<!doctype html><html lang dir=ltr><meta charset=utf-8><meta name=viewport content="width=device-width,initial-scale=1"><title>漏洞目录 | Hui.Ke - Blog</title><meta name=generator content="Hugo Eureka 0.9.3"><link rel=stylesheet href=https://b.hui.ke/css/eureka.min.9cec6350e37e534b0338fa9a085bf06855de3b0f2dcf857e792e5e97b07ea905d4d5513db554cbc26a9c3da622bae92d.css><script defer src=https://b.hui.ke/js/eureka.min.fa9a6bf6d7a50bb635b4cca7d2ba5cf3dfb095ae3798773f1328f7950028b48c17d06276594e1b5f244a25a6c969a705.js></script>
<link rel=preconnect href=https://fonts.googleapis.com><link rel=preconnect href=https://fonts.gstatic.com crossorigin><link rel=preload href="https://fonts.googleapis.com/css2?family=Lora:wght@400;600;700&family=Noto+Serif+SC:wght@400;600;700&display=swap" as=style onload='this.onload=null,this.rel="stylesheet"'><link rel=stylesheet href=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/styles/vs.min.css media=print onload='this.media="all",this.onload=null' crossorigin><script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/highlight.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/bash.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/ini.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/json.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/php.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/python.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/shell.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/sql.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/x86asm.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/xml.min.js crossorigin></script>
<link rel=stylesheet href=https://b.hui.ke/css/highlightjs.min.2958991528e43eb6fc9b8c4f2b8e052f79c4010718e1d1e888a777620e9ee63021c2c57ec7417a3108019bb8c41943e6.css media=print onload='this.media="all",this.onload=null'><script defer type=text/javascript src=https://lib.baomitu.com/font-awesome/6.1.1/js/all.min.js></script>
<link rel=stylesheet href=https://cdn.jsdelivr.net/npm/katex@0.15.2/dist/katex.min.css integrity=sha384-MlJdn/WNKDGXveldHDdyRP1R4CTHr3FeuDNfhsLPYrq2t0UBkUdK2jyTnXPEK1NQ media=print onload='this.media="all",this.onload=null' crossorigin><script defer src=https://cdn.jsdelivr.net/npm/katex@0.15.2/dist/katex.min.js integrity=sha384-VQ8d8WVFw0yHhCk5E8I86oOhv48xLpnDZx5T9GogA/Y84DcCKWXDmSDfn13bzFZY crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/npm/katex@0.15.2/dist/contrib/auto-render.min.js integrity=sha384-+XBljXPPiv+OzfbB3cVmLHf4hdUFHlWNZN5spNQ7rmHTXpd7WvJum6fIACpNNfIR crossorigin></script>
<script>document.addEventListener("DOMContentLoaded",function(){renderMathInElement(document.body,{delimiters:[{left:"$$",right:"$$",display:!0},{left:"$",right:"$",display:!1},{left:"\\(",right:"\\)",display:!1},{left:"\\[",right:"\\]",display:!0}]})})</script><script defer src=https://cdn.jsdelivr.net/npm/mermaid@8.14.0/dist/mermaid.min.js integrity=sha384-atOyb0FxAgN9LyAc6PEf9BjgwLISyansgdH8/VXQH8p2o5vfrRgmGIJ2Sg22L0A0 crossorigin></script>
<link rel=icon type=image/png sizes=32x32 href=https://b.hui.ke/icon_hub7ca0b5404c6d576559b2bd22c64b0e5_2009_32x32_fill_box_center_3.png><link rel=apple-touch-icon sizes=180x180 href=https://b.hui.ke/icon_hub7ca0b5404c6d576559b2bd22c64b0e5_2009_180x180_fill_box_center_3.png><meta name=description content="  最近正想整理一个漏洞合辑，就遇上了护网。于是乎就利用【护网漏洞提交平台】的漏洞分类，作为一个漏洞类型的目录指引，在往后的学习工作中，再逐一补充漏洞的详细信息。"><script type=application/ld+json>{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https://b.hui.ke/posts/"},{"@type":"ListItem","position":2,"name":"漏洞目录","item":"https://b.hui.ke/posts/vulnerability-directory/"}]}</script><script type=application/ld+json>{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://b.hui.ke/posts/vulnerability-directory/"},"headline":"漏洞目录 | Hui.Ke - Blog","datePublished":"2020-07-03T14:04:49+08:00","dateModified":"2020-07-03T14:04:49+08:00","wordCount":571,"author":{"@type":"Person","name":"Hui.ke"},"publisher":{"@type":"Person","name":"Hui.Ke","logo":{"@type":"ImageObject","url":"https://b.hui.ke/icon.png"}},"description":"\u003cp\u003e  最近正想整理一个漏洞合辑，就遇上了护网。于是乎就利用【护网漏洞提交平台】的漏洞分类，作为一个漏洞类型的目录指引，在往后的学习工作中，再逐一补充漏洞的详细信息。\u003c\/p\u003e"}</script><meta property="og:title" content="漏洞目录 | Hui.Ke - Blog"><meta property="og:type" content="article"><meta property="og:image" content="https://b.hui.ke/icon.png"><meta property="og:url" content="https://b.hui.ke/posts/vulnerability-directory/"><meta property="og:description" content="  最近正想整理一个漏洞合辑，就遇上了护网。于是乎就利用【护网漏洞提交平台】的漏洞分类，作为一个漏洞类型的目录指引，在往后的学习工作中，再逐一补充漏洞的详细信息。"><meta property="og:site_name" content="Hui.Ke - Blog"><meta property="article:published_time" content="2020-07-03T14:04:49+08:00"><meta property="article:modified_time" content="2020-07-03T14:04:49+08:00"><meta property="article:section" content="posts"><meta property="article:tag" content="Vulnerability"><meta property="article:tag" content="漏洞"><meta property="article:tag" content="漏洞分类"><script>!function(e){"use strict";!function(){var i,s=window,o=document,a=e,c="".concat("https:"===o.location.protocol?"https://":"http://","sdk.51.la/js-sdk-pro.min.js"),n=o.createElement("script"),r=o.getElementsByTagName("script")[0];n.type="text/javascript",n.setAttribute("charset","UTF-8"),n.async=!0,n.src=c,n.id="LA_COLLECT",a.d=n,i=function(){s.LA.ids.push(a)},s.LA?s.LA.ids&&i():(s.LA=e,s.LA.ids=[],i()),r.parentNode.insertBefore(n,r)}()}({id:"Jgb8aUbG5e3rqhrs",ck:"Jgb8aUbG5e3rqhrs",autoTrack:!0,hashMode:!0})</script><body class="flex min-h-screen flex-col"><header class="min-h-16 pl-scrollbar bg-secondary-bg fixed z-50 flex w-full items-center shadow-sm"><div class="mx-auto w-full max-w-screen-xl"><script>let storageColorScheme=localStorage.getItem("lightDarkMode");((storageColorScheme=="Auto"||storageColorScheme==null)&&window.matchMedia("(prefers-color-scheme: dark)").matches||storageColorScheme=="Dark")&&document.getElementsByTagName("html")[0].classList.add("dark")</script><nav class="flex items-center justify-between flex-wrap px-4 py-4 md:py-0"><a href=/ class="me-6 text-primary-text text-xl font-bold">Hui.Ke - Blog</a>
<button id=navbar-btn class="md:hidden flex items-center px-3 py-2" aria-label="Open Navbar">
<i class="fas fa-bars"></i></button><div id=target class="hidden block md:flex md:grow md:justify-between md:items-center w-full md:w-auto text-primary-text z-20"><div class="md:flex md:h-16 text-sm md:grow pb-4 md:pb-0 border-b md:border-b-0"><a href=/posts/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 selected-menu-item me-4">Posts</a>
<a href=/docs/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">Docs</a>
<a href=/categories/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">Categories</a>
<a href=/series/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">Series</a>
<a href=/tags/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">Tags</a>
<a href=/love/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">Love</a>
<a href=/about/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">About</a></div><div class=flex><div class="relative pt-4 md:pt-0"><div class="cursor-pointer hover:text-eureka" id=lightDarkMode><i class="fas fa-adjust"></i></div><div class="fixed hidden inset-0 opacity-0 h-full w-full cursor-default z-30" id=is-open></div><div class="absolute flex flex-col start-0 md:start-auto end-auto md:end-0 hidden bg-secondary-bg w-48 rounded py-2 border border-tertiary-bg cursor-pointer z-40" id=lightDarkOptions><span class="px-4 py-1 hover:text-eureka" name=Light>Light</span>
<span class="px-4 py-1 hover:text-eureka" name=Dark>Dark</span>
<span class="px-4 py-1 hover:text-eureka" name=Auto>Auto</span></div></div></div></div><div class="fixed hidden inset-0 opacity-0 h-full w-full cursor-default z-0" id=is-open-mobile></div></nav><script>let element=document.getElementById("lightDarkMode");storageColorScheme==null||storageColorScheme=="Auto"?document.addEventListener("DOMContentLoaded",()=>{window.matchMedia("(prefers-color-scheme: dark)").addEventListener("change",switchDarkMode)}):storageColorScheme=="Light"?(element.firstElementChild.classList.remove("fa-adjust"),element.firstElementChild.setAttribute("data-icon","sun"),element.firstElementChild.classList.add("fa-sun")):storageColorScheme=="Dark"&&(element.firstElementChild.classList.remove("fa-adjust"),element.firstElementChild.setAttribute("data-icon","moon"),element.firstElementChild.classList.add("fa-moon")),document.addEventListener("DOMContentLoaded",()=>{getcolorscheme(),switchBurger()})</script></div></header><main class="grow pt-16"><div class=pl-scrollbar><div class="mx-auto w-full max-w-screen-xl lg:px-4 xl:px-8"><div class="grid grid-cols-2 gap-4 lg:grid-cols-8 lg:pt-12"><div class="bg-secondary-bg col-span-2 rounded px-6 py-8 lg:col-span-6"><article class=prose><h1 class=mb-4>漏洞目录</h1><div class="text-tertiary-text not-prose mt-2 flex flex-row flex-wrap items-center"><div class="me-6 my-2"><i class="fas fa-calendar me-1"></i>
<span>2020-07-03</span></div><div class="me-6 my-2"><i class="fa-solid fa-pen-to-square me-1"></i>
<span>2020-07-03</span></div><div class="me-6 my-2"><i class="fas fa-clock me-1"></i>
<span>2 min read</span></div><div class="me-6 my-2"><i class="fas fa-folder me-1"></i>
<a href=https://b.hui.ke/categories/it/ class=hover:text-eureka>IT</a></div><div class="me-6 my-2"><i class="fas fa-th-list me-1"></i>
<a href=https://b.hui.ke/series/vulnerabilities/ class=hover:text-eureka>Vulnerabilities</a></div><div class="me-6 my-2"><i class="fa-solid fa-eye me-1"></i>
<span id=busuanzi_value_page_pv><i class="fa fa-spinner fa-spin"></i></span> Hits</div></div><p>  最近正想整理一个漏洞合辑，就遇上了护网。于是乎就利用【护网漏洞提交平台】的漏洞分类，作为一个漏洞类型的目录指引，在往后的学习工作中，再逐一补充漏洞的详细信息。</p><p>  本漏洞合辑的编写呢，将会分为几步走</p><ol><li>漏洞分类<ol><li>列出所有的漏洞分类</li><li>漏洞分类作综述</li><li>将单一漏洞编入漏洞分类</li></ol></li><li>单一漏洞<ol><li>给每一个漏洞评定“漏洞等级”（High、Medium、Low）</li><li>给每一个漏洞增加“漏洞简述”</li><li>给危害大或可利用性高的漏洞发布单独的博文，补充漏洞的详细信息、POC 请求包、复现步骤、修复方案等等</li></ol></li><li>单一漏洞组合利用（这个近几年是写不粗来了）</li><li>最后就是永久的更新、补充、完善。</li></ol><h2 id=it信息系统漏洞>IT信息系统漏洞</h2><h3 id=xss漏洞>XSS漏洞</h3><h3 id=任意文件上传漏洞>任意文件上传漏洞</h3><h3 id=ssrf漏洞>SSRF漏洞</h3><h3 id=文件遍历漏洞>文件遍历漏洞</h3><h3 id=远程命令执行漏洞>远程命令执行漏洞</h3><h3 id=弱口令漏洞>弱口令漏洞</h3><h3 id=其他漏洞>其他漏洞</h3><h3 id=csrf漏洞>CSRF漏洞</h3><h3 id=拒绝服务漏洞>拒绝服务漏洞</h3><h3 id=远程文件包含漏洞>远程文件包含漏洞</h3><h3 id=本地文件包含漏洞>本地文件包含漏洞</h3><h3 id=错误配置漏洞>错误配置漏洞</h3><h3 id=任意文件操作漏洞>任意文件操作漏洞</h3><h3 id=缓冲区溢出漏洞>缓冲区溢出漏洞</h3><h3 id=xxe漏洞>XXE漏洞</h3><h3 id=信息泄露漏洞>信息泄露漏洞</h3><h3 id=支付逻辑漏洞>支付逻辑漏洞</h3><h3 id=密码重置漏洞>密码重置漏洞</h3><h3 id=任意注册>任意注册</h3><h3 id=任意登陆>任意登陆</h3><h3 id=撞库扫号暴力破解>撞库/扫号/暴力破解</h3><h3 id=其他认证缺陷>其他认证缺陷</h3><h3 id=系统服务器补丁不及时漏洞>系统/服务器补丁不及时漏洞</h3><h3 id=jsonp漏洞>JSONP漏洞</h3><h3 id=反序列化漏洞>反序列化漏洞</h3><h3 id=url重定向漏洞>URL重定向漏洞</h3><h3 id=任意文件下载漏洞>任意文件下载漏洞</h3><h3 id=代码执行漏洞>代码执行漏洞</h3><h3 id=水平越权漏洞>水平越权漏洞</h3><h3 id=垂直越权漏洞>垂直越权漏洞</h3><h3 id=条件竞争漏洞>条件竞争漏洞</h3><h3 id=疑似入侵存在后门>疑似入侵/存在后门</h3><h3 id=释放重引用>释放重引用</h3><h3 id=双重释放>双重释放</h3><h3 id=权限提升绕过>权限提升/绕过</h3><h3 id=数组越界访问>数组越界访问</h3><h3 id=内核提权>内核提权</h3><h3 id=注入漏洞>注入漏洞</h3><h2 id=工业系统漏洞>工业系统漏洞</h2><h2 id=车联网漏洞>车联网漏洞</h2><h2 id=移动终端漏洞>移动终端漏洞</h2><h3 id=组件暴露权限漏洞>组件暴露/权限漏洞</h3><h3 id=webview命令执行>WebView命令执行</h3><h3 id=ssl证书验证错误>SSL证书验证错误</h3><h3 id=不安全存储>不安全存储</h3><h3 id=硬编码敏感信息>硬编码敏感信息</h3></article><div class=my-4><a href=https://b.hui.ke/tags/vulnerability/ class="inline-block bg-tertiary-bg text-sm rounded px-3 py-1 my-1 me-2 hover:text-eureka">#Vulnerability</a>
<a href=https://b.hui.ke/tags/%E6%BC%8F%E6%B4%9E/ class="inline-block bg-tertiary-bg text-sm rounded px-3 py-1 my-1 me-2 hover:text-eureka">#漏洞</a>
<a href=https://b.hui.ke/tags/%E6%BC%8F%E6%B4%9E%E5%88%86%E7%B1%BB/ class="inline-block bg-tertiary-bg text-sm rounded px-3 py-1 my-1 me-2 hover:text-eureka">#漏洞分类</a></div><div class=py-2><div class="my-8 flex flex-col items-center md:flex-row"><a href=https://b.hui.ke/authors/hui.ke/ class="md:me-4 text-primary-text h-24 w-24"><img src=https://b.hui.ke/bagua.webp class="bg-primary-bg w-full rounded-full" alt=Avatar></a><div class="mt-4 w-full md:mt-0 md:w-auto"><a href=https://b.hui.ke/authors/hui.ke/ class="mb-2 block border-b pb-1 text-lg font-bold"><h3>Hui.Ke</h3></a><span class="block pb-2">❤ Cyber Security | Safety is a priority.</span>
<a href=mailto:3199731997@qq.com class=me-2><i class="fas fa-envelope"></i></a>
<a href="https://wpa.qq.com/msgrd?v=3&uin=3199731997" class=me-2><i class="fab fa-qq"></i></a>
<a href=/images/aixinxianquan.webp class=me-2><i class="fab fa-weixin"></i></a></div></div></div><div class="-mx-2 mt-4 flex flex-col border-t px-2 pt-4 md:flex-row md:justify-between"><div><span class="text-primary-text block font-bold">Previous</span>
<a href=https://b.hui.ke/posts/pentest-code-of-conduct/ class=block>渗透测试行为准则</a></div><div class="mt-4 md:mt-0 md:text-right"><span class="text-primary-text block font-bold">Next</span>
<a href=https://b.hui.ke/posts/hw-vulnerability-submission-instructions/ class=block>漏洞提交说明</a></div></div><div id=valine-comments class=mt-4></div><script defer src=https://cdn.jsdelivr.net/npm/valine@1.4.16/dist/Valine.min.js integrity=sha384-e0+DNUCJo75aOAzHQbFWYBCM9/S4f0BhRJXvEgbE3mMS85RM20MSSGStHuNdY2QK crossorigin></script>
<script>document.addEventListener("DOMContentLoaded",function(){new Valine({el:"#valine-comments",appId:"BQnVqWIiq78AdqwyhvBVAa3y-MdYXbMMI",appKey:"RKg5By312YjM8rU6WkkfK9IN",recordIP:"true",serverURLs:"https://l.hui.ke",visitor:"true"})})</script></div><div class=col-span-2><div class="bg-secondary-bg prose max-w-none rounded p-6"><h3>Series of Posts</h3><a href=https://b.hui.ke/posts/vulnerability-directory/ class=no-underline>漏洞目录</a><br></div><div class="bg-primary-bg
prose sticky top-16 z-10 hidden px-6 py-4 lg:block"><h3>On This Page</h3></div><div class="sticky-toc hidden px-6 pb-6 lg:block"><nav id=TableOfContents><ul><li><a href=#it信息系统漏洞>IT信息系统漏洞</a><ul><li><a href=#xss漏洞>XSS漏洞</a></li><li><a href=#任意文件上传漏洞>任意文件上传漏洞</a></li><li><a href=#ssrf漏洞>SSRF漏洞</a></li><li><a href=#文件遍历漏洞>文件遍历漏洞</a></li><li><a href=#远程命令执行漏洞>远程命令执行漏洞</a></li><li><a href=#弱口令漏洞>弱口令漏洞</a></li><li><a href=#其他漏洞>其他漏洞</a></li><li><a href=#csrf漏洞>CSRF漏洞</a></li><li><a href=#拒绝服务漏洞>拒绝服务漏洞</a></li><li><a href=#远程文件包含漏洞>远程文件包含漏洞</a></li><li><a href=#本地文件包含漏洞>本地文件包含漏洞</a></li><li><a href=#错误配置漏洞>错误配置漏洞</a></li><li><a href=#任意文件操作漏洞>任意文件操作漏洞</a></li><li><a href=#缓冲区溢出漏洞>缓冲区溢出漏洞</a></li><li><a href=#xxe漏洞>XXE漏洞</a></li><li><a href=#信息泄露漏洞>信息泄露漏洞</a></li><li><a href=#支付逻辑漏洞>支付逻辑漏洞</a></li><li><a href=#密码重置漏洞>密码重置漏洞</a></li><li><a href=#任意注册>任意注册</a></li><li><a href=#任意登陆>任意登陆</a></li><li><a href=#撞库扫号暴力破解>撞库/扫号/暴力破解</a></li><li><a href=#其他认证缺陷>其他认证缺陷</a></li><li><a href=#系统服务器补丁不及时漏洞>系统/服务器补丁不及时漏洞</a></li><li><a href=#jsonp漏洞>JSONP漏洞</a></li><li><a href=#反序列化漏洞>反序列化漏洞</a></li><li><a href=#url重定向漏洞>URL重定向漏洞</a></li><li><a href=#任意文件下载漏洞>任意文件下载漏洞</a></li><li><a href=#代码执行漏洞>代码执行漏洞</a></li><li><a href=#水平越权漏洞>水平越权漏洞</a></li><li><a href=#垂直越权漏洞>垂直越权漏洞</a></li><li><a href=#条件竞争漏洞>条件竞争漏洞</a></li><li><a href=#疑似入侵存在后门>疑似入侵/存在后门</a></li><li><a href=#释放重引用>释放重引用</a></li><li><a href=#双重释放>双重释放</a></li><li><a href=#权限提升绕过>权限提升/绕过</a></li><li><a href=#数组越界访问>数组越界访问</a></li><li><a href=#内核提权>内核提权</a></li><li><a href=#注入漏洞>注入漏洞</a></li></ul></li><li><a href=#工业系统漏洞>工业系统漏洞</a></li><li><a href=#车联网漏洞>车联网漏洞</a></li><li><a href=#移动终端漏洞>移动终端漏洞</a><ul><li><a href=#组件暴露权限漏洞>组件暴露/权限漏洞</a></li><li><a href=#webview命令执行>WebView命令执行</a></li><li><a href=#ssl证书验证错误>SSL证书验证错误</a></li><li><a href=#不安全存储>不安全存储</a></li><li><a href=#硬编码敏感信息>硬编码敏感信息</a></li></ul></li></ul></nav></div><script>window.addEventListener("DOMContentLoaded",()=>{enableStickyToc()})</script></div><div class="bg-secondary-bg prose col-span-2 rounded p-6 lg:col-span-6"><h3>See Also</h3><a href=https://b.hui.ke/posts/hw-vulnerability-submission-instructions/ class=no-underline>漏洞提交说明</a><br></div></div><script>document.addEventListener("DOMContentLoaded",()=>{hljs.highlightAll()})</script></div></div></main><footer class=pl-scrollbar><div class="mx-auto w-full max-w-screen-xl"><div class="text-center p-6 pin-b"><script async src=/js/click.js></script><div id=poem_ip></div><script type=text/javascript>jinrishici.load(function(e){tags.innerHTML=e.data.matchTags})</script><div><span id=timeDate>载入年天数...</span><span id=times>载入时分秒...</span>
<script async src=/js/duration.js></script></div><a href=https://www.foreverblog.cn/go.html target=_blank><img src=https://img.foreverblog.cn/wormhole_4_tp.gif alt style=display:inline-block;width:auto;height:32px title=穿梭虫洞-随机访问十年之约友链博客></a><p class="text-sm text-tertiary-text"><script async src=//busuanzi.ibruce.info/busuanzi/2.3/busuanzi.pure.mini.js></script>本站总访问量 <span id=busuanzi_value_site_pv></span> 次
&#183; 您是本站的第 <span id=busuanzi_value_site_uv></span> 个小伙伴</p><script async src=/js/tab.js></script></div></div></footer></body></html>