From 87a48191f2c0e2c9a3b71072cebd3297326fee50 Mon Sep 17 00:00:00 2001 From: Rainyseason <73454853+Rainyseason-c@users.noreply.github.com> Date: Fri, 9 May 2025 15:30:49 +0800 Subject: [PATCH] =?UTF-8?q?Update=20Supermap=20iServer=E4=BB=BB=E6=84=8F?= =?UTF-8?q?=E6=96=87=E4=BB=B6=E8=AF=BB=E5=8F=96=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- wpoc/Supermap iServer/Supermap iServer任意文件读取漏洞.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/wpoc/Supermap iServer/Supermap iServer任意文件读取漏洞.md b/wpoc/Supermap iServer/Supermap iServer任意文件读取漏洞.md index 990c126..b0a0e47 100644 --- a/wpoc/Supermap iServer/Supermap iServer任意文件读取漏洞.md +++ b/wpoc/Supermap iServer/Supermap iServer任意文件读取漏洞.md @@ -1,6 +1,6 @@ ## Supermap iServer任意文件读取漏洞 -## 简介 +## 漏洞描述 北京超图软件股份有限公司是聚焦地理信息软件和空间智能领域的基础软件与应用软件厂商,Supermap iServer 存在文件读取漏洞,攻击者可获取用于认证的tokenKey ## fofa