',
      name_en: 'Internal IP address disclosure',
      msfpath: '',
      updatetime: '2021-07-19 00:00:00',
      name: '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Prevent this information from being displayed to the user.',
    },
    clickjacking_x_frame_options: {
      impact_en: 'The impact depends on the affected web application.',
      reference: [
        'https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet#Defending_with_Content_Security_Policy_frame-ancestors_directive',
      ],
      bugtraq_info: [],
      disabled: true,
      recommendation:
        "\u914d\u7f6eWeb\u670d\u52a1\u5668\uff0c\u6dfb\u52a0\u4e00\u4e2a 'X-Frame-Options' \u54cd\u5e94\u5934\u90e8\u5b57\u6bb5",
      wasc: ['WASC-14'],
      id: '5bed0d537dc93b08352e9161',
      findtime: '2008-03-07 00:00:00',
      cnvd_info: [],
      impact:
        '\u98ce\u9669\u53d6\u51b3\u4e8e\u53d7\u5f71\u54cd\u7684Web\u5e94\u7528\u7a0b\u5e8f\u3002',
      poc_check: true,
      vul_id: 2166,
      is_scanv: '0',
      cwe: ['CWE-16'],
      is0day: true,
      description:
        '\u70b9\u51fb\u52ab\u6301\uff08\u7528\u6237\u754c\u9762\u4f2a\u88c5\u653b\u51fb\uff0cUI\u4f2a\u88c5\u653b\u51fb\uff09\u662f\u5f15\u8bf1\u7f51\u7edc\u7528\u6237\u70b9\u51fb\u754c\u9762\u770b\u4e0d\u5230\u7684\u94fe\u63a5\u6216\u64cd\u4f5c\uff0c\u4ece\u800c\u6709\u53ef\u80fd\u6cc4\u9732\u673a\u5bc6\u4fe1\u606f\u6216\u64cd\u4f5c\u770b\u4f3c\u65e0\u5bb3\u7684\u7f51\u9875\uff0c\u800c\u5b9e\u9645\u6267\u884c\u6076\u610f\u64cd\u4f5c\u3002',
      short_name: '',
      tag_id: [310],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.',
      key: 'clickjacking_x_frame_options',
      name_en: 'Clickjacking: X-Frame-Options header missing',
      msfpath: '',
      updatetime: '2021-12-08 00:00:00',
      name: 'X-Frame-Options Header\u672a\u914d\u7f6e',
      level: 2,
      owasp_level: ['2013A5', '2017A6'],
      rule: '',
      test_data: '',
      recommendation_en:
        'Configure your web server to include an  X-Frame-Options header. Consult Web references for more information about the possible values for this header.',
    },
    'b8e2c082-44f1-cf0b-0b8e-0e0bb357e798': {
      impact_en: 'The impact depends on the affected web application. ',
      reference: [
        'https://developer.mozilla.org/en-US/docs/HTTP/X-Frame-Options',
        'http://en.wikipedia.org/wiki/Clickjacking',
        'https://www.owasp.org/index.php/Clickjacking',
        'https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet#Defending_with_Content_Security_Policy_frame-ancestors_directive',
        'http://stackoverflow.com/questions/958997/frame-buster-buster-buster-code-needed',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5c06Web\u670d\u52a1\u5668\u914d\u7f6e\u4e3a\u5305\u542bX-Frame-Options\u6807\u5934\u3002\u6709\u5173\u6b64\u6807\u5934\u7684\u53ef\u80fd\u503c\u7684\u66f4\u591a\u4fe1\u606f\uff0c\u8bf7\u53c2\u9605Web\u5f15\u7528\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff20',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u5f71\u54cd\u53d6\u51b3\u4e8e\u53d7\u5f71\u54cd\u7684Web\u5e94\u7528\u7a0b\u5e8f\u3002',
      poc_check: false,
      vul_id: 'b8e2c082-44f1-cf0b-0b8e-0e0bb357e798',
      is_scanv: '2',
      cwe: ['CWE-693'],
      is0day: false,
      description:
        '\u70b9\u51fb\u52ab\u6301\uff08\u7528\u6237\u754c\u9762\u7ea0\u6b63\u653b\u51fb\uff0c\u7528\u6237\u754c\u9762\u7ea0\u6b63\u653b\u51fb\uff0c\u7528\u6237\u754c\u9762\u7ea0\u6b63\uff09\u662f\u4e00\u79cd\u6076\u610f\u6280\u672f\uff0c\u6b3a\u9a97\u7f51\u7edc\u7528\u6237\u70b9\u51fb\u4e0e\u7528\u6237\u8ba4\u4e3a\u4ed6\u4eec\u70b9\u51fb\u7684\u5185\u5bb9\u4e0d\u540c\u7684\u5185\u5bb9\uff0c\u4ece\u800c\u53ef\u80fd\u6cc4\u9732\u673a\u5bc6\u4fe1\u606f\u6216\u63a7\u5236\u4ed6\u4eec\u7684\u8ba1\u7b97\u673a\u70b9\u51fb\u770b\u4f3c\u65e0\u5bb3\u7684\u7f51\u9875\u3002 \u670d\u52a1\u5668\u672a\u8fd4\u56de X-Frame-Options \u6807\u5934\uff0c\u8fd9\u610f\u5473\u7740\u8be5\u7f51\u7ad9\u53ef\u80fd\u9762\u4e34\u70b9\u51fb\u52ab\u6301\u653b\u51fb\u7684\u98ce\u9669\u3002X-Frame-Options HTTP\u54cd\u5e94\u5934\u53ef\u7528\u4e8e\u6307\u793a\u662f\u5426\u5e94\u5141\u8bb8\u6d4f\u89c8\u5668\u5728\u6846\u67b6\u6216iframe\u5185\u5448\u73b0\u9875\u9762\u3002\u7ad9\u70b9\u53ef\u4ee5\u901a\u8fc7\u786e\u4fdd\u5176\u5185\u5bb9\u672a\u5d4c\u5165\u5230\u5176\u4ed6\u7ad9\u70b9\u4e2d\u6765\u907f\u514d\u70b9\u51fb\u52ab\u6301\u653b\u51fb\u3002',
      short_name: '',
      tag_id: ['16'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. \nThe server didn't return an X-Frame-Options header which means that this website could be at risk of a clickjacking attack. The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page inside a frame or iframe. Sites can use this to avoid clickjacking attacks, by ensuring that their content is not embedded into other sites.\n",
      key: 'b8e2c082-44f1-cf0b-0b8e-0e0bb357e798',
      name_en: 'Clickjacking: X-Frame-Options header missing',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u70b9\u51fb\u52ab\u6301\uff1a\u7f3a\u5c11X-Frame-Options\u6807\u5934',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Configure your web server to include an  X-Frame-Options header. Consult Web references for more information about the possible values for this header.',
    },
    html_form_weak_credentials: {
      impact_en: 'An attacker may access the contents of the password-protected page.',
      reference: ['http://en.wikipedia.org/wiki/Password_strength'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5f3a\u5236\u6267\u884c\u5f3a\u5bc6\u7801\u7b56\u7565\u3002\u4e0d\u5141\u8bb8\u4f7f\u7528\u5f31\u53e3\u4ee4\u6216\u8005\u5b57\u5178\u4e2d\u51fa\u73b0\u7684\u8bcd\u6c47\u3002',
      wasc: ['WASC-15'],
      id: '5bed0d527dc93b08352e90bb',
      findtime: '2004-03-27 00:00:00',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u53ef\u4ee5\u8bbf\u95ee\u53d7\u5bc6\u7801\u4fdd\u62a4\u7684\u7f51\u9875\u7684\u5185\u5bb9\u3002',
      poc_check: true,
      vul_id: 1999,
      is_scanv: '1',
      cwe: ['CWE-259'],
      is0day: false,
      description:
        '\u6b64\u9875\u9762\u5b58\u5728\u4f7f\u7528\u5f31\u53e3\u4ee4\u7684\u60c5\u51b5\u3002 \u6f0f\u6d1e\u68c0\u6d4b\u7a0b\u5e8f\u80fd\u731c\u51fa\u8bbf\u95ee\u6b64\u9875\u9762\u6240\u9700\u8981\u7684\u51ed\u636e\u3002\u5f31\u53e3\u4ee4\u662f\u6307\uff1a\u957f\u5ea6\u6bd4\u8f83\u77ed\uff0c\u975e\u5e38\u5e38\u89c1\u7684\u4e00\u4e9b\u5b57\u7b26\uff0c\u7cfb\u7edf\u9ed8\u8ba4\u7684\u5bc6\u7801\uff0c\u6216\u8005\u662f\u4e00\u4e9b\u5f88\u5bb9\u6613\u88ab\u5bc6\u7801\u5b57\u5178\u731c\u51fa\u7684\u5bc6\u7801\uff0c\u5982\u4e00\u4e9b\u5e38\u7528\u5b57\u6bcd\uff0c\u4e13\u4e1a\u672f\u8bed,\u4e0e\u7528\u6237\u540d\u76f8\u5173\u7684\u4e00\u4e9b\u5b57\u7b26\u3002',
      short_name: '',
      tag_id: [48, 310],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This page is using a weak password. WebSOC was able to guess the credentials required to access this page. A weak password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common variations on these themes.',
      key: 'html_form_weak_credentials',
      name_en: 'Weak password',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: '\u8868\u5355\u5f31\u53e3\u4ee4',
      level: 8,
      owasp_level: ['2013A6', '2017A3'],
      rule: '',
      test_data: '',
      recommendation_en:
        "Enforce a strong password policy. Don't permit weak passwords or passwords based on dictionary words.",
    },
    '7a2fa5a4-7125-1062-0651-ed5219f05809': {
      impact_en:
        "Malicious JavaScript has access to all the same objects as the rest of the web page, including access to cookies and local storage, which are often used to store session tokens. If an attacker can obtain a user's session cookie, they can then impersonate that user.\n\nFurthermore, JavaScript can read and make arbitrary modifications to the contents of a page being displayed to a user. Therefore, XSS in conjunction with some clever social engineering opens up a lot of possibilities for an attacker.",
      reference: [
        'https://www.Attacker.com/websitesecurity/cross-site-scripting/',
        'https://www.Attacker.com/websitesecurity/xss/',
        'http://www.owasp.org/index.php/Cross_Site_Scripting',
        'https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet',
        'https://excess-xss.com/',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5c06\u4f9d\u8d56\u4e8e\u4e0a\u4e0b\u6587\u7684\u7f16\u7801\u548c/\u6216\u9a8c\u8bc1\u5e94\u7528\u4e8e\u9875\u9762\u4e0a\u5448\u73b0\u7684\u7528\u6237\u8f93\u5165',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa1427',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u6076\u610fJavaScript\u53ef\u4ee5\u8bbf\u95ee\u4e0e\u7f51\u9875\u5176\u4f59\u90e8\u5206\u76f8\u540c\u7684\u6240\u6709\u5bf9\u8c61\uff0c\u5305\u62ec\u8bbf\u95eeCookie\u548c\u672c\u5730\u5b58\u50a8\uff0c\u8fd9\u4e9b\u901a\u5e38\u7528\u4e8e\u5b58\u50a8\u4f1a\u8bdd\u4ee4\u724c\u3002\u5982\u679c\u653b\u51fb\u8005\u53ef\u4ee5\u83b7\u53d6\u7528\u6237\u7684\u4f1a\u8bddcookie\uff0c\u5219\u4ed6\u4eec\u53ef\u4ee5\u5192\u5145\u8be5\u7528\u6237\u3002 \u6b64\u5916\uff0cJavaScript\u53ef\u4ee5\u8bfb\u53d6\u5e76\u5bf9\u6b63\u5728\u5411\u7528\u6237\u663e\u793a\u7684\u9875\u9762\u5185\u5bb9\u8fdb\u884c\u4efb\u610f\u4fee\u6539\u3002\u56e0\u6b64\uff0cXSS\u4e0e\u4e00\u4e9b\u806a\u660e\u7684\u793e\u4ea4\u5de5\u7a0b\u76f8\u7ed3\u5408\uff0c\u4e3a\u653b\u51fb\u8005\u5f00\u8f9f\u4e86\u8bb8\u591a\u53ef\u80fd\u6027\u3002',
      poc_check: false,
      vul_id: '7a2fa5a4-7125-1062-0651-ed5219f05809',
      is_scanv: '2',
      cwe: ['CWE-79'],
      is0day: false,
      description:
        '\u8de8\u7ad9\u70b9\u811a\u672c\uff08XSS\uff09\u662f\u6307\u5ba2\u6237\u7aef\u4ee3\u7801\u6ce8\u5165\u653b\u51fb\uff0c\u5176\u4e2d\u653b\u51fb\u8005\u53ef\u4ee5\u5c06\u6076\u610f\u811a\u672c\u6267\u884c\u5230\u5408\u6cd5\u7f51\u7ad9\u6216Web\u5e94\u7528\u7a0b\u5e8f\u4e2d\u3002\u5f53Web\u5e94\u7528\u7a0b\u5e8f\u5728\u5176\u751f\u6210\u7684\u8f93\u51fa\u4e2d\u4f7f\u7528\u672a\u7ecf\u9a8c\u8bc1\u6216\u672a\u7f16\u7801\u7684\u7528\u6237\u8f93\u5165\u65f6\uff0c\u5c31\u4f1a\u53d1\u751fXSS\u3002',
      short_name: '',
      tag_id: ['309'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts into a legitimate website or web application. XSS occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.',
      key: '7a2fa5a4-7125-1062-0651-ed5219f05809',
      name_en: 'Cross site scripting',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u8de8\u7ad9\u811a\u672c',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Apply context-dependent encoding and/or validation to user input rendered on a page',
    },
    sql_injection: {
      impact_en:
        'An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of your database and/or expose sensitive information.',
      reference: [
        'http://sebug.net/category/Sql%E6%B3%A8%E5%85%A5\nhttp://www.owasp.org/index.php/Injection_Flaws\nhttp://www.securiteam.com/securityreviews/5DP0N1P76E.html',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '1. \u6700\u4f73\u9009\u62e9\u662f\u4f7f\u7528\u5b89\u5168\u7684API\uff0c\u5b8c\u5168\u907f\u514d\u4f7f\u7528\u89e3\u91ca\u5668\u6216 \u63d0\u4f9b\u53c2\u6570\u5316\u754c\u9762\u7684API\u3002\u4f46\u8981\u6ce8\u610f\u6709\u4e9b\u53c2\u6570\u5316\u7684API\uff0c \u6bd4\u5982\u5b58\u50a8\u8fc7\u7a0b\uff08stored procedures\uff09\uff0c\u5982\u679c\u4f7f\u7528\u4e0d\u5f53\uff0c \u4ecd\u7136\u53ef\u4ee5\u5f15\u5165\u6ce8\u5165\u6f0f\u6d1e\u30022. \u5982\u679c\u6ca1\u6cd5\u4f7f\u7528\u4e00\u4e2a\u53c2\u6570\u5316\u7684API\uff0c\u90a3\u4e48\u4f60\u5e94\u8be5\u4f7f\u7528\u89e3 \u91ca\u5668\u5177\u4f53\u7684escape\u8bed\u6cd5\u6765\u907f\u514d\u7279\u6b8a\u5b57\u7b26\u3002 OWASP\u2019s Java Encoder\u5c31\u6709\u4e00\u4e9bescape\u4f8b\u7a0b\u30023. \u4f7f\u7528\u6b63\u9762\u7684\u6216\u201c\u767d\u540d\u5355\u201d\u7684\u5177\u6709\u6070\u5f53\u7684\u89c4\u8303\u5316\u7684\u8f93\u5165\u9a8c\u8bc1\u65b9\u6cd5\u540c\u6837\u4f1a\u6709\u52a9\u4e8e\u9632\u6b62\u6ce8\u5165\u653b\u51fb\u3002\u4f46\u7531\u4e8e\u5f88\u591a\u5e94\u7528\u5728\u8f93\u5165\u4e2d\u9700\u8981\u7279\u6b8a\u5b57\u7b26\uff0c\u8fd9\u4e00\u65b9\u6cd5\u4e0d\u662f\u5b8c\u6574\u7684\u9632\u62a4\u65b9\u6cd5\u3002 OWASP\u7684ESAPI\u4e2d\u5305\u542b\u4e00\u4e2a\u767d\u540d\u5355\u8f93\u5165\u9a8c\u8bc1\u4f8b\u7a0b\u7684\u6269\u5c55\u5e93\u3002',
      wasc: ['WASC-19'],
      id: '5bed0d527dc93b08352e9110',
      findtime: '2004-03-27 00:00:00',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u80fd\u591f\u5229\u7528SQL\u6ce8\u5165\u6f0f\u6d1e\u8131\u5e93\uff0c\u7be1\u6539\u7f51\u7ad9\uff0c\u83b7\u53d6\u6570\u636e\u5e93\u751a\u81f3\u662fWeb\u670d\u52a1\u5668\u7684\u63a7\u5236\u6743\u9650\u3002',
      poc_check: true,
      vul_id: 2085,
      is_scanv: '1',
      cwe: ['CWE-89'],
      is0day: false,
      description:
        'SQL\u6ce8\u5165\u653b\u51fb\u662f\u9ed1\u5ba2\u5bf9\u6570\u636e\u5e93\u8fdb\u884c\u653b\u51fb\u7684\u5e38\u7528\u624b\u6bb5\u4e4b\u4e00\u3002\u5b83\u662f\u5229\u7528\u73b0\u6709\u5e94\u7528\u7a0b\u5e8f\uff0c\u5c06\uff08\u6076\u610f\uff09\u7684SQL\u547d\u4ee4\u6ce8\u5165\u5230\u540e\u53f0\u6570\u636e\u5e93\u5f15\u64ce\u6267\u884c\u7684\u80fd\u529b\uff0c\u5b83\u53ef\u4ee5\u901a\u8fc7\u5728Web\u8868\u5355\u4e2d\u8f93\u5165\uff08\u6076\u610f\uff09SQL\u8bed\u53e5\u5f97\u5230\u4e00\u4e2a\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u7684\u7f51\u7ad9\u4e0a\u7684\u6570\u636e\u5e93\uff0c\u800c\u4e0d\u662f\u6309\u7167\u8bbe\u8ba1\u8005\u610f\u56fe\u53bb\u6267\u884cSQL\u8bed\u53e5\u3002',
      short_name: '',
      tag_id: [3],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out dangerous characters.",
      key: 'sql_injection',
      name_en: 'SQL injection',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: 'SQL\u6ce8\u5165\u6f0f\u6d1e',
      level: 8,
      owasp_level: ['2013A1', '2017A1'],
      rule: '',
      test_data: '',
      recommendation_en: 'Your script should filter metacharacters from user input.',
    },
    'db04b846-7dec-fb62-f12d-1a152945cdae': {
      impact_en:
        "An attacker can use SQL injection it to bypass a web application's authentication and authorization mechanisms and retrieve the contents of an entire database. SQLi can also be used to add, modify and delete records in a database, affecting data integrity. Under the right circumstances, SQLi can also be used by an attacker to execute OS commands, which may then be used to escalate an attack even further.",
      reference: [
        'https://www.Attacker.com/websitesecurity/sql-injection/',
        'https://www.Attacker.com/websitesecurity/sql-injection2/',
        'https://www.Attacker.com/blog/articles/prevent-sql-injection-vulnerabilities-in-php-applications/',
        'https://www.owasp.org/index.php/SQL_Injection',
        'http://bobby-tables.com/',
        'http://pentestmonkey.net/category/cheat-sheet/sql-injection',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5904\u7406\u5305\u542b\u7528\u6237\u8f93\u5165\u7684SQL\u67e5\u8be2\u65f6\uff0c\u8bf7\u4f7f\u7528\u53c2\u6570\u5316\u67e5\u8be2\u3002\u53c2\u6570\u5316\u67e5\u8be2\u5141\u8bb8\u6570\u636e\u5e93\u4e86\u89e3SQL\u67e5\u8be2\u7684\u54ea\u4e9b\u90e8\u5206\u5e94\u88ab\u89c6\u4e3a\u7528\u6237\u8f93\u5165\uff0c\u4ece\u800c\u89e3\u51b3SQL\u6ce8\u5165\u95ee\u9898\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa026d',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u53ef\u4ee5\u4f7f\u7528SQL\u6ce8\u5165\u6765\u7ed5\u8fc7Web\u5e94\u7528\u7a0b\u5e8f\u7684\u8eab\u4efd\u9a8c\u8bc1\u548c\u6388\u6743\u673a\u5236\uff0c\u5e76\u68c0\u7d22\u6574\u4e2a\u6570\u636e\u5e93\u7684\u5185\u5bb9\u3002SQLi\u8fd8\u53ef\u7528\u4e8e\u6dfb\u52a0\uff0c\u4fee\u6539\u548c\u5220\u9664\u6570\u636e\u5e93\u4e2d\u7684\u8bb0\u5f55\uff0c\u4ece\u800c\u5f71\u54cd\u6570\u636e\u5b8c\u6574\u6027\u3002\u5728\u9002\u5f53\u7684\u60c5\u51b5\u4e0b\uff0c\u653b\u51fb\u8005\u4e5f\u53ef\u4ee5\u4f7f\u7528SQLi\u6765\u6267\u884c\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\uff0c\u7136\u540e\u53ef\u4ee5\u4f7f\u7528\u5b83\u6765\u8fdb\u4e00\u6b65\u5347\u7ea7\u653b\u51fb\u3002',
      poc_check: false,
      vul_id: 'db04b846-7dec-fb62-f12d-1a152945cdae',
      is_scanv: '2',
      cwe: ['CWE-89'],
      is0day: false,
      description:
        'SQL\u6ce8\u5165\uff08SQLi\uff09\u662f\u6307\u6ce8\u5165\u653b\u51fb\uff0c\u5176\u4e2d\u653b\u51fb\u8005\u53ef\u4ee5\u6267\u884c\u63a7\u5236Web\u5e94\u7528\u7a0b\u5e8f\u6570\u636e\u5e93\u670d\u52a1\u5668\u7684\u6076\u610fSQL\u8bed\u53e5\u3002',
      short_name: '',
      tag_id: ['323'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application's database server.",
      key: 'db04b846-7dec-fb62-f12d-1a152945cdae',
      name_en: 'SQL injection',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: 'SQL\u6ce8\u5165',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Use parameterized queries when dealing with SQL queries that contains user input. Parameterized queries allows the database to understand which parts of the SQL query should be considered as user input, therefore solving SQL injection.',
    },
    'bb934d58-1121-7042-cac6-4be44616a2e1': {
      impact_en: 'Possible sensitive information disclosure.',
      reference: ['https://www.owasp.org/index.php/Full_Path_Disclosure'],
      bugtraq_info: [],
      disabled: false,
      recommendation: '\u9632\u6b62\u5c06\u6b64\u4fe1\u606f\u663e\u793a\u7ed9\u7528\u6237\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa0212',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact: '\u53ef\u80fd\u7684\u654f\u611f\u4fe1\u606f\u62ab\u9732\u3002',
      poc_check: false,
      vul_id: 'bb934d58-1121-7042-cac6-4be44616a2e1',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        '\u5728\u6b64\u9875\u9762\u4e0a\u627e\u5230\u4e00\u4e2a\u6216\u591a\u4e2a\u5b8c\u5168\u9650\u5b9a\u7684\u8def\u5f84\u540d\u200b\u200b\u79f0\u3002\u6839\u636e\u6b64\u4fe1\u606f\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u4eceWeb\u670d\u52a1\u5668\u5b66\u4e60\u6587\u4ef6\u7cfb\u7edf\u7ed3\u6784\u3002\u6b64\u4fe1\u606f\u53ef\u7528\u4e8e\u8fdb\u884c\u8fdb\u4e00\u6b65\u653b\u51fb\u3002   \u6b64\u8b66\u62a5\u53ef\u80fd\u662f\u8bef\u62a5\uff0c\u9700\u8981\u624b\u52a8\u786e\u8ba4 ',
      short_name: '',
      tag_id: ['48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'One or more fully qualified path names were found on this page. From this information the attacker may learn the file system structure from the web server. This information can be used to conduct further attacks.This alert may be a false positive, manual confirmation is required.',
      key: 'bb934d58-1121-7042-cac6-4be44616a2e1',
      name_en: 'Possible server path disclosure (Unix)',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u53ef\u80fd\u7684\u670d\u52a1\u5668\u8def\u5f84\u6cc4\u9732\uff08Unix\uff09',
      level: 0,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Prevent this information from being displayed to the user.',
    },
    'b53afc6c-83c3-7ea8-ce7b-d5f5fb01b7d7': {
      impact_en:
        'A user can view a list of all files from this directory possibly exposing sensitive information.',
      reference: [
        'http://www.Attacker.com/blog/web-security-zone/directory-listing-information-disclosure/',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u60a8\u5e94\u8be5\u786e\u4fdd\u8be5\u76ee\u5f55\u4e0d\u5305\u542b\u654f\u611f\u4fe1\u606f\uff0c\u6216\u8005\u60a8\u53ef\u80fd\u5e0c\u671b\u9650\u5236Web\u670d\u52a1\u5668\u914d\u7f6e\u4e2d\u7684\u76ee\u5f55\u5217\u8868\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff6e',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u7528\u6237\u53ef\u4ee5\u67e5\u770b\u6b64\u76ee\u5f55\u4e2d\u53ef\u80fd\u66b4\u9732\u654f\u611f\u4fe1\u606f\u7684\u6240\u6709\u6587\u4ef6\u7684\u5217\u8868\u3002',
      poc_check: false,
      vul_id: 'b53afc6c-83c3-7ea8-ce7b-d5f5fb01b7d7',
      is_scanv: '2',
      cwe: ['CWE-538'],
      is0day: false,
      description:
        'Web\u670d\u52a1\u5668\u914d\u7f6e\u4e3a\u663e\u793a\u6b64\u76ee\u5f55\u4e2d\u5305\u542b\u7684\u6587\u4ef6\u5217\u8868\u3002\u5efa\u8bae\u4e0d\u8981\u8fd9\u6837\u505a\uff0c\u56e0\u4e3a\u8be5\u76ee\u5f55\u53ef\u80fd\u5305\u542b\u901a\u5e38\u4e0d\u901a\u8fc7\u7f51\u7ad9\u4e0a\u7684\u94fe\u63a5\u516c\u5f00\u7684\u6587\u4ef6\u3002',
      short_name: '',
      tag_id: ['310', '313', '48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'The web server is configured to display the list of files contained in this directory. This is not recommended because the directory may contain files that are not normally exposed through links on the web site.',
      key: 'b53afc6c-83c3-7ea8-ce7b-d5f5fb01b7d7',
      name_en: 'Directory listing',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u76ee\u5f55\u5217\u8868',
      level: 6,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'You should make sure the directory does not contain sensitive information or you may want to restrict directory listings from the web server configuration.',
    },
    xss: {
      impact_en:
        'Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them.',
      reference: [
        'http://en.wikipedia.org/wiki/Cross-site_scripting\nhttp://www.owasp.org/index.php/Cross_Site_Scripting',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '1. \u4e3a\u4e86\u907f\u514d\u670d\u52a1\u5668XSS\uff0c\u6700\u597d\u7684\u529e\u6cd5\u662f\u6839\u636e\u6570\u636e\u5c06\u8981\u7f6e \u4e8e\u7684HTML\u4e0a\u4e0b\u6587\uff08\u5305\u62ec\u4e3b\u4f53\u3001\u5c5e\u6027\u3001JavaScript\u3001CSS \u6216 URL \uff09\u5bf9\u6240\u6709\u7684\u4e0d\u53ef\u4fe1\u6570\u636e\u8fdb\u884c\u6070\u5f53\u7684\u8f6c\u4e49\uff08escape\uff09\u3002\u66f4\u591a\u5173\u4e8e\u6570\u636e\u8f6c\u4e49\u6280\u672f\u7684\u4fe1\u606f\u89c1OWASP XSS Prevention Cheat Sheet\u30022. \u4e3a\u4e86\u907f\u514d\u5ba2\u6237\u7aefXSS\uff0c\u6700\u597d\u7684\u9009\u62e9\u662f\u907f\u514d\u4f20\u9012\u4e0d\u53d7\u4fe1 \u4efb\u7684\u6570\u636e\u5230JavaScript\u548c\u53ef\u4ee5\u751f\u6210\u6d3b\u52a8\u5185\u5bb9\u7684\u5176\u4ed6\u6d4f\u89c8 \u5668API\u3002\u5982\u679c\u8fd9\u79cd\u60c5\u51b5\u4e0d\u80fd\u907f\u514d\uff0c\u53ef\u4ee5\u91c7\u7528OWASP DOM based XSS Prevention Cheat Sheet \u63cf\u8ff0\u7684\u7c7b\u4f3c\u4e0a \u4e0b\u6587\u654f\u611f\u7684\u8f6c\u4e49\u6280\u672f\u5e94\u7528\u4e8e\u6d4f\u89c8\u5668API\u30023. \u66f4\u591a\u5185\u5bb9\u8bf7\u53c2\u8003 OWASP \u7684 AntiSamy \u6216 Java HTML Sanitizer \u9879\u76ee\u3002 4. \u8003\u8651\u4f7f\u7528\u5185\u5bb9\u5b89\u5168\u7b56\u7565\uff08CSP\uff09\u6765\u62b5\u5fa1\u6574\u4e2a\u7f51\u7ad9\u7684\u8de8 \u7ad9\u811a\u672c\u653b\u51fb\u3002',
      wasc: ['WASC-08'],
      id: '5bed0d527dc93b08352e9146',
      findtime: '2004-03-27 00:00:00',
      cnvd_info: [],
      impact:
        '\u6076\u610f\u7528\u6237\u53ef\u80fd\u4f1a\u5728 JavaScript\u3001 VBScript\u3001 ActiveX\u3001 HTML \u6216 Flash \u4e2d\u6ce8\u5165\u6210\u4e00\u4e2a\u6613\u53d7\u653b\u51fb\u7684\u5e94\u7528\u7a0b\u5e8f\u6765\u6b3a\u9a97\u7528\u6237\uff0c\u4ee5\u4fbf\u4ece\u4e2d\u6536\u96c6\u6570\u636e\u3002',
      poc_check: true,
      vul_id: 2139,
      is_scanv: '1',
      cwe: ['CWE-79'],
      is0day: false,
      description:
        '\u8fd9\u4e2a\u811a\u672c\u5bb9\u6613\u53d7\u5230\u8de8\u7ad9\u811a\u672c\uff08XSS\uff09\u653b\u51fb\u3002\u8de8\u7ad9\u811a\u672c (\u4e5f\u79f0\u4f5c XSS) \u8fd9\u4e2a\u6f0f\u6d1e\u5b83\u5141\u8bb8\u4e00\u4e2a\u653b\u51fb\u8005\u7ed9\u53e6\u4e00\u4e2a\u7528\u6237\u53d1\u9001\u6076\u610f\u4ee3\u7801 (\u901a\u5e38\u662f\u4ee5 JavaScript \u7684\u5f62\u5f0f)>\u3002',
      short_name: '',
      tag_id: [1],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This script is possibly vulnerable to Cross Site Scripting (XSS) attacks.\n    Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker\n    to send malicious code (usually in the form of Javascript) to another user.',
      key: 'xss',
      name_en: 'Cross site scripting',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: '\u8de8\u7ad9\u811a\u672c\u653b\u51fb',
      level: 8,
      owasp_level: ['2013A3', '2017A7'],
      rule: '',
      test_data: '',
      recommendation_en: 'Your script should filter metacharacters from user input.',
    },
    '2a9ef16f-b388-70e5-20ed-b9ffb05061d4': {
      impact_en: 'Email addresses posted on Web sites may attract spam.',
      reference: ['https://en.wikipedia.org/wiki/Anti-spam_techniques'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u6709\u5173\u5982\u4f55\u89e3\u51b3\u6b64\u95ee\u9898\u7684\u8be6\u7ec6\u4fe1\u606f\uff0c\u8bf7\u67e5\u770b\u53c2\u8003\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa002f',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u7f51\u7ad9\u4e0a\u53d1\u5e03\u7684\u7535\u5b50\u90ae\u4ef6\u5730\u5740\u53ef\u80fd\u4f1a\u5438\u5f15\u5783',
      poc_check: false,
      vul_id: '2a9ef16f-b388-70e5-20ed-b9ffb05061d4',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        '\u5728\u6b64\u9875\u9762\u4e0a\u627e\u5230\u4e86\u4e00\u4e2a\u6216\u591a\u4e2a\u7535\u5b50\u90ae\u4ef6\u5730\u5740\u3002\u5927\u591a\u6570\u5783\u573e\u90ae\u4ef6\u6765\u81ea\u4e92\u8054\u7f51\u4e0a\u6536\u96c6\u7684\u7535\u5b50\u90ae\u4ef6\u5730\u5740\u3002\u5783\u573e\u90ae\u4ef6\u673a\u5668\u4eba\uff08\u4e5f\u79f0\u4e3a\u7535\u5b50\u90ae\u4ef6\u6536\u96c6\u5668\u548c\u7535\u5b50\u90ae\u4ef6\u63d0\u53d6\u5668\uff09\u662f\u5728\u4e92\u8054\u7f51\u4e0a\u641c\u7d22\u4ed6\u4eec\u9047\u5230\u7684\u4efb\u4f55\u7f51\u7ad9\u4e0a\u7684\u7535\u5b50\u90ae\u4ef6\u5730\u5740\u7684\u7a0b\u5e8f\u3002Spambot\u7a0b\u5e8f\u67e5\u627emyname@mydomain.com\u7b49\u5b57\u7b26\u4e32\uff0c\u7136\u540e\u8bb0\u5f55\u627e\u5230\u7684\u4efb\u4f55\u5730\u5740\u3002',
      short_name: '',
      tag_id: ['48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'One or more email addresses have been found on this page. The majority of spam comes from email addresses harvested off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour the internet looking for email addresses on any website they come across.  Spambot programs look for strings like myname@mydomain.com and then record any addresses found.',
      key: '2a9ef16f-b388-70e5-20ed-b9ffb05061d4',
      name_en: 'Email address found',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u627e\u5230\u7535\u5b50\u90ae\u4ef6\u5730\u5740',
      level: 0,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Check references for details on how to solve this problem.',
    },
    '84fd0f24-a88f-09cf-97eb-67959deb26d4': {
      impact_en: 'Consult References for more information.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation: '\u5347\u7ea7\u5230\u6700\u65b0\u7248\u672c\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa02e1',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u6709\u5173\u66f4\u591a\u4fe1\u606f\uff0c\u8bf7\u53c2\u9605\u53c2\u8003\u8d44\u6599',
      poc_check: false,
      vul_id: '84fd0f24-a88f-09cf-97eb-67959deb26d4',
      is_scanv: '2',
      cwe: ['CWE-16'],
      is0day: false,
      description:
        '\u60a8\u6b63\u5728\u4f7f\u7528\u6613\u53d7\u653b\u51fb\u7684Javascript\u5e93\u3002\u6b64\u7248\u672c\u7684Javascript\u5e93\u62a5\u544a\u4e86\u4e00\u4e2a\u6216\u591a\u4e2a\u6f0f\u6d1e\u3002\u6709\u5173\u53d7\u5f71\u54cd\u7684\u5e93\u548c\u62a5\u544a\u7684\u6f0f\u6d1e\u7684\u8be6\u7ec6\u4fe1\u606f\uff0c\u8bf7\u53c2\u9605\u653b\u51fb\u8be6\u7ec6\u4fe1\u606f\u548cWeb\u5f15\u7528\u3002',
      short_name: '',
      tag_id: ['319'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'You are using a vulnerable Javascript library. One or more vulnerabilities were reported for this version of the Javascript library. Consult Attack details and Web References for more information about the affected library and the vulnerabilities that were reported.',
      key: '84fd0f24-a88f-09cf-97eb-67959deb26d4',
      name_en: 'Vulnerable Javascript library',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u6613\u53d7\u653b\u51fb\u7684Javascript\u5e93',
      level: 6,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Upgrade to the latest version.',
    },
    'c611eed1-5456-d45c-4848-e3e2eed26b71': {
      impact_en:
        "Error messages information about an application's internal workings may be used to escalate attacks.",
      reference: [
        'https://httpd.apache.org/docs/current/custom-error.html',
        'http://nginx.org/en/docs/http/ngx_http_core_module.html#server_tokens',
        'https://blogs.msdn.microsoft.com/varunm/2013/04/23/remove-unwanted-http-response-headers/',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u6b63\u786e\u914d\u7f6eWeb\u670d\u52a1\u5668\u4e0d\u8981\u5411\u7528\u6237\u516c\u5f00\u6709\u5173\u5e94\u7528\u7a0b\u5e8f\u5185\u90e8\u5de5\u4f5c\u7684\u4fe1\u606f\u3002\u6709\u5173\u66f4\u591a\u4fe1\u606f\uff0c\u8bf7\u53c2\u9605\u201cWeb\u5f15\u7528\u201d\u90e8\u5206\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa0034',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u6709\u5173\u5e94\u7528\u7a0b\u5e8f\u5185\u90e8\u5de5\u4f5c\u7684\u9519\u8bef\u6d88\u606f\u4fe1\u606f\u53ef\u7528\u4e8e\u5347\u7ea7\u653b\u51fb\u3002',
      poc_check: false,
      vul_id: 'c611eed1-5456-d45c-4848-e3e2eed26b71',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        '\u5e94\u7528\u7a0b\u5e8f\u9519\u8bef\u6216\u8b66\u544a\u6d88\u606f\u53ef\u80fd\u4f1a\u5411\u653b\u51fb\u8005\u62ab\u9732\u6709\u5173\u5e94\u7528\u7a0b\u5e8f\u5185\u90e8\u5de5\u4f5c\u7684\u654f\u611f\u4fe1\u606f\u3002  Attacker\u53d1\u73b0\u76ee\u6807\u670d\u52a1\u5668\u4e0a\u542f\u7528\u4e86Web\u670d\u52a1\u5668\u7248\u672c\u53f7\u548c\u6a21\u5757\u5217\u8868\u3002\u6709\u5173\u53d7\u5f71\u54cd\u9875\u9762\u7684\u8be6\u7ec6\u4fe1\u606f\uff0c\u8bf7\u53c2\u9605\u201c\u653b\u51fb\u8be6\u7ec6\u4fe1\u606f\u201d\u90e8\u5206\u3002',
      short_name: '',
      tag_id: ['310', '315', '48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "Application errors or warning messages may disclose sensitive information about an application's internal workings to an attacker.\n\nAttacker found the web server version number and a list of modules enabled on the target server. Consult the 'Attack details' section for more information about the affected page.",
      key: 'c611eed1-5456-d45c-4848-e3e2eed26b71',
      name_en: 'Error page web server version disclosure',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u9519\u8bef\u9875\u9762Web\u670d\u52a1\u5668\u7248\u672c\u516c\u5f00',
      level: 0,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        "Properly configure the web server not to disclose information about an application's internal workings to the user. Consult the 'Web references' section for more information.",
    },
    '575ba039-89b6-b7d7-eba6-553135c04553': {
      impact_en: 'Cookies could be sent over unencrypted channels.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5982\u679c\u53ef\u80fd\uff0c\u60a8\u5e94\u8be5\u4e3a\u6b64cookie\u8bbe\u7f6e\u5b89\u5168\u6807\u5fd7\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff49',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        'Cookie\u53ef\u4ee5\u901a\u8fc7\u672a\u52a0\u5bc6\u7684\u6e20\u9053\u53d1\u9001\u3002',
      poc_check: false,
      vul_id: '575ba039-89b6-b7d7-eba6-553135c04553',
      is_scanv: '2',
      cwe: ['CWE-16'],
      is0day: false,
      description:
        '\u6b64cookie\u6ca1\u6709\u8bbe\u7f6e\u5b89\u5168\u6807\u5fd7\u3002\u4f7f\u7528\u5b89\u5168\u6807\u5fd7\u8bbe\u7f6ecookie\u65f6\uff0c\u5b83\u4f1a\u6307\u793a\u6d4f\u89c8\u5668\u53ea\u80fd\u901a\u8fc7\u5b89\u5168\u7684SSL / TLS\u901a\u9053\u8bbf\u95eecookie\u3002\u8fd9\u662f\u4f1a\u8bddcookie\u7684\u91cd\u8981\u5b89\u5168\u4fdd\u62a4\u3002',
      short_name: '',
      tag_id: ['310'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This cookie does not have the Secure flag set. When a cookie is set with the Secure flag, it instructs the browser that the cookie can only be accessed over secure SSL/TLS channels. This is an important security protection for session cookies.',
      key: '575ba039-89b6-b7d7-eba6-553135c04553',
      name_en: 'Cookie(s) without Secure flag set',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: 'Cookie\u6ca1\u6709\u5b89\u5168\u6807\u5fd7\u8bbe\u7f6e',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'If possible, you should set the Secure flag for this cookie.',
    },
    '2648b2a5-e4dc-ca70-cbb5-b7513459c75a': {
      impact_en:
        'A malicious user may execute arbitrary system commands with the permissions of the web server.',
      reference: [
        'http://www.symantec.com/connect/articles/penetration-testing-web-applications-part-two',
        'http://www.owasp.org/index.php/PHP_Top_5',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u60a8\u7684\u811a\u672c\u5e94\u8be5\u4ece\u7528\u6237\u8f93\u5165\u4e2d\u8fc7\u6ee4\u5143\u5b57\u7b26\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff2b',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u6076\u610f\u7528\u6237\u53ef\u4ee5\u4f7f\u7528Web\u670d\u52a1\u5668\u7684\u6743\u9650\u6267\u884c\u4efb\u610f\u7cfb\u7edf\u547d\u4ee4\u3002',
      poc_check: false,
      vul_id: '2648b2a5-e4dc-ca70-cbb5-b7513459c75a',
      is_scanv: '2',
      cwe: ['CWE-94'],
      is0day: false,
      description:
        '\u6b64\u811a\u672c\u53ef\u80fd\u5bb9\u6613\u53d7\u5230\u4ee3\u7801\u6267\u884c\u653b\u51fb\u3002 \u4ee3\u7801\u6ce8\u5165\u6f0f\u6d1e\u53d1\u751f\u5728Web\u5e94\u7528\u7a0b\u5e8f\u63d0\u4f9b\u7684\u8f93\u51fa\u6216\u5185\u5bb9\u53ef\u4ee5\u901a\u8fc7\u89e6\u53d1\u670d\u52a1\u5668\u7aef\u4ee3\u7801\u6267\u884c\u7684\u65b9\u5f0f\u8fdb\u884c\u64cd\u4f5c\u7684\u60c5\u51b5\u3002\u5728\u4e00\u4e9b\u5199\u5f97\u4e0d\u597d\u7684Web\u5e94\u7528\u7a0b\u5e8f\u4e2d\uff0c\u5141\u8bb8\u7528\u6237\u4fee\u6539\u670d\u52a1\u5668\u7aef\u6587\u4ef6\uff08\u4f8b\u5982\u901a\u8fc7\u53d1\u5e03\u5230\u7559\u8a00\u677f\u6216\u7559\u8a00\u7c3f\uff09\uff0c\u6709\u65f6\u53ef\u4ee5\u7528\u5e94\u7528\u7a0b\u5e8f\u672c\u8eab\u7684\u811a\u672c\u8bed\u8a00\u6ce8\u5165\u4ee3\u7801\u3002',
      short_name: '',
      tag_id: ['316'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This script is possibly vulnerable to code execution attacks.Code injection vulnerabilities occur where the output or content served from a Web application can be manipulated in such a way that it triggers server-side code execution. In some poorly written Web applications that allow users to modify server-side files (such as by posting to a message board or guestbook) it is sometimes possible to inject code in the scripting language of the application itself.',
      key: '2648b2a5-e4dc-ca70-cbb5-b7513459c75a',
      name_en: 'Code execution',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u4ee3\u7801\u6267\u884c',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Your script should filter metacharacters from user input.',
    },
    solr_dataimport_rce_cve_2019_0193: {
      impact_en:
        'An attacker can use this vulnerability to execute arbitrary code on the target server.',
      reference: ['https://issues.apache.org/jira/browse/SOLR-13669'],
      bugtraq_info: [],
      disabled: true,
      recommendation:
        '\u5347\u7ea7\u5230\u5b98\u65b9\u6307\u5b9a\u7248\u672c\u53ca\u4ee5\u4e0a\u3002',
      wasc: [],
      id: '60ad03d07dc93b454c20b97f',
      findtime: '2019-07-31 00:00:00',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u76ee\u6807\u670d\u52a1\u5668\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002',
      poc_check: true,
      vul_id: 2653,
      is_scanv: '0',
      cwe: [],
      is0day: false,
      description:
        'Apache Solr\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u8f6f\u4ef6\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u57fa\u4e8eLucene\uff08\u4e00\u6b3e\u5168\u6587\u641c\u7d22\u5f15\u64ce\uff09\u7684\u641c\u7d22\u670d\u52a1\u5668\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u5c42\u9762\u641c\u7d22\u3001\u5782\u76f4\u641c\u7d22\u3001\u9ad8\u4eae\u663e\u793a\u641c\u7d22\u7ed3\u679c\u7b49',
      short_name: '',
      tag_id: [316],
      cve_info: ['CVE-2019-0193'],
      cnnvd_info: [],
      description_en:
        'Apache Solr is an Apache software foundation based on Lucene (a full-text search engine) search server. The product supports horizontal search, vertical search, highlighting search results and so on.',
      key: 'solr_dataimport_rce_cve_2019_0193',
      name_en: 'Apache Solr dataimport RCE vulnerability (CVE-2019-0193)',
      msfpath: '',
      updatetime: '2021-08-10 00:00:00',
      name: 'Apache Solr dataimport RCE \u6f0f\u6d1e(CVE-2019-0193)',
      level: 8,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Upgrade to the official version and above.',
    },
    git_repository: {
      impact_en:
        'These files may expose sensitive information that may help an malicious user to prepare more advanced attacks.',
      reference: [
        'http://www.ducea.com/2006/08/11/apache-tips-tricks-deny-access-to-some-folders/',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u9650\u5236\u8be5\u76ee\u5f55(.git)\u7684\u8bbf\u95ee\u6743\u9650\u6216\u4ece\u7ebf\u4e0a\u670d\u52a1\u5668\u5220\u9664\u8be5\u76ee\u5f55\u3002',
      wasc: ['WASC-13'],
      id: '5bed0d527dc93b08352e90b1',
      findtime: '2009-09-25 00:00:00',
      cnvd_info: [],
      impact:
        '\u8fd9\u4e9b\u6587\u4ef6\u53ef\u80fd\u5305\u542b\u654f\u611f\u4fe1\u606f\u3002\u8fd9\u80fd\u5e2e\u52a9\u4e00\u4e2a\u6076\u610f\u7528\u6237\uff08Hacker\uff09\u4e3a\u66f4\u9ad8\u7ea7\u7684\u653b\u51fb\u505a\u51c6\u5907\u3002',
      poc_check: true,
      vul_id: 1989,
      is_scanv: '1',
      cwe: ['CWE-538'],
      is0day: false,
      description:
        '\u5728\u76ee\u5f55\u4e2d\u53d1\u73b0\u4e86GIT\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u7684\u76ee\u5f55 (.git)\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6cc4\u6f0f\u7684\u6587\u4ef6\u63d0\u53d6\u5305\u62ec\u5f00\u53d1\u4eba\u5458\u7684\u7528\u6237\u540d\u53ca\u6587\u4ef6\u7684\u6e90\u4ee3\u7801\u7b49\u3002',
      short_name: '',
      tag_id: [48, 307, 317],
      cve_info: [],
      cnnvd_info: [],
      description_en: 'Git metadata directory (.git) was found in this folder.',
      key: 'git_repository',
      name_en: 'Git repository found',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: 'GIT\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u4fe1\u606f\u6cc4\u6f0f',
      level: 8,
      owasp_level: ['2013A6', '2017A3'],
      rule: '',
      test_data: '',
      recommendation_en:
        'Remove these files from production systems or restrict access to the .git directory. To deny access to all the .git folders you need to add the following lines in the appropriate context (either global config, or vhost/directory, or from .htaccess):',
    },
    'ca3a4dd5-3f3b-4b43-527e-3210a52f9c8c': {
      impact_en:
        "An attacker could use CSRF to trick a victim into accessing a website hosted by the attacker, or clicking a URL containing malicious or unauthorized requests.\n\nCSRF is a type of 'confused deputy' attack which leverages the authentication and authorization of the victim when the forged request is being sent to the web server. Therefore, if a CSRF vulnerability could affect highly privileged users such as administrators full application compromise may be possible.",
      reference: [
        'https://www.Attacker.com/websitesecurity/csrf-attacks/',
        'https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet',
        'http://www.cgisecurity.com/csrf-faq.html',
        'https://en.wikipedia.org/wiki/Cross-site_request_forgery',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u9a8c\u8bc1\u6b64\u8868\u5355\u662f\u5426\u9700\u8981\u53cdCSRF\u4fdd\u62a4\u5e76\u5728\u5fc5\u8981\u65f6\u5b9e\u65bdCSRF\u5bf9\u7b56\u3002 \u7528\u4e8e\u9632\u6b62CSRF\u653b\u51fb\u7684\u63a8\u8350\u548c\u6700\u5e7f\u6cdb\u4f7f\u7528\u7684\u6280\u672f\u88ab\u79f0\u4e3a\u53cdCSRF\u4ee4\u724c\uff0c\u6709\u65f6\u4e5f\u79f0\u4e3a\u540c\u6b65\u5668\u4ee4\u724c\u3002\u7cbe\u5fc3\u8bbe\u8ba1\u7684\u53cdCSRF\u7cfb\u7edf\u7684\u7279\u5f81\u5305\u62ec\u4ee5\u4e0b\u5c5e\u6027\uff1a   \u6bcf\u4e2a\u7528\u6237\u4f1a\u8bdd\u7684\u53cdCSRF\u4ee4\u724c\u5e94\u8be5\u662f\u552f\u4e00\u7684 \u4f1a\u8bdd\u5e94\u8be5\u5728\u9002\u5f53\u7684\u65f6\u95f4\u540e\u81ea\u52a8\u8fc7\u671f \u53cdCSRF\u4ee4\u724c\u5e94\u8be5\u662f\u5177\u6709\u91cd\u8981\u957f\u5ea6\u7684\u52a0\u5bc6\u968f\u673a\u503c \u53cdCSRF\u4ee4\u724c\u5e94\u8be5\u662f\u52a0\u5bc6\u5b89\u5168\u7684\uff0c\u5373\u7531\u5f3a\u4f2a\u968f\u673a\u6570\u751f\u6210\u5668\uff08PRNG\uff09\u7b97\u6cd5\u751f\u6210 \u53cdCSRF\u4ee4\u724c\u4f5c\u4e3a\u8868\u5355\u6216URL\u5185\u7684\u9690\u85cf\u5b57\u6bb5\u6dfb\u52a0\uff08\u4ec5\u5728GET\u8bf7\u6c42\u5bfc\u81f4\u72b6\u6001\u66f4\u6539\u65f6\u624d\u9700\u8981\uff0c\u5373\uff0c GET\u8bf7\u6c42\u4e0d\u662f\u5e42\u7b49\u7684\u3002\uff09 \u5982\u679c\u53cdCSRF\u4ee4\u724c\u672a\u901a\u8fc7\u9a8c\u8bc1\uff0c\u670d\u52a1\u5668\u5e94\u62d2\u7edd\u8bf7\u6c42\u7684\u64cd\u4f5c  \u5f53\u7528\u6237\u63d0\u4ea4\u8868\u5355\u6216\u5236\u4f5c\u5176\u4ed6\u8868\u5355\u65f6\u9700\u8981Cookie\u7684\u7ecf\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u7684\u8bf7\u6c42\uff0c\u53cdCSRF\u4ee4\u724c\u5e94\u5305\u542b\u5728\u8bf7\u6c42\u4e2d\u3002\u7136\u540e\uff0cWeb\u5e94\u7528\u7a0b\u5e8f\u5c06\u5728\u5904\u7406\u8bf7\u6c42\u4e4b\u524d\u9a8c\u8bc1\u6b64\u4ee4\u724c\u7684\u5b58\u5728\u6027\u548c\u6b63\u786e\u6027\u3002\u5982\u679c\u4ee4\u724c\u4e22\u5931\u6216\u4e0d\u6b63\u786e\uff0c\u5219\u53ef\u4ee5\u62d2\u7edd\u8be5\u8bf7\u6c42\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff4f',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u653b\u51fb\u8005\u53ef\u4ee5\u4f7f\u7528CSRF\u6b3a\u9a97\u53d7\u5bb3\u8005\u8bbf\u95ee\u653b\u51fb\u8005\u6258\u7ba1\u7684\u7f51\u7ad9\uff0c\u6216\u70b9\u51fb\u5305\u542b\u6076\u610f\u6216\u672a\u7ecf\u6388\u6743\u8bf7\u6c42\u7684URL\u3002  CSRF\u662f\u4e00\u79cd\u5229\u7528\u8eab\u4efd\u9a8c\u8bc1\u7684\u201c\u6df7\u6dc6\u4ee3\u7406\u201d\u653b\u51fb\u5f53\u4f2a\u9020\u8bf7\u6c42\u88ab\u53d1\u9001\u5230Web\u670d\u52a1\u5668\u65f6\u53d7\u5bb3\u8005\u7684\u6388\u6743\u3002\u56e0\u6b64\uff0c\u5982\u679cCSRF\u6f0f\u6d1e\u53ef\u80fd\u5f71\u54cd\u9ad8\u6743\u9650\u7528\u6237\uff0c\u4f8b\u5982\u7ba1\u7406\u5458\uff0c\u5219\u53ef\u80fd\u4f1a\u5bfc\u81f4\u5b8c\u5168\u5e94\u7528\u7a0b\u5e8f\u53d7\u635f\u3002',
      poc_check: false,
      vul_id: 'ca3a4dd5-3f3b-4b43-527e-3210a52f9c8c',
      is_scanv: '2',
      cwe: ['CWE-352'],
      is0day: false,
      description:
        ' \u6b64\u8b66\u62a5\u9700\u8981\u624b\u52a8\u786e\u8ba4  \u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\uff08CSRF\u6216XSRF\uff09\u662f\u4e00\u4e2a\u6f0f\u6d1e\uff0c\u5176\u4e2d\u653b\u51fb\u8005\u6b3a\u9a97\u53d7\u5bb3\u8005\u63d0\u51fa\u53d7\u5bb3\u8005\u4e0d\u6253\u7b97\u63d0\u51fa\u7684\u8bf7\u6c42\u3002\u56e0\u6b64\uff0c\u4f7f\u7528CSRF\uff0c\u653b\u51fb\u8005\u6ee5\u7528Web\u5e94\u7528\u7a0b\u5e8f\u4e0e\u53d7\u5bb3\u8005\u6d4f\u89c8\u5668\u7684\u4fe1\u4efb\u3002  Attacker\u53d1\u73b0\u4e86\u4e00\u4e2a\u6ca1\u6709\u660e\u663e\u53cdCSRF\u4fdd\u62a4\u7684HTML\u8868\u5355\u3002\u6709\u5173\u53d7\u5f71\u54cd\u7684HTML\u8868\u5355\u7684\u8be6\u7ec6\u4fe1\u606f\uff0c\u8bf7\u53c2\u9605\u201c\u653b\u51fb\u8be6\u7ec6\u4fe1\u606f\u201d\u90e8\u5206\u3002',
      short_name: '',
      tag_id: ['322'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "This alert requires manual confirmation\n\nCross-Site Request Forgery (CSRF, or XSRF) is a vulnerability wherein an attacker tricks a victim into making a request the victim did not intend to make. Therefore, with CSRF, an attacker abuses the trust a web application has with a victim's browser.\n\nAttacker found an HTML form with no apparent anti-CSRF protection implemented. Consult the 'Attack details' section for more information about the affected HTML form.",
      key: 'ca3a4dd5-3f3b-4b43-527e-3210a52f9c8c',
      name_en: 'HTML form without CSRF protection',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u6ca1\u6709CSRF\u4fdd\u62a4\u7684HTML\u8868\u5355',
      level: 6,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Verify if this form requires anti-CSRF protection and implement CSRF countermeasures if necessary.\n\nThe recommended and the most widely used technique for preventing CSRF attacks is know as an anti-CSRF token, also sometimes referred to as a synchronizer token. The characteristics of a well designed anti-CSRF system involve the following attributes.\n\n\n  The anti-CSRF token should be unique for each user session\n  The session should automatically expire after a suitable amount of time\n  The anti-CSRF token should be a cryptographically random value of significant length\n  The anti-CSRF token should be cryptographically secure, that is, generated by a strong Pseudo-Random Number Generator (PRNG) algorithm\n  The anti-CSRF token is added as a hidden field for forms, or within URLs (only necessary if GET requests cause state changes, that is, GET requests are not idempotent)\n  The server should reject the requested action if the anti-CSRF token fails validation\n\n\nWhen a user submits a form or makes some other authenticated request that requires a Cookie, the anti-CSRF token should be included in the request. Then, the web application will then verify the existence and correctness of this token before processing the request. If the token is missing or incorrect, the request can be rejected.',
    },
    '53bf84c1-cb0e-8261-afb2-fd028ea6d36b': {
      impact_en: 'None',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation: '\u4e3a\u6b64\u9875\u9762\u8bbe\u7f6eContent-Type\u6807\u5934\u503c\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff47',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact: '\u6ca1\u6709',
      poc_check: false,
      vul_id: '53bf84c1-cb0e-8261-afb2-fd028ea6d36b',
      is_scanv: '2',
      cwe: ['CWE-16'],
      is0day: false,
      description:
        '\u6b64\u9875\u9762\u672a\u8bbe\u7f6eContent-Type\u6807\u5934\u503c\u3002\u8be5\u503c\u901a\u77e5\u6d4f\u89c8\u5668\u671f\u671b\u7684\u6570\u636e\u7c7b\u578b\u3002\u5982\u679c\u7f3a\u5c11\u6b64\u6807\u5934\uff0c\u6d4f\u89c8\u5668\u53ef\u80fd\u4f1a\u9519\u8bef\u5730\u5904\u7406\u6570\u636e\u3002\u8fd9\u53ef\u80fd\u4f1a\u5bfc\u81f4\u5b89\u5168\u95ee\u9898\u3002',
      short_name: '',
      tag_id: ['310'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This page does not set a Content-Type header value. This value informs the browser what kind of data to expect. If this header is missing, the browser may incorrectly handle the data. This could lead to security problems.',
      key: '53bf84c1-cb0e-8261-afb2-fd028ea6d36b',
      name_en: 'Content type is not specified',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u672a\u6307\u5b9a\u5185\u5bb9\u7c7b\u578b',
      level: 0,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Set a Content-Type header value for this page.',
    },
    'd6b36f54-09ec-af8d-df8a-5f76932151ca': {
      impact_en:
        'Error messages may disclose sensitive information which can be used to escalate attacks.',
      reference: [
        'http://www.php.net/manual/en/errorfunc.configuration.php#ini.display-errors',
        'https://www.owasp.org/index.php/Improper_Error_Handling',
      ],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u9a8c\u8bc1\u6b64\u9875\u9762\u662f\u5426\u516c\u5f00\u9519\u8bef\u6216\u8b66\u544a\u6d88\u606f\uff0c\u5e76\u6b63\u786e\u914d\u7f6e\u5e94\u7528\u7a0b\u5e8f\u4ee5\u5c06\u9519\u8bef\u8bb0\u5f55\u5230\u6587\u4ef6\u800c\u4e0d\u662f\u5411\u7528\u6237\u663e\u793a\u9519\u8bef\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9fee2',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u9519\u8bef\u6d88\u606f\u53ef\u80fd\u4f1a\u6cc4\u9732\u53ef\u7528\u4e8e\u5347\u7ea7\u653b\u51fb\u7684\u654f\u611f\u4fe1\u606f\u3002',
      poc_check: false,
      vul_id: 'd6b36f54-09ec-af8d-df8a-5f76932151ca',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        ' \u6b64\u8b66\u62a5\u9700\u8981\u624b\u52a8\u786e\u8ba4  \u5e94\u7528\u7a0b\u5e8f\u9519\u8bef\u6216\u8b66\u544a\u6d88\u606f\u53ef\u80fd\u4f1a\u6cc4\u9732\u6709\u5173\u5e94\u7528\u7a0b\u5e8f\u5185\u90e8\u7684\u654f\u611f\u4fe1\u606f\u5bf9\u653b\u51fb\u8005\u7684\u64cd\u4f5c\u3002  Attacker\u53d1\u73b0\u4e86\u53ef\u80fd\u6cc4\u9732\u654f\u611f\u4fe1\u606f\u7684\u9519\u8bef\u6216\u8b66\u544a\u4fe1\u606f\u3002\u8be5\u6d88\u606f\u8fd8\u53ef\u80fd\u5305\u542b\u751f\u6210\u672a\u5904\u7406\u5f02\u5e38\u7684\u6587\u4ef6\u7684\u4f4d\u7f6e\u3002\u6709\u5173\u53d7\u5f71\u54cd\u9875\u9762\u7684\u8be6\u7ec6\u4fe1\u606f\uff0c\u8bf7\u53c2\u9605\u201c\u653b\u51fb\u8be6\u7ec6\u4fe1\u606f\u201d\u90e8\u5206\u3002',
      short_name: '',
      tag_id: ['48', '315'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "This alert requires manual confirmation\n\nApplication error or warning messages may expose sensitive information about an application's internal workings to an attacker.\n\nAttacker found an error or warning message that may disclose sensitive information. The message may also contain the location of the file that produced an unhandled exception. Consult the 'Attack details' section for more information about the affected page.",
      key: 'd6b36f54-09ec-af8d-df8a-5f76932151ca',
      name_en: 'Error message on page',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u9875\u9762\u4e0a\u7684\u9519\u8bef\u6d88\u606f',
      level: 6,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Verify that this page is disclosing error or warning messages and properly configure the application to log errors to a file instead of displaying the error to the user.',
    },
    '7da1eea9-f52f-fcf4-9f9e-3469b273fa20': {
      impact_en: 'Possible sensitive information disclosure.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5e94\u4f7f\u7528cookie\uff08\u6216\u9690\u85cf\u7684\u8f93\u5165\u5b57\u6bb5\uff09\u7ef4\u62a4\u4f1a\u8bdd\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0f9ff4c',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact: '\u53ef\u80fd\u7684\u654f\u611f\u4fe1\u606f\u62ab\u9732\u3002',
      poc_check: false,
      vul_id: '7da1eea9-f52f-fcf4-9f9e-3469b273fa20',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        '\u6b64\u5e94\u7528\u7a0b\u5e8f\u5728\u67e5\u8be2\u53c2\u6570\u4e2d\u5305\u542b\u4f1a\u8bdd\u4ee4\u724c\u3002\u4f1a\u8bdd\u4ee4\u724c\u662f\u654f\u611f\u4fe1\u606f\uff0c\u4e0d\u5e94\u5b58\u50a8\u5728URL\u4e2d\u3002\u53ef\u4ee5\u901a\u8fc7Referer\u6807\u5934\u8bb0\u5f55\u6216\u6cc4\u9732URL\u3002',
      short_name: '',
      tag_id: ['48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'This application contains a session token in the query parameters. A session token is sensitive information and should not be stored in the URL. URLs could be logged or leaked via the Referer header.',
      key: '7da1eea9-f52f-fcf4-9f9e-3469b273fa20',
      name_en: 'Session token in URL',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: 'URL\u4e2d\u7684\u4f1a\u8bdd\u4ee4\u724c',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'The session should be maintained using cookies (or hidden input fields).',
    },
    'fecbc431-2901-83d2-54be-29e6cc55319b': {
      impact_en:
        'This file may expose sensitive information that could help a malicious user to prepare more advanced attacks.',
      reference: ['http://www.Attacker.com/websitesecurity/webserver-security/'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u9650\u5236\u5bf9\u6b64\u6587\u4ef6\u7684\u8bbf\u95ee\u6216\u5c06\u5176\u4ece\u7f51\u7ad9\u4e2d\u5220\u9664\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa021e',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u6b64\u6587\u4ef6\u53ef\u80fd\u4f1a\u6cc4\u9732\u53ef\u80fd\u6709\u52a9\u4e8e\u6076\u610f\u7528\u6237\u51c6\u5907\u66f4\u9ad8\u7ea7\u653b\u51fb\u7684\u654f\u611f\u4fe1\u606f\u3002',
      poc_check: false,
      vul_id: 'fecbc431-2901-83d2-54be-29e6cc55319b',
      is_scanv: '2',
      cwe: ['CWE-200'],
      is0day: false,
      description:
        '\u627e\u5230\u4e86\u53ef\u80fd\u7684\u654f\u611f\u6587\u4ef6\u3002\u6b64\u6587\u4ef6\u672a\u76f4\u63a5\u4ece\u7f51\u7ad9\u94fe\u63a5\u3002\u6b64\u68c0\u67e5\u67e5\u627e\u5e38\u89c1\u7684\u654f\u611f\u8d44\u6e90\uff0c\u5982\u5bc6\u7801\u6587\u4ef6\uff0c\u914d\u7f6e\u6587\u4ef6\uff0c\u65e5\u5fd7\u6587\u4ef6\uff0c\u5305\u542b\u6587\u4ef6\uff0c\u7edf\u8ba1\u6570\u636e\uff0c\u6570\u636e\u5e93\u8f6c\u50a8\u3002\u8fd9\u4e9b\u6587\u4ef6\u4e2d\u7684\u6bcf\u4e00\u4e2a\u90fd\u53ef\u4ee5\u5e2e\u52a9\u653b\u51fb\u8005\u66f4\u591a\u5730\u4e86\u89e3\u4ed6\u7684\u76ee\u6807\u3002',
      short_name: '',
      tag_id: ['48', '307'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'A possible sensitive file has been found. This file is not directly linked from the website. This check looks for common sensitive resources like password files, configuration files, log files, include files, statistics data, database dumps. Each one of these files could help an attacker to learn more about his target.',
      key: 'fecbc431-2901-83d2-54be-29e6cc55319b',
      name_en: 'Possible sensitive files',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u53ef\u80fd\u7684\u654f\u611f\u6587\u4ef6',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Restrict access to this file or remove it from the website.',
    },
    '397e08c1-4742-723a-c1d0-fe6c4dfacd79': {
      impact_en:
        'These files may disclose sensitive information. This information can be used to launch further attacks.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5220\u9664\u6216\u9650\u5236\u5bf9\u4eceInternet\u8bbf\u95ee\u7684\u6240\u6709\u6587\u6863\u6587\u4ef6\u7684\u8bbf\u95ee\u6743\u9650\u3002',
      wasc: [],
      id: '5d9f0e38e775e39cd0fa0235',
      findtime: '2019-10-10 10:55:52',
      cnvd_info: [],
      impact:
        '\u8fd9\u4e9b\u6587\u4ef6\u53ef\u80fd\u4f1a\u6cc4\u9732\u654f\u611f\u4fe1\u606f\u3002\u6b64\u4fe1\u606f\u53ef\u7528\u4e8e\u53d1\u52a8\u8fdb\u4e00\u6b65\u7684\u653b\u51fb\u3002',
      poc_check: false,
      vul_id: '397e08c1-4742-723a-c1d0-fe6c4dfacd79',
      is_scanv: '2',
      cwe: ['CWE-538'],
      is0day: false,
      description:
        '\u5728\u6b64\u76ee\u5f55\u4e2d\u627e\u5230\u4e86\u6587\u6863\u6587\u4ef6\uff08\u4f8b\u5982readme.txt\uff0cchangelog.txt\uff0c...\uff09\u3002\u8fd9\u4e9b\u6587\u4ef6\u4e2d\u5305\u542b\u7684\u4fe1\u606f\u53ef\u4ee5\u5e2e\u52a9\u653b\u51fb\u8005\u8bc6\u522b\u60a8\u6b63\u5728\u4f7f\u7528\u7684Web\u5e94\u7528\u7a0b\u5e8f\uff0c\u6709\u65f6\u8fd8\u53ef\u4ee5\u8bc6\u522b\u5e94\u7528\u7a0b\u5e8f\u7684\u7248\u672c\u3002\u5efa\u8bae\u4ece\u751f\u4ea7\u7cfb\u7edf\u4e2d\u5220\u9664\u8fd9\u4e9b\u6587\u4ef6\u3002',
      short_name: '',
      tag_id: ['48'],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        "A documentation file (e.g. readme.txt, changelog.txt, ...) was found in this directory.  The information contained in these files could help an attacker identify the web application you are using and sometimes the version of the application.  It's recommended to remove these files from production systems.",
      key: '397e08c1-4742-723a-c1d0-fe6c4dfacd79',
      name_en: 'Documentation file',
      msfpath: '',
      updatetime: '2019-10-10 10:55:52',
      name: '\u6587\u6863\u6587\u4ef6',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en:
        'Remove or restrict access to all documentation file acessible from internet.',
    },
    sensitive_dirs: {
      impact_en:
        'This directory may expose sensitive information that could help a malicious user to prepare more advanced attacks.',
      reference: [],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u9650\u5236\u8be5\u76ee\u5f55\u7684\u8bbf\u95ee\u6743\u9650\u6216\u4ece\u670d\u52a1\u5668\u5220\u9664\u8be5\u6587\u4ef6\u3002',
      wasc: [],
      id: '5bed0d527dc93b08352e9108',
      findtime: '2004-03-27 00:00:00',
      cnvd_info: [],
      impact:
        '\u8fd9\u4e2a\u76ee\u5f55\u4fe1\u606f\u80fd\u5e2e\u52a9\u653b\u51fb\u8005\uff08Hacker\uff09\u4e3a\u66f4\u9ad8\u7ea7\u7684\u653b\u51fb\u505a\u51c6\u5907\u3002',
      poc_check: true,
      vul_id: 2077,
      is_scanv: '1',
      cwe: [],
      is0day: false,
      description:
        '\u53d1\u73b0\u7591\u4f3c\u654f\u611f\u76ee\u5f55\u3002\u8fd9\u4e2a\u76ee\u5f55\u901a\u5e38\u4e0d\u662f\u5728\u7f51\u9875\u4e2d\u901a\u8fc7\u94fe\u63a5\u6765\u8bbf\u95ee\uff0c\u653b\u51fb\u8005\u901a\u8fc7\u6536\u96c6\u8fd9\u4e9b\u654f\u611f\u76ee\u5f55\u4fe1\u606f\u53d1\u8d77\u8fdb\u4e00\u6b65\u653b\u51fb\u3002',
      short_name: '',
      tag_id: [48],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these directories could help an attacker to learn more about his target.',
      key: 'sensitive_dirs',
      name_en: 'Possible sensitive dirs',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: '\u53d1\u73b0\u654f\u611f\u76ee\u5f55',
      level: 2,
      owasp_level: [],
      rule: '',
      test_data: '',
      recommendation_en: 'Restrict access to this directory or remove it from the website.',
    },
    url_redirection: {
      impact_en:
        'A remote attacker can redirect users from your website to a specified URL. This problem may assist an attacker to conduct phishing attacks, trojan distribution, spammers.',
      reference: ['https://www.owasp.org/index.php/Unvalidated_Redirects_and_Forwards_Cheat_Sheet'],
      bugtraq_info: [],
      disabled: false,
      recommendation:
        '\u5bf9\u7528\u6237\u8f93\u5165\u505a\u8fc7\u6ee4,\u914d\u7f6e\u5141\u8bb8\u8df3\u8f6c\u7684\u767d\u540d\u5355\u57df\u540d',
      wasc: ['WASC-38'],
      id: '5bed0d537dc93b08352e91de',
      findtime: '2014-08-05 00:00:00',
      cnvd_info: [],
      impact:
        '\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5c06\u7528\u6237\u4ece\u60a8\u7684\u7f51\u7ad9\u91cd\u5b9a\u5411\u5230\u6307\u5b9a\u7684\u7f51\u5740\u3002 \u6b64\u95ee\u9898\u53ef\u80fd\u6709\u52a9\u4e8e\u653b\u51fb\u8005\u8fdb\u884c\u7f51\u7edc\u9493\u9c7c\u653b\u51fb\uff0c\u6728\u9a6c\u5206\u53d1\uff0c\u5783\u573e\u90ae\u4ef6\u53d1\u9001\u3002',
      poc_check: true,
      vul_id: 2292,
      is_scanv: '1',
      cwe: ['CWE-601'],
      is0day: false,
      description:
        'URL\u91cd\u5b9a\u5411\u6709\u65f6\u88ab\u7528\u4f5c\u7f51\u7edc\u9493\u9c7c\u653b\u51fb\u7684\u4e00\u90e8\u5206\uff0c\u4ece\u800c\u4f7f\u8bbf\u95ee\u8005\u6df7\u6dc6\u4ed6\u4eec\u8bbf\u95ee\u54ea\u4e2a\u7f51\u7ad9\u3002',
      short_name: '',
      tag_id: [],
      cve_info: [],
      cnnvd_info: [],
      description_en:
        'URL redirection is sometimes used as a part of phishing attacks that confuse visitors about which web site they are visiting.',
      key: 'url_redirection',
      name_en: 'URL redirection',
      msfpath: '',
      updatetime: '2021-05-12 00:00:00',
      name: 'URL\u91cd\u5b9a\u5411',
      level: 5,
      owasp_level: ['2013A10'],
      rule: '',
      test_data: '',
      recommendation_en: 'Your script should properly sanitize user input.',
    },
  },
  content: {
    black_links: {
      count: 10,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [
        {
          url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=64',
          event_id: 441798,
          ignore: false,
          feedback: '',
          level: 3,
        },
        {
          url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=65',
          event_id: 441799,
          ignore: false,
          feedback: '',
          level: 3,
        },
        {
          url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=66',
          event_id: 441800,
          ignore: false,
          feedback: '',
          level: 3,
        },
        {
          url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=59',
          event_id: 441801,
          ignore: false,
          feedback: '',
          level: 3,
        },
        {
          url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=58',
          event_id: 441802,
          ignore: false,
          feedback: '',
          level: 3,
        },
        {
          url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=70',
          event_id: 441803,
          ignore: false,
          feedback: '',
          level: 3,
        },
        {
          url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=57',
          event_id: 441804,
          ignore: false,
          feedback: '',
          level: 3,
        },
        {
          url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=56',
          event_id: 441805,
          ignore: false,
          feedback: '',
          level: 3,
        },
        {
          url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=73',
          event_id: 441806,
          ignore: false,
          feedback: '',
          level: 3,
        },
        {
          url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=72',
          event_id: 441807,
          ignore: false,
          feedback: '',
          level: 3,
        },
      ],
      show: 10,
      site_id: 278952,
      summary: {},
      event_list: [
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441798,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 3,
          value: {
            url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=64',
            keywords: [],
            links: ['http://xss.bxss.me'],
          },
          group_id: 2061,
          type: 'black_links',
        },
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441799,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 3,
          value: {
            url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=65',
            keywords: [],
            links: ['http://xss.bxss.me'],
          },
          group_id: 2061,
          type: 'black_links',
        },
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441800,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 3,
          value: {
            url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=66',
            keywords: [],
            links: ['http://xss.bxss.me'],
          },
          group_id: 2061,
          type: 'black_links',
        },
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441801,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 3,
          value: {
            url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=59',
            keywords: [],
            links: ['http://xss.bxss.me'],
          },
          group_id: 2061,
          type: 'black_links',
        },
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441802,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 3,
          value: {
            url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=58',
            keywords: [],
            links: ['http://xss.bxss.me'],
          },
          group_id: 2061,
          type: 'black_links',
        },
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441803,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 3,
          value: {
            url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=70',
            keywords: [],
            links: ['http://xss.bxss.me'],
          },
          group_id: 2061,
          type: 'black_links',
        },
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441804,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 3,
          value: {
            url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=57',
            keywords: [],
            links: ['http://xss.bxss.me'],
          },
          group_id: 2061,
          type: 'black_links',
        },
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441805,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 3,
          value: {
            url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=56',
            keywords: [],
            links: ['http://xss.bxss.me'],
          },
          group_id: 2061,
          type: 'black_links',
        },
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441806,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 3,
          value: {
            url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=73',
            keywords: [],
            links: ['http://xss.bxss.me'],
          },
          group_id: 2061,
          type: 'black_links',
        },
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441807,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 3,
          value: {
            url: 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=72',
            keywords: [],
            links: ['http://xss.bxss.me'],
          },
          group_id: 2061,
          type: 'black_links',
        },
      ],
      regroup_dict: {
        links: {
          detail_list: ['http://xss.bxss.me'],
          name: 'links',
          desc: '\u6076\u610f\u94fe\u63a5',
        },
        keywords: { detail_list: [], name: 'keywords', desc: '\u6076\u610f\u5173\u952e\u8bcd' },
      },
      medium_count: 0,
      info_count: 0,
      high_count: 10,
      enabled: true,
    },
    malscan: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      show: 0,
      site_id: 278952,
      summary: {},
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    keyword: {
      count: 2,
      low_count: 2,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [
        {
          ignore: false,
          event_id: 441795,
          source: null,
          keywords: ['ceshi'],
          level: 1,
          url: 'http://10.0.8.151:32853/assets/js/jquery-1.11.3.min.js',
          image: null,
          site_id: 278952,
          feedback: false,
        },
        {
          ignore: false,
          event_id: 441796,
          source: null,
          keywords: ['ceshi'],
          level: 1,
          url: 'http://10.0.8.151:32853/assets/js/jquery-2.1.4.min.js',
          image: null,
          site_id: 278952,
          feedback: false,
        },
      ],
      show: 2,
      site_id: 278952,
      summary: {},
      event_list: [
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441795,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 1,
          value: {
            url: 'http://10.0.8.151:32853/assets/js/jquery-1.11.3.min.js',
            keywords: [{ type: 1, keyword: 'ceshi', level: 3 }],
          },
          group_id: 2061,
          type: 'keyword',
        },
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441796,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          level_value: 1,
          value: {
            url: 'http://10.0.8.151:32853/assets/js/jquery-2.1.4.min.js',
            keywords: [{ type: 1, keyword: 'ceshi', level: 3 }],
          },
          group_id: 2061,
          type: 'keyword',
        },
      ],
      regroup_dict: {
        zhengzhi: { detail_list: ['ceshi'], name: 'zhengzhi', desc: '\u653f\u6cbb' },
        disu: { detail_list: [], name: 'disu', desc: '\u4f4e\u4fd7' },
      },
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    deface: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278952,
      summary: {},
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: false,
    },
    deface_stat: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278952,
      summary: {},
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: false,
    },
    statistics: {
      tree_event_list: [],
      filetype: {
        cgi: 0,
        do: 0,
        ch: 0,
        htm: 0,
        jpg: 2,
        js: 20,
        asp: 0,
        jsp: 0,
        nsp: 0,
        php: 138,
        png: 13,
        xml: 0,
        shtml: 0,
        dhtml: 0,
        zone: 0,
        unknown: 21,
        vbs: 0,
        gif: 1,
        html: 1,
        mspx: 0,
        aspx: 0,
        css: 11,
      },
      site_id: 278952,
      form_hidden: {
        count: 2,
        detail_list: [
          {
            url: 'http://10.0.8.151:32853/vul/burteforce/bf_token.php',
            params: [['token', '93241616413ba8669c543129445']],
          },
          {
            url: 'http://10.0.8.151:32853/vul/overpermission/op1/op1_mem.php',
            params: [['username', 'aSdFh1']],
          },
        ],
      },
      medium_count: 0,
      broken_links: {
        count: 22,
        url_list: [
          ['http://10.0.8.151:32853/.navbar', 'http://10.0.8.151:32853/'],
          ['http://10.0.8.151:32853/js/jquery-1.11.3.min.js', 'http://10.0.8.151:32853/'],
          ['http://10.0.8.151:32853/css/ace-part2.min.css', 'http://10.0.8.151:32853/'],
          [
            'http://10.0.8.151:32853/%5Cxfs.bxss.me',
            'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=72',
          ],
          ['http://10.0.8.151:32853/js/excanvas.min.js', 'http://10.0.8.151:32853/'],
          [
            'http://10.0.8.151:32853/.breadcrumb',
            'http://10.0.8.151:32853/vul/unsafedownload/down_nba.php',
          ],
          ['http://10.0.8.151:32853/css/ace-ie.min.css', 'http://10.0.8.151:32853/'],
          ['http://10.0.8.151:32853/.main', 'http://10.0.8.151:32853/'],
          ['http://10.0.8.151:32853/.page', 'http://10.0.8.151:32853/'],
          ['http://10.0.8.151:32853/vul/xxe/xee.php', 'http://10.0.8.151:32853/vul/xxe/xxe_1.php'],
          ['http://10.0.8.151:32853/js/html5shiv.min.js', 'http://10.0.8.151:32853/'],
          ['http://10.0.8.151:32853/.nav', 'http://10.0.8.151:32853/'],
          [
            'http://10.0.8.151:32853/assets/css/images/loading.gif',
            'http://10.0.8.151:32853/assets/css/ace-ie.min.css',
          ],
          ['http://10.0.8.151:32853/vul/sqli.php', 'http://10.0.8.151:32853/vul/sqli/sqli_del.php'],
          [
            'http://10.0.8.151:32853/.widget',
            'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get_login.php',
          ],
          [
            'http://10.0.8.151:32853/vul/xss/9103.com',
            'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=59',
          ],
          [
            'http://10.0.8.151:32853/vul/urlredirect/unsafere.php.php',
            'http://10.0.8.151:32853/vul/urlredirect/urlredirect.php',
          ],
          [
            'http://10.0.8.151:32853/vul/xss/20',
            'http://10.0.8.151:32853/vul/xss/xss_02.php?message=20&submit=submit',
          ],
          ['http://10.0.8.151:32853/js/respond.min.js', 'http://10.0.8.151:32853/'],
          [
            'http://10.0.8.151:32853/assets/css/images/pattern.jpg',
            'http://10.0.8.151:32853/assets/css/ace.min.css',
          ],
          [
            'http://10.0.8.151:32853/t/xss.html?%00',
            'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=57',
          ],
          [
            'http://10.0.8.151:32853/assets/css/images/meteorshower2.jpg',
            'http://10.0.8.151:32853/assets/css/ace.min.css',
          ],
        ],
      },
      info_count: 1,
      low_count: 0,
      waf: [],
      files: 207,
      exact_file_type: {
        cgi: [],
        do: [],
        ch: [],
        htm: [],
        jpg: [
          'http://10.0.8.151:32853/assets/css/images/pattern.jpg',
          'http://10.0.8.151:32853/assets/css/images/meteorshower2.jpg',
        ],
        js: [
          'http://10.0.8.151:32853/assets/js/jquery-1.11.3.min.js',
          'http://10.0.8.151:32853/assets/js/respond.min.js',
          'http://10.0.8.151:32853/js/jquery-1.11.3.min.js',
          'http://10.0.8.151:32853/assets/js/jquery-ui.custom.min.js',
          'http://10.0.8.151:32853/assets/js/bootstrap.min.js',
          'http://10.0.8.151:32853/assets/js/jquery.flot.resize.min.js',
          'http://10.0.8.151:32853/assets/js/excanvas.min.js',
          'http://10.0.8.151:32853/js/excanvas.min.js',
          'http://10.0.8.151:32853/assets/js/ace-extra.min.js',
          'http://10.0.8.151:32853/assets/js/jquery.flot.pie.min.js',
          'http://10.0.8.151:32853/assets/js/html5shiv.min.js',
          'http://10.0.8.151:32853/js/html5shiv.min.js',
          'http://10.0.8.151:32853/assets/js/ace-elements.min.js',
          'http://10.0.8.151:32853/assets/js/jquery.ui.touch-punch.min.js',
          'http://10.0.8.151:32853/assets/js/ace.min.js',
          'http://10.0.8.151:32853/assets/js/jquery.flot.min.js',
          'http://10.0.8.151:32853/assets/js/jquery-2.1.4.min.js',
          'http://10.0.8.151:32853/assets/js/jquery.sparkline.index.min.js',
          'http://10.0.8.151:32853/js/respond.min.js',
          'http://10.0.8.151:32853/assets/js/jquery.easypiechart.min.js',
        ],
        asp: [],
        jsp: [],
        nsp: [],
        php: [
          'http://10.0.8.151:32853/vul/sqli/sqli_blind_b.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=59',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=58',
          'http://10.0.8.151:32853/vul/xxe/xxe_1.php',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=57',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=56',
          'http://10.0.8.151:32853/vul/xss/xss_dom_x.php?text=1',
          'http://10.0.8.151:32853/vul/xss/xss_04.php?message=20&submit=submit',
          'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=camby.png',
          'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_mem.php',
          'http://10.0.8.151:32853/vul/xss/xss_03.php?message=20&submit=submit',
          'http://10.0.8.151:32853/vul/sqli/sqli_str.php',
          'http://10.0.8.151:32853/vul/overpermission/op1/op1_mem.php?logout=1',
          'http://10.0.8.151:32853/vul/infoleak/abc.php?logout=1',
          'http://10.0.8.151:32853/vul/unsafeupload/upload.php',
          'http://10.0.8.151:32853/index.php',
          'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=lmx.png',
          'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get.php?logout=1',
          'http://10.0.8.151:32853/vul/sqli/sqli_blind_t.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=323',
          'http://10.0.8.151:32853/vul/xss/xsspost/post_login.php',
          'http://10.0.8.151:32853/vul/overpermission/op1/op1_login.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_search.php?name=aSdFh1&submit=%E6%90%9C%E7%B4%A2',
          'http://10.0.8.151:32853/vul/overpermission/op.php',
          'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php?file=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info2.php',
          'http://10.0.8.151:32853/vul/ssrf/ssrf.php',
          'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=smallane.png',
          'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_edit.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=321',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=320',
          'http://10.0.8.151:32853/vul/burteforce/bf_client.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=322',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=325',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=324',
          'http://10.0.8.151:32853/vul/urlredirect/urlredirect.php?url=i',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=326',
          'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get.php?logout=1',
          'http://10.0.8.151:32853/vul/dir/dir_list.php?title=truman.php',
          'http://10.0.8.151:32853/vul/unsafedownload/unsafedownload.php',
          'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=rayal.png',
          'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=bigben.png',
          'http://10.0.8.151:32853/vul/xss/xssblind/xss_blind.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_mem.php?logout=1',
          'http://10.0.8.151:32853/vul/rce/rce_ping.php',
          'http://10.0.8.151:32853/vul/xss/xss.php',
          'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=sks.png',
          'http://10.0.8.151:32853/vul/infoleak/findabc.php?username=aSdFh1&password=g00dPassw0rD1&submit=Login',
          'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php',
          'http://10.0.8.151:32853/vul/sqli/sqli.php',
          'http://10.0.8.151:32853/vul/burteforce/bf_token.php',
          'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post.php',
          'http://10.0.8.151:32853/vul/csrf/csrf.php',
          'http://10.0.8.151:32853/vul/xss/xss_02.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_login.php',
          'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get.php',
          'http://10.0.8.151:32853/vul/urlredirect/unsafere.php',
          'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get_login.php',
          'http://10.0.8.151:32853/vul/unserilization/unser.php',
          'http://10.0.8.151:32853/vul/overpermission/op1/op1_mem.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php',
          'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=oldfish.png',
          'http://10.0.8.151:32853/vul/xss/xss_02.php?message=20&submit=submit',
          'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get_login.php?username=aSdFh1&password=g00dPassw0rD1&submit=Login',
          'http://10.0.8.151:32853/vul/rce/rce_eval.php',
          'http://10.0.8.151:32853/vul/unsafeupload/clientcheck.php',
          'http://10.0.8.151:32853/vul/burteforce/burteforce.php',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php',
          'http://10.0.8.151:32853/vul/xss/xss_01.php?message=20&submit=submit',
          'http://10.0.8.151:32853/vul/sqli/sqli_x.php',
          'http://10.0.8.151:32853/vul/xss/xss_reflected_get.php',
          'http://10.0.8.151:32853/vul/dir/dir_list.php?title=jarheads.php',
          'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get_edit.php',
          'http://10.0.8.151:32853/vul/overpermission/op1/op1_mem.php?username=aSdFh1&submit=%E7%82%B9%E5%87%BB%E6%9F%A5%E7%9C%8B%E4%B8%AA%E4%BA%BA%E4%BF%A1%E6%81%AF',
          'http://10.0.8.151:32853/pkxss/index.php',
          'http://10.0.8.151:32853/inc/showvcode.php',
          'http://10.0.8.151:32853/vul/unsafedownload/down_nba.php',
          'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=mbl.png',
          'http://10.0.8.151:32853/vul/xss/xss_01.php',
          'http://10.0.8.151:32853/vul/xxe/xee.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_reg.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_x.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
          'http://10.0.8.151:32853/vul/xss/xss_dom.php',
          'http://10.0.8.151:32853/vul/unserilization/unserilization.php',
          'http://10.0.8.151:32853/vul/infoleak/infoleak.php',
          'http://10.0.8.151:32853/vul/unsafeupload/servercheck.php',
          'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get_login.php?username=aSdFh1&password=g00dPassw0rD1&submit=Login',
          'http://10.0.8.151:32853/vul/sqli/sqli_header/sqli_header_login.php',
          'http://10.0.8.151:32853/vul/rce/rce.php',
          'http://10.0.8.151:32853/vul/sqli.php',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=64',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=65',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=66',
          'http://10.0.8.151:32853/vul/infoleak/findabc.php',
          'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post_login.php',
          'http://10.0.8.151:32853/vul/fileinclude/fi_local.php?submit=1&filename=',
          'http://10.0.8.151:32853/vul/overpermission/op2/op2_login.php',
          'http://10.0.8.151:32853/vul/dir/dir.php',
          'http://10.0.8.151:32853/vul/infoleak/abc.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_widebyte.php',
          'http://10.0.8.151:32853/pkxss/pkxss_login.php',
          'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get_login.php',
          'http://10.0.8.151:32853/vul/xss/xss_dom_x.php',
          'http://10.0.8.151:32853/vul/unsafeupload/getimagesize.php',
          'http://10.0.8.151:32853/vul/fileinclude/fi_remote.php',
          'http://10.0.8.151:32853/vul/fileinclude/fi_remote.php?submit=1&filename=',
          'http://10.0.8.151:32853/vul/sqli/sqli_str.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
          'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php?url=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info1.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_blind_t.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=73',
          'http://10.0.8.151:32853/vul/sqli/sqli_search.php',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=70',
          'http://10.0.8.151:32853/vul/urlredirect/urlredirect.php?url=unsafere.php',
          'http://10.0.8.151:32853/vul/burteforce/bf_form.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=318',
          'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post.php?logout=1',
          'http://10.0.8.151:32853/vul/xss/xss_reflected_get.php?message=20&submit=submit',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=311',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=312',
          'http://10.0.8.151:32853/vul/urlredirect/unsafere.php.php',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=72',
          'http://10.0.8.151:32853/vul/sqli/sqli_blind_b.php',
          'http://10.0.8.151:32853/vul/xxe/xxe.php',
          'http://10.0.8.151:32853/vul/fileinclude/fileinclude.php',
          'http://10.0.8.151:32853/vul/dir/dir_list.php',
          'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get.php',
          'http://10.0.8.151:32853/vul/urlredirect/urlredirect.php',
          'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php',
          'http://10.0.8.151:32853/vul/xss/xss_03.php',
          'http://10.0.8.151:32853/vul/burteforce/bf_server.php',
          'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=ns.png',
          'http://10.0.8.151:32853/vul/fileinclude/fi_local.php',
          'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=pj.png',
          'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_login.php?username=aSdFh1&password=g00dPassw0rD1&submit=Login',
          'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post_edit.php',
          'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post_login.php?username=aSdFh1&password=g00dPassw0rD1&submit=Login',
          'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get_edit.php',
          'http://10.0.8.151:32853/vul/xss/xss_04.php',
          'http://10.0.8.151:32853/vul/sqli/sqli_id.php',
        ],
        png: [
          'http://10.0.8.151:32853/vul/unsafedownload/download/ns.png',
          'http://10.0.8.151:32853/vul/unsafedownload/download/rayal.png',
          'http://10.0.8.151:32853/vul/unsafedownload/download/smallane.png',
          'http://10.0.8.151:32853/vul/unsafedownload/download/ai.png',
          'http://10.0.8.151:32853/vul/unsafedownload/download/bigben.png',
          'http://10.0.8.151:32853/vul/unsafedownload/download/camby.png',
          'http://10.0.8.151:32853/vul/unsafedownload/download/sks.png',
          'http://10.0.8.151:32853/vul/unsafedownload/download/lmx.png',
          'http://10.0.8.151:32853/vul/unsafedownload/download/kb.png',
          'http://10.0.8.151:32853/vul/unsafedownload/download/mbl.png',
          'http://10.0.8.151:32853/vul/unsafedownload/download/oldfish.png',
          'http://10.0.8.151:32853/assets/images/avatars/pikachu1.png',
          'http://10.0.8.151:32853/vul/unsafedownload/download/pj.png',
        ],
        xml: [],
        shtml: [],
        dhtml: [],
        zone: [],
        unknown: [
          'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.woff2?v=4.5.0',
          'http://10.0.8.151:32853/.navbar',
          'http://10.0.8.151:32853/assets/fonts/glyphicons-halflings-regular.ttf',
          'http://10.0.8.151:32853/assets/fonts/glyphicons-halflings-regular.svg',
          'http://10.0.8.151:32853/%5Cxfs.bxss.me',
          'http://10.0.8.151:32853/.breadcrumb',
          'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.eot?v=4.5.0',
          'http://10.0.8.151:32853/.main',
          'http://10.0.8.151:32853/.page',
          'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.svg?v=4.5.0',
          'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.ttf?v=4.5.0',
          'http://10.0.8.151:32853/assets/fonts/glyphicons-halflings-regular.woff',
          'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.eot',
          'http://10.0.8.151:32853/.nav',
          'http://10.0.8.151:32853/.widget',
          'http://10.0.8.151:32853/assets/fonts/glyphicons-halflings-regular.eot',
          'http://10.0.8.151:32853/vul/xss/9103.com',
          'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.woff?v=4.5.0',
          'http://10.0.8.151:32853/vul/xss/20',
          'http://10.0.8.151:32853/assets/fonts/glyphicons-halflings-regular.woff2',
        ],
        vbs: [],
        gif: ['http://10.0.8.151:32853/assets/css/images/loading.gif'],
        html: ['http://10.0.8.151:32853/t/xss.html?%00'],
        mspx: [],
        aspx: [],
        css: [
          'http://10.0.8.151:32853/css/ace-part2.min.css',
          'http://10.0.8.151:32853/assets/css/bootstrap.min.css',
          'http://10.0.8.151:32853/assets/font-awesome/4.5.0/css/font-awesome.min.css',
          'http://10.0.8.151:32853/css/ace-ie.min.css',
          'http://10.0.8.151:32853/assets/css/ace-skins.min.css',
          'http://10.0.8.151:32853/assets/css/fonts.googleapis.com.css',
          'http://10.0.8.151:32853/assets/css/ace-ie.min.css',
          'http://10.0.8.151:32853/pkxss/pkxss.css',
          'http://10.0.8.151:32853/assets/css/ace.min.css',
          'http://10.0.8.151:32853/assets/css/ace-rtl.min.css',
          'http://10.0.8.151:32853/assets/css/ace-part2.min.css',
        ],
      },
      tags: {
        a: 0,
        style: 0,
        form: 73,
        img: 0,
        area: 0,
        in_js: 0,
        frame: 0,
        script: 0,
        meta: 0,
        iframe: 0,
        embed: 0,
        in_css: 0,
        in_swf: 0,
      },
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      regroup_dict: {},
      count: 1,
      high_count: 0,
      enabled: true,
      form_all: {
        count: 73,
        detail_list: [
          'http://10.0.8.151:32853/vul/sqli/sqli_blind_b.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=59?id=59',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=58?id=58',
          'http://10.0.8.151:32853/vul/xxe/xxe_1.php?',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=57?id=57',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=56?id=56',
          'http://10.0.8.151:32853/vul/xss/xss_dom_x.php?text=1?text=1',
          'http://10.0.8.151:32853/vul/xss/xss_04.php?message=20&submit=submit?message=20&submit=submit',
          'http://10.0.8.151:32853/vul/xss/xss_03.php?message=20&submit=submit?message=20&submit=submit',
          'http://10.0.8.151:32853/vul/sqli/sqli_str.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_blind_t.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=323?id=323',
          'http://10.0.8.151:32853/vul/xss/xsspost/post_login.php?',
          'http://10.0.8.151:32853/vul/overpermission/op1/op1_login.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_search.php?name=aSdFh1&submit=%E6%90%9C%E7%B4%A2?name=aSdFh1&submit=%E6%90%9C%E7%B4%A2',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=321?id=321',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=320?id=320',
          'http://10.0.8.151:32853/vul/burteforce/bf_client.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=322?id=322',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=325?id=325',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=324?id=324',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=326?id=326',
          'http://10.0.8.151:32853/vul/xss/xssblind/xss_blind.php?',
          'http://10.0.8.151:32853/vul/rce/rce_ping.php?',
          'http://10.0.8.151:32853/vul/burteforce/bf_token.php?',
          'http://10.0.8.151:32853/vul/xss/xss_02.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_login.php?',
          'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get_login.php?',
          'http://10.0.8.151:32853/vul/unserilization/unser.php?',
          'http://10.0.8.151:32853/vul/overpermission/op1/op1_mem.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?',
          'http://10.0.8.151:32853/vul/xss/xss_02.php?message=20&submit=submit?message=20&submit=submit',
          'http://10.0.8.151:32853/vul/unsafeupload/clientcheck.php?',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?',
          'http://10.0.8.151:32853/vul/xss/xss_01.php?message=20&submit=submit?message=20&submit=submit',
          'http://10.0.8.151:32853/vul/sqli/sqli_x.php?',
          'http://10.0.8.151:32853/vul/xss/xss_reflected_get.php?',
          'http://10.0.8.151:32853/vul/xss/xss_01.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_reg.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_x.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
          'http://10.0.8.151:32853/vul/unsafeupload/servercheck.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_header/sqli_header_login.php?',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=64?id=64',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=65?id=65',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=66?id=66',
          'http://10.0.8.151:32853/vul/infoleak/findabc.php?',
          'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post_login.php?',
          'http://10.0.8.151:32853/vul/fileinclude/fi_local.php?submit=1&filename=?submit=1&filename=',
          'http://10.0.8.151:32853/vul/overpermission/op2/op2_login.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_widebyte.php?',
          'http://10.0.8.151:32853/pkxss/pkxss_login.php?',
          'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get_login.php?',
          'http://10.0.8.151:32853/vul/xss/xss_dom_x.php?',
          'http://10.0.8.151:32853/vul/unsafeupload/getimagesize.php?',
          'http://10.0.8.151:32853/vul/fileinclude/fi_remote.php?',
          'http://10.0.8.151:32853/vul/fileinclude/fi_remote.php?submit=1&filename=?submit=1&filename=',
          'http://10.0.8.151:32853/vul/sqli/sqli_str.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
          'http://10.0.8.151:32853/vul/sqli/sqli_blind_t.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=73?id=73',
          'http://10.0.8.151:32853/vul/sqli/sqli_search.php?',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=70?id=70',
          'http://10.0.8.151:32853/vul/burteforce/bf_form.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=318?id=318',
          'http://10.0.8.151:32853/vul/xss/xss_reflected_get.php?message=20&submit=submit?message=20&submit=submit',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=311?id=311',
          'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=312?id=312',
          'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=72?id=72',
          'http://10.0.8.151:32853/vul/sqli/sqli_blind_b.php?',
          'http://10.0.8.151:32853/vul/xss/xss_03.php?',
          'http://10.0.8.151:32853/vul/burteforce/bf_server.php?',
          'http://10.0.8.151:32853/vul/fileinclude/fi_local.php?',
          'http://10.0.8.151:32853/vul/xss/xss_04.php?',
          'http://10.0.8.151:32853/vul/sqli/sqli_id.php?',
        ],
      },
      summary: {},
      event_list: [
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441794,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          value: {
            files: 207,
            exact_file_type: {
              cgi: [],
              do: [],
              ch: [],
              htm: [],
              jpg: [
                'http://10.0.8.151:32853/assets/css/images/pattern.jpg',
                'http://10.0.8.151:32853/assets/css/images/meteorshower2.jpg',
              ],
              js: [
                'http://10.0.8.151:32853/assets/js/jquery-1.11.3.min.js',
                'http://10.0.8.151:32853/assets/js/respond.min.js',
                'http://10.0.8.151:32853/js/jquery-1.11.3.min.js',
                'http://10.0.8.151:32853/assets/js/jquery-ui.custom.min.js',
                'http://10.0.8.151:32853/assets/js/bootstrap.min.js',
                'http://10.0.8.151:32853/assets/js/jquery.flot.resize.min.js',
                'http://10.0.8.151:32853/assets/js/excanvas.min.js',
                'http://10.0.8.151:32853/js/excanvas.min.js',
                'http://10.0.8.151:32853/assets/js/ace-extra.min.js',
                'http://10.0.8.151:32853/assets/js/jquery.flot.pie.min.js',
                'http://10.0.8.151:32853/assets/js/html5shiv.min.js',
                'http://10.0.8.151:32853/js/html5shiv.min.js',
                'http://10.0.8.151:32853/assets/js/ace-elements.min.js',
                'http://10.0.8.151:32853/assets/js/jquery.ui.touch-punch.min.js',
                'http://10.0.8.151:32853/assets/js/ace.min.js',
                'http://10.0.8.151:32853/assets/js/jquery.flot.min.js',
                'http://10.0.8.151:32853/assets/js/jquery-2.1.4.min.js',
                'http://10.0.8.151:32853/assets/js/jquery.sparkline.index.min.js',
                'http://10.0.8.151:32853/js/respond.min.js',
                'http://10.0.8.151:32853/assets/js/jquery.easypiechart.min.js',
              ],
              asp: [],
              jsp: [],
              nsp: [],
              php: [
                'http://10.0.8.151:32853/vul/sqli/sqli_blind_b.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=59',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=58',
                'http://10.0.8.151:32853/vul/xxe/xxe_1.php',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=57',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=56',
                'http://10.0.8.151:32853/vul/xss/xss_dom_x.php?text=1',
                'http://10.0.8.151:32853/vul/xss/xss_04.php?message=20&submit=submit',
                'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=camby.png',
                'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_mem.php',
                'http://10.0.8.151:32853/vul/xss/xss_03.php?message=20&submit=submit',
                'http://10.0.8.151:32853/vul/sqli/sqli_str.php',
                'http://10.0.8.151:32853/vul/overpermission/op1/op1_mem.php?logout=1',
                'http://10.0.8.151:32853/vul/infoleak/abc.php?logout=1',
                'http://10.0.8.151:32853/vul/unsafeupload/upload.php',
                'http://10.0.8.151:32853/index.php',
                'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=lmx.png',
                'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get.php?logout=1',
                'http://10.0.8.151:32853/vul/sqli/sqli_blind_t.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=323',
                'http://10.0.8.151:32853/vul/xss/xsspost/post_login.php',
                'http://10.0.8.151:32853/vul/overpermission/op1/op1_login.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_search.php?name=aSdFh1&submit=%E6%90%9C%E7%B4%A2',
                'http://10.0.8.151:32853/vul/overpermission/op.php',
                'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php?file=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info2.php',
                'http://10.0.8.151:32853/vul/ssrf/ssrf.php',
                'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=smallane.png',
                'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_edit.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=321',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=320',
                'http://10.0.8.151:32853/vul/burteforce/bf_client.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=322',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=325',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=324',
                'http://10.0.8.151:32853/vul/urlredirect/urlredirect.php?url=i',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=326',
                'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get.php?logout=1',
                'http://10.0.8.151:32853/vul/dir/dir_list.php?title=truman.php',
                'http://10.0.8.151:32853/vul/unsafedownload/unsafedownload.php',
                'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=rayal.png',
                'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=bigben.png',
                'http://10.0.8.151:32853/vul/xss/xssblind/xss_blind.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_mem.php?logout=1',
                'http://10.0.8.151:32853/vul/rce/rce_ping.php',
                'http://10.0.8.151:32853/vul/xss/xss.php',
                'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=sks.png',
                'http://10.0.8.151:32853/vul/infoleak/findabc.php?username=aSdFh1&password=g00dPassw0rD1&submit=Login',
                'http://10.0.8.151:32853/vul/ssrf/ssrf_fgc.php',
                'http://10.0.8.151:32853/vul/sqli/sqli.php',
                'http://10.0.8.151:32853/vul/burteforce/bf_token.php',
                'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post.php',
                'http://10.0.8.151:32853/vul/csrf/csrf.php',
                'http://10.0.8.151:32853/vul/xss/xss_02.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_login.php',
                'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get.php',
                'http://10.0.8.151:32853/vul/urlredirect/unsafere.php',
                'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get_login.php',
                'http://10.0.8.151:32853/vul/unserilization/unser.php',
                'http://10.0.8.151:32853/vul/overpermission/op1/op1_mem.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php',
                'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=oldfish.png',
                'http://10.0.8.151:32853/vul/xss/xss_02.php?message=20&submit=submit',
                'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get_login.php?username=aSdFh1&password=g00dPassw0rD1&submit=Login',
                'http://10.0.8.151:32853/vul/rce/rce_eval.php',
                'http://10.0.8.151:32853/vul/unsafeupload/clientcheck.php',
                'http://10.0.8.151:32853/vul/burteforce/burteforce.php',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php',
                'http://10.0.8.151:32853/vul/xss/xss_01.php?message=20&submit=submit',
                'http://10.0.8.151:32853/vul/sqli/sqli_x.php',
                'http://10.0.8.151:32853/vul/xss/xss_reflected_get.php',
                'http://10.0.8.151:32853/vul/dir/dir_list.php?title=jarheads.php',
                'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get_edit.php',
                'http://10.0.8.151:32853/vul/overpermission/op1/op1_mem.php?username=aSdFh1&submit=%E7%82%B9%E5%87%BB%E6%9F%A5%E7%9C%8B%E4%B8%AA%E4%BA%BA%E4%BF%A1%E6%81%AF',
                'http://10.0.8.151:32853/pkxss/index.php',
                'http://10.0.8.151:32853/inc/showvcode.php',
                'http://10.0.8.151:32853/vul/unsafedownload/down_nba.php',
                'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=mbl.png',
                'http://10.0.8.151:32853/vul/xss/xss_01.php',
                'http://10.0.8.151:32853/vul/xxe/xee.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_reg.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_x.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
                'http://10.0.8.151:32853/vul/xss/xss_dom.php',
                'http://10.0.8.151:32853/vul/unserilization/unserilization.php',
                'http://10.0.8.151:32853/vul/infoleak/infoleak.php',
                'http://10.0.8.151:32853/vul/unsafeupload/servercheck.php',
                'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get_login.php?username=aSdFh1&password=g00dPassw0rD1&submit=Login',
                'http://10.0.8.151:32853/vul/sqli/sqli_header/sqli_header_login.php',
                'http://10.0.8.151:32853/vul/rce/rce.php',
                'http://10.0.8.151:32853/vul/sqli.php',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=64',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=65',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=66',
                'http://10.0.8.151:32853/vul/infoleak/findabc.php',
                'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post_login.php',
                'http://10.0.8.151:32853/vul/fileinclude/fi_local.php?submit=1&filename=',
                'http://10.0.8.151:32853/vul/overpermission/op2/op2_login.php',
                'http://10.0.8.151:32853/vul/dir/dir.php',
                'http://10.0.8.151:32853/vul/infoleak/abc.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_widebyte.php',
                'http://10.0.8.151:32853/pkxss/pkxss_login.php',
                'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get_login.php',
                'http://10.0.8.151:32853/vul/xss/xss_dom_x.php',
                'http://10.0.8.151:32853/vul/unsafeupload/getimagesize.php',
                'http://10.0.8.151:32853/vul/fileinclude/fi_remote.php',
                'http://10.0.8.151:32853/vul/fileinclude/fi_remote.php?submit=1&filename=',
                'http://10.0.8.151:32853/vul/sqli/sqli_str.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
                'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php?url=http://127.0.0.1/vul/vul/ssrf/ssrf_info/info1.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_blind_t.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=73',
                'http://10.0.8.151:32853/vul/sqli/sqli_search.php',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=70',
                'http://10.0.8.151:32853/vul/urlredirect/urlredirect.php?url=unsafere.php',
                'http://10.0.8.151:32853/vul/burteforce/bf_form.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=318',
                'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post.php?logout=1',
                'http://10.0.8.151:32853/vul/xss/xss_reflected_get.php?message=20&submit=submit',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=311',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=312',
                'http://10.0.8.151:32853/vul/urlredirect/unsafere.php.php',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=72',
                'http://10.0.8.151:32853/vul/sqli/sqli_blind_b.php',
                'http://10.0.8.151:32853/vul/xxe/xxe.php',
                'http://10.0.8.151:32853/vul/fileinclude/fileinclude.php',
                'http://10.0.8.151:32853/vul/dir/dir_list.php',
                'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get.php',
                'http://10.0.8.151:32853/vul/urlredirect/urlredirect.php',
                'http://10.0.8.151:32853/vul/ssrf/ssrf_curl.php',
                'http://10.0.8.151:32853/vul/xss/xss_03.php',
                'http://10.0.8.151:32853/vul/burteforce/bf_server.php',
                'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=ns.png',
                'http://10.0.8.151:32853/vul/fileinclude/fi_local.php',
                'http://10.0.8.151:32853/vul/unsafedownload/execdownload.php?filename=pj.png',
                'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_login.php?username=aSdFh1&password=g00dPassw0rD1&submit=Login',
                'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post_edit.php',
                'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post_login.php?username=aSdFh1&password=g00dPassw0rD1&submit=Login',
                'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get_edit.php',
                'http://10.0.8.151:32853/vul/xss/xss_04.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_id.php',
              ],
              png: [
                'http://10.0.8.151:32853/vul/unsafedownload/download/ns.png',
                'http://10.0.8.151:32853/vul/unsafedownload/download/rayal.png',
                'http://10.0.8.151:32853/vul/unsafedownload/download/smallane.png',
                'http://10.0.8.151:32853/vul/unsafedownload/download/ai.png',
                'http://10.0.8.151:32853/vul/unsafedownload/download/bigben.png',
                'http://10.0.8.151:32853/vul/unsafedownload/download/camby.png',
                'http://10.0.8.151:32853/vul/unsafedownload/download/sks.png',
                'http://10.0.8.151:32853/vul/unsafedownload/download/lmx.png',
                'http://10.0.8.151:32853/vul/unsafedownload/download/kb.png',
                'http://10.0.8.151:32853/vul/unsafedownload/download/mbl.png',
                'http://10.0.8.151:32853/vul/unsafedownload/download/oldfish.png',
                'http://10.0.8.151:32853/assets/images/avatars/pikachu1.png',
                'http://10.0.8.151:32853/vul/unsafedownload/download/pj.png',
              ],
              xml: [],
              shtml: [],
              dhtml: [],
              zone: [],
              unknown: [
                'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.woff2?v=4.5.0',
                'http://10.0.8.151:32853/.navbar',
                'http://10.0.8.151:32853/assets/fonts/glyphicons-halflings-regular.ttf',
                'http://10.0.8.151:32853/assets/fonts/glyphicons-halflings-regular.svg',
                'http://10.0.8.151:32853/%5Cxfs.bxss.me',
                'http://10.0.8.151:32853/.breadcrumb',
                'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.eot?v=4.5.0',
                'http://10.0.8.151:32853/.main',
                'http://10.0.8.151:32853/.page',
                'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.svg?v=4.5.0',
                'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.ttf?v=4.5.0',
                'http://10.0.8.151:32853/assets/fonts/glyphicons-halflings-regular.woff',
                'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.eot',
                'http://10.0.8.151:32853/.nav',
                'http://10.0.8.151:32853/.widget',
                'http://10.0.8.151:32853/assets/fonts/glyphicons-halflings-regular.eot',
                'http://10.0.8.151:32853/vul/xss/9103.com',
                'http://10.0.8.151:32853/assets/font-awesome/4.5.0/fonts/fontawesome-webfont.woff?v=4.5.0',
                'http://10.0.8.151:32853/vul/xss/20',
                'http://10.0.8.151:32853/assets/fonts/glyphicons-halflings-regular.woff2',
              ],
              vbs: [],
              gif: ['http://10.0.8.151:32853/assets/css/images/loading.gif'],
              html: ['http://10.0.8.151:32853/t/xss.html?%00'],
              mspx: [],
              aspx: [],
              css: [
                'http://10.0.8.151:32853/css/ace-part2.min.css',
                'http://10.0.8.151:32853/assets/css/bootstrap.min.css',
                'http://10.0.8.151:32853/assets/font-awesome/4.5.0/css/font-awesome.min.css',
                'http://10.0.8.151:32853/css/ace-ie.min.css',
                'http://10.0.8.151:32853/assets/css/ace-skins.min.css',
                'http://10.0.8.151:32853/assets/css/fonts.googleapis.com.css',
                'http://10.0.8.151:32853/assets/css/ace-ie.min.css',
                'http://10.0.8.151:32853/pkxss/pkxss.css',
                'http://10.0.8.151:32853/assets/css/ace.min.css',
                'http://10.0.8.151:32853/assets/css/ace-rtl.min.css',
                'http://10.0.8.151:32853/assets/css/ace-part2.min.css',
              ],
            },
            tags: {
              a: 0,
              style: 0,
              form: 73,
              img: 0,
              area: 0,
              in_js: 0,
              frame: 0,
              script: 0,
              meta: 0,
              iframe: 0,
              embed: 0,
              in_css: 0,
              in_swf: 0,
            },
            filetype: {
              cgi: 0,
              do: 0,
              ch: 0,
              htm: 0,
              jpg: 2,
              js: 20,
              asp: 0,
              jsp: 0,
              nsp: 0,
              php: 138,
              png: 13,
              xml: 0,
              shtml: 0,
              dhtml: 0,
              zone: 0,
              unknown: 21,
              vbs: 0,
              gif: 1,
              html: 1,
              mspx: 0,
              aspx: 0,
              css: 11,
            },
            request: {
              request_success_count: 391,
              request_failed_count: 30,
              plugins: {
                malscan: {
                  scan_time: '00:03:24',
                  callback_count: 0,
                  start_at: 1633948851.301229,
                  request_count: 0,
                  end_at: 1633949055.884653,
                },
                statistics: { start_at: 1633949055.888754, request_count: 0, callback_count: 0 },
                keyword: { callback_count: 0, request_count: 0, end_at: 1633948814.489916 },
                black_links: { callback_count: 0, request_count: 0, end_at: 1633948814.4889 },
                cryjack: { callback_count: 0, request_count: 0, end_at: 1633948814.489424 },
                wmap: {
                  scan_time: '00:00:36',
                  callback_count: 0,
                  start_at: 1633948814.561903,
                  request_count: 0,
                  end_at: 1633948851.290221,
                },
              },
              total_scan_time: '00:07:53',
              total_request_count: 421,
              total_page_size: 0,
            },
            siteattrs: { dbms: [] },
            forms: {
              forms: [
                'http://10.0.8.151:32853/vul/sqli/sqli_blind_b.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=59?id=59',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=58?id=58',
                'http://10.0.8.151:32853/vul/xxe/xxe_1.php?',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=57?id=57',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=56?id=56',
                'http://10.0.8.151:32853/vul/xss/xss_dom_x.php?text=1?text=1',
                'http://10.0.8.151:32853/vul/xss/xss_04.php?message=20&submit=submit?message=20&submit=submit',
                'http://10.0.8.151:32853/vul/xss/xss_03.php?message=20&submit=submit?message=20&submit=submit',
                'http://10.0.8.151:32853/vul/sqli/sqli_str.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_blind_t.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=323?id=323',
                'http://10.0.8.151:32853/vul/xss/xsspost/post_login.php?',
                'http://10.0.8.151:32853/vul/overpermission/op1/op1_login.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_search.php?name=aSdFh1&submit=%E6%90%9C%E7%B4%A2?name=aSdFh1&submit=%E6%90%9C%E7%B4%A2',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=321?id=321',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=320?id=320',
                'http://10.0.8.151:32853/vul/burteforce/bf_client.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=322?id=322',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=325?id=325',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=324?id=324',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=326?id=326',
                'http://10.0.8.151:32853/vul/xss/xssblind/xss_blind.php?',
                'http://10.0.8.151:32853/vul/rce/rce_ping.php?',
                'http://10.0.8.151:32853/vul/burteforce/bf_token.php?',
                'http://10.0.8.151:32853/vul/xss/xss_02.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_login.php?',
                'http://10.0.8.151:32853/vul/csrf/csrftoken/token_get_login.php?',
                'http://10.0.8.151:32853/vul/unserilization/unser.php?',
                'http://10.0.8.151:32853/vul/overpermission/op1/op1_mem.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?',
                'http://10.0.8.151:32853/vul/xss/xss_02.php?message=20&submit=submit?message=20&submit=submit',
                'http://10.0.8.151:32853/vul/unsafeupload/clientcheck.php?',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?',
                'http://10.0.8.151:32853/vul/xss/xss_01.php?message=20&submit=submit?message=20&submit=submit',
                'http://10.0.8.151:32853/vul/sqli/sqli_x.php?',
                'http://10.0.8.151:32853/vul/xss/xss_reflected_get.php?',
                'http://10.0.8.151:32853/vul/xss/xss_01.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_iu/sqli_reg.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_x.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
                'http://10.0.8.151:32853/vul/unsafeupload/servercheck.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_header/sqli_header_login.php?',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=64?id=64',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=65?id=65',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=66?id=66',
                'http://10.0.8.151:32853/vul/infoleak/findabc.php?',
                'http://10.0.8.151:32853/vul/csrf/csrfpost/csrf_post_login.php?',
                'http://10.0.8.151:32853/vul/fileinclude/fi_local.php?submit=1&filename=?submit=1&filename=',
                'http://10.0.8.151:32853/vul/overpermission/op2/op2_login.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_widebyte.php?',
                'http://10.0.8.151:32853/pkxss/pkxss_login.php?',
                'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get_login.php?',
                'http://10.0.8.151:32853/vul/xss/xss_dom_x.php?',
                'http://10.0.8.151:32853/vul/unsafeupload/getimagesize.php?',
                'http://10.0.8.151:32853/vul/fileinclude/fi_remote.php?',
                'http://10.0.8.151:32853/vul/fileinclude/fi_remote.php?submit=1&filename=?submit=1&filename=',
                'http://10.0.8.151:32853/vul/sqli/sqli_str.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
                'http://10.0.8.151:32853/vul/sqli/sqli_blind_t.php?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2?name=aSdFh1&submit=%E6%9F%A5%E8%AF%A2',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=73?id=73',
                'http://10.0.8.151:32853/vul/sqli/sqli_search.php?',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=70?id=70',
                'http://10.0.8.151:32853/vul/burteforce/bf_form.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=318?id=318',
                'http://10.0.8.151:32853/vul/xss/xss_reflected_get.php?message=20&submit=submit?message=20&submit=submit',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=311?id=311',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php?id=312?id=312',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=72?id=72',
                'http://10.0.8.151:32853/vul/sqli/sqli_blind_b.php?',
                'http://10.0.8.151:32853/vul/xss/xss_03.php?',
                'http://10.0.8.151:32853/vul/burteforce/bf_server.php?',
                'http://10.0.8.151:32853/vul/fileinclude/fi_local.php?',
                'http://10.0.8.151:32853/vul/xss/xss_04.php?',
                'http://10.0.8.151:32853/vul/sqli/sqli_id.php?',
              ],
              hidden_param: [
                {
                  url: 'http://10.0.8.151:32853/vul/burteforce/bf_token.php',
                  params: [['token', '93241616413ba8669c543129445']],
                },
                {
                  url: 'http://10.0.8.151:32853/vul/overpermission/op1/op1_mem.php',
                  params: [['username', 'aSdFh1']],
                },
              ],
            },
            urls: 207,
            broken_links: [
              ['http://10.0.8.151:32853/.navbar', 'http://10.0.8.151:32853/'],
              ['http://10.0.8.151:32853/js/jquery-1.11.3.min.js', 'http://10.0.8.151:32853/'],
              ['http://10.0.8.151:32853/css/ace-part2.min.css', 'http://10.0.8.151:32853/'],
              [
                'http://10.0.8.151:32853/%5Cxfs.bxss.me',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=72',
              ],
              ['http://10.0.8.151:32853/js/excanvas.min.js', 'http://10.0.8.151:32853/'],
              [
                'http://10.0.8.151:32853/.breadcrumb',
                'http://10.0.8.151:32853/vul/unsafedownload/down_nba.php',
              ],
              ['http://10.0.8.151:32853/css/ace-ie.min.css', 'http://10.0.8.151:32853/'],
              ['http://10.0.8.151:32853/.main', 'http://10.0.8.151:32853/'],
              ['http://10.0.8.151:32853/.page', 'http://10.0.8.151:32853/'],
              [
                'http://10.0.8.151:32853/vul/xxe/xee.php',
                'http://10.0.8.151:32853/vul/xxe/xxe_1.php',
              ],
              ['http://10.0.8.151:32853/js/html5shiv.min.js', 'http://10.0.8.151:32853/'],
              ['http://10.0.8.151:32853/.nav', 'http://10.0.8.151:32853/'],
              [
                'http://10.0.8.151:32853/assets/css/images/loading.gif',
                'http://10.0.8.151:32853/assets/css/ace-ie.min.css',
              ],
              [
                'http://10.0.8.151:32853/vul/sqli.php',
                'http://10.0.8.151:32853/vul/sqli/sqli_del.php',
              ],
              [
                'http://10.0.8.151:32853/.widget',
                'http://10.0.8.151:32853/vul/csrf/csrfget/csrf_get_login.php',
              ],
              [
                'http://10.0.8.151:32853/vul/xss/9103.com',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=59',
              ],
              [
                'http://10.0.8.151:32853/vul/urlredirect/unsafere.php.php',
                'http://10.0.8.151:32853/vul/urlredirect/urlredirect.php',
              ],
              [
                'http://10.0.8.151:32853/vul/xss/20',
                'http://10.0.8.151:32853/vul/xss/xss_02.php?message=20&submit=submit',
              ],
              ['http://10.0.8.151:32853/js/respond.min.js', 'http://10.0.8.151:32853/'],
              [
                'http://10.0.8.151:32853/assets/css/images/pattern.jpg',
                'http://10.0.8.151:32853/assets/css/ace.min.css',
              ],
              [
                'http://10.0.8.151:32853/t/xss.html?%00',
                'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=57',
              ],
              [
                'http://10.0.8.151:32853/assets/css/images/meteorshower2.jpg',
                'http://10.0.8.151:32853/assets/css/ace.min.css',
              ],
            ],
          },
          group_id: 2061,
          type: 'statistics',
        },
      ],
      urls: 207,
    },
    wad: {
      count: 1,
      app: '',
      low_count: 0,
      '3rd_content': '',
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278952,
      summary: {},
      event_list: [
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441797,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          value: {
            version: '',
            depend: [],
            name: 'phpMyAdmin',
            path: 'http://10.0.8.151:32853/phpmyadmin/',
            type: [],
            site: '',
            rule: '',
          },
          group_id: 2061,
          type: 'wad',
        },
      ],
      version: '',
      regroup_dict: {},
      medium_count: 0,
      info_count: 1,
      high_count: 0,
      enabled: true,
      event_dict: {
        phpMyAdmin: {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          _id: 441797,
          user_id: 1,
          task_id: 243960,
          created_at: '2021-10-11 18:44:17',
          site_id: 278952,
          module: 'appscan',
          ignore: false,
          value: {
            version: '',
            depend: [],
            name: 'phpMyAdmin',
            path: 'http://10.0.8.151:32853/phpmyadmin/',
            type: [],
            site: '',
            rule: '',
          },
          group_id: 2061,
          type: 'wad',
        },
      },
    },
    cryjack: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      show: 0,
      site_id: 278952,
      summary: {},
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    image_check: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      show: 0,
      site_id: 278952,
      summary: {},
      event_list: [],
      regroup_dict: {
        porn: { detail_list: [], name: 'porn', desc: '\u8272\u60c5' },
        horror: { detail_list: [], name: 'horror', desc: '\u66b4\u529b' },
      },
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: false,
    },
  },
  url_count: 210,
  csv_row_list: [
    ['\u6697\u94fe'],
    ['\u7b49\u7ea7', 'URL'],
    ['\u9ad8\u5371', 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=64'],
    ['\u9ad8\u5371', 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=65'],
    ['\u9ad8\u5371', 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=66'],
    ['\u9ad8\u5371', 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=59'],
    ['\u9ad8\u5371', 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=58'],
    ['\u9ad8\u5371', 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=70'],
    ['\u9ad8\u5371', 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=57'],
    ['\u9ad8\u5371', 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=56'],
    ['\u9ad8\u5371', 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=73'],
    ['\u9ad8\u5371', 'http://10.0.8.151:32853/vul/xss/xss_stored.php?id=72'],
    [],
    ['\u6302\u9a6c'],
    ['\u7b49\u7ea7', 'URL'],
    [],
    ['\u5173\u952e\u8bcd'],
    ['\u7b49\u7ea7', 'URL'],
    ['\u4f4e\u5371', 'http://10.0.8.151:32853/assets/js/jquery-1.11.3.min.js'],
    ['\u4f4e\u5371', 'http://10.0.8.151:32853/assets/js/jquery-2.1.4.min.js'],
    [],
    ['\u6316\u77ff'],
    ['\u7b49\u7ea7', 'URL'],
    [],
    ['SQLi'],
    [
      '\u7b49\u7ea7',
      'URL',
      '\u6f0f\u6d1e\u9a8c\u8bc1',
      '\u8bf7\u6c42',
      '\u7c7b\u578b',
      '\u53c2\u6570',
      '\u6d4b\u8bd5\u6570\u636e',
    ],
    [],
    ['XSS'],
    [
      '\u7b49\u7ea7',
      'URL',
      '\u6f0f\u6d1e\u9a8c\u8bc1',
      '\u8bf7\u6c42',
      '\u7c7b\u578b',
      '\u53c2\u6570',
      '\u6d4b\u8bd5\u6570\u636e',
    ],
    [],
    ['\u5e94\u7528\u6f0f\u6d1e'],
    ['\u7b49\u7ea7', '\u6f0f\u6d1e\u540d\u79f0', 'CVE ID', 'CNNVD ID'],
    [],
    ['CGI'],
    ['\u7b49\u7ea7', 'URL'],
    [],
    ['CSRF'],
    ['\u7b49\u7ea7', 'URL'],
    [],
    ['\u8868\u5355\u7834\u89e3'],
    ['\u7b49\u7ea7', 'URL', '\u7528\u6237\u540d', '\u5bc6\u7801', '\u6765\u6e90'],
    [],
  ],
  weakness: {
    awvs: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      show: 0,
      site_id: 278953,
      summary: {},
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: false,
    },
    sql: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      show: 0,
      site_id: 278953,
      summary: { dbms: ['MySQL'], db: ['pikachu'], user: ['root@localhost'] },
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    xss: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      show: 0,
      site_id: 278953,
      summary: {},
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    webvul: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      show: 0,
      site_id: 278953,
      summary: {
        XSSInfo: [],
        Database: [],
        DBInfo: [],
        SiteAttr: [],
        ShellInfo: [],
        AdminInfo: [],
        FileInfo: [],
        VerifyInfo: [],
      },
      event_list: [],
      regroup_dict: {
        info: {
          count: 0,
          detail_list: [],
          name: 'info',
          desc: '\u5b58\u5728\u6f5c\u5728\u98ce\u9669',
        },
        zero_day: {
          count: 0,
          detail_list: [],
          name: 'zero_day',
          desc: '\u5b58\u5728\u96f6\u65e5\u653b\u51fb\uff080 Day\uff09',
        },
        poc: {
          count: 0,
          detail_list: [],
          name: 'poc',
          desc: 'POC\u9a8c\u8bc1\u53ef\u88ab\u5229\u7528',
        },
      },
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    info_leak: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      show: 0,
      site_id: 278953,
      summary: {},
      event_list: [],
      regroup_dict: {
        webshell: {
          detail_list: [],
          level: 3,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'webshell',
          desc: 'WebShell\u7f51\u7ad9\u540e\u95e8',
        },
        svn_info: {
          detail_list: [],
          level: 3,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'svn_info',
          desc: '\u7248\u672c\u63a7\u5236\u4fe1\u606f\u6cc4\u9732',
        },
        backup_files: {
          detail_list: [],
          level: 3,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'backup_files',
          desc: '\u5907\u4efd\u6587\u4ef6',
        },
        source_code: {
          detail_list: [],
          level: 3,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'source_code',
          desc: '\u6e90\u4ee3\u7801\u6cc4\u9732',
        },
        server_probe: {
          detail_list: [],
          level: 2,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'server_probe',
          desc: '\u670d\u52a1\u5668\u73af\u5883\u63a2\u9488',
        },
        jsp_samples: {
          detail_list: [],
          level: 2,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'jsp_samples',
          desc: 'JSP\u793a\u4f8b\u6587\u4ef6',
        },
        phpinfo: {
          detail_list: [],
          level: 2,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'phpinfo',
          desc: 'PHPINFO\u6587\u4ef6\u4fe1\u606f\u6cc4\u9732',
        },
        auto_indexes: {
          detail_list: [],
          level: 2,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'auto_indexes',
          desc: 'Web\u5bb9\u5668\u76ee\u5f55\u6d4f\u89c8',
        },
        admin_login: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'admin_login',
          desc: '\u540e\u53f0\u767b\u5f55\u5730\u5740',
        },
        web_path: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'web_path',
          desc: '\u7f51\u7ad9\u8def\u5f84\u6cc4\u9732',
        },
        default_diretory: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'default_diretory',
          desc: 'Web\u5e94\u7528\u7a0b\u5e8f\u9ed8\u8ba4\u76ee\u5f55',
        },
        cgi_documents: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'cgi_documents',
          desc: 'CGI\u9ed8\u8ba4\u76ee\u5f55',
        },
        swp_info: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'swp_info',
          desc: '\u7f16\u8f91\u5668\u4e34\u65f6\u6587\u4ef6\u4fe1\u606f',
        },
        sensitive_documents: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'sensitive_documents',
          desc: '\u7591\u4f3c\u654f\u611f\u6587\u4ef6/\u76ee\u5f55',
        },
        ip_address: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'ip_address',
          desc: '\u5185\u7f51IP\u5730\u5740\u6cc4\u9732',
        },
        bash_history: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'bash_history',
          desc: '\u7528\u6237Shell\u5386\u53f2\u547d\u4ee4\u4fe1\u606f',
        },
        statics_info: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'statics_info',
          desc: 'WEB\u670d\u52a1\u5668\u7edf\u8ba1\u4fe1\u606f',
        },
        bash_rc: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'bash_rc',
          desc: '\u7528\u6237Shell\u914d\u7f6e\u6587\u4ef6',
        },
        flash_object: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'flash_object',
          desc: 'Flash\u53c2\u6570\u914d\u7f6e\u98ce\u9669',
        },
        apps_error_info: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'apps_error_info',
          desc: '\u670d\u52a1\u5668\u7aef\u5e94\u7528\u7a0b\u5e8f\u9519\u8bef',
        },
        frontpage: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'frontpage',
          desc: 'FrontPage\u914d\u7f6e\u6587\u4ef6',
        },
        test_samples: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'test_samples',
          desc: '\u6d4b\u8bd5\u6587\u4ef6\u6cc4\u6f0f',
        },
        hided_files: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'hided_files',
          desc: '\u9690\u85cf\u6587\u4ef6/\u76ee\u5f55',
        },
        debug_info: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'debug_info',
          desc: '\u670d\u52a1\u7aef\u8c03\u8bd5\u4fe1\u606f',
        },
        mdrds: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'mdrds',
          desc: 'Dreamware\u8fde\u63a5\u6587\u4ef6',
        },
        dbms_info: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'dbms_info',
          desc: '\u6570\u636e\u5e93\u4fe1\u606f\u6cc4\u9732',
        },
        log_info: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'log_info',
          desc: '\u65e5\u5fd7\u4fe1\u606f',
        },
        email: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'email',
          desc: 'Email\u5730\u5740\u6cc4\u9732',
        },
        resion_doc: {
          detail_list: [],
          level: 1,
          detail_dict: {
            url: {
              count: 0,
              detail_list: [],
              show: 0,
              name: 'url',
              desc: '\u53d7\u5f71\u54cd\u9875\u9762\u5217\u8868',
            },
            info: { detail_list: [], name: 'info', desc: '\u6cc4\u9732\u4fe1\u606f' },
          },
          name: 'resion_doc',
          desc: 'Resion-doc\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6',
        },
      },
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: false,
    },
    cgi: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      show: 0,
      site_id: 278953,
      summary: {},
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    csrf: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278953,
      summary: {},
      event_list: [],
      regroup_dict: {
        risk: {
          detail_list: [],
          name: 'risk',
          desc: '\u9875\u9762\u672a\u9a8c\u8bc1\u4efb\u4f55token\uff0c\u53ef\u8fdc\u7a0b\u63d0\u4ea4',
        },
        warning: { detail_list: [], name: 'warning', desc: '\u6709\u6f5c\u5728\u98ce\u9669' },
      },
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    form_crack: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      show: 0,
      site_id: 278953,
      summary: {},
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: true,
    },
    poc: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278953,
      summary: {},
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: false,
    },
    wmap: {
      count: 1,
      low_count: 0,
      tree_event_list: [],
      last_scan: '2021-10-11 18:36:04',
      url_list: [],
      site_id: 278953,
      summary: {},
      event_list: [
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          group_id: 2062,
          user_id: 1,
          task_id: 243961,
          created_at: '2021-10-11 19:43:35',
          site_id: 278953,
          module: 'kscan',
          ignore: false,
          value: {
            depend: [],
            name: 'phpMyAdmin',
            site: 'http://10.0.8.151:32853/phpmyadmin/',
            rule: '',
            version: '',
            path: 'http://10.0.8.151:32853/phpmyadmin/',
            type: [],
          },
          _id: 441924,
          type: 'statistics',
        },
      ],
      regroup_dict: {},
      medium_count: 0,
      info_count: 1,
      high_count: 0,
      enabled: false,
      event_dict: {
        phpMyAdmin: {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          group_id: 2062,
          user_id: 1,
          task_id: 243961,
          created_at: '2021-10-11 19:43:35',
          site_id: 278953,
          module: 'kscan',
          ignore: false,
          value: {
            depend: [],
            name: 'phpMyAdmin',
            site: 'http://10.0.8.151:32853/phpmyadmin/',
            rule: '',
            version: '',
            path: 'http://10.0.8.151:32853/phpmyadmin/',
            type: [],
          },
          _id: 441924,
          type: 'statistics',
        },
      },
    },
  },
  siteinfo: {
    city: '',
    title: 'Get the pikachu',
    ip: '10.0.8.151',
    region: '\u5c40\u57df\u7f51',
    http_method_list: [
      { on: true, safe: true, name: 'HEAD' },
      { on: false, safe: false, name: 'TRACE' },
      { on: true, safe: true, name: 'GET' },
      { on: false, safe: false, name: 'PUT' },
      { on: true, safe: true, name: 'POST' },
      { on: false, safe: false, name: 'OPTIONS' },
      { on: false, safe: false, name: 'DELETE' },
    ],
    enabled: true,
    longitude: 0.0,
    server: 'Apache/2.4.29 (Ubuntu)',
    host: '10.0.8.151',
    http_method: 'HEAD,GET,POST',
    coordinates: { y: null, x: null },
    country: '\u5c40\u57df\u7f51',
    latitude: 0.0,
    port: [
      {
        product: 'OpenSSH',
        name: 'ssh',
        extrainfo: 'Ubuntu Linux; protocol 2.0',
        version: '7.6p1 Ubuntu 4ubuntu0.3',
        fingerprint: '',
        ostype: 'Linux',
        port: 22,
      },
      {
        product: '',
        name: 'http',
        extrainfo: '',
        version: '',
        fingerprint:
          'SF-Port80-TCP:V=7.60%I=7%D=10/11%Time=616413B5%P=x86_64-unknown-linux-gnu%r(GetRequest,5BC1,"HTTP/1\\.0\\x20200\\x20OK\\r\\nAccept-Ranges:\\x20bytes\\r\\nCache-Control:\\x20max-age=31536000\\r\\nContent-Length:\\x2023203\\r\\nContent-Type:\\x20text/html;\\x20charset=utf-8\\r\\nLast-Modified:\\x20Wed,\\x2022\\x20Jul\\x202020\\x2022:47:36\\x20GMT\\r\\nX-Content-Type-Options:\\x20nosniff\\r\\nX-Xss-Protection:\\x201;\\x20mode=block\\r\\nDate:\\x20Mon,\\x2011\\x20Oct\\x202021\\x2010:36:37\\x20GMT\\r\\n\\r\\n<!DOCTYPE\\x20html\\n><html\\x20lang=\\"en\\"\\x20ng-app=\\"portainer\\">\\n\\x20\\x20<head>\\n\\x20\\x20\\x20\\x20<meta\\x20charset=\\"utf-8\\"\\x20/>\\n\\x20\\x20\\x20\\x20<title>Portainer</title>\\n\\x20\\x20\\x20\\x20<meta\\x20name=\\"description\\"\\x20content=\\"\\"\\x20/>\\n\\x20\\x20\\x20\\x20<meta\\x20name=\\"author\\"\\x20content=\\"Portainer\\.io\\"\\x20/>\\n\\n\\x20\\x20\\x20\\x20<!--\\x20HTML5\\x20shim,\\x20for\\x20IE6-8\\x20support\\x20of\\x20HTML5\\x20elements\\x20-->\\n\\x20\\x20\\x20\\x20<!--\\[if\\x20lt\\x20IE\\x209\\]>\\n\\x20\\x20\\x20\\x20\\x20\\x20<script\\x20src=\\"//html5shim\\.googlecode\\.com/svn/trunk/html5\\.js\\"></script>\\n\\x20\\x20\\x20\\x20<!\\[endif\\]-->\\n\\n\\x20\\x20\\x20\\x20<!--\\x20Fav\\x20and\\x20touch\\x20icons\\x20-->\\n\\x20\\x20\\x20\\x20<link\\x20rel=\\"apple-touch-icon\\"\\x20sizes=\\"180x180\\"\\x20href=\\"dc4d092847be46242d8c013d1bc7c494\\.png\\"\\x20/>\\n\\x20\\x20\\x20\\x20<link\\x20rel=\\"icon\\"\\x20type=\\"image/png\\"\\x20sizes=\\"32x32\\"\\x20href=\\"5ba13dcb526292ae707310a54e103cd1\\.png\\"")%r(HTTPOptions,5BC1,"HTTP/1\\.0\\x20200\\x20OK\\r\\nAccept-Ranges:\\x20bytes\\r\\nCache-Control:\\x20max-age=31536000\\r\\nContent-Length:\\x2023203\\r\\nContent-Type:\\x20text/html;\\x20charset=utf-8\\r\\nLast-Modified:\\x20Wed,\\x2022\\x20Jul\\x202020\\x2022:47:36\\x20GMT\\r\\nX-Content-Type-Options:\\x20nosniff\\r\\nX-Xss-Protection:\\x201;\\x20mode=block\\r\\nDate:\\x20Mon,\\x2011\\x20Oct\\x202021\\x2010:36:37\\x20GMT\\r\\n\\r\\n<!DOCTYPE\\x20html\\n><html\\x20lang=\\"en\\"\\x20ng-app=\\"portainer\\">\\n\\x20\\x20<head>\\n\\x20\\x20\\x20\\x20<meta\\x20charset=\\"utf-8\\"\\x20/>\\n\\x20\\x20\\x20\\x20<title>Portainer</title>\\n\\x20\\x20\\x20\\x20<meta\\x20name=\\"description\\"\\x20content=\\"\\"\\x20/>\\n\\x20\\x20\\x20\\x20<meta\\x20name=\\"author\\"\\x20content=\\"Portainer\\.io\\"\\x20/>\\n\\n\\x20\\x20\\x20\\x20<!--\\x20HTML5\\x20shim,\\x20for\\x20IE6-8\\x20support\\x20of\\x20HTML5\\x20elements\\x20-->\\n\\x20\\x20\\x20\\x20<!--\\[if\\x20lt\\x20IE\\x209\\]>\\n\\x20\\x20\\x20\\x20\\x20\\x20<script\\x20src=\\"//html5shim\\.googlecode\\.com/svn/trunk/html5\\.js\\"></script>\\n\\x20\\x20\\x20\\x20<!\\[endif\\]-->\\n\\n\\x20\\x20\\x20\\x20<!--\\x20Fav\\x20and\\x20touch\\x20icons\\x20-->\\n\\x20\\x20\\x20\\x20<link\\x20rel=\\"apple-touch-icon\\"\\x20sizes=\\"180x180\\"\\x20href=\\"dc4d092847be46242d8c013d1bc7c494\\.png\\"\\x20/>\\n\\x20\\x20\\x20\\x20<link\\x20rel=\\"icon\\"\\x20type=\\"image/png\\"\\x20sizes=\\"32x32\\"\\x20href=\\"5ba13dcb526292ae707310a54e103cd1\\.png\\"");',
        ostype: '',
        port: 80,
      },
      {
        product: 'Apache httpd',
        name: 'http',
        extrainfo: '(Debian)',
        version: '2.4.38',
        fingerprint: '',
        ostype: '',
        port: 8000,
      },
      {
        product: 'Apache httpd',
        name: 'http',
        extrainfo: '(Debian)',
        version: '2.4.38',
        fingerprint: '',
        ostype: '',
        port: 8888,
      },
      {
        product: 'Apache httpd',
        name: 'http',
        extrainfo: '(Ubuntu)',
        version: '2.4.29',
        fingerprint: '',
        ostype: '',
        port: 32768,
      },
    ],
  },
  vul_name_list: [
    '360\u65b0\u5929\u64ceSQL\u6ce8\u5165\u6f0f\u6d1e',
    '74cms assign_resume_tpl\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'ASP.NET \u8def\u5f84\u6cc4\u6f0f',
    'ASP.NET\u542f\u7528\u9875\u8ddf\u8e2a',
    'ASP.NET\u8c03\u8bd5\u6a21\u5f0f\u5df2\u5f00\u542f',
    'AVCON \u7cfb\u7edf\u7ba1\u7406\u5e73\u53f0\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'AVCON \u7cfb\u7edf\u7ba1\u7406\u5e73\u53f0\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    'AVCON \u7cfb\u7edf\u7ba1\u7406\u5e73\u53f0\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e',
    'Access\u6570\u636e\u5e93\u6587\u4ef6',
    'ActiveMQ \u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    'Adobe XML \u5916\u90e8\u5b9e\u4f53\u6ce8\u5165',
    'Airflow \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e',
    'Alibaba Canal Admin \u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e',
    'Alibaba Nacos derby \u7aef\u70b9\u8ba4\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e \uff08CVE-2021-29442\uff09',
    'Alibaba Nacos \u63a7\u5236\u53f0\u9ed8\u8ba4\u5f31\u53e3\u4ee4',
    'Alibaba Nacos \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e',
    'Allegro Rompager \u5384\u8fd0 Cookie',
    'AnyMacro Mail loginuser \u76ee\u5f55\u7a7f\u8d8a',
    'Apache 2.4.49 \u76ee\u5f55\u7a7f\u8d8a',
    'Apache Apisix \u4e0d\u5b89\u5168\u914d\u7f6e\uff08CVE-2020-11710\uff09',
    'Apache Axis2 \u4fe1\u606f\u6cc4\u6f0f',
    'Apache Axis2 \u6587\u4ef6\u5305\u542b\u6f0f\u6d1e',
    'Apache Axis2 \u670d\u52a1\u5217\u8868\u6cc4\u6f0f',
    'Apache Axis2 \u7ba1\u7406\u540e\u53f0\u5f31\u5bc6\u7801',
    'Apache Druid Javascript Enabled Bypass\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Apache Expect\u5934\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    'Apache Flink \u4e0a\u4f20\u8def\u5f84\u904d\u5386',
    'Apache Flink \u672a\u6388\u6743\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'Apache Flink \u76ee\u5f55\u7a7f\u8d8a',
    'Apache Geronimo\u9ed8\u8ba4\u7ba1\u7406\u5458\u8ba4\u8bc1',
    'Apache Jetspeed \u672a\u6388\u6743\u8bbf\u95ee',
    'Apache Kylin \u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e',
    'Apache Kylin \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e',
    'Apache NiFI API \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Apache OFBiz RMI\u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Apache Ofbiz XXE \u6f0f\u6d1e',
    'Apache Ofbiz \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Apache Roller OGNL\u6ce8\u5165\u6f0f\u6d1e',
    'Apache ShardingSphere UI YAML \u89e3\u6790\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CVE-2020-1947\uff09',
    'Apache Shiro Java \u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'Apache SkyWalking SQL \u6ce8\u5165\u6f0f\u6d1e',
    'Apache Solr Dataimport XXE \u6f0f\u6d1e',
    'Apache Solr SSRF\u6f0f\u6d1e',
    'Apache Solr XXE \u6f0f\u6d1e',
    'Apache Solr dataimport RCE \u6f0f\u6d1e(CVE-2019-0193)',
    'Apache Solr \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'Apache Solr \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1eCVE-2017-3163',
    'Apache Solr \u6a21\u677f\u6ce8\u5165',
    'Apache Solr \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Apache Struts2\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c S2-059',
    'Apache Tapestry \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Apache Tomcat JK Connector \u8def\u5f84\u904d\u5386\u6f0f\u6d1e',
    'Apache Tomcat examples\u6587\u4ef6',
    'Apache Tomcat hello.jsp\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    'Apache Tomcat \u6587\u4ef6\u5305\u542b\u6f0f\u6d1e\uff08CVE-2020-1938\uff09',
    'Apache Tomcat\u793a\u4f8b\u6587\u4ef6\u6f0f\u6d1e',
    'Apache Tomcat\u9ed8\u8ba4\u7ba1\u7406\u5458\u8ba4\u8bc1',
    'Apache Unomi \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Apache httpOnly Cookie\u6cc4\u6f0f',
    'Apache mod_negotiation\u6a21\u5757\u6587\u4ef6\u540d\u66b4\u529b\u7834\u89e3',
    'Apache solr \u672a\u6388\u6743\u8bbf\u95ee\u7ba1\u7406\u9875\u9762',
    'Apache tomcat \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e \uff08CVE-2017-12615\uff09',
    'Apache \u5f00\u542f\u4ee3\u7406\u670d\u52a1',
    'Apache\u542f\u7528\u4e86CONNECT\u65b9\u6cd5',
    'Apache\u670d\u52a1\u5668\u4fe1\u606f\u6cc4\u6f0f',
    'Apache\u670d\u52a1\u5668\u72b6\u6001\u4fe1\u606f\u6cc4\u6f0f',
    'Apereo CAS 4.1.7 \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'AspCMS\u6570\u636e\u5e93\u6587\u4ef6\u6cc4\u6f0f',
    'Atlassian Confluence \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CVE-2021-26084\uff09',
    'Atlassian JIRA \u654f\u611f\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e',
    'Atlassian JIRA \u654f\u611f\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e(CVE-2020-14179)',
    'Atlassian Jira \u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e',
    'Atlassian Jira \u672a\u6388\u6743\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\uff08CVE-2021-26086\uff09',
    'Aviatrix Controller 6.x \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CVE-2021-40870\uff09',
    'B2Bbuilder X-Forwarded-For SQL \u6ce8\u5165\u6f0f\u6d1e',
    'B2Bbuilder ajax_back_end.php SQL \u6ce8\u5165\u6f0f\u6d1e',
    'Bazaar\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u4fe1\u606f\u6cc4\u6f0f',
    'CLTPHP \u524d\u53f0\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20',
    'CMS4J \u65e5\u5fd7\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e',
    'CMSEasy\u672a\u6388\u6743\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c',
    'CORS \u8de8\u57df\u6f0f\u6d1e',
    'CVS\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u4fe1\u606f\u6cc4\u6f0f',
    'Cachet SQL\u6ce8\u5165\u6f0f\u6d1e(CVE-2021-39165)',
    'Citrix Systems XenMobile Server \u8def\u5f84\u904d\u5386\u6f0f\u6d1e\uff08CVE-2020-8209\uff09',
    'ColdFusion AMF \u53cd\u5e8f\u5217\u5316\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'ColdFusion v8 \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'ColdFusion v9 \u767b\u5f55\u8ba4\u8bc1\u7ed5\u8fc7',
    'ColdFusion \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'ColdFusion \u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e',
    'ColdFusion \u53cd\u5e8f\u5217\u5316\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'ColdFusion \u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
    'ColdFusion \u8def\u5f84\u6cc4\u6f0f',
    'Confluence\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Cookie SQL\u6ce8\u5165',
    'Cookie \u8de8\u7ad9\u653b\u51fb',
    'Core dump checker php \u811a\u672c',
    'CouchDB \u4efb\u610f\u7ba1\u7406\u5458\u6dfb\u52a0\u6f0f\u6d1e',
    'CouchDB \u672a\u6388\u6743\u8bbf\u95ee',
    'CouchDB \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'CxCms resource \u76ee\u5f55\u7a7f\u8d8a',
    'D-Link DCS-2530L\u8d26\u53f7\u5bc6\u7801\u6cc4\u9732',
    'D-Link \u591a\u6b3e\u8def\u7531\u5668\u7ba1\u7406\u5458\u8d26\u53f7\u5bc6\u7801\u6cc4\u9732',
    'D-Link\u8def\u7531\u5668\u4e2d\u7684\u672a\u6388\u6743RCE\u6f0f\u6d1e',
    'DedeCMS /plus/carbuyaction.php \u672c\u5730\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e',
    'DedeCMS /plus/feedback_js.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'DedeCMS /plus/infosearch.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'DedeCMS /tag.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'DedeCMS advancedsearch.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'DedeCMS ajax_membergroup.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'DedeCMS config.php \u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    'DedeCMS dedesql.class.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'DedeCMS download.php URL\u91cd\u5b9a\u5411\u6f0f\u6d1e',
    'DedeCMS global.inc.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'DedeCMS index.php.bak \u5b89\u5168\u6a21\u5f0f\u7ed5\u8fc7\u6f0f\u6d1e',
    'DedeCMS mysql_error_trace.inc\u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e',
    'DedeCMS recommend.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'DedeCMS resetpassword.php\u4efb\u610f\u5bc6\u7801\u91cd\u7f6e\u6f0f\u6d1e',
    'DedeCMS search.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'DedeCMS shopcar.class.php \u540e\u95e8\u6f0f\u6d1e',
    'DedeCMS swfupload.swf \u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    'DedeCMS wap.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'DedeCMS \u672a\u6388\u6743RCE',
    'DedeEIMS common.inc.php \u767b\u9646\u7ed5\u8fc7\u6f0f\u6d1e',
    'Dedecms \u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e\uff08CVE-2018-6910\uff09',
    'Destoon spread SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Discuz!ML V3.X \u4ee3\u7801\u6ce8\u5165\u6f0f\u6d1e',
    'Docker Remote API \u672a\u6388\u6743\u8bbf\u95ee',
    'DrayTek\u4f01\u4e1a\u7f51\u7edc\u8bbe\u5907\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'Dreamweaver\u8fdc\u7a0b\u6570\u636e\u5e93\u8fde\u63a5\u6587\u4ef6',
    'Drupal \u6ce8\u518c\u9875\u9762\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Drupal8 RESTful Web Services\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'Drupal8 \u5bfc\u51fa\u914d\u7f6e\u6587\u4ef6\u4e0b\u8f7d',
    'E-Office weibo lazyuploadify \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'ECSHOP delete_cart_goods SQL\u6ce8\u5165',
    'ECShop 4.1 \u672a\u6388\u6743 Sql \u6ce8\u5165\u6f0f\u6d1e',
    'ECShop user.php \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'EIS information platform SQL\u6ce8\u5165',
    'EL\u8868\u8fbe\u5f0f\u6ce8\u5165\u6f0f\u6d1e',
    'ETERNALBLUE Windows SMB\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'ETERNALBLUE \u540e\u95e8',
    'Eclipse Jetty WEB-INF\u654f\u611f\u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e',
    'Eclipse Jetty WEB-INF\u654f\u611f\u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e',
    'Ecology OA \u524d\u53f0SQL \u6ce8\u5165\u6f0f\u6d1e',
    'EgoWeb2.0 SQL \u6ce8\u5165\u6f0f\u6d1e',
    'Eir moderm \u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e',
    'ElasticSearch ECE 7.13.3\u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e (CVE-2021-22146)',
    'ElasticSearch Groovy \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'ElasticSearch Plugin \u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
    'ElasticSearch Snapshot API \u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
    'Elasticsearch\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Elmah\u654f\u611f\u4fe1\u606f\u6cc4\u6f0f',
    'Etcd REST API \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e',
    'Exim \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e (CVE-2019-10149)',
    'Express Handlebars \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\uff08CVE-2021-32820\uff09',
    'F5 BIG-IP iControl REST\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'F5 BIG-IP \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'FCKeditor spellchecker \u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    'FCKeditor \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'Fantastico \u6587\u4ef6\u5217\u8868',
    'FineCMS Api SQL \u6ce8\u5165\u6f0f\u6d1e',
    'FineCMS ajax_upload \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'FineCMS ajaxswfupload \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'FineCMS swfupload \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'FineCMS \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'FineCMS \u7528\u6237\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e',
    'Flask \u5f00\u542fdebug \u6a21\u5f0f',
    'ForgeRock OpenAM \u672a\u6388\u6743\u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'FrontPage pwd \u6587\u4ef6\u53ef\u8bfb',
    'Frontpage \u4fe1\u606f\u6cc4\u6f0f',
    'GIT\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u4fe1\u606f\u6cc4\u6f0f',
    'Gate One \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'Gate One\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Gitlab API \u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e',
    'GlassFish utf8\u76ee\u5f55\u7a7f\u8d8a',
    'GlassFish \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'GlassFish \u5f31\u5bc6\u7801',
    'GlassFish \u7ba1\u7406\u5458\u63a7\u5236\u53f0\u8ba4\u8bc1\u7ed5\u8fc7',
    'Gogs/Gitea \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Gpcsoft EGP usersecuritycontroller SQL\u6ce8\u5165',
    'Gpcsoft EGP\u7cfb\u7edf imgurl1 \u76ee\u5f55\u7a7f\u8d8a',
    'Gpcsoft EGP\u7cfb\u7edfJSP\u540e\u95e8',
    'Gurock Software Gurock TestRail \u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e',
    'H3C Aolynk BR304 \u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    'HIKVISION \u6d41\u5a92\u4f53\u7ba1\u7406\u670d\u52a1\u5668\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    'HTTP \u5934 hostname \u653b\u51fb',
    'HTTP \u660e\u6587\u4f20\u8f93',
    'HTTP_PROXY \u8fdc\u7a0b\u4ee3\u7406\u611f\u67d3\u6f0f\u6d1e',
    'HTTP\u54cd\u5e94\u62c6\u5206\u6f0f\u6d1e',
    'Hadoop Yarn \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\u3002',
    'Hadoop cluster web \u63a5\u53e3',
    'Himail inputfile \u76ee\u5f55\u7a7f\u8d8a',
    'Horde webemail barcode \u76ee\u5f55\u7a7f\u8d8a',
    'House5\u623f\u4ea7\u7cfb\u7edf allid SQL\u6ce8\u5165\u6f0f\u6d1e',
    'ICEFlow VPN \u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e',
    'IIS 6.0 WebDAV \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'IIS Content-Location\u5185\u90e8IP\u5730\u5740\u6cc4\u6f0f',
    'IIS HTTP.sys \u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e',
    'IIS service.cnf \u6587\u4ef6\u6cc4\u9732',
    'IIS\u77ed\u6587\u4ef6\u540d\u6cc4\u6f0f',
    'IPS Community Suite <= 4.1.12.3 php \u4ee3\u7801\u6ce8\u5165\u6f0f\u6d1e',
    'IceWarp Webmail basic\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Ioncube loader wizard \u76ee\u5f55\u7a7f\u8d8a',
    'JBOSS Java \u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'JBoss AS 5.x/6.x \u53cd\u5e8f\u5217\u5316\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'JBoss BSHDeployer\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'JBoss JMX Console\u672a\u6388\u6743\u8bbf\u95ee',
    'JBoss JMX \u7ba1\u7406\u63a7\u5236\u53f0\u672a\u6388\u6743\u8bbf\u95ee',
    'JBoss Server MBean \u4fe1\u606f\u6cc4\u6f0f',
    'JBoss ServerInfo MBean \u4fe1\u606f\u6cc4\u6f0f',
    'JBoss Web Service Console\u672a\u6388\u6743\u8bbf\u95ee',
    'JBoss Web\u7ba1\u7406\u63a7\u5236\u53f0JMX Invoker',
    'JBoss jmx-consle \u6587\u4ef6\u4e0a\u4f20',
    'JBoss status servlet\u4fe1\u606f\u6cc4\u6f0f',
    'JBoss\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'JEEWMS\u4ed3\u5e93\u7ba1\u7406\u7cfb\u7edf\u672a\u6388\u6743\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'Java Debug Wire Protocol \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c',
    'Java RMI \u53cd\u5e8f\u5217\u5316\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Jboss JMX Console \u5f31\u5bc6\u7801',
    'Jboss Seam Remoting XXE\u6f0f\u6d1e',
    'Jboss Seam Remoting \u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e',
    'JeeCMS redirect \u547d\u4ee4\u6267\u884c',
    'JeeSite Userfiles Servlet \u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    'Jenkins CLI \u53cd\u5e8f\u5217\u5316\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Jenkins Dashboard \u672a\u6388\u6743\u8bbf\u95ee',
    'Jenkins Java \u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'Jenkins \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'Jetty Web-INF Web.xml \u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'Jetty shared-buffer \u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e',
    'Jetty \u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e',
    'Jira \u7528\u6237\u679a\u4e3e\u6f0f\u6d1e',
    'Jira\u672a\u6388\u6743\u7528\u6237\u679a\u4e3e\u6f0f\u6d1e\uff08CVE-2020-14181\uff09',
    'Jira\u6a21\u7248\u6ce8\u5165\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Joomla 3.2.0-3.4.4 SQL\u6ce8\u5165',
    'Joomla session \u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'Joomla \u7528\u6237\u6743\u9650\u63d0\u5347\u6f0f\u6d1e',
    'Joomla! Component JS Jobs\uff08com_jsjobs\uff091.2.5-cities.php SQL\u6ce8\u5165',
    'Joomla! Core 3.7 com_fileds\u7ec4\u4ef6SQL\u6ce8\u5165\u6f0f\u6d1e',
    'JumpServer\u5821\u5792\u673a\u672a\u6388\u6743\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'Jupyter Notebook \u672a\u6388\u6743\u8bbf\u95ee\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'KesionCMS plus_ajaxs SQL\u6ce8\u5165',
    'KindEditor \u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'Kong Gateway ADMIN API \u4e0d\u5b89\u5168\u914d\u7f6e\uff08CVE-2020-11710\uff09',
    'Kyan \u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Kyan\u7ba1\u7406\u5e73\u53f0\u5bc6\u7801\u6f0f\u6d1e',
    'LDAP\u6ce8\u5165\u6f0f\u6d1e',
    'Lanproxy \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'Laravel Debug \u6a21\u5f0f\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Liferay Portal CE \u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Linux\u4e3b\u673a\u914d\u7f6e\u68c0\u67e5',
    'Live800 chatHoursSta.jsp SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Live800 chatOpSta.jsp SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Live800 chatTopicSta.jsp SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Live800 chatUrlSta.jsp SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Live800 downlog.jsp \u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    'Live800 referrerSta.jsp SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Lotus Domino HTTP \u54cd\u5e94\u62c6\u5206\u548c XSS',
    'Lukashinsch Spring Boot Actuator Logview \u8def\u5f84\u904d\u5386\u6f0f\u6d1e',
    'MallBuilder \u540e\u95e8\u68c0\u6d4b',
    'MallBuilder \u5546\u57ce\u7cfb\u7edf district.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'MallBuilder \u5546\u57ce\u7cfb\u7edf help.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'MallBuilder \u5546\u57ce\u7cfb\u7edf shop \u6a21\u5757SQL\u6ce8\u5165\u6f0f\u6d1e',
    'MallBuilder \u5546\u57ce\u7cfb\u7edf sms \u6a21\u5757SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Memcache \u672a\u6388\u6743\u8bbf\u95ee',
    'Mercurial\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u4fe1\u606f\u6cc4\u6f0f',
    'MessageSolution \u4f01\u4e1a\u90ae\u4ef6\u5f52\u6863\u7ba1\u7406\u7cfb\u7edfEEA\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'MessageSolution \u4f01\u4e1a\u90ae\u4ef6\u5f52\u6863\u7ba1\u7406\u7cfb\u7edfEEA\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e',
    'MessageSolution \u4f01\u4e1a\u90ae\u4ef6\u5f52\u6863\u7ba1\u7406\u7cfb\u7edfEEA\u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'MetInfo HTTP_X_REWRITE_URL SQL \u6ce8\u5165\u6f0f\u6d1e',
    'MetInfo about_index \u6587\u4ef6\u5305\u542b\u6f0f\u6d1e',
    'MetInfo dataoptimize_html \u6587\u4ef6\u5305\u542b\u6f0f\u6d1e',
    'MetInfo thumb.php \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'MetInfo \u4f1a\u5458\u767b\u5f55 sql \u6ce8\u5165\u6f0f\u6d1e',
    'Microsoft Exchange \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Microsoft SharePoint scriptresx \u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    'MinIO Server\u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    'Mini \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'Minify \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'MinyooCMS pathfile \u76ee\u5f55\u7a7f\u8d8a',
    'MongoDB HTTP status interface\u654f\u611f\u4fe1\u606f\u6cc4\u6f0f',
    'Mongodb \u672a\u6388\u6743\u8bbf\u95ee',
    'NFS\u914d\u7f6e\u4e0d\u5f53',
    'Nagios XI commandline.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Nagios XI helpedit.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Nagios XI info.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Nagios XI logbook.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Nagios XI magpie_debug.php \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Nagios XI menuaccess.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Nagios XI \u5c0f\u4e8e 5.2.8 SQL\u6ce8\u5165',
    'Nagios XI \u5c0f\u4e8e 5.2.8 \u547d\u4ee4\u6267\u884c',
    'Nagios XI \u5c0f\u4e8e 5.2.8 \u767b\u9646\u7ed5\u8fc7',
    'Netgear R7000 \u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Nette\u6846\u67b6\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Nexus Repository Manager3 \u672a\u6388\u6743\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'NexusDB \u8def\u5f84\u7a7f\u8d8a\u6f0f\u6d1e',
    'Nginx\u7a7a\u5b57\u8282\u4ee3\u7801\u6267\u884c',
    'NiuShop imgPhoto \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'NiuShop v4.1.0 Api Store Info SQL\u6ce8\u5165\u6f0f\u6d1e',
    'NiuShop v4.1.0 Upvideo \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'Node-Red ui base \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'Ntopng \u6743\u9650\u7ed5\u8fc7\u6f0f\u6d1e(CVE-2021-28073)',
    'Nuxeo login.jsp EL \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'N\u70b9\u865a\u62df\u4e3b\u673a\u7ba1\u7406\u7cfb\u7edfV1.9.6\u7248\u6570\u636e\u5e93\u4e0b\u8f7d\u6f0f\u6d1e',
    'OURPHP filebox \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'OURPHP \u7ba1\u7406\u5458\u767b\u9646\u53e3\u4ee4\u548c\u5b89\u5168\u7801\u6cc4\u9732',
    'Open5GS \u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    'OpenSNS Weibo Sharebox \u672a\u6388\u6743\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'OpenSSL DROWN \u6f0f\u6d1e',
    'OpenSSL POODLE \u6f0f\u6d1e',
    'OpenSSL\u5fc3\u810f\u6ef4\u8840\u6f0f\u6d1e',
    'Openmrs \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e',
    'Oracle JavaServer Faces \u76ee\u5f55\u904d\u5386\u6f0f\u6d1e',
    'Oracle Reports \u6570\u636e\u5e93\u4fe1\u606f\u6cc4\u6f0f',
    'Oracle Reports \u6587\u4ef6\u4e0a\u4f20',
    'Oracle Reports \u76ee\u5f55\u7a7f\u8d8a',
    'Oracle WebLogic wls-wsat \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Oracle \u5e94\u7528\u65e5\u5fd7\u4fe1\u606f\u6cc4\u6f0f',
    'PHP CGI\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'PHP FastCGI\u89e3\u6790\u6f0f\u6d1e',
    'PHP \u8bf7\u6c42\u5934 XSS \u6f0f\u6d1e',
    'PHPCMS 2008 type.php \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'PHPCMS v9 wap\u6a21\u5757 SQL\u6ce8\u5165\u6f0f\u6d1e',
    'PHPCMS v9.6 \u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    'PHPCMS \u6ce8\u518c\u9875\u9762\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'PHPOA \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'PHPUnit \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'PHP\u4ee3\u7801\u6ce8\u5165\u6f0f\u6d1e',
    'PIW CMS SQL\u6ce8\u5165\u6f0f\u6d1e',
    'PageAdmin\u6570\u636e\u5e93\u6587\u4ef6\u6cc4\u6f0f',
    'Panabit Panalog \u9ed8\u8ba4\u5bc6\u7801\u4e0e\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Panabit\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Parallels Plesk SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Parallels Plesk SiteBuilder \u5ba1\u8ba1',
    'Plesk SSO XXE\u6f0f\u6d1e',
    'ProFTPD \u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e',
    'Pulse Secure SSL VPN\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6',
    'RAS \u7269\u7406\u8def\u5f84\u6cc4\u9732',
    'RabbitMQ \u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    'Railo administration panel \u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    'Rails\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Referer SQL\u6ce8\u5165',
    'Referer \u8de8\u7ad9\u653b\u51fb',
    'Resin windows \u76ee\u5f55\u904d\u5386\u6f0f\u6d1e',
    'Resin-doc\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
    'RockMongo \u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    'Ruby on Rails Action Pack\u5224\u65ad\u4efb\u610f\u6587\u4ef6\u662f\u5426\u5b58\u5728',
    'Ruby on Rails database \u914d\u7f6e\u6587\u4ef6\u6cc4\u9732',
    'Ruby on Rails \u8def\u5f84\u7a7f\u8d8a\u4e0e\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6',
    'SAP NetWeaver\u7cfb\u7edf\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'SFTP/FTP\u914d\u7f6e\u6587\u4ef6\u4fe1\u606f\u6cc4\u6f0f',
    'SQLite\u6570\u636e\u5e93\u6587\u4ef6',
    'SQL\u6ce8\u5165\u6f0f\u6d1e',
    'SSL/TLS \u4e2d\u95f4\u4eba\u653b\u51fb\u6f0f\u6d1e (CCS Injection)',
    'SVN\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u4fe1\u606f\u6cc4\u6f0f',
    'SaltStack \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c',
    'SaltStack\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Schneider Electric PowerLogic PM8ECC \u786c\u7f16\u7801\u5bc6\u7801\u6f0f\u6d1e',
    'ShopXO \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\u3002',
    'ShowDoc\u6587\u6863\u5de5\u5177\u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    'SiteFactory assets \u76ee\u5f55\u7a7f\u8d8a',
    'SiteServer CMS \u8fdc\u7a0b\u6a21\u7248\u4e0b\u8f7d getshell \u6f0f\u6d1e',
    'SmartBI \u672a\u6388\u6743SQL\u6ce8\u5165\u6f0f\u6d1e',
    'SmartBI\u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    'Snoop Servlet \u4fe1\u606f\u6cc4\u6f0f',
    'SolarWinds Origin \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'SonicWall SSL VPN \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Spark REST API \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Spring Boot Actuator\u654f\u611f\u4fe1\u606f\u6cc4\u6f0f',
    'Spring Boot Jolokia Realm JNDI \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Spring Cloud Netflix \u53ef\u56de\u663e\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e',
    'Spring Cloud Snake Yaml \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Spring Data Commons \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Sprockets \u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002',
    'SquirrellyJS \u6a21\u677f\u5f15\u64ce\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CVE-2021-32819\uff09',
    'Struts XWork HTML\u6807\u7b7e\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    'Struts \u9519\u8bef\u9875\u9762\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    'Struts2 URL\u8df3\u8f6cS2-017',
    'Struts2 \u8c03\u8bd5\u6a21\u5f0f\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'Struts2\u542f\u7528\u5f00\u53d1\u6a21\u5f0f',
    'Struts2\u8fdc\u7a0b\u4ee3\u7801\u6267\u884cS2-052',
    'Struts2\u8fdc\u7a0b\u4ee3\u7801\u6267\u884cS2-053',
    'Struts2\u8fdc\u7a0b\u4ee3\u7801\u6267\u884cS2-057',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-005',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-007',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-009',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-013',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-014',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-015',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-016',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-019',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-020',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-021',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-032',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-033',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-037',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-045',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-046',
    'Struts2\u8fdc\u7a0b\u547d\u4ee4\u6267\u884cS2-048',
    'TRS WCM6 infoview.do \u767b\u5f55\u7ed5\u8fc7\u6f0f\u6d1e',
    'TRS WCM6 \u7528\u6237\u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e',
    'TRS Web Application Server 5.0 outlinecustomize \u4efb\u610f\u4ee3\u7801\u6267\u884c',
    'TRS Web Application Server 5.0 \u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'TRS Web Application Server 5.0 \u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    'TRS Web Application Server 5.0 \u914d\u7f6e\u6587\u4ef6\u8bfb\u53d6',
    'TRS inforadar\u654f\u611f\u4fe1\u606f\u6cc4\u6f0f',
    'TRSID env\u4fe1\u606f\u6cc4\u6f0f',
    'TRSWCM govfileuploader \u76ee\u5f55\u4efb\u610f\u5199\u6587\u4ef6',
    'TVT\u6570\u7801\u79d1\u6280 NVMS-1000 \u8def\u5f84\u904d\u5386\u6f0f\u6d1e',
    'TamronOS IPTV\u7cfb\u7edf\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Tecnick.com TCExam \u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CVE-2021-20114\uff09',
    'TerraMaster TOS Makecvs \u672a\u6388\u6743\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'TerraMaster TOS \u672a\u6388\u6743\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'ThinkAdmin v6 \u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'ThinkAdmin\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'ThinkCMFX fetch \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'ThinkPHP 5.X method\u53d8\u91cf\u8986\u76d6\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'ThinkPHP 5.X \u63a7\u5236\u5668\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'ThinkPHP V6 \u4efb\u610f\u6587\u4ef6\u521b\u5efa\u6f0f\u6d1e',
    'TongdaOA \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e',
    'Tongdaoa \u4efb\u610f\u7528\u6237\u767b\u5165',
    'Tornado \u5f00\u542f\u8c03\u8bd5\u6a21\u5f0f',
    'Turbo Mail \u4efb\u610f\u8d26\u53f7\u767b\u5f55\u6f0f\u6d1e',
    'Turbo Mail \u524d\u53f0SQL\u6ce8\u5165\u6f0f\u6d1e',
    'Typecho install.php \u53cd\u5e8f\u5217\u5316\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Typecho \u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e',
    'UEditor .net\u7248\u672c\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'URI \u8de8\u7ad9\u653b\u51fb',
    'URL\u91cd\u5b9a\u5411',
    'Uniportal displayimg \u76ee\u5f55\u7a7f\u8d8a',
    'User-Agent SQL\u6ce8\u5165',
    'User-Agent \u8de8\u7ad9\u653b\u51fb',
    'V2\u89c6\u9891\u4f1a\u8bae\u7cfb\u7edfbulletinAction.do SQL\u6ce8\u5165\u6f0f\u6d1e',
    'V2\u89c6\u9891\u4f1a\u8bae\u7cfb\u7edfdownloadaction.do\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
    'VMware vCenter Server \u672a\u6388\u6743\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff08CVE-2021-22005\uff09',
    'VMware vRealize Operations Manager SSRF\u6f0f\u6d1e',
    'VMware \u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
    'Vange system searchkey SQL\u6ce8\u5165',
    'Vmware vCenter Server vscan health \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Vmware vCenter uploadova \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Vmware vCenter\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'VoIPmonitor\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'WEBrick \u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
    'We7 CMS download \u76ee\u5f55\u7a7f\u8d8a',
    'We7 CMS \u5b89\u88c5\u63a5\u53e3\u65e0\u9650\u5236\u8bbf\u95ee',
    'Weaver E-cology OA BeanShell \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c',
    'WebDAV \u76ee\u5f55\u904d\u5386\u6f0f\u6d1e',
    'WebDAV\u76ee\u5f55\u4efb\u610f\u5199\u6587\u4ef6',
    'WebDAV\u76ee\u5f55\u5199\u5165\u540e\u95e8',
    'WebLogic Java \u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'WebLogic coherence\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e(CVE-2020-2555)',
    'WebLogic java \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e(CVE-2018-3245)',
    'WebLogic ws-utc \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'WebLogic \u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e(CVE-2018-3191)',
    'WebLogic \u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff08CVE-2018-2894\uff09',
    'WebLogic\u7ba1\u7406\u540e\u53f0\u5f31\u53e3\u4ee4',
    'WebLoigc XXE \u6f0f\u6d1e\uff08CVE-2019-2888\uff09',
    'WebSphere Java \u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    'Webbuilder main \u76ee\u5f55\u7a7f\u8d8a',
    'Weblogic java \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e(CVE-2016-0638)',
    'Weblogic java \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e(CVE-2016-3510)',
    'Weblogic java \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e(CVE-2017-3248)',
    'Weblogic java \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e(CVE-2018-2628)',
    'Weblogic java \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e(CVE-2018-2893)',
    'Weblogic java \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e(CVE-2019-2725)',
    'Weblogic java \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e(CVE-2019-2729)',
    'Weblogic uddiexplorer \u670d\u52a1\u5668\u8bf7\u6c42\u4f2a\u9020',
    'Weblogic\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Webmin webmin_password_change.cgi \u8fdc\u7a0b\u4ee3\u7801\u6267\u6f0f\u6d1e',
    'Web\u5e94\u7528\u7a0b\u5e8fPoC\u68c0\u6d4b',
    'Web\u5e94\u7528\u7a0b\u5e8f\u9519\u8bef\u4fe1\u606f',
    'Web\u670d\u52a1\u5668\u9ed8\u8ba4\u6b22\u8fce\u9875\u9762',
    'Weiphp\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'WordPress 4.2-4.5.1 MediaElement\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    'WordPress Core 4.6 \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'WordPress DZS Zoomsounds\u63d2\u4ef6 \u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    'WordPress Mailpress \u63d2\u4ef6\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'WordPress Pingback DDoS \u6f0f\u6d1e',
    'WordPress REST API \u5185\u5bb9\u6ce8\u5165\u6f0f\u6d1e',
    'WordPress The Plus addons for Elementor \u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e',
    'WordPress robotcpa \u76ee\u5f55\u7a7f\u8d8a',
    'WordPress \u4e3b\u9898\u540e\u95e8',
    'WordPress \u7269\u7406\u8def\u5f84\u6cc4\u9732',
    'WordPress\u63d2\u4ef6 wp_miniaudioplayer \u76ee\u5f55\u7a7f\u8d8a',
    'WordPress\u63d2\u4ef6 wp_mobile_edition \u76ee\u5f55\u7a7f\u8d8a',
    'Wordpress Woocommerce \u63d2\u4ef6\u672a\u6388\u6743SQL\u6ce8\u5165\u6f0f\u6d1e',
    'WrodPress Social Warfare\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'X-Forwarded-For \u4f2a\u9020\u7ed5\u8fc7\u9a8c\u8bc1',
    'X-Frame-Options Header\u672a\u914d\u7f6e',
    'XML\u5916\u90e8\u5b9e\u4f53\u6ce8\u5165',
    'XPath\u6ce8\u5165\u6f0f\u6d1e',
    'XXL-JOB Admin\u53cd\u5e8f\u5217\u5316\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'XXL-JOB Admin\u8c03\u5ea6\u4e2d\u5fc3\u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    'XXL-JOB\u672a\u6388\u6743\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'Yapi\u8ba4\u8bc1\u7528\u6237Mock\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'Zabbix jsrpc.php SQL\u6ce8\u5165',
    'Zend Framework \u914d\u7f6e\u6587\u4ef6\u6cc4\u9732',
    'Zimbra \u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
    'Zoomla\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    'Zope\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'bash_history \u4fe1\u606f\u6cc4\u6f0f',
    'bashrc \u4fe1\u606f\u6cc4\u6f0f',
    'bsphp \u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e',
    'cormail \u914d\u7f6e\u6587\u4ef6\u6cc4\u6f0f',
    'doccms SQL \u6ce8\u5165\u6f0f\u6d1e',
    'exacqVision Web Service \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'fastjson 1.2.47 \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e',
    'fsmcms jspdownload \u76ee\u5f55\u7a7f\u8d8a',
    'fsmcms replydetail SQL\u6ce8\u5165',
    'h3c imc \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'h3c secparh \u5821\u5792\u673a\u4efb\u610f\u7528\u6237\u767b\u5f55\u548c\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'harbor \u672a\u6388\u6743\u521b\u5efa\u7ba1\u7406\u5458\u6f0f\u6d1e',
    'iGENUS mail \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'iGENUS mail \u76ee\u5f55\u7a7f\u8d8a',
    'jellyfin \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    'joomla \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'konga\u9ed8\u8ba4jwt key\u4efb\u610f\u7528\u6237\u767b\u9646\u6f0f\u6d1e',
    'lighttpd sql \u6ce8\u5165\u548c\u76ee\u5f55\u7a7f\u8d8a',
    'memcached \u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e',
    'minio \u672a\u6388\u6743 webrpc ssrf',
    'nexus \u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    'pbootcms \u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    'phpLiteAdmin\u9ed8\u8ba4\u7ba1\u7406\u5bc6\u7801',
    'phpMoAdmin \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'phpStudy \u540e\u95e8\u6f0f\u6d1e',
    'phpcms cachefile \u76ee\u5f55\u7a7f\u8d8a',
    'phpmyadmin\u672a\u6388\u6743\u8bbf\u95ee\u7ba1\u7406\u540e\u53f0',
    'rconfig \u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e',
    'redis \u672a\u6388\u6743\u8bbf\u95ee',
    'resoftcms technological SQL\u6ce8\u5165',
    'showdoc\u524d\u53f0\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    'skywcm check SQL\u6ce8\u5165',
    'sonarqube unauth information disclosure',
    'spring boot jolokia\u7ec4\u4ef6\u5916\u90e8\u5b9e\u4f53\u6ce8\u5165\u6f0f\u6d1e',
    'spring framework\u53cd\u5c04\u578b\u6587\u4ef6\u4e0b\u8f7d',
    'trswcm importdocuments XXE\u6f0f\u6d1e',
    'trswcm pre \u76ee\u5f55\u7a7f\u8d8a',
    'uniportal pollproblem SQL\u6ce8\u5165',
    'uniportal showsheets SQL\u6ce8\u5165',
    'vBulletin 5 PreAuth \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'vBulletin 5 pre-auth \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    'vBulletin SQL\u6ce8\u5165\u6f0f\u6d1e(CVE-2020-12720)',
    'vBulletin forumrunner request sql \u6ce8\u5165\u6f0f\u6d1e',
    'web.xml \u6587\u4ef6\u4fe1\u606f\u6cc4\u6f0f',
    'westarcms bgxz_bg SQL\u6ce8\u5165',
    'zfsoft gwxxbviewhtml \u76ee\u5f55\u7a7f\u8d8a',
    'zzzcms \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u4e00\u91c7\u901a\u7535\u5b50\u91c7\u8d2d\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u4e07\u6237 ezEIP 4.0 SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u4e07\u6237 ezEIP 5.0 productlist SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u4e07\u6237OA XXE \u6f0f\u6d1e',
    '\u4e07\u6237OA download_ftp \u76ee\u5f55\u7a7f\u8d8a',
    '\u4e07\u6237OA download_netdisk \u76ee\u5f55\u7a7f\u8d8a',
    '\u4e07\u6237OA downloadhttp \u76ee\u5f55\u7a7f\u8d8a',
    '\u4e07\u6237OA graphreportaction SQL\u6ce8\u5165',
    '\u4e07\u6237OA informationmanager_download \u76ee\u5f55\u7a7f\u8d8a',
    '\u4e0d\u5b89\u5168\u7684ClientAccessPolicy.xml\u914d\u7f6e\u6587\u4ef6',
    '\u4e0d\u5b89\u5168\u7684crossdomain.xml\u914d\u7f6e\u6587\u4ef6',
    '\u4e16\u7eaa\u6052\u6377\u901a\u7528\u653f\u5e9c\u4fe1\u606f\u7cfb\u7edf bszn SQL\u6ce8\u5165',
    '\u4e2d\u519c\u4fe1\u8fbe\u7f51\u7edc\u76d1\u6d4b\u5e73\u53f0SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u4e2d\u519c\u4fe1\u8fbe\u7f51\u7edc\u76d1\u6d4b\u5e73\u53f0\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u4e2d\u519c\u4fe1\u8fbe\u7f51\u7edc\u76d1\u6d4b\u5e73\u53f0\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u4e2d\u65b0\u91d1\u76fe\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u7cfb\u7edf\u9ed8\u8ba4\u7ba1\u7406\u5458\u5bc6\u94a5\u6f0f\u6d1e',
    '\u4e45\u5176GMS\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u4e91ec v1.2.3\u524d\u53f0SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u4e91ec \u524d\u53f0\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u4e94\u6307cms SQL \u6ce8\u5165\u6f0f\u6d1e',
    '\u4ebf\u8d5b\u901a\u7535\u5b50\u6587\u6863\u5b89\u5168\u7ba1\u7406\u7cfb\u7edf\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    '\u4ebf\u90ae\u7535\u5b50\u90ae\u4ef6\u7cfb\u7edf\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    '\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u4f1a\u8bddCookie\u4e2d\u7f3a\u5c11HttpOnly\u5c5e\u6027',
    '\u5141\u8bb8Flash\u6587\u4ef6\u4e0e\u4efb\u4f55\u57dfHTML\u9875\u9762\u901a\u4fe1',
    '\u5141\u8bb8Frontpage\u6269\u5c55',
    '\u5141\u8bb8\u76ee\u5f55\u6d4f\u89c8',
    '\u5185\u7f51IP\u5730\u5740\u6cc4\u6f0f',
    '\u519c\u53cb\u653f\u52a1\u7cfb\u7edf\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u519c\u53cb\u7cfb\u7edf ItemSecond.aspx SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u519c\u53cb\u7cfb\u7edf ItemSixth.aspx SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u519c\u53cb\u7cfb\u7edf tname \u53c2\u6570 SQL\u6ce8\u5165',
    '\u5317\u4eac\u4e2d\u521b\u89c6\u8baf\u79d1\u6280\u6709\u9650\u516c\u53f8HIM\u57fa\u7840\u7ba1\u7406\u5e73\u53f0\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u5317\u4eac\u4e2d\u521b\u89c6\u8baf\u79d1\u6280\u6709\u9650\u516c\u53f8\u4f1a\u6377\u901a\u4e91\u89c6\u8baf\u5b58\u5728\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e',
    '\u534e\u4e3a\u5bb6\u5ead\u7f51\u5173HG569\u8bbe\u5907\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u534e\u57dfreporter\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    '\u53d1\u73b0 ZOHO ManageEngine ADSelfService Plus\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u53d1\u73b0 webpack \u6e90\u7801\u6620\u5c04\u6587\u4ef6',
    '\u53d1\u73b0Django\u7ba1\u7406\u9875\u9762\u5f31\u5bc6\u7801',
    '\u53d1\u73b0Global.asa\u6587\u4ef6',
    '\u53d1\u73b0HTTP\u8ba4\u8bc1\u5f31\u53e3\u4ee4',
    '\u53d1\u73b0JetBrains .idea\u76ee\u5f55',
    '\u53d1\u73b0MSSQL\u5f31\u5bc6\u7801',
    '\u53d1\u73b0MySQL\u5f31\u5bc6\u7801',
    '\u53d1\u73b0Oracle\u5f31\u5bc6\u7801',
    '\u53d1\u73b0PHPINFO\u6587\u4ef6',
    '\u53d1\u73b0POP3\u670d\u52a1\u5f31\u5bc6\u7801',
    '\u53d1\u73b0RDP\u670d\u52a1\u5f31\u5bc6\u7801',
    '\u53d1\u73b0SMB\u670d\u52a1\u5f31\u5bc6\u7801',
    '\u53d1\u73b0SSH\u5f31\u5bc6\u7801',
    '\u53d1\u73b0Sybase\u5f31\u5bc6\u7801',
    '\u53d1\u73b0Tomcat\u72b6\u6001\u76d1\u63a7\u4fe1\u606f\u6cc4\u6f0f',
    '\u53d1\u73b0VNC\u670d\u52a1\u5f31\u5bc6\u7801',
    '\u53d1\u73b0WS_FTP\u914d\u7f6e\u6587\u4ef6',
    '\u53d1\u73b0apc.php\u6587\u4ef6',
    '\u53d1\u73b0ftp\u533f\u540d\u8bbf\u95ee',
    '\u53d1\u73b0ftp\u5f31\u5bc6\u7801',
    '\u53d1\u73b0rsync\u533f\u540d\u8bbf\u95ee',
    '\u53d1\u73b0telnet\u5f31\u5bc6\u7801',
    '\u53d1\u73b0zabbix\u5f31\u5bc6\u7801',
    '\u53d1\u73b0\u538b\u7f29\u5305\u6587\u4ef6',
    '\u53d1\u73b0\u5907\u4efd\u6587\u4ef6',
    '\u53d1\u73b0\u654f\u611f\u6587\u4ef6',
    '\u53d1\u73b0\u654f\u611f\u76ee\u5f55',
    '\u53d1\u73b0\u6587\u4ef6\u4e0a\u4f20',
    '\u53d1\u73b0\u6587\u6863\u6587\u4ef6',
    '\u53d1\u73b0\u670d\u52a1\u5668\u63a2\u9488\u6587\u4ef6',
    '\u53d1\u73b0\u6d4b\u8bd5\u6587\u4ef6',
    '\u53d1\u8d27100\u865a\u62df\u5546\u54c1\u81ea\u52a8\u53d1\u8d27\u7cfb\u7edfSQL\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2021-30193\uff09',
    '\u53ef\u80fd\u53d1\u73b0\u6570\u636e\u5e93\u5907\u4efd\u6587\u4ef6',
    '\u542f\u7528\u4e86WebDAV',
    '\u542f\u83b1OA \u672a\u6388\u6743SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u548c\u4fe1\u521b\u5929\u4e91\u684c\u9762\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20',
    '\u56fd\u5bb6\u6570\u5b57\u5316\u5b66\u4e60\u8d44\u6e90\u4e2d\u5fc3\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u56fd\u5fae\u653f\u5e9c\u7f51\u7ad9\u7cfb\u7edf image_cut.php \u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    '\u56fd\u5fae\u653f\u5e9c\u7f51\u7ad9\u7cfb\u7edf lettersearch \u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e',
    '\u56fd\u5fae\u653f\u5e9c\u7f51\u7ad9\u7cfb\u7edf list_ask.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u56fd\u5fae\u653f\u5e9c\u7f51\u7ad9\u7cfb\u7edf list_content.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u56fd\u5fae\u653f\u5e9c\u7f51\u7ad9\u7cfb\u7edf list_picture.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u56fd\u5fae\u653f\u5e9c\u7f51\u7ad9\u7cfb\u7edf member/verify.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u56fd\u5fae\u653f\u5e9c\u7f51\u7ad9\u7cfb\u7edf uploader/list.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u56fd\u5fae\u653f\u5e9c\u7f51\u7ad9\u7cfb\u7edf\u4efb\u610f\u7ba1\u7406\u5458\u6dfb\u52a0\u6f0f\u6d1e',
    '\u56fd\u5fae\u7f51\u7ad9\u7cfb\u7edf\u7ba1\u7406\u5458\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e',
    '\u56fe\u521b\u8f6f\u4ef6\u56fe\u4e66\u9986\u7ad9\u7fa4\u7ba1\u7406\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u591a\u6b3e\u9632\u706b\u5899\u8bbe\u5907\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u5927\u534e\u6444\u50cf\u5934\u540e\u95e8',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf classajax SQL\u6ce8\u5165',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf columncoun \u76ee\u5f55\u7a7f\u8d8a',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf enckey \u654f\u611f\u4fe1\u606f\u6cc4\u6f0f',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf export \u76ee\u5f55\u7a7f\u8d8a',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf getcount SQL\u6ce8\u5165',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf letterbox SQL\u6ce8\u5165',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf mailwrite_over \u76ee\u5f55\u7a7f\u8d8a',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf noontimelist SQL\u6ce8\u5165',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf opr_datacall SQL\u6ce8\u5165',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf out_userinfo \u654f\u611f\u4fe1\u606f\u6cc4\u6f0f',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf reg_2 \u76ee\u5f55\u7a7f\u8d8a',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf session \u6743\u9650\u7ed5\u8fc7',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf votingdown \u76ee\u5f55\u7a7f\u8d8a',
    '\u5927\u6c49\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf\u914d\u7f6e\u6587\u4ef6\u8bfb\u53d6',
    '\u5927\u6c49\u5728\u7ebf\u8bbf\u8c08\u7cfb\u7edf session \u6743\u9650\u7ed5\u8fc7',
    '\u5927\u6c49\u653f\u5e9c\u4fe1\u606f\u516c\u5f00\u7cfb\u7edf session \u6743\u9650\u7ed5\u8fc7\u6f0f\u6d1e',
    '\u5927\u6c49\u8bbf\u95ee\u7edf\u8ba1\u7cfb\u7edf opr_copycode SQL\u6ce8\u5165',
    '\u5927\u6c49\u8bbf\u95ee\u7edf\u8ba1\u7cfb\u7edf que_style_coltop SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u592a\u6781\u4e91\u8f6f\u653f\u52a1\u516c\u5f00\u76d1\u5bdf\u7cfb\u7edf bmtd SQL\u6ce8\u5165',
    '\u597d\u89c6\u901a\u89c6\u9891\u4f1a\u8bae\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u5b58\u5728\u98ce\u9669\u7684javascript\u5e93',
    '\u5b89\u5fbd\u9633\u5149\u5fc3\u5065 \u5fc3\u7406\u6d4b\u91cf\u5e73\u53f0 \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e',
    '\u5b89\u7f8e\u6570\u5b57 \u9152\u5e97\u5bbd\u5e26\u8fd0\u8425\u7cfb\u7edf\u5b58\u5728\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    '\u5b89\u8d22\u8f6f\u4ef6\u901a\u7528\u62a5\u9500\u7cfb\u7edf GetFile \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u5b89\u8d22\u8f6f\u4ef6\u901a\u7528\u62a5\u9500\u7cfb\u7edf GetFileContent \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u5b89\u8d22\u8f6f\u4ef6\u901a\u7528\u62a5\u9500\u7cfb\u7edf GetXMLList \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u5b89\u8d22\u8f6f\u4ef6\u901a\u7528\u62a5\u9500\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u5b9d\u5854 7.4.2 PHPMyAdmin\u672a\u6388\u6743\u8bbf\u95ee',
    '\u5e0c\u5c14OA faWenAction \u76ee\u5f55\u7a7f\u8d8a',
    '\u5e0c\u5c14OA vfs \u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
    '\u5e0c\u5c14\u534f\u540c\u529e\u516c\u7cfb\u7edf fawenaction \u76ee\u5f55\u7a7f\u8d8a',
    '\u5e1d\u53cbP2P\u501f\u8d37\u7cfb\u7edf areas SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u5e1d\u53cbP2P\u501f\u8d37\u7cfb\u7edf blacklist SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u5e1d\u53cbP2P\u501f\u8d37\u7cfb\u7edf getpwd SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u5e1d\u53cbP2P\u501f\u8d37\u7cfb\u7edf keywords SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u5e1d\u53cbP2P\u501f\u8d37\u7cfb\u7edf lates SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u5e1d\u53cbP2P\u501f\u8d37\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u5e1d\u53cbP2P\u501f\u8d37\u7cfb\u7edf\u7528\u6237\u767b\u9646\u5904SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u5e7f\u8baf\u901a\u5224\u65ad\u4efb\u610f\u6587\u4ef6\u5b58\u5728\u6f0f\u6d1e',
    '\u5fae\u64ce\u672a\u6388\u6743\u53ef\u56de\u663eSSRF',
    '\u5fae\u64ce\u672a\u6388\u6743\u65e0\u56de\u663eSSRF\u6f0f\u6d1e',
    '\u5fae\u8f6fExchange\u90ae\u4ef6SSRF\u6f0f\u6d1e',
    '\u601d\u79d1\u9632\u706b\u5899\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u624b\u673a\u53f7\u7801\u6cc4\u9732',
    '\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e',
    '\u65b9\u6b63\u7fd4\u5b87CMS\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u65f6\u5149\u52a8\u6001\u7f51\u7ad9\u5e73\u53f0\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u65f6\u5149\u52a8\u6001\u7f51\u7ad9\u5e73\u53f0\u76ee\u5f55\u4efb\u610f\u5199\u6587\u4ef6',
    '\u6613\u4f18CMS\u524d\u53f0\u8bbe\u7f6e\u7ba1\u7406\u5458SESSION\u6f0f\u6d1e',
    '\u6613\u601d\u4f01\u4e1a\u7f51\u7ad9\u7ba1\u7406\u7cfb\u7edf Cookie SQL \u6ce8\u5165\u6f0f\u6d1e',
    '\u6613\u60f3\u56e2\u8d2d\u7cfb\u7edf ajax.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6613\u60f3\u56e2\u8d2d\u7cfb\u7edf link.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6613\u60f3\u56e2\u8d2d\u7cfb\u7edf message.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6613\u60f3\u56e2\u8d2d\u7cfb\u7edf sms.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6613\u60f3\u56e2\u8d2d\u7cfb\u7edf user.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6613\u60f3\u56e2\u8d2d\u7cfb\u7edf vote.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6613\u7766\u7f51\u7edcimo\u4e91\u529e\u516c\u7cfb\u7edf read \u76ee\u5f55\u7a7f\u8d8a',
    '\u6613\u7766\u7f51\u7edcimo\u4e91\u529e\u516c\u7cfb\u7edfPHP\u4ee3\u7801\u6ce8\u5165\u6f0f\u6d1e',
    '\u6613\u7766\u7f51\u7edcimo\u4e91\u529e\u516c\u7cfb\u7edfcorpfile\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u6613\u7766\u7f51\u7edcimo\u4e91\u529e\u516c\u7cfb\u7edfget_file\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u6613\u7766\u7f51\u7edcimo\u4e91\u529e\u516c\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u6613\u9f99\u5929CMS database\u654f\u611f\u4fe1\u606f\u6cc4\u6f0f',
    '\u6613\u9f99\u5929CMS loadarea \u76ee\u5f55\u7a7f\u8d8a',
    '\u667a\u6167\u6821\u56ed\u7ba1\u7406\u7cfb\u7edf\u524d\u53f0\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u670d\u52a1\u5668\u8def\u5f84\u6cc4\u9732',
    '\u670d\u52a1\u7aef\u6a21\u677f\u6ce8\u5165\u6f0f\u6d1e',
    '\u670d\u52a1\u7aef\u8bf7\u6c42\u4f2a\u9020',
    '\u6781\u901a EWEBS \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u6781\u901a EWEBS \u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf catid_save.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf catid_user_save.php \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf custom_design.php \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf edittheme.php \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf edittheme1.php \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf edittheme2.php \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf getjwj.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf getsyscat.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf jg_city.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf province_city.php SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf set_border_color.php \u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    '\u6b27\u864e\u653f\u52a1\u7cfb\u7edf uploadPage.php \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u6b27\u864e\u7f51\u7ad9\u96c6\u6210\u7cfb\u7edf\u6570\u636e\u5e93\u914d\u7f6e\u6587\u4ef6\u6cc4\u9732',
    '\u6b63\u65b9\u6559\u52a1\u7ba1\u7406\u7cfb\u7edf WebService SQL \u6ce8\u5165',
    '\u6cdb\u5fae E-Cology cloudstore api \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c',
    '\u6cdb\u5fae E-Cology \u6570\u636e\u5e93\u914d\u7f6e\u4fe1\u606f\u6cc4\u6f0f',
    '\u6cdb\u5fae E-Office SQL \u6ce8\u5165\u6f0f\u6d1e',
    '\u6cdb\u5fae E-Office inc jquery \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u6cdb\u5fae E-Office officeserver \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u6cdb\u5fae E-Office officeserver \u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
    '\u6cdb\u5fae E-Office webservice upload  \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u6cdb\u5fae E-Office webservice \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u6cdb\u5fae E-Office webservice-json \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u6cdb\u5fae E-Office webservice-xml \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u6cdb\u5fae E-Office weibo uploadify \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u6cdb\u5fae E-Office \u6570\u636e\u5e93\u914d\u7f6e\u6587\u4ef6\u6cc4\u6f0f',
    '\u6cdb\u5faeOA workflowservice \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u6cdb\u5faeOA\u524d\u53f0\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20',
    '\u6cdb\u5faee-cology OA\u7cfb\u7edfWorkflowCenterTreeData\u63a5\u53e3\u5b58\u5728SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u6cdb\u5faeoa\u672a\u6388\u6743\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c',
    '\u6cdb\u5fae\u4e91\u6865\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u6d6a\u6f6e ECGAP image \u76ee\u5f55\u7a7f\u8d8a',
    '\u6d6a\u6f6eCluster Engine \u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    '\u6d6a\u6f6eECGAP broadcast SQL\u6ce8\u5165',
    '\u6d6a\u6f6eECGAP faqloading SQL\u6ce8\u5165',
    '\u6e90\u7801\u6cc4\u6f0f',
    '\u72ee\u5b50\u9c7cCMS SQL\u6ce8\u5165\u6f0f\u6d1e\u3002',
    '\u72ee\u5b50\u9c7c\u5546\u57ce\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u7528\u53cb codemorewidget SQL\u6ce8\u5165',
    '\u7528\u53cbA6 OA\u7ba1\u7406\u5458\u8d26\u53f7\u4fe1\u606f\u6cc4\u6f0f',
    '\u7528\u53cbA6 isignaturehtmlserver SQL\u6ce8\u5165',
    '\u7528\u53cbA6 menutest SQL\u6ce8\u5165',
    '\u7528\u53cbA6 messageviewer SQL\u6ce8\u5165',
    '\u7528\u53cbA6 userdata \u654f\u611f\u4fe1\u606f\u6cc4\u6f0f',
    '\u7528\u53cbCRM getemaildata \u76ee\u5f55\u7a7f\u8d8a',
    '\u7528\u53cbERP-NC \u76ee\u5f55\u904d\u5386\u6f0f\u6d1e',
    '\u7528\u53cbFE OA\u7ba1\u7406\u5458\u8d26\u53f7\u4fe1\u606f\u6cc4\u6f0f',
    '\u7528\u53cbFE grouptreexml SQL\u6ce8\u5165',
    '\u7528\u53cbFE proxyservletutil \u76ee\u5f55\u7a7f\u8d8a',
    '\u7528\u53cbFE schedule SQL\u6ce8\u5165',
    '\u7528\u53cbFE treexml SQL\u6ce8\u5165',
    '\u7528\u53cbGRP cm_info_content SQL\u6ce8\u5165',
    '\u7528\u53cbGRP cm_info_list SQL\u6ce8\u5165',
    '\u7528\u53cbGRP login SQL\u6ce8\u5165',
    '\u7528\u53cbGRP-U8 SQL \u6ce8\u5165\u6f0f\u6d1e',
    '\u7528\u53cbGRP\u7ba1\u7406\u5458\u8d26\u53f7\u4fe1\u606f\u6cc4\u6f0f',
    '\u7528\u53cbIUFO\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    '\u7528\u53cbNC BeanShell \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u7528\u53cbNC IUFO \u7528\u6237\u4fe1\u606f\u6cc4\u6f0f',
    '\u7528\u53cbNC XXE \u6f0f\u6d1e',
    '\u7528\u53cbNC ncfindweb \u76ee\u5f55\u7a7f\u8d8a',
    '\u7528\u53cbNC soapformat XXE\u6f0f\u6d1e',
    '\u7528\u53cbNC\u7cfb\u7edf\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e',
    '\u7528\u53cbNC\u7cfb\u7edf\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\uff08FileReceive\uff09',
    '\u7528\u53cbNC\u7cfb\u7edf\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\uff08monitor\uff09',
    '\u7528\u53cbU8 OA SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u7528\u53cbU8 OA\u7528\u6237\u4f1a\u8bdd\u4fe1\u606f\u6cc4\u6f0f',
    '\u7528\u53cbUAP soapformat XXE\u6f0f\u6d1e',
    '\u7528\u53cbnc\u7cfb\u7edf ELTextFile.load.d \u76ee\u5f55\u7a7f\u8d8a',
    '\u7535\u5b50\u90ae\u4ef6\u5730\u5740\u6cc4\u6f0f',
    '\u7535\u5b50\u90ae\u4ef6\u5730\u5740\u6cc4\u6f0f(\u5916\u57df)',
    '\u76ee\u5f55\u7a7f\u8d8a\u6f0f\u6d1e',
    '\u7834\u58f3\u6f0f\u6d1eShellshock',
    '\u7985\u9053\u524d\u53f0sql\u6ce8\u5165\u81f4getshell\u6f0f\u6d1e',
    '\u79d1\u4fe1\u90ae\u4ef6\u7cfb\u7edf sql \u6ce8\u5165\u6f0f\u6d1e',
    '\u79d1\u521b\u4e92\u8054CMS GRP contshow SQL\u6ce8\u5165',
    '\u79d1\u521b\u7ba1\u7406\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u79d1\u8fc8RAS SQL \u6ce8\u5165',
    '\u7ecf\u7eac\u4e2d\u5929\u5728\u7ebf\u8bbf\u8c08\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u7ef4\u76df\u667a\u80fd\u8def\u7531\u7ba1\u7406\u7cfb\u7edf\u7ba1\u7406\u5458\u5f31\u53e3\u4ee4',
    '\u7f51\u52a8\u7edf\u4e00\u901a\u4fe1\u5e73\u53f0(Active-UC) \u5f31\u5bc6\u7801',
    '\u7f51\u5eb7\u79d1\u6280\u4e0b\u4e00\u4ee3\u9632\u706b\u5899getDownloadStatus\u672a\u6388\u6743\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    '\u7f51\u5eb7\u79d1\u6280\u4e0b\u4e00\u4ee3\u9632\u706b\u5899\u672a\u6388\u6743\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c',
    '\u7f51\u7ad9\u7ba1\u7406\u9875\u9762\u5730\u5740\u6cc4\u9732',
    '\u811a\u672c\u6728\u9a6c',
    '\u817e\u72d0\u884c\u4e3a\u7ba1\u7406\u7cfb\u7edf\u767b\u5f55\u70b9SQL\u6ce8\u5165\u6f0f\u6d1e',
    '\u817e\u8fbe\u8def\u7531\u5668\u7ba1\u7406\u5458COOKIE\u4f2a\u9020\u767b\u5f55\u6f0f\u6d1e',
    '\u81f4\u8fdcOA Ajax\u8ba4\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e',
    '\u81f4\u8fdcOA webmail.do \u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u81f4\u8fdcOA\u62a5\u8868\u7ec4\u4ef6\u672a\u6388\u6743\u63d2\u4ef6\u5b89\u88c5\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u81f4\u8fdcOA\u7cfb\u7edf\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u81f4\u8fdcOA\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u82e5\u4f9d\u540e\u53f0\u7ba1\u7406\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u82e5\u4f9d\u7ba1\u7406\u7cfb\u7edf\u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    '\u84dd\u51ccEKP \u672a\u6388\u6743\u4efb\u610f\u7528\u6237\u5bc6\u7801\u4fee\u6539\u6f0f\u6d1e',
    '\u84dd\u51ccOA\u524d\u53f0\u5217\u76ee\u5f55\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6SSRF\u6f0f\u6d1e',
    '\u84dd\u6d77\u5353\u8d8a\u7ba1\u7406\u7cfb\u7edf\u9ed8\u8ba4\u7ba1\u7406\u5458\u53e3\u4ee4\u6f0f\u6d1e',
    '\u84dd\u6d77\u5353\u8d8a\u8ba1\u8d39\u7ba1\u7406\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e',
    '\u84dd\u6d77\u5353\u8d8a\u8ba1\u8d39\u7ba1\u7406\u7cfb\u7edf\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    '\u8868\u5355\u5f31\u53e3\u4ee4',
    '\u8bbf\u95ee\u63a7\u5236\u6587\u4ef6\u5185\u5bb9\u6cc4\u6f0f',
    '\u8de8\u7ad9\u811a\u672c\u653b\u51fb',
    '\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020',
    '\u8def\u5f84EL\u8868\u8fbe\u5f0f\u6ce8\u5165\u6f0f\u6d1e',
    '\u8eab\u4efd\u8bc1\u53f7\u7801\u6cc4\u9732',
    '\u8fc8\u666e\u5b89\u5168\u7f51\u5173ISG1000\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u901a\u5143\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf\u7528\u6237\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e',
    '\u901a\u8fbe OA \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u914d\u5408\u6587\u4ef6\u5305\u542b\u5bfc\u81f4\u7684\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e',
    '\u901a\u8fbeOA interface auth SQL\u6ce8\u5165',
    '\u901a\u8fbeOA logincheck SQL\u6ce8\u5165',
    '\u901a\u8fbeOA register turn SQL\u6ce8\u5165',
    '\u901a\u8fbeOA scoredate result SQL\u6ce8\u5165',
    '\u901a\u8fbeOA swfupload SQL\u6ce8\u5165',
    '\u901a\u8fbeOA use finger SQL\u6ce8\u5165',
    '\u901a\u8fbeOA video file \u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d',
    '\u901a\u8fbeOA wbUpload \u4efb\u610f\u6587\u4ef6\u4e0a\u4f20',
    '\u901a\u8fbeOA \u7528\u6237\u4fe1\u606f\u6cc4\u9732',
    '\u91d1\u548cC6\u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    '\u91d1\u548cOA C6\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u91d1\u5b87\u6052\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u91d1\u5c71v8\u7ec8\u7aef\u5b89\u5168\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u4e0b\u8f7d\u6f0f\u6d1e',
    '\u91d1\u65b9\u65f6\u4ee3\u7f51\u7ad9\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e',
    '\u91d1\u65b9\u65f6\u4ee3\u7f51\u7ad9\u7cfb\u7edf\u9644\u4ef6\u7ba1\u7406\u672a\u6388\u6743\u8bbf\u95ee',
    '\u91d1\u789fApusic\u5e94\u7528\u670d\u52a1\u5668\u7ba1\u7406\u754c\u9762\u5f31\u5bc6\u7801',
    '\u91d1\u8776 file_download \u76ee\u5f55\u7a7f\u8d8a',
    '\u91d1\u8776 get_connection_data SQL\u6ce8\u5165',
    '\u91d1\u8776 getclass SQL\u6ce8\u5165',
    '\u91d1\u8776 tree SQL\u6ce8\u5165',
    '\u91d1\u8776CAS web_inf \u654f\u611f\u4fe1\u606f\u6cc4\u6f0f',
    '\u91d1\u8776EAS\u7cfb\u7edf\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e',
    '\u91d1\u8776OA flow_performance SQL\u6ce8\u5165',
    '\u91d1\u8776OA login SQL\u6ce8\u5165',
    '\u9501\u7fa4\u7ba1\u7406\u7cfb\u7edf\u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    '\u9510\u6377RG-UAC\u5bc6\u7801\u54c8\u5e0c\u6cc4\u6f0f\u6f0f\u6d1e',
    '\u9510\u6377RG-UAC\u654f\u611f\u4fe1\u606f\uff08\u5bc6\u7801\u54c8\u5e0c\uff09\u6cc4\u6f0f\u6f0f\u6d1e',
    '\u9510\u6377\u4e91\u8bfe\u5802\u4e3b\u673a\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e',
    '\u9510\u6377\u7f51\u7edcEweb\u8ba4\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e',
    '\u9510\u6377\u7f51\u7edcEweb\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
    '\u9510\u6377\u7f51\u7edcSmartWeb\u7ba1\u7406\u7cfb\u7edf\u9ed8\u8ba4\u51ed\u8bc1\u6f0f\u6d1e',
    '\u9519\u8bef\u9875\u9762Web\u5e94\u7528\u670d\u52a1\u5668\u7248\u672c\u6cc4\u9732',
    '\u9519\u8bef\u9875\u9762\u670d\u52a1\u5668\u8def\u5f84\u6cc4\u9732',
    '\u963f\u91cc\u5df4\u5df4Nacos\u8ba4\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e',
    '\u963f\u91cc\u5df4\u5df4Nacos\u9ed8\u8ba4\u53e3\u4ee4\u6f0f\u6d1e',
    '\u9886\u7fd4\u653f\u5e9c\u95e8\u6237\u5b50\u7ad9\u5e94\u7528\u5e73\u53f0 keyword XSS\u6f0f\u6d1e',
    '\u9886\u7fd4\u653f\u5e9c\u95e8\u6237\u5b50\u7ad9\u5e94\u7528\u5e73\u53f0XSS\u6f0f\u6d1e',
    '\u98ce\u8baf Dotnet Cms City_ajax.aspx\u9875\u9762 SQL \u6ce8\u5165\u6f0f\u6d1e',
    '\u9f50\u6cbb\u5821\u5792\u673a\u672a\u6388\u6743\u8fdc\u7a0b\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e',
  ],
  weakness_params: [
    '360_tianqing_ccid_sql_injection',
    '74cms_assign_resume_tpl_rce',
    'D_Link_password_disclosure',
    'ID_number_disclosure',
    'ProFTPD_rce',
    'a3_webvul',
    'access_database_found',
    'acsoft_eol_arbitrary_file_download',
    'acsoft_eol_getfile_arbitrary_file_read',
    'acsoft_eol_getfilecontent_arbitrary_file_read',
    'acsoft_eol_getxmllist_arbitrary_file_read',
    'active_uc_weak_password',
    'admin_page',
    'adobe_xml_injection',
    'agrij_finance_arbitrary_file_download',
    'agrij_finance_arbitrary_file_upload',
    'agrij_finance_attach_sql_injection',
    'alibaba_nacos_auth_bypass',
    'alibaba_nacos_default_password',
    'alibaba_nacos_derby_endpoint_auth_bypass_cve_2021_29442',
    'allegro_rompager_misfortune_cookie',
    'anymacromail_loginuser_directory_traversal',
    'apache_apisix_security_misconfiguration',
    'apache_axis2_information_disclosure',
    'apache_axis2_local_file_inclusion',
    'apache_axis2_services_list',
    'apache_axis2_weak_passwd',
    'apache_druid_javascript_enabled_bypass_rce',
    'apache_expect_header_injection',
    'apache_flink_directory_traversal',
    'apache_flink_unauth_rce',
    'apache_flink_upload_path_traversal',
    'apache_geronimo_default_administrative_credentials',
    'apache_httponly_cookie_disclosure',
    'apache_info',
    'apache_jetspeed_unauthorized_access',
    'apache_kylin_command_injection',
    'apache_mod_negotiation_filename_bruteforcing',
    'apache_nifi_api_rce',
    'apache_ofbiz_rce_cve20209496',
    'apache_ofbiz_rmi_rce_cve_2021_26295',
    'apache_ofbiz_xxe_injection',
    'apache_proxy_connect_enable',
    'apache_roller_ognl_injection',
    'apache_running_as_proxy',
    'apache_shardingshpere_rce',
    'apache_shiro_java_deserialization_rce',
    'apache_skywalking_sql_injection',
    'apache_solr_arbitrary_file_read',
    'apache_solr_arbitrary_file_read_cve_2017_3163',
    'apache_solr_cmd_exec',
    'apache_solr_exposed',
    'apache_solr_rce',
    'apache_solr_ssrf_cve_2021_27905',
    'apache_solr_xxe',
    'apache_solr_xxe_cve_2018_1308',
    'apache_status',
    'apache_tomcat_cve_2020_1938',
    'apache_tomcat_default_administrative_credentials',
    'apache_tomcat_examples_vuln',
    'apache_tomcat_hello_jsp_xss',
    'apache_tomcat_jk_connector_path_traversal',
    'apache_tomcat_rce',
    'apache_tomcat_sample_files',
    'apache_unomi_rce',
    'apc',
    'apereo_cas_4_1_7_rce',
    'application_error_message',
    'archive_file',
    'aspcms_database_information_disclosure',
    'aspnet_debug_enabled',
    'aspnet_path_disclosure',
    'aspnet_trace_enabled',
    'avcon_arbitrary_file_download',
    'avcon_arbitrary_file_upload',
    'avcon_webservice_information_disclosure',
    'b2bbuilder_ajax_back_end_sql_injection',
    'b2bbuilder_x_forwarded_for_sql_injection',
    'backup_file',
    'bash_history_information_disclosure',
    'bash_rce',
    'bashrc_information_disclosure',
    'basic_cors_misconfiguration',
    'bazaar_repository',
    'bjjfsd_arbitrary_file_upload',
    'bjjfsd_attachment_management_unauthorized_access',
    'broadvision_iptv_file_upload',
    'bt_panel_phpmyadmin_bypass',
    'caitonge3_webupload_arbitrary_file_upload',
    'cctrlcms_contshow_sql_injection',
    'cicro_cms_arbitrary_file_download',
    'cicro_cms_directory_write',
    'cisco_asa_arbitrary_file_read_cve_2020_3452',
    'clickjacking_x_frame_options',
    'clientaccesspolicy_xml',
    'cltphp_pre_auth_upload',
    'cms4j_log_information_disclosure',
    'cmseasy_cut_image_rce',
    'code_execution',
    'coldfusion_amf_deserialization_rce',
    'coldfusion_ckeditor_file_upload',
    'coldfusion_deserialization_rce',
    'coldfusion_information_disclosure',
    'coldfusion_path_disclosure',
    'coldfusion_unspecified_directory_traversal',
    'coldfusion_v8_file_upload',
    'coldfusion_v9_logon_bypass',
    'confluence_rce_cve20193396',
    'cookie_without_httponly',
    'core_dump_check',
    'coremail_config_file_disclosure',
    'couchdb_administrator_add',
    'couchdb_rce',
    'couchdb_unauthorized_access',
    'creatorcms_arbitrary_file_download',
    'crlf_injection',
    'crossdomain_xml',
    'csrf',
    'cvs_repository',
    'cxcms_resource_directory_traversal',
    'dahua_backdoor_detect',
    'database_backup_file',
    'dedecms_advancedsearch_sql_injection',
    'dedecms_ajax_membergroup_sql_injection',
    'dedecms_carbuyaction_file_inclusion',
    'dedecms_config_xss',
    'dedecms_dedesql_class_sql_injection',
    'dedecms_download_redirect',
    'dedecms_feedback_js_sql_injection',
    'dedecms_global_inc_sql_injection',
    'dedecms_index_php_bak_sec_bypass',
    'dedecms_information_disclosure_cve_2018_6910',
    'dedecms_infosearch_sql_injection',
    'dedecms_mysql_error_trace_information_disclosure',
    'dedecms_recommend_sql_injection',
    'dedecms_resetpassword_pwd_reset',
    'dedecms_search_sql_injection',
    'dedecms_shopcar_class_backdoor',
    'dedecms_swfupload_swf_xss',
    'dedecms_tag_sql_injection',
    'dedecms_wap_sql_injection',
    'dedeeims_common_inc_login_bypass',
    'destoon_spread_sql_injection',
    'directory_listing',
    'directory_traversal',
    'discuz_ml_code_injection',
    'django_admin_weak_password',
    'dlink_multi_router_information_disclosure',
    'dlink_rce',
    'docker_remote_api_unauthorized_access',
    'draytek_vigor_rce_cve20208515',
    'dreamweaver_scripts',
    'drupal8_config_export_download',
    'drupal8_sa_core_rce',
    'drupal_register_code_execution',
    'dyp2p_arbitrary_file_read',
    'dyp2p_areas_sql_injection',
    'dyp2p_blacklist_sql_injection',
    'dyp2p_getpwd_sql_injection',
    'dyp2p_keywords_sql_injection',
    'dyp2p_lates_sql_injection',
    'dyp2p_user_login_sql_injection',
    'easethink_ajax_sql_injection',
    'easethink_link_sql_injection',
    'easethink_message_sql_injection',
    'easethink_sms_sql_injection',
    'easethink_user_sql_injection',
    'easethink_vote_sql_injection',
    'ecology_oa_getdata_sql_injection',
    'ecology_oa_sqli_cnvd_2019_34241',
    'ecology_oa_upload_operation_rce',
    'ecology_rce',
    'ecshop_4_1_sql_injection',
    'ecshop_delete_cart_goods_sql_injection',
    'ecshop_user_code_execution',
    'egoweb_sql_injection',
    'eir_moderm_information_disclosure',
    'eis_sql_injection',
    'elasticsearch_ece_7_13_3_information_disclosure',
    'elasticsearch_groovy_rce',
    'elasticsearch_plugin_directory_traversal',
    'elasticsearch_rest_rce',
    'elasticsearch_snapshot_directory_traversal',
    'elmah_information_disclosure',
    'elongtiancms_database_information_disclosure',
    'elongtiancms_loadarea_directory_traversal',
    'email_address_disclosure',
    'email_address_disclosure_out',
    'error_page_path_disclosure',
    'error_page_web_server_version_disclosure',
    'espcms_cookie_sql_injection',
    'etcd_rest_api_unauthorized_access',
    'eternalblue_backdoor_detect',
    'eternalblue_windows_smb_rce',
    'exim_cve_2019_10149',
    'express_handlebars_arbitrary_file_read_cve_2021_32820',
    'expression_language_injection',
    'eyou_php_moni_detail_rce',
    'eyoucms_set_admin_session',
    'f5_big_ip_icontrol_rest_rce_cve_2021_22986',
    'f5_bigip_remote_code_execution',
    'fantastico_fileslist',
    'fastjson_deserialization_vul',
    'fckeditor_arbitrary_file_upload',
    'fckeditor_spellchecker_xss',
    'file_inclusion',
    'file_upload',
    'finecms_ajaxswfupload_file_upload',
    'finecms_api_ajaxupload_file_upload',
    'finecms_api_code_execution',
    'finecms_api_sql_injection',
    'finecms_api_swfupload_file_upload',
    'finecms_api_user_information_disclosure',
    'flash_allowscriptaccess',
    'flask_debug_mode',
    'forgerock_openam_pre_auth_rce',
    'founder_cms_code_execution',
    'frontpage_extensions_enabled',
    'frontpage_information',
    'frontpage_pwd_file_available',
    'fsmcms_jspdownload_directory_traversal',
    'fsmcms_replydetail_sql_injection',
    'ftp_anonymous',
    'ftp_weak_password',
    'gateone_arbitrary_file_read',
    'gateone_ws_rce',
    'gevercms_arbitrary_file_download',
    'git_repository',
    'gitlab_api_ci_lint_ssrf_cve_2021_22214',
    'glassfish_auth_bypass',
    'glassfish_utf8_directory_traversal',
    'glassfish_weak_credentials',
    'gogs_gitea_command_execution',
    'gpcsoft_egp_imgurl1_directory_traversal',
    'gpcsoft_egp_sysconfig_jsp_backdoor',
    'gpcsoft_egp_usersecuritycontroller_sql_injection',
    'gpower_users_information_disclosure',
    'guangxuntong_arbitrary_file_existence',
    'gwcms_admin_information_disclosure',
    'gwcms_gov_administrator_add',
    'gwcms_image_cut_xss',
    'gwcms_list_ask_sql_injection',
    'gwcms_list_content_sql_injection',
    'gwcms_list_picture_sql_injection',
    'gwcms_member_verify_sql_injection',
    'gwcms_opinion_lettersearch_xss',
    'gwcms_uploader_list_sql_injection',
    'h3c_imc_remote_command_execute',
    'h3c_secparh_get_detail_view_any_user_login',
    'hadoop_cluster_web_interface',
    'hanweb_jcms_readxml_config_file_read',
    'hanweb_jcms_verifycode_session_bypass',
    'hanweb_vc_opr_copycode_sql_injection',
    'hanweb_vc_que_style_coltop_sql_injection',
    'hanweb_vipchat_verifycode_session_bypass',
    'hanweb_xxgk_session_permission_bypass',
    'haoshitong_arbitrary_file_download',
    'harbor_administrator_add_cve201916097',
    'heartbleed_bug',
    'heeroa_fawenaction_directory_traversal',
    'hikvision_arbitrary_file_download',
    'himail_inputfile_directory_traversal',
    'horde_webemail_barcode_directory_traversal',
    'house5_allid_sql_injection',
    'htaccess_file_readable',
    'html_form_weak_credentials',
    'http_header_hostname_attack',
    'http_proxy_header_injection',
    'http_transmission',
    'http_weak_password',
    'huawei_home_gateway_hg659_arbitrary_file_read',
    'huayu_reporter_rce',
    'huge_bszn_sql_injection',
    'icewarp_webmail_basic_rce',
    'icomexe_ras_sql_injection',
    'igenus_mail_code_execution',
    'igenus_mail_directory_traversal',
    'iis_global_asa',
    'iis_httpsys_range_overflow',
    'iis_internal_ip_address_disclosure',
    'iis_service_cnf',
    'iis_tilde_directory_enumeration',
    'iis_webdav_rce',
    'imo_loginbindkd_php_code_injection',
    'imo_oa_corpfile_code_execution',
    'imo_oa_get_file_code_execution',
    'imo_oa_read_directory_traversal',
    'imo_oa_write_arbitrary_file_upload',
    'inspur_cluster_engine_rce',
    'inspur_ecgap_broadcast_sql_injection',
    'inspur_ecgap_faqloading_sql_injection',
    'inspur_image_directory_traversal',
    'internal_ip_address_disclosure',
    'ioncube_loader_wizard_directory_traversal',
    'ips_community_suite_code_injection',
    'java_debug_wire_protocol_rce',
    'java_rmi_deserialization_rce',
    'jboss_as_invoker_deserialization_rce',
    'jboss_bshdeployer_mbean',
    'jboss_httpadapter_jmxinvokerservlet',
    'jboss_java_deserialization_rce',
    'jboss_jmx_console_file_upload',
    'jboss_jmx_console_weak_password',
    'jboss_jmx_management_console_access',
    'jboss_seam_remoting_information_disclosure',
    'jboss_seam_remoting_xxe',
    'jboss_server_mbean',
    'jboss_serverinfo_mbean',
    'jboss_status_servlet_information_leak',
    'jboss_web_console_access',
    'jboss_web_console_jmx_invoker',
    'jboss_web_service_console_access',
    'jcms_classajax_sql_injection',
    'jcms_columncoun_directory_traversal',
    'jcms_enckey_information_disclosure',
    'jcms_export_directory_traversal',
    'jcms_getcount_sql_injection',
    'jcms_letterbox_sql_injection',
    'jcms_mailwrite_over_directory_traversal',
    'jcms_noontimelist_sql_injection',
    'jcms_opr_datacall_sql_injection',
    'jcms_out_userinfo_information_disclosure',
    'jcms_reg_2_directory_traversal',
    'jcms_voting_down_directory_traversal',
    'jeecms_redirect_rce',
    'jeesite_userfiles_arbitrary_file_download',
    'jeewms_showordownbyurl_arbitrary_file_read',
    'jellyfin_arbitrary_file_read',
    'jenkins_cli_deserialization_rce',
    'jenkins_dashboard_unauthorized_access',
    'jenkins_java_deserialization_rce',
    'jenkins_plugin_arbitrary_file_read',
    'jetbrains_idea_project_directory',
    'jetty_information_disclosure_cve_2021_28164',
    'jetty_shared_buffer_information_disclosure',
    'jetty_web_xml_file_read_cve_2021_34229',
    'jinhe_oa_c6_default_password',
    'jinhe_oa_c6_download_jsp_arbitrary_file_download',
    'jira_information_disclosure_cve20198449',
    'jira_ssrf',
    'jira_template_injection_rce',
    'jira_user_enumeration_cve202014181',
    'jiuqigms_arbitrary_file_download',
    'joomla_com_jsjobs_sql_inj',
    'joomla_core_com_fields_sql_injection',
    'joomla_history_sqli',
    'joomla_privilege_escalation',
    'joomla_session_code_execution',
    'joomla_session_deserialization_rce',
    'jumpserver_pre_auth_rce',
    'kesioncms_plus_ajaxs_sql_injection',
    'kindeditor_file_upload',
    'kingdee_apusic_weak_password',
    'kingdee_cas_web_inf_information_disclosure',
    'kingdee_eas_directory_traversal',
    'kingdee_file_download_directory_traversal',
    'kingdee_flow_performance_sql_injecton',
    'kingdee_get_connection_data_sql_injection',
    'kingdee_getclass_sql_injection',
    'kingdee_login_sql_injection',
    'kingdee_tree_sql_injection',
    'kingsoft_v8_terminal_security_system_arbitrary_file_download',
    'kong_gateway_admin_api_security_misconfiguration_cve202011710',
    'konga_default_jwt_key_login',
    'kxmail_sql_injection',
    'kyan_password_disclosure',
    'kyan_rce_vulnerabitily',
    'landray_file_list_read_ssrf',
    'landray_unauthorized_arbitrary_user_password_modify',
    'lanproxy_arbitrary_file_read',
    'laravel_debug_mode_rce',
    'ldap_injection',
    'liferay_portal_ce_unserialize_rce',
    'lighttpd_sql_injection_path_traversal',
    'lingxiangportal_search_keyword_xss',
    'lingxiangportal_search_xss',
    'linux_baseline_check',
    'live800_chathourssta_sql_injection',
    'live800_chatopsta_sql_injection',
    'live800_chattopicsta_sql_injection',
    'live800_chaturlsta_sql_injection',
    'live800_downlog_arbitrary_file_download',
    'live800_referrersta_sql_injection',
    'lock_group_management_system_default_password',
    'lotus_domino_crlf_xss',
    'mallbuilder_district_sql_injection',
    'mallbuilder_help_sql_injection',
    'mallbuilder_modifier_config_backdoor',
    'mallbuilder_shop_sql_injection',
    'mallbuilder_sms_sql_injection',
    'memcache_unauthorized_access',
    'memcached_integer_overflow',
    'mercurial_repository',
    'message_solution_unserialize_rce',
    'message_solution_upload_file_cnvd_2021_08441',
    'messagesolution_eea_information_disclosure',
    'metinfo_about_index_local_file_inclusion',
    'metinfo_dataoptimize_html_local_file_inclusion',
    'metinfo_member_login_sql_injection',
    'metinfo_rewrite_url_sql_injection',
    'metinfo_thumb_arbitrary_file_read',
    'microsoft_exchange_proxy_shell_cve_2021_34773',
    'microsoft_exchange_ssrf_cve_2021_26855',
    'microsoft_sharepoint_scriptresx_xss',
    'mini_httpd_arbitrary_file_read',
    'minify_arbitrary_file_read',
    'minio_pre_auth_webrpc_ssrf',
    'minyoocms_directory_traversal',
    'mongodb_http_status_interface',
    'mongodb_unauthorized_access',
    'mpsec_isg1000_arbitrary_file_download',
    'mssql_weak_password',
    'multi_firewall_devices_arbitrary_file_download',
    'mysql_weak_password',
    'nagiosxi_commandline_sql_injection',
    'nagiosxi_helpedit_sql_injection',
    'nagiosxi_info_sql_injection',
    'nagiosxi_logbook_sql_injection',
    'nagiosxi_login_bypass',
    'nagiosxi_magpie_debug_rce',
    'nagiosxi_menuaccess_sql_injection',
    'nagiosxi_os_commanding',
    'nagiosxi_sql_injection',
    'natshell_billing_manager_system_debug_rce',
    'natshell_billing_manager_system_file_read',
    'nerc_edu_arbitrary_file_upload',
    'neten_tsec_ns_ngfw_getdownloadstatus_rce',
    'neten_tsec_ns_ngfw_rce',
    'netgear_r7000_command_execution',
    'nette_pre_auth_rce',
    'nexus_repository_manager_3_pre_auth_rce',
    'nexusdb_path_traversal_cve_2020_24571',
    'nfs_unauthorized_access',
    'nginx_null_bytes_rce',
    'niushop_arbitrary_file_upload',
    'niushop_v4_1_0_api_store_info_sql_injection',
    'niushop_v4_1_0_upvideo_arbitrary_file_upload',
    'node_red_ui_base_arbitrary_file_read',
    'nongyou_itemsecond_sql_injection',
    'nongyou_itemsixth_sql_injection',
    'nongyou_tname_sql_injection',
    'nongyou_zhengwu_file_upload',
    'npointhost_mdb_download',
    'nuxeo_login_el_rce',
    'oa_vfs_directory_traversal',
    'ohocms_catid_save_sql_injection',
    'ohocms_catid_user_save_code_execution',
    'ohocms_custom_design_code_execution',
    'ohocms_db_config_file_disclosure',
    'ohocms_edittheme1_code_execution',
    'ohocms_edittheme2_code_execution',
    'ohocms_edittheme_code_execution',
    'ohocms_getjwj_sql_injection',
    'ohocms_getsyscat_sql_injection',
    'ohocms_jg_city_sql_injection',
    'ohocms_province_city_sql_injection',
    'ohocms_set_border_color_command_execution',
    'ohocms_uploadpage_arbitrary_file_upload',
    'open5gs_default_password',
    'openmrs_deserialization_vul_cve201819276',
    'opensns_weibo_sharebox_rce',
    'openssl_v2_drown',
    'openssl_v3_poodle',
    'oracle_application_logs',
    'oracle_jsf2_path_traversal',
    'oracle_reports_database_disclosure',
    'oracle_reports_directory_traversal',
    'oracle_reports_file_upload',
    'oracle_weak_password',
    'ourphp_filebox_arbitrary_file_upload',
    'ourphp_validation_safecode_disclosure',
    'pageadmin_database_information_disclosure',
    'panabit_code_execution',
    'parallels_plesk_sitebuilder_audit',
    'pbootcms_remote_code_execution',
    'perfolder_expression_injection',
    'phone_number_disclosure',
    'php_cgi_rce',
    'php_code_injection',
    'php_fastcgi_rce',
    'php_transfer_encoding_xss',
    'phpcms_2008_type_code_execution',
    'phpcms_cachefile_directory_traversal',
    'phpcms_register_arbitrary_file_upload',
    'phpcms_v9_6_arbitrary_file_download',
    'phpcms_wap_sql_injection',
    'phpinfo',
    'phpliteadmin_default_password',
    'phpmoadmin_remote_code_execution',
    'phpoa_upload_file',
    'phpstudy_backdoor',
    'piw_cms_sql_injection',
    'plesk_agent_sql_injection',
    'plesk_sso_xxe',
    'plone_zope_rce',
    'pop3_weak_password',
    'probe_file',
    'pulse_secure_ssl_vpn_file_read_cve_2019_11510',
    'qilai_oa_sql_injection',
    'qizhi_shterm_preauth_rce',
    'railo_admin_xss',
    'rails_xml_yaml_rce',
    'ras_full_path_disclosure',
    'rdp_weak_password',
    'readme_files',
    'redis_unauthorized_access',
    'resin_doc_directory_traversal',
    'resin_windows_directory_listing',
    'resoftcms_technological_sql_injection',
    'rsync_ping',
    'rubyonrails_actionpack_arbitrary_file_existence',
    'rubyonrails_database_yml',
    'rubyonrails_directory_traversal',
    'ruijie_cloud_classroom_host_directory_traversal',
    'ruijie_network_eweb_auth_bypass',
    'ruijie_network_eweb_rce',
    'ruijie_rg_information_disclosure',
    'ruijie_rg_uac_password_hash_leak',
    'ruijie_smartweb_default_credential',
    'saltstack_rce',
    'saltstack_rce_cve202016846',
    'sap_netweaver_config_servlet_exec',
    'schneider_hardcoded_password',
    'seeyon_oa_ajax_auth_bypass',
    'seeyon_oa_remote_code_execution',
    'seeyon_oa_webmail_do_download_file',
    'sensitive_dirs',
    'sensitive_files',
    'server_path_disclosure',
    'server_side_template_injection',
    'sftp_credentials_exposure',
    'shiziyu_cms_arbitrary_file_upload',
    'showdoc_pre_auth_upload',
    'sitefactory_assets_directory_traversal',
    'siteserver_cms_download_getshell',
    'skywcm_check_sql_injection',
    'smartbi_default_password',
    'smartbi_pre_auth_sql_injection',
    'smb_weak_password',
    'snoop_servlet_information_disclosure',
    'solarwinds_orion_local_file_disclosure',
    'solr_dataimport_rce_cve_2019_0193',
    'sonarqube_unauth_information_disclosure',
    'sonicwall_ssl_vpn_rce',
    'source_code_disclosure',
    'spark_rest_api_code_execution',
    'spring_boot_actuator_information_disclosure',
    'spring_boot_jolokia_xxe',
    'spring_cloud_netflix_full_read_ssrf_cve_2020_5412',
    'spring_cloud_snake_yaml_rce',
    'spring_data_rce_cve20181273',
    'spring_reflected_file_download',
    'springboot_realm_jndi_rce',
    'sql_injection',
    'sql_injection_cookie',
    'sql_injection_referer',
    'sql_injection_ua',
    'sqlite_database_found',
    'sqoa_fawenaction_directory_traversal',
    'squirrellyjs_template_engine_rce_cve_2021_32819',
    'ssh_weak_password',
    'ssl_ccs_injection',
    'ssrf',
    'struts2_devmode',
    'struts2_devmode_rce',
    'struts2_rce_s2_005',
    'struts2_rce_s2_007',
    'struts2_rce_s2_009',
    'struts2_rce_s2_013',
    'struts2_rce_s2_014',
    'struts2_rce_s2_015',
    'struts2_rce_s2_016',
    'struts2_rce_s2_017',
    'struts2_rce_s2_019',
    'struts2_rce_s2_020',
    'struts2_rce_s2_021',
    'struts2_rce_s2_032',
    'struts2_rce_s2_033',
    'struts2_rce_s2_037',
    'struts2_rce_s2_045',
    'struts2_rce_s2_046',
    'struts2_rce_s2_048',
    'struts2_rce_s2_052',
    'struts2_rce_s2_053',
    'struts2_rce_s2_057',
    'struts2_rce_s2_059',
    'struts2_xss_s2_006',
    'struts_errorpage_xss',
    'svn_repository',
    'sybase_weak_password',
    'telnet_weak_password',
    'tenda_route_admin_login_with_fake_cookie',
    'tenhot_tos_login_sql_injection',
    'terramaster_tos_pre_auth_rce',
    'test_files',
    'thinkadmin_arbitrary_file_read',
    'thinkadmin_v6_unserialize_rce',
    'thinkcmfx_fetch_rce',
    'thinkphp6_file_create',
    'thinkphp_controller_rce',
    'thinkphp_method_rce',
    'tomcat_status_page',
    'tongdaoa_arbitrary_file_upload_file_inclusion_rce',
    'tongdaoa_arbitrary_login',
    'tongdaoa_interface_auth_sql_injection',
    'tongdaoa_logincheck_sql_injection',
    'tongdaoa_register_turn_sql_injection',
    'tongdaoa_scoredate_result_sql_injection',
    'tongdaoa_swfupload_sql_injection',
    'tongdaoa_unauthorized_access',
    'tongdaoa_use_finger_sql_injection',
    'tongdaoa_user_information_disclosure',
    'tongdaoa_video_file_arbitrary_file_download',
    'tongdaoa_wbupload_arbitrary_file_upload',
    'tornado_debug_mode',
    'trojan_scripts',
    'trs_inforadar_information_disclosure',
    'trs_was5_arbitrary_code_execution',
    'trs_was5_arbitrary_file_download',
    'trs_was5_config_file_read',
    'trs_was5_outline_arbitrary_code_execution',
    'trsid_env_information_disclosure',
    'trswcm_govfileuploader_directory_write',
    'trswcm_importdocuments_xxe',
    'trswcm_infoview_infomation_disclosure',
    'trswcm_infoview_login_bypass',
    'trswcm_pre_directory_traversal',
    'turbo_mail_frontend_sql_injection',
    'turbo_mail_login_with_any_account',
    'tykycms_bmtd_sql_injection',
    'typecho_install_deserialize_rce',
    'typecho_ssrf',
    'ueditor_asp_net_upload_shell',
    'uniportal_displayimg_directory_traversal',
    'uniportal_pollproblem_sql_injection',
    'uniportal_showsheets_sql_injection',
    'unprotected_phpmyadmin_interface',
    'url_redirection',
    'v2tech_conf_bulletinaction_sql_injection',
    'v2tech_conf_downloadaction_directory_traversal',
    'vBulletin_sql_injection_cve_2020_12720',
    'vange_searchkey_sql_injection',
    'vbulletin_ajax_api_hook_decodearguments_rce',
    'vbulletin_forumrunner_request_sql_injection',
    'vbulletin_pre_auth_rce',
    'vesystem_vengd_upload_file_rce',
    'vmware_directory_traversal',
    'vmware_vcenter_file_read',
    'vmware_vcenter_uploadova_rce',
    'vmware_vcenter_vsan_rce',
    'vmware_vrealize_operations_manager_ssrf_cve_2021_21975',
    'vnc_weak_password',
    'voipmonitor_rce_cve_2021_30461',
    'vuln_javascript_lib',
    'wanhu_oa_xfire_xxe',
    'we7_api_unauthorized_blind_ssrf',
    'we7_cms_download_directory_traversal',
    'we7_cms_interface_access',
    'we7_utility_wxcode_image_unauthorized_ssrf',
    'weaver_e-bridge_file_read',
    'weaver_e-cology_beanshell_rce',
    'weaver_e-cology_cloudstore_api_rce',
    'weaver_e-cology_mobile_database_config_disclosure',
    'weaver_e-cology_workflowservicexml_rce',
    'weaver_eoffice_database_config_disclosure',
    'weaver_eoffice_flowdo_sql_injection',
    'weaver_eoffice_inc_jquery_file_upload',
    'weaver_eoffice_officeserver_directory_traversal',
    'weaver_eoffice_officeserver_file_upload',
    'weaver_eoffice_webservice_file_upload',
    'weaver_eoffice_webservice_json_file_upload',
    'weaver_eoffice_webservice_upload_file_upload',
    'weaver_eoffice_webservice_xml_file_upload',
    'weaver_eoffice_weibo_lazyuploadify_file_upload',
    'weaver_eoffice_weibo_uploadify_file_upload',
    'web_server_default_welcome_page',
    'web_xml_disclosure',
    'webbuilder_main_directory_traversal',
    'webdav_directory_listing',
    'webdav_enabled',
    'webdav_put',
    'webdav_shell',
    'weblogic_deserialization_rce_cve20160638',
    'weblogic_deserialization_rce_cve20163510',
    'weblogic_deserialization_rce_cve20173248',
    'weblogic_deserialization_rce_cve20182628',
    'weblogic_deserialization_rce_cve20182893',
    'weblogic_deserialization_rce_cve20183191',
    'weblogic_deserialization_rce_cve20183245',
    'weblogic_deserialization_rce_cve20192725',
    'weblogic_deserialization_rce_cve20192729',
    'weblogic_deserialization_rce_cve_2020_2555',
    'weblogic_file_upload_cve_2018_2894',
    'weblogic_java_deserialization_rce',
    'weblogic_rce_cve202014882',
    'weblogic_uddiexplorer_ssrf',
    'weblogic_utc_arbitrary_file_upload',
    'weblogic_weak_credentials',
    'weblogic_wls_wsat_rce',
    'weblogic_xxe_cve20192888',
    'webmin_password_change_cgi_rce',
    'webpack_source_map',
    'webrick_directory_traversal',
    'websphere_java_deserialization_rce',
    'westarcms_bgxz_bg_sql_injection',
    'whir_download_ftp_directory_traversal',
    'whir_download_netdisk_directory_traversal',
    'whir_downloadhttp_directory_traversal',
    'whir_ezeip_4_0_hit_sql_injection',
    'whir_ezeip_5_0_productlist_aspx_sql_injection',
    'whir_graphreportaction_sql_injection',
    'whir_informationmanager_download_directory_traversal',
    'wordpress_core_4_6_rce',
    'wordpress_full_path_disclosure',
    'wordpress_mailpress_code_execution',
    'wordpress_mediaelement_xss',
    'wordpress_pingback_ddos',
    'wordpress_plugin_wp_miniaudioplayer_directory_traversal',
    'wordpress_plugin_wp_mobile_edition_directory_traversal',
    'wordpress_rest_api_content_injection',
    'wordpress_robotcpa_directory_traversal',
    'wordpress_social_warfare_rce',
    'wordpress_the_plus_addons_for_elementor_bypass_auth',
    'wordpress_theme_backdoor',
    'wordpress_woocommerce_sql_injection',
    'ws_ftp_ini_file',
    'x_forwarded_for',
    'xenmobile_server_directory_traversal',
    'xml_external_entity_injection',
    'xpath_injection',
    'xss',
    'xss_cookie',
    'xss_referer',
    'xss_ua',
    'xss_uri',
    'xxl_job_admin_default_password',
    'xxl_job_admin_unserialize_rce',
    'xxl_job_executor_rce',
    'yapi_authentication_user_mock_rce',
    'yongyou_erp_nc_directory_traversal',
    'yongyou_nc_beanshell_rce',
    'yongyou_u8_oa_sql_injection',
    'yonyou_codemorewidget_sql_injection',
    'yonyou_nc_xxe_vulnerability',
    'yonyoua6_createmysql_information_disclosure',
    'yonyoua6_isignaturehtmlserver_sql_injection',
    'yonyoua6_menutest_sql_injection',
    'yonyoua6_messageviewer_sql_injection',
    'yonyoua6_userdata_information_disclosure',
    'yonyoucrm_getemaildata_directory_traversal',
    'yonyoufe_grouptreexml_sql_injection',
    'yonyoufe_proxyservletutil_direcotory_traversal',
    'yonyoufe_schedule_sql_injection',
    'yonyoufe_treexml_sql_injection',
    'yonyoufe_user_systemxml_information_disclosure',
    'yonyougrp_cm_info_content_sql_injection',
    'yonyougrp_cm_info_list_sql_injection',
    'yonyougrp_login_sql_injection',
    'yonyougrp_userinfoweb_information_disclosure',
    'yonyougrpu8_sql_injection',
    'yonyounc_deserialization_vul',
    'yonyounc_dorado_xxe',
    'yonyounc_eltextfile_directory_traversal',
    'yonyounc_file_receive_servlet_deserialization_vul',
    'yonyounc_iufo_code_execution',
    'yonyounc_monitor_deserialization_vul',
    'yonyounc_ncfindweb_directory_traversal',
    'yonyounc_user_information_disclosure',
    'yonyouu8_getsessionlist_information_disclosure',
    'yonyouuap_soapformat_xxe',
    'yunec_v1_2_3_user_sql_injection',
    'yunec_v1_3_upload_shell',
    'zabbix_jsrpc_sql_injection',
    'zabbix_weak_password',
    'zend_framework_config_file',
    'zentao_sqli_upload_shell',
    'zfsoft_gwxxbviewhtml_directory_traversal',
    'zfsoft_webservice_sql_injection',
    'zhongxinjindun_default_admin_password',
    'zimbra_directory_traversal',
    'zoomla_arbitrary_file_download',
    'natshell_billing_manager_system_default_admin_password',
    'tcsoft_library_station_cluster_management_system_arbitrary_file_read',
    'atlassian_jira_file_read_cve_2021_26086',
    'ruoyi_default_password',
    'zhihuixiaoyuan_management_system_arbitrary_file_upload',
    'iceflow_vpn_information_disclosure',
    'wayos_system_default_password',
    'jupyter_notebook_unauthorized_access_and_rce',
    'ruoyi_management_system_arbitrary_file_download',
    'showdoc_default_password',
    'minio_default_password',
    'amtt_hotel_broadband_operation_system_rce',
    'h3c_aolynk_br304_default_password',
    'cachet_sql_injection_cve_2021_39165',
    'zzzcms_remote_code_execution',
    'nexus_default_password',
    'panabit_panalog_default_password_and_rce',
    'alibaba_nacos_control_panel_default_passwd',
    'atlassian_confluence_rce_cve_2021_26084',
    'huijietong_cloud_video_directory_listing',
    'weiphp_arbitrary_file_read',
    'alibaba_nacos_unauthorized_access',
    'alibaba_canal_admin_cloud_key_information_disclosure',
    'shopxo_arbitrary_file_download',
    'bsphp_information_disclosure',
    'glassfish_arbitrary_file_read',
    'tvt_nvms_1000_directory_traversal',
    'shiziyu_cms_sql_injection',
    'seeyon_oa_arbitrary_file_upload',
    'dotnet_cms_sql_injection',
    'eclipse_jetty_web_info_information_disclosure',
    'eclipse_jetty_web_info_information_disclosure_cve_2021_34429',
    'jitong_ewebs_information_disclosure',
    'tamronos_iptv_command_execution',
    'ntopng_authentication_bypass_cve_2021_28073',
    'jitong_ewebs_arbitrary_file_read',
    'ygxinjian_celiangpingtai_unauthorized_access',
    'tcexam_sensitive_information_leakage',
    'activemq_default_password',
    'zoho_manageengine_adselfservice_plus_rce_cve_2021_40539',
    'rabbitmq_default_password',
    'lukashinsch_spring_boot_actuator_logview_directory_travesal',
    'him_basic_management_platform_arbitrary_file_read',
    'wuzhicms_sql_injection',
    'rconfig_information_disclosure',
    'vmware_vcenter_server_unauthenticated_upload_cve_2021_22005',
    'apache_kylin_unauth',
    'wordpress_dzs_zoomsounds_arbitrary_file_download_cve_2021_39316',
    'airflow_unauth',
    'doccms_sql_injection',
    'fahuo100_virtual_goods_auto_delivery_system_cnvd_2021_30193',
    'rockmongo_default_password',
    'gurock_software_gurock_testrail_information_disclosure',
    'jira_sensitive_information_disclosure_cve_2020_14179',
    'jira_sensitive_information_disclosure',
    'terramaster_tos_unauth_rce',
    'apache_tapestry_rce_cve_2021_27850',
    'seeyonreport_plugin_install_rce',
    'exacqvision_web_service_rce',
    'apache_directory_traversal_cve_2021_41773',
    'yisaitong_document_secrity_management_system_rce',
    'phpunit_remote_code_execution',
    'hadoop_yarn_unauth',
    'dedecms_unauthorized_rce',
    'aviatrix_controller_6_x_rce_cve_2021_40870',
    'sprockets_information_disclosure',
  ],
  info: {
    os: {
      count: 1,
      low_count: 0,
      tree_event_list: [],
      last_scan: null,
      url_list: [],
      site_id: null,
      summary: {},
      event_list: [
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          group_id: 2062,
          user_id: 1,
          task_id: 243961,
          created_at: '2021-10-11 19:43:35',
          site_id: 278953,
          module: 'kscan',
          ignore: false,
          value: { distrib: 'Ubuntu', version: '', name: 'Linux' },
          _id: 441924,
          type: 'statistics',
        },
      ],
      regroup_dict: {},
      medium_count: 0,
      info_count: 1,
      high_count: 0,
      enabled: false,
    },
    os_path: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: null,
      url_list: [],
      site_id: null,
      summary: {},
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: false,
    },
    tech: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: null,
      url_list: [],
      site_id: null,
      summary: {},
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: false,
    },
    svn: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: null,
      url_list: [],
      site_id: null,
      summary: {},
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: false,
    },
    webserver: {
      count: 1,
      low_count: 0,
      tree_event_list: [],
      last_scan: null,
      url_list: [],
      site_id: null,
      summary: {},
      event_list: [
        {
          v_group_id: '616413867dc93b06853eb07e',
          g_site_id: '616413867dc93b06853eb07f',
          group_id: 2062,
          user_id: 1,
          task_id: 243961,
          created_at: '2021-10-11 19:43:35',
          site_id: 278953,
          module: 'kscan',
          ignore: false,
          value: { version: '2.4.29', name: 'Apache' },
          _id: 441924,
          type: 'statistics',
        },
      ],
      regroup_dict: {},
      medium_count: 0,
      info_count: 1,
      high_count: 0,
      enabled: false,
    },
    hardware: {
      count: 0,
      low_count: 0,
      tree_event_list: [],
      last_scan: null,
      url_list: [],
      site_id: null,
      summary: {},
      event_list: [],
      regroup_dict: {},
      medium_count: 0,
      info_count: 0,
      high_count: 0,
      enabled: false,
    },
  },
  level_count: { medium_count: 314, high_count: 47, low_count: 69, info_count: 314 },
  summary: { level: 3, site: 'http://10.0.8.151:32853/', risk: 100 },
  param_dict: {
    weakness: {
      enabled: true,
      spider: {
        max_page: 500000,
        include_domains: [],
        max_url_param: 10,
        thread_count: 20,
        json_post: {},
        depth: 20,
        exclude_domains: [],
        delay: 0,
        parse_webkit: 0,
        pre_login: {},
        timeout: 30,
        exclude_urls: [],
        gather_scope: 1,
        include_urls: [],
      },
    },
    modules: {
      content: {
        deface: {
          bin: false,
          ignore_authcode: true,
          text: 3,
          image: 1,
          level: 3,
          enabled: false,
          evidence: false,
          exclude_url: null,
        },
        malscan: { enabled: true, mode: 'deep', evidence: false },
        keyword: { sys: true, level: 3, enabled: true, evidence: false },
        image_check: { enabled: false },
        wad: { enabled: true },
        black_links: { enabled: true },
        cryjack: { enabled: true, evidence: false },
      },
      weakness: {
        plugin_info: {},
        template_id: '5a3bb3547dc93b414fefb713',
        advanced: '1',
        plugin_list: [
          '360_tianqing_ccid_sql_injection',
          '74cms_assign_resume_tpl_rce',
          'D_Link_password_disclosure',
          'ID_number_disclosure',
          'ProFTPD_rce',
          'a3_webvul',
          'access_database_found',
          'acsoft_eol_arbitrary_file_download',
          'acsoft_eol_getfile_arbitrary_file_read',
          'acsoft_eol_getfilecontent_arbitrary_file_read',
          'acsoft_eol_getxmllist_arbitrary_file_read',
          'active_uc_weak_password',
          'admin_page',
          'adobe_xml_injection',
          'agrij_finance_arbitrary_file_download',
          'agrij_finance_arbitrary_file_upload',
          'agrij_finance_attach_sql_injection',
          'alibaba_nacos_auth_bypass',
          'alibaba_nacos_default_password',
          'alibaba_nacos_derby_endpoint_auth_bypass_cve_2021_29442',
          'allegro_rompager_misfortune_cookie',
          'anymacromail_loginuser_directory_traversal',
          'apache_apisix_security_misconfiguration',
          'apache_axis2_information_disclosure',
          'apache_axis2_local_file_inclusion',
          'apache_axis2_services_list',
          'apache_axis2_weak_passwd',
          'apache_druid_javascript_enabled_bypass_rce',
          'apache_expect_header_injection',
          'apache_flink_directory_traversal',
          'apache_flink_unauth_rce',
          'apache_flink_upload_path_traversal',
          'apache_geronimo_default_administrative_credentials',
          'apache_httponly_cookie_disclosure',
          'apache_info',
          'apache_jetspeed_unauthorized_access',
          'apache_kylin_command_injection',
          'apache_mod_negotiation_filename_bruteforcing',
          'apache_nifi_api_rce',
          'apache_ofbiz_rce_cve20209496',
          'apache_ofbiz_rmi_rce_cve_2021_26295',
          'apache_ofbiz_xxe_injection',
          'apache_proxy_connect_enable',
          'apache_roller_ognl_injection',
          'apache_running_as_proxy',
          'apache_shardingshpere_rce',
          'apache_shiro_java_deserialization_rce',
          'apache_skywalking_sql_injection',
          'apache_solr_arbitrary_file_read',
          'apache_solr_arbitrary_file_read_cve_2017_3163',
          'apache_solr_cmd_exec',
          'apache_solr_exposed',
          'apache_solr_rce',
          'apache_solr_ssrf_cve_2021_27905',
          'apache_solr_xxe',
          'apache_solr_xxe_cve_2018_1308',
          'apache_status',
          'apache_tomcat_cve_2020_1938',
          'apache_tomcat_default_administrative_credentials',
          'apache_tomcat_examples_vuln',
          'apache_tomcat_hello_jsp_xss',
          'apache_tomcat_jk_connector_path_traversal',
          'apache_tomcat_rce',
          'apache_tomcat_sample_files',
          'apache_unomi_rce',
          'apc',
          'apereo_cas_4_1_7_rce',
          'application_error_message',
          'archive_file',
          'aspcms_database_information_disclosure',
          'aspnet_debug_enabled',
          'aspnet_path_disclosure',
          'aspnet_trace_enabled',
          'avcon_arbitrary_file_download',
          'avcon_arbitrary_file_upload',
          'avcon_webservice_information_disclosure',
          'b2bbuilder_ajax_back_end_sql_injection',
          'b2bbuilder_x_forwarded_for_sql_injection',
          'backup_file',
          'bash_history_information_disclosure',
          'bash_rce',
          'bashrc_information_disclosure',
          'basic_cors_misconfiguration',
          'bazaar_repository',
          'bjjfsd_arbitrary_file_upload',
          'bjjfsd_attachment_management_unauthorized_access',
          'broadvision_iptv_file_upload',
          'bt_panel_phpmyadmin_bypass',
          'caitonge3_webupload_arbitrary_file_upload',
          'cctrlcms_contshow_sql_injection',
          'cicro_cms_arbitrary_file_download',
          'cicro_cms_directory_write',
          'cisco_asa_arbitrary_file_read_cve_2020_3452',
          'clickjacking_x_frame_options',
          'clientaccesspolicy_xml',
          'cltphp_pre_auth_upload',
          'cms4j_log_information_disclosure',
          'cmseasy_cut_image_rce',
          'code_execution',
          'coldfusion_amf_deserialization_rce',
          'coldfusion_ckeditor_file_upload',
          'coldfusion_deserialization_rce',
          'coldfusion_information_disclosure',
          'coldfusion_path_disclosure',
          'coldfusion_unspecified_directory_traversal',
          'coldfusion_v8_file_upload',
          'coldfusion_v9_logon_bypass',
          'confluence_rce_cve20193396',
          'cookie_without_httponly',
          'core_dump_check',
          'coremail_config_file_disclosure',
          'couchdb_administrator_add',
          'couchdb_rce',
          'couchdb_unauthorized_access',
          'creatorcms_arbitrary_file_download',
          'crlf_injection',
          'crossdomain_xml',
          'csrf',
          'cvs_repository',
          'cxcms_resource_directory_traversal',
          'dahua_backdoor_detect',
          'database_backup_file',
          'dedecms_advancedsearch_sql_injection',
          'dedecms_ajax_membergroup_sql_injection',
          'dedecms_carbuyaction_file_inclusion',
          'dedecms_config_xss',
          'dedecms_dedesql_class_sql_injection',
          'dedecms_download_redirect',
          'dedecms_feedback_js_sql_injection',
          'dedecms_global_inc_sql_injection',
          'dedecms_index_php_bak_sec_bypass',
          'dedecms_information_disclosure_cve_2018_6910',
          'dedecms_infosearch_sql_injection',
          'dedecms_mysql_error_trace_information_disclosure',
          'dedecms_recommend_sql_injection',
          'dedecms_resetpassword_pwd_reset',
          'dedecms_search_sql_injection',
          'dedecms_shopcar_class_backdoor',
          'dedecms_swfupload_swf_xss',
          'dedecms_tag_sql_injection',
          'dedecms_wap_sql_injection',
          'dedeeims_common_inc_login_bypass',
          'destoon_spread_sql_injection',
          'directory_listing',
          'directory_traversal',
          'discuz_ml_code_injection',
          'django_admin_weak_password',
          'dlink_multi_router_information_disclosure',
          'dlink_rce',
          'docker_remote_api_unauthorized_access',
          'draytek_vigor_rce_cve20208515',
          'dreamweaver_scripts',
          'drupal8_config_export_download',
          'drupal8_sa_core_rce',
          'drupal_register_code_execution',
          'dyp2p_arbitrary_file_read',
          'dyp2p_areas_sql_injection',
          'dyp2p_blacklist_sql_injection',
          'dyp2p_getpwd_sql_injection',
          'dyp2p_keywords_sql_injection',
          'dyp2p_lates_sql_injection',
          'dyp2p_user_login_sql_injection',
          'easethink_ajax_sql_injection',
          'easethink_link_sql_injection',
          'easethink_message_sql_injection',
          'easethink_sms_sql_injection',
          'easethink_user_sql_injection',
          'easethink_vote_sql_injection',
          'ecology_oa_getdata_sql_injection',
          'ecology_oa_sqli_cnvd_2019_34241',
          'ecology_oa_upload_operation_rce',
          'ecology_rce',
          'ecshop_4_1_sql_injection',
          'ecshop_delete_cart_goods_sql_injection',
          'ecshop_user_code_execution',
          'egoweb_sql_injection',
          'eir_moderm_information_disclosure',
          'eis_sql_injection',
          'elasticsearch_ece_7_13_3_information_disclosure',
          'elasticsearch_groovy_rce',
          'elasticsearch_plugin_directory_traversal',
          'elasticsearch_rest_rce',
          'elasticsearch_snapshot_directory_traversal',
          'elmah_information_disclosure',
          'elongtiancms_database_information_disclosure',
          'elongtiancms_loadarea_directory_traversal',
          'email_address_disclosure',
          'email_address_disclosure_out',
          'error_page_path_disclosure',
          'error_page_web_server_version_disclosure',
          'espcms_cookie_sql_injection',
          'etcd_rest_api_unauthorized_access',
          'eternalblue_backdoor_detect',
          'eternalblue_windows_smb_rce',
          'exim_cve_2019_10149',
          'express_handlebars_arbitrary_file_read_cve_2021_32820',
          'expression_language_injection',
          'eyou_php_moni_detail_rce',
          'eyoucms_set_admin_session',
          'f5_big_ip_icontrol_rest_rce_cve_2021_22986',
          'f5_bigip_remote_code_execution',
          'fantastico_fileslist',
          'fastjson_deserialization_vul',
          'fckeditor_arbitrary_file_upload',
          'fckeditor_spellchecker_xss',
          'file_inclusion',
          'file_upload',
          'finecms_ajaxswfupload_file_upload',
          'finecms_api_ajaxupload_file_upload',
          'finecms_api_code_execution',
          'finecms_api_sql_injection',
          'finecms_api_swfupload_file_upload',
          'finecms_api_user_information_disclosure',
          'flash_allowscriptaccess',
          'flask_debug_mode',
          'forgerock_openam_pre_auth_rce',
          'founder_cms_code_execution',
          'frontpage_extensions_enabled',
          'frontpage_information',
          'frontpage_pwd_file_available',
          'fsmcms_jspdownload_directory_traversal',
          'fsmcms_replydetail_sql_injection',
          'ftp_anonymous',
          'ftp_weak_password',
          'gateone_arbitrary_file_read',
          'gateone_ws_rce',
          'gevercms_arbitrary_file_download',
          'git_repository',
          'gitlab_api_ci_lint_ssrf_cve_2021_22214',
          'glassfish_auth_bypass',
          'glassfish_utf8_directory_traversal',
          'glassfish_weak_credentials',
          'gogs_gitea_command_execution',
          'gpcsoft_egp_imgurl1_directory_traversal',
          'gpcsoft_egp_sysconfig_jsp_backdoor',
          'gpcsoft_egp_usersecuritycontroller_sql_injection',
          'gpower_users_information_disclosure',
          'guangxuntong_arbitrary_file_existence',
          'gwcms_admin_information_disclosure',
          'gwcms_gov_administrator_add',
          'gwcms_image_cut_xss',
          'gwcms_list_ask_sql_injection',
          'gwcms_list_content_sql_injection',
          'gwcms_list_picture_sql_injection',
          'gwcms_member_verify_sql_injection',
          'gwcms_opinion_lettersearch_xss',
          'gwcms_uploader_list_sql_injection',
          'h3c_imc_remote_command_execute',
          'h3c_secparh_get_detail_view_any_user_login',
          'hadoop_cluster_web_interface',
          'hanweb_jcms_readxml_config_file_read',
          'hanweb_jcms_verifycode_session_bypass',
          'hanweb_vc_opr_copycode_sql_injection',
          'hanweb_vc_que_style_coltop_sql_injection',
          'hanweb_vipchat_verifycode_session_bypass',
          'hanweb_xxgk_session_permission_bypass',
          'haoshitong_arbitrary_file_download',
          'harbor_administrator_add_cve201916097',
          'heartbleed_bug',
          'heeroa_fawenaction_directory_traversal',
          'hikvision_arbitrary_file_download',
          'himail_inputfile_directory_traversal',
          'horde_webemail_barcode_directory_traversal',
          'house5_allid_sql_injection',
          'htaccess_file_readable',
          'html_form_weak_credentials',
          'http_header_hostname_attack',
          'http_proxy_header_injection',
          'http_transmission',
          'http_weak_password',
          'huawei_home_gateway_hg659_arbitrary_file_read',
          'huayu_reporter_rce',
          'huge_bszn_sql_injection',
          'icewarp_webmail_basic_rce',
          'icomexe_ras_sql_injection',
          'igenus_mail_code_execution',
          'igenus_mail_directory_traversal',
          'iis_global_asa',
          'iis_httpsys_range_overflow',
          'iis_internal_ip_address_disclosure',
          'iis_service_cnf',
          'iis_tilde_directory_enumeration',
          'iis_webdav_rce',
          'imo_loginbindkd_php_code_injection',
          'imo_oa_corpfile_code_execution',
          'imo_oa_get_file_code_execution',
          'imo_oa_read_directory_traversal',
          'imo_oa_write_arbitrary_file_upload',
          'inspur_cluster_engine_rce',
          'inspur_ecgap_broadcast_sql_injection',
          'inspur_ecgap_faqloading_sql_injection',
          'inspur_image_directory_traversal',
          'internal_ip_address_disclosure',
          'ioncube_loader_wizard_directory_traversal',
          'ips_community_suite_code_injection',
          'java_debug_wire_protocol_rce',
          'java_rmi_deserialization_rce',
          'jboss_as_invoker_deserialization_rce',
          'jboss_bshdeployer_mbean',
          'jboss_httpadapter_jmxinvokerservlet',
          'jboss_java_deserialization_rce',
          'jboss_jmx_console_file_upload',
          'jboss_jmx_console_weak_password',
          'jboss_jmx_management_console_access',
          'jboss_seam_remoting_information_disclosure',
          'jboss_seam_remoting_xxe',
          'jboss_server_mbean',
          'jboss_serverinfo_mbean',
          'jboss_status_servlet_information_leak',
          'jboss_web_console_access',
          'jboss_web_console_jmx_invoker',
          'jboss_web_service_console_access',
          'jcms_classajax_sql_injection',
          'jcms_columncoun_directory_traversal',
          'jcms_enckey_information_disclosure',
          'jcms_export_directory_traversal',
          'jcms_getcount_sql_injection',
          'jcms_letterbox_sql_injection',
          'jcms_mailwrite_over_directory_traversal',
          'jcms_noontimelist_sql_injection',
          'jcms_opr_datacall_sql_injection',
          'jcms_out_userinfo_information_disclosure',
          'jcms_reg_2_directory_traversal',
          'jcms_voting_down_directory_traversal',
          'jeecms_redirect_rce',
          'jeesite_userfiles_arbitrary_file_download',
          'jeewms_showordownbyurl_arbitrary_file_read',
          'jellyfin_arbitrary_file_read',
          'jenkins_cli_deserialization_rce',
          'jenkins_dashboard_unauthorized_access',
          'jenkins_java_deserialization_rce',
          'jenkins_plugin_arbitrary_file_read',
          'jetbrains_idea_project_directory',
          'jetty_information_disclosure_cve_2021_28164',
          'jetty_shared_buffer_information_disclosure',
          'jetty_web_xml_file_read_cve_2021_34229',
          'jinhe_oa_c6_default_password',
          'jinhe_oa_c6_download_jsp_arbitrary_file_download',
          'jira_information_disclosure_cve20198449',
          'jira_ssrf',
          'jira_template_injection_rce',
          'jira_user_enumeration_cve202014181',
          'jiuqigms_arbitrary_file_download',
          'joomla_com_jsjobs_sql_inj',
          'joomla_core_com_fields_sql_injection',
          'joomla_history_sqli',
          'joomla_privilege_escalation',
          'joomla_session_code_execution',
          'joomla_session_deserialization_rce',
          'jumpserver_pre_auth_rce',
          'kesioncms_plus_ajaxs_sql_injection',
          'kindeditor_file_upload',
          'kingdee_apusic_weak_password',
          'kingdee_cas_web_inf_information_disclosure',
          'kingdee_eas_directory_traversal',
          'kingdee_file_download_directory_traversal',
          'kingdee_flow_performance_sql_injecton',
          'kingdee_get_connection_data_sql_injection',
          'kingdee_getclass_sql_injection',
          'kingdee_login_sql_injection',
          'kingdee_tree_sql_injection',
          'kingsoft_v8_terminal_security_system_arbitrary_file_download',
          'kong_gateway_admin_api_security_misconfiguration_cve202011710',
          'konga_default_jwt_key_login',
          'kxmail_sql_injection',
          'kyan_password_disclosure',
          'kyan_rce_vulnerabitily',
          'landray_file_list_read_ssrf',
          'landray_unauthorized_arbitrary_user_password_modify',
          'lanproxy_arbitrary_file_read',
          'laravel_debug_mode_rce',
          'ldap_injection',
          'liferay_portal_ce_unserialize_rce',
          'lighttpd_sql_injection_path_traversal',
          'lingxiangportal_search_keyword_xss',
          'lingxiangportal_search_xss',
          'linux_baseline_check',
          'live800_chathourssta_sql_injection',
          'live800_chatopsta_sql_injection',
          'live800_chattopicsta_sql_injection',
          'live800_chaturlsta_sql_injection',
          'live800_downlog_arbitrary_file_download',
          'live800_referrersta_sql_injection',
          'lock_group_management_system_default_password',
          'lotus_domino_crlf_xss',
          'mallbuilder_district_sql_injection',
          'mallbuilder_help_sql_injection',
          'mallbuilder_modifier_config_backdoor',
          'mallbuilder_shop_sql_injection',
          'mallbuilder_sms_sql_injection',
          'memcache_unauthorized_access',
          'memcached_integer_overflow',
          'mercurial_repository',
          'message_solution_unserialize_rce',
          'message_solution_upload_file_cnvd_2021_08441',
          'messagesolution_eea_information_disclosure',
          'metinfo_about_index_local_file_inclusion',
          'metinfo_dataoptimize_html_local_file_inclusion',
          'metinfo_member_login_sql_injection',
          'metinfo_rewrite_url_sql_injection',
          'metinfo_thumb_arbitrary_file_read',
          'microsoft_exchange_proxy_shell_cve_2021_34773',
          'microsoft_exchange_ssrf_cve_2021_26855',
          'microsoft_sharepoint_scriptresx_xss',
          'mini_httpd_arbitrary_file_read',
          'minify_arbitrary_file_read',
          'minio_pre_auth_webrpc_ssrf',
          'minyoocms_directory_traversal',
          'mongodb_http_status_interface',
          'mongodb_unauthorized_access',
          'mpsec_isg1000_arbitrary_file_download',
          'mssql_weak_password',
          'multi_firewall_devices_arbitrary_file_download',
          'mysql_weak_password',
          'nagiosxi_commandline_sql_injection',
          'nagiosxi_helpedit_sql_injection',
          'nagiosxi_info_sql_injection',
          'nagiosxi_logbook_sql_injection',
          'nagiosxi_login_bypass',
          'nagiosxi_magpie_debug_rce',
          'nagiosxi_menuaccess_sql_injection',
          'nagiosxi_os_commanding',
          'nagiosxi_sql_injection',
          'natshell_billing_manager_system_debug_rce',
          'natshell_billing_manager_system_file_read',
          'nerc_edu_arbitrary_file_upload',
          'neten_tsec_ns_ngfw_getdownloadstatus_rce',
          'neten_tsec_ns_ngfw_rce',
          'netgear_r7000_command_execution',
          'nette_pre_auth_rce',
          'nexus_repository_manager_3_pre_auth_rce',
          'nexusdb_path_traversal_cve_2020_24571',
          'nfs_unauthorized_access',
          'nginx_null_bytes_rce',
          'niushop_arbitrary_file_upload',
          'niushop_v4_1_0_api_store_info_sql_injection',
          'niushop_v4_1_0_upvideo_arbitrary_file_upload',
          'node_red_ui_base_arbitrary_file_read',
          'nongyou_itemsecond_sql_injection',
          'nongyou_itemsixth_sql_injection',
          'nongyou_tname_sql_injection',
          'nongyou_zhengwu_file_upload',
          'npointhost_mdb_download',
          'nuxeo_login_el_rce',
          'oa_vfs_directory_traversal',
          'ohocms_catid_save_sql_injection',
          'ohocms_catid_user_save_code_execution',
          'ohocms_custom_design_code_execution',
          'ohocms_db_config_file_disclosure',
          'ohocms_edittheme1_code_execution',
          'ohocms_edittheme2_code_execution',
          'ohocms_edittheme_code_execution',
          'ohocms_getjwj_sql_injection',
          'ohocms_getsyscat_sql_injection',
          'ohocms_jg_city_sql_injection',
          'ohocms_province_city_sql_injection',
          'ohocms_set_border_color_command_execution',
          'ohocms_uploadpage_arbitrary_file_upload',
          'open5gs_default_password',
          'openmrs_deserialization_vul_cve201819276',
          'opensns_weibo_sharebox_rce',
          'openssl_v2_drown',
          'openssl_v3_poodle',
          'oracle_application_logs',
          'oracle_jsf2_path_traversal',
          'oracle_reports_database_disclosure',
          'oracle_reports_directory_traversal',
          'oracle_reports_file_upload',
          'oracle_weak_password',
          'ourphp_filebox_arbitrary_file_upload',
          'ourphp_validation_safecode_disclosure',
          'pageadmin_database_information_disclosure',
          'panabit_code_execution',
          'parallels_plesk_sitebuilder_audit',
          'pbootcms_remote_code_execution',
          'perfolder_expression_injection',
          'phone_number_disclosure',
          'php_cgi_rce',
          'php_code_injection',
          'php_fastcgi_rce',
          'php_transfer_encoding_xss',
          'phpcms_2008_type_code_execution',
          'phpcms_cachefile_directory_traversal',
          'phpcms_register_arbitrary_file_upload',
          'phpcms_v9_6_arbitrary_file_download',
          'phpcms_wap_sql_injection',
          'phpinfo',
          'phpliteadmin_default_password',
          'phpmoadmin_remote_code_execution',
          'phpoa_upload_file',
          'phpstudy_backdoor',
          'piw_cms_sql_injection',
          'plesk_agent_sql_injection',
          'plesk_sso_xxe',
          'plone_zope_rce',
          'pop3_weak_password',
          'probe_file',
          'pulse_secure_ssl_vpn_file_read_cve_2019_11510',
          'qilai_oa_sql_injection',
          'qizhi_shterm_preauth_rce',
          'railo_admin_xss',
          'rails_xml_yaml_rce',
          'ras_full_path_disclosure',
          'rdp_weak_password',
          'readme_files',
          'redis_unauthorized_access',
          'resin_doc_directory_traversal',
          'resin_windows_directory_listing',
          'resoftcms_technological_sql_injection',
          'rsync_ping',
          'rubyonrails_actionpack_arbitrary_file_existence',
          'rubyonrails_database_yml',
          'rubyonrails_directory_traversal',
          'ruijie_cloud_classroom_host_directory_traversal',
          'ruijie_network_eweb_auth_bypass',
          'ruijie_network_eweb_rce',
          'ruijie_rg_information_disclosure',
          'ruijie_rg_uac_password_hash_leak',
          'ruijie_smartweb_default_credential',
          'saltstack_rce',
          'saltstack_rce_cve202016846',
          'sap_netweaver_config_servlet_exec',
          'schneider_hardcoded_password',
          'seeyon_oa_ajax_auth_bypass',
          'seeyon_oa_remote_code_execution',
          'seeyon_oa_webmail_do_download_file',
          'sensitive_dirs',
          'sensitive_files',
          'server_path_disclosure',
          'server_side_template_injection',
          'sftp_credentials_exposure',
          'shiziyu_cms_arbitrary_file_upload',
          'showdoc_pre_auth_upload',
          'sitefactory_assets_directory_traversal',
          'siteserver_cms_download_getshell',
          'skywcm_check_sql_injection',
          'smartbi_default_password',
          'smartbi_pre_auth_sql_injection',
          'smb_weak_password',
          'snoop_servlet_information_disclosure',
          'solarwinds_orion_local_file_disclosure',
          'solr_dataimport_rce_cve_2019_0193',
          'sonarqube_unauth_information_disclosure',
          'sonicwall_ssl_vpn_rce',
          'source_code_disclosure',
          'spark_rest_api_code_execution',
          'spring_boot_actuator_information_disclosure',
          'spring_boot_jolokia_xxe',
          'spring_cloud_netflix_full_read_ssrf_cve_2020_5412',
          'spring_cloud_snake_yaml_rce',
          'spring_data_rce_cve20181273',
          'spring_reflected_file_download',
          'springboot_realm_jndi_rce',
          'sql_injection',
          'sql_injection_cookie',
          'sql_injection_referer',
          'sql_injection_ua',
          'sqlite_database_found',
          'sqoa_fawenaction_directory_traversal',
          'squirrellyjs_template_engine_rce_cve_2021_32819',
          'ssh_weak_password',
          'ssl_ccs_injection',
          'ssrf',
          'struts2_devmode',
          'struts2_devmode_rce',
          'struts2_rce_s2_005',
          'struts2_rce_s2_007',
          'struts2_rce_s2_009',
          'struts2_rce_s2_013',
          'struts2_rce_s2_014',
          'struts2_rce_s2_015',
          'struts2_rce_s2_016',
          'struts2_rce_s2_017',
          'struts2_rce_s2_019',
          'struts2_rce_s2_020',
          'struts2_rce_s2_021',
          'struts2_rce_s2_032',
          'struts2_rce_s2_033',
          'struts2_rce_s2_037',
          'struts2_rce_s2_045',
          'struts2_rce_s2_046',
          'struts2_rce_s2_048',
          'struts2_rce_s2_052',
          'struts2_rce_s2_053',
          'struts2_rce_s2_057',
          'struts2_rce_s2_059',
          'struts2_xss_s2_006',
          'struts_errorpage_xss',
          'svn_repository',
          'sybase_weak_password',
          'telnet_weak_password',
          'tenda_route_admin_login_with_fake_cookie',
          'tenhot_tos_login_sql_injection',
          'terramaster_tos_pre_auth_rce',
          'test_files',
          'thinkadmin_arbitrary_file_read',
          'thinkadmin_v6_unserialize_rce',
          'thinkcmfx_fetch_rce',
          'thinkphp6_file_create',
          'thinkphp_controller_rce',
          'thinkphp_method_rce',
          'tomcat_status_page',
          'tongdaoa_arbitrary_file_upload_file_inclusion_rce',
          'tongdaoa_arbitrary_login',
          'tongdaoa_interface_auth_sql_injection',
          'tongdaoa_logincheck_sql_injection',
          'tongdaoa_register_turn_sql_injection',
          'tongdaoa_scoredate_result_sql_injection',
          'tongdaoa_swfupload_sql_injection',
          'tongdaoa_unauthorized_access',
          'tongdaoa_use_finger_sql_injection',
          'tongdaoa_user_information_disclosure',
          'tongdaoa_video_file_arbitrary_file_download',
          'tongdaoa_wbupload_arbitrary_file_upload',
          'tornado_debug_mode',
          'trojan_scripts',
          'trs_inforadar_information_disclosure',
          'trs_was5_arbitrary_code_execution',
          'trs_was5_arbitrary_file_download',
          'trs_was5_config_file_read',
          'trs_was5_outline_arbitrary_code_execution',
          'trsid_env_information_disclosure',
          'trswcm_govfileuploader_directory_write',
          'trswcm_importdocuments_xxe',
          'trswcm_infoview_infomation_disclosure',
          'trswcm_infoview_login_bypass',
          'trswcm_pre_directory_traversal',
          'turbo_mail_frontend_sql_injection',
          'turbo_mail_login_with_any_account',
          'tykycms_bmtd_sql_injection',
          'typecho_install_deserialize_rce',
          'typecho_ssrf',
          'ueditor_asp_net_upload_shell',
          'uniportal_displayimg_directory_traversal',
          'uniportal_pollproblem_sql_injection',
          'uniportal_showsheets_sql_injection',
          'unprotected_phpmyadmin_interface',
          'url_redirection',
          'v2tech_conf_bulletinaction_sql_injection',
          'v2tech_conf_downloadaction_directory_traversal',
          'vBulletin_sql_injection_cve_2020_12720',
          'vange_searchkey_sql_injection',
          'vbulletin_ajax_api_hook_decodearguments_rce',
          'vbulletin_forumrunner_request_sql_injection',
          'vbulletin_pre_auth_rce',
          'vesystem_vengd_upload_file_rce',
          'vmware_directory_traversal',
          'vmware_vcenter_file_read',
          'vmware_vcenter_uploadova_rce',
          'vmware_vcenter_vsan_rce',
          'vmware_vrealize_operations_manager_ssrf_cve_2021_21975',
          'vnc_weak_password',
          'voipmonitor_rce_cve_2021_30461',
          'vuln_javascript_lib',
          'wanhu_oa_xfire_xxe',
          'we7_api_unauthorized_blind_ssrf',
          'we7_cms_download_directory_traversal',
          'we7_cms_interface_access',
          'we7_utility_wxcode_image_unauthorized_ssrf',
          'weaver_e-bridge_file_read',
          'weaver_e-cology_beanshell_rce',
          'weaver_e-cology_cloudstore_api_rce',
          'weaver_e-cology_mobile_database_config_disclosure',
          'weaver_e-cology_workflowservicexml_rce',
          'weaver_eoffice_database_config_disclosure',
          'weaver_eoffice_flowdo_sql_injection',
          'weaver_eoffice_inc_jquery_file_upload',
          'weaver_eoffice_officeserver_directory_traversal',
          'weaver_eoffice_officeserver_file_upload',
          'weaver_eoffice_webservice_file_upload',
          'weaver_eoffice_webservice_json_file_upload',
          'weaver_eoffice_webservice_upload_file_upload',
          'weaver_eoffice_webservice_xml_file_upload',
          'weaver_eoffice_weibo_lazyuploadify_file_upload',
          'weaver_eoffice_weibo_uploadify_file_upload',
          'web_server_default_welcome_page',
          'web_xml_disclosure',
          'webbuilder_main_directory_traversal',
          'webdav_directory_listing',
          'webdav_enabled',
          'webdav_put',
          'webdav_shell',
          'weblogic_deserialization_rce_cve20160638',
          'weblogic_deserialization_rce_cve20163510',
          'weblogic_deserialization_rce_cve20173248',
          'weblogic_deserialization_rce_cve20182628',
          'weblogic_deserialization_rce_cve20182893',
          'weblogic_deserialization_rce_cve20183191',
          'weblogic_deserialization_rce_cve20183245',
          'weblogic_deserialization_rce_cve20192725',
          'weblogic_deserialization_rce_cve20192729',
          'weblogic_deserialization_rce_cve_2020_2555',
          'weblogic_file_upload_cve_2018_2894',
          'weblogic_java_deserialization_rce',
          'weblogic_rce_cve202014882',
          'weblogic_uddiexplorer_ssrf',
          'weblogic_utc_arbitrary_file_upload',
          'weblogic_weak_credentials',
          'weblogic_wls_wsat_rce',
          'weblogic_xxe_cve20192888',
          'webmin_password_change_cgi_rce',
          'webpack_source_map',
          'webrick_directory_traversal',
          'websphere_java_deserialization_rce',
          'westarcms_bgxz_bg_sql_injection',
          'whir_download_ftp_directory_traversal',
          'whir_download_netdisk_directory_traversal',
          'whir_downloadhttp_directory_traversal',
          'whir_ezeip_4_0_hit_sql_injection',
          'whir_ezeip_5_0_productlist_aspx_sql_injection',
          'whir_graphreportaction_sql_injection',
          'whir_informationmanager_download_directory_traversal',
          'wordpress_core_4_6_rce',
          'wordpress_full_path_disclosure',
          'wordpress_mailpress_code_execution',
          'wordpress_mediaelement_xss',
          'wordpress_pingback_ddos',
          'wordpress_plugin_wp_miniaudioplayer_directory_traversal',
          'wordpress_plugin_wp_mobile_edition_directory_traversal',
          'wordpress_rest_api_content_injection',
          'wordpress_robotcpa_directory_traversal',
          'wordpress_social_warfare_rce',
          'wordpress_the_plus_addons_for_elementor_bypass_auth',
          'wordpress_theme_backdoor',
          'wordpress_woocommerce_sql_injection',
          'ws_ftp_ini_file',
          'x_forwarded_for',
          'xenmobile_server_directory_traversal',
          'xml_external_entity_injection',
          'xpath_injection',
          'xss',
          'xss_cookie',
          'xss_referer',
          'xss_ua',
          'xss_uri',
          'xxl_job_admin_default_password',
          'xxl_job_admin_unserialize_rce',
          'xxl_job_executor_rce',
          'yapi_authentication_user_mock_rce',
          'yongyou_erp_nc_directory_traversal',
          'yongyou_nc_beanshell_rce',
          'yongyou_u8_oa_sql_injection',
          'yonyou_codemorewidget_sql_injection',
          'yonyou_nc_xxe_vulnerability',
          'yonyoua6_createmysql_information_disclosure',
          'yonyoua6_isignaturehtmlserver_sql_injection',
          'yonyoua6_menutest_sql_injection',
          'yonyoua6_messageviewer_sql_injection',
          'yonyoua6_userdata_information_disclosure',
          'yonyoucrm_getemaildata_directory_traversal',
          'yonyoufe_grouptreexml_sql_injection',
          'yonyoufe_proxyservletutil_direcotory_traversal',
          'yonyoufe_schedule_sql_injection',
          'yonyoufe_treexml_sql_injection',
          'yonyoufe_user_systemxml_information_disclosure',
          'yonyougrp_cm_info_content_sql_injection',
          'yonyougrp_cm_info_list_sql_injection',
          'yonyougrp_login_sql_injection',
          'yonyougrp_userinfoweb_information_disclosure',
          'yonyougrpu8_sql_injection',
          'yonyounc_deserialization_vul',
          'yonyounc_dorado_xxe',
          'yonyounc_eltextfile_directory_traversal',
          'yonyounc_file_receive_servlet_deserialization_vul',
          'yonyounc_iufo_code_execution',
          'yonyounc_monitor_deserialization_vul',
          'yonyounc_ncfindweb_directory_traversal',
          'yonyounc_user_information_disclosure',
          'yonyouu8_getsessionlist_information_disclosure',
          'yonyouuap_soapformat_xxe',
          'yunec_v1_2_3_user_sql_injection',
          'yunec_v1_3_upload_shell',
          'zabbix_jsrpc_sql_injection',
          'zabbix_weak_password',
          'zend_framework_config_file',
          'zentao_sqli_upload_shell',
          'zfsoft_gwxxbviewhtml_directory_traversal',
          'zfsoft_webservice_sql_injection',
          'zhongxinjindun_default_admin_password',
          'zimbra_directory_traversal',
          'zoomla_arbitrary_file_download',
          'natshell_billing_manager_system_default_admin_password',
          'tcsoft_library_station_cluster_management_system_arbitrary_file_read',
          'atlassian_jira_file_read_cve_2021_26086',
          'ruoyi_default_password',
          'zhihuixiaoyuan_management_system_arbitrary_file_upload',
          'iceflow_vpn_information_disclosure',
          'wayos_system_default_password',
          'jupyter_notebook_unauthorized_access_and_rce',
          'ruoyi_management_system_arbitrary_file_download',
          'showdoc_default_password',
          'minio_default_password',
          'amtt_hotel_broadband_operation_system_rce',
          'h3c_aolynk_br304_default_password',
          'cachet_sql_injection_cve_2021_39165',
          'zzzcms_remote_code_execution',
          'nexus_default_password',
          'panabit_panalog_default_password_and_rce',
          'alibaba_nacos_control_panel_default_passwd',
          'atlassian_confluence_rce_cve_2021_26084',
          'huijietong_cloud_video_directory_listing',
          'weiphp_arbitrary_file_read',
          'alibaba_nacos_unauthorized_access',
          'alibaba_canal_admin_cloud_key_information_disclosure',
          'shopxo_arbitrary_file_download',
          'bsphp_information_disclosure',
          'glassfish_arbitrary_file_read',
          'tvt_nvms_1000_directory_traversal',
          'shiziyu_cms_sql_injection',
          'seeyon_oa_arbitrary_file_upload',
          'dotnet_cms_sql_injection',
          'eclipse_jetty_web_info_information_disclosure',
          'eclipse_jetty_web_info_information_disclosure_cve_2021_34429',
          'jitong_ewebs_information_disclosure',
          'tamronos_iptv_command_execution',
          'ntopng_authentication_bypass_cve_2021_28073',
          'jitong_ewebs_arbitrary_file_read',
          'ygxinjian_celiangpingtai_unauthorized_access',
          'tcexam_sensitive_information_leakage',
          'activemq_default_password',
          'zoho_manageengine_adselfservice_plus_rce_cve_2021_40539',
          'rabbitmq_default_password',
          'lukashinsch_spring_boot_actuator_logview_directory_travesal',
          'him_basic_management_platform_arbitrary_file_read',
          'wuzhicms_sql_injection',
          'rconfig_information_disclosure',
          'vmware_vcenter_server_unauthenticated_upload_cve_2021_22005',
          'apache_kylin_unauth',
          'wordpress_dzs_zoomsounds_arbitrary_file_download_cve_2021_39316',
          'airflow_unauth',
          'doccms_sql_injection',
          'fahuo100_virtual_goods_auto_delivery_system_cnvd_2021_30193',
          'rockmongo_default_password',
          'gurock_software_gurock_testrail_information_disclosure',
          'jira_sensitive_information_disclosure_cve_2020_14179',
          'jira_sensitive_information_disclosure',
          'terramaster_tos_unauth_rce',
          'apache_tapestry_rce_cve_2021_27850',
          'seeyonreport_plugin_install_rce',
          'exacqvision_web_service_rce',
          'apache_directory_traversal_cve_2021_41773',
          'yisaitong_document_secrity_management_system_rce',
          'phpunit_remote_code_execution',
          'hadoop_yarn_unauth',
          'dedecms_unauthorized_rce',
          'aviatrix_controller_6_x_rce_cve_2021_40870',
          'sprockets_information_disclosure',
        ],
      },
      siteinfo: true,
      availability: ['http_get', 'ping', 'dns', 'dns_hijack', 'http_get_full_time'],
    },
    siteinfo: { enabled: true },
    site: 'http://10.0.8.151:32853/',
    content: {
      enabled: true,
      spider: {
        max_page: 500000,
        include_domains: [],
        max_url_param: 10,
        thread_count: 20,
        json_post: {},
        depth: 20,
        exclude_domains: [],
        delay: 0,
        parse_webkit: 0,
        pre_login: {},
        timeout: 30,
        exclude_urls: [],
        gather_scope: 1,
        include_urls: [],
      },
    },
    availability: { enabled: true },
  },
};
