Movie video (kik) www.2cto.com
The program is good, but the vulnerabilities are also good. It may be that the program developers take care of the vast majority of hackers ~~ If this is the case, thanks to the developer ~~~ (The more program developers like China, the better.-Oh! Who beat me with a banana peel ~~ 5555 will it be okay if I don't talk nonsense ~!)
Vulnerability occurs in Utility/UploadFile/FileList. asp
On this page, you can directly upload the following shell steps:
Add Utility/UploadFile/FileList. asp to the upload page and create a folder, such as 123.asp.
Then, in the folder we just created, upload asp Trojans in jpg format, such as xx.jpg (asp Parsing Vulnerability 123 is used here. the image trojan in the asp folder will be parsed to the asp format) and then open the uploaded asp Trojan ~ Shell successfully obtains
Keywords: Powered by gb/company. asp or Powered by planning and design: Internet of vendors