MiniBB is a rare open source PHP forum software. The index. PHP file in MiniBB 2.5 has the SQL injection vulnerability, which may cause sensitive information leakage.
[+] Info:~~~~~~~~~MiniBB 2.5 SQL Injection VulnerabilityProduct: MiniBBVendor:
The spread. php page request parameters are included in the query without any filtering, resulting in SQL injection.
Vulnerability file: spread. php
{?> Var s = document. getElementsByTagName (SCRIPT), x = document. createElement (SCRIPT), u =
The WSN Links is an advanced PHP/MySQL-based search script. the SQL injection vulnerability in PHP files may cause leakage of sensitive information.
[+] Info:~~~~~~~~~WSN Links SQL Injection Vulnerability (CVE-2010-4006)Mark Stanislav-mark.stanislav@
Product_box
A suspicious server has opened port 80, port 21, port 3389, and other ports. The webshell has been obtained and has a high permission. You can set up an administrator user and immediately connect to the server.Tragedy, unable to
Vulnerability Description: Duhok Forum is used to upload a file and obtain the shell.
=== [Vulnerable File] === vulnerability File
/Admin/up_xml.php
/Admin/up_style.php
/Idara/up_xml.php
/Idara/up_style.php
Vulnerability Testing:
1-go
#! /Usr/bin/perlUse IO: Socket;Use Net: FTP;$ Host = shift or die "Usage: perl $0 []";$ User = shift or die "Usage: perl $0 []";$ Pass = shift or die "Usage: perl $0 []";$ Log_file = shift;$ Ftp = Net: FTP-> new ($ host) or die "Impossibile
The so-called universal password is the password that directly enters the Administrator background without logon verification. This type of password can be used for many websites with this vulnerability.
I have also collected some information, and
A few days ago, I saw a breakthrough upload idea on the Internet for the type of files that have been decompressed and uploaded.
The general idea is that we put our Trojan file into the compressed package for upload, and then decompress the program
A few days ago, the West Lake edge and coal boss and coffee mentioned the sales and usage problems of a product of a cow. The main reason is that a product of a cow is actually a very nb thing,? Sales are not big and after-sales feedback is not
PHP168 V6.01 permission Escalation VulnerabilityPHP168 is the most powerful website construction system in the PHP field. All codes are open-source and can be easily used for secondary development. All function modules can be freely installed and
The only way for websites to defend against ClickJacking is to use javascript scripts, before X-FRAME-OPTIONS or browser defense deployment is widely used. We call this javascript script -- Frame Busting, and the script that breaks through "Frame
PhpMyAdmin Client Side 0Day Code Injection and Redirect Link Falsification
Credits:
Emanuele emgent Gentili
Marco white_sheep Rondini
Alessandro scox Scoscia
In error. php, PhpMyAdmin permit to insert text and restricted tag, like BBCode.
Author: xhm1n9 [ESST]EMail: xhm1n9@0x70.comSite: http://www.x-xox-x.netDate: 2010-12-27 10:22:15From: http://x-xox-x.net/exploit/11
Something that was released in February.Adminedit_languages.php
Related variables are not filtered!
Elseif ($ _
Design defects
Vulnerability file: admin/ad_data.phpBackup and database restoration function, no management login verification
Check the code ....Case down:$ Filename or message (the file name cannot be blank );File_down (../data/. $ filename
Wen/tU Shucheng Li Yin♂(Fantastic swordsman)The network is filled with colorful blessing methods, a large part of which is implemented through the Wishing Tree program. A few days ago, I just downloaded a set of "three-member Best Wishes" program on
From: B0mbErM @ nDescription: The online repair report function is not submitted for filtering.Analysis: xiu. asp is not submitted for filtering, resulting in execution of any XSS statement.Patch: FilterExp:.../Xiu. asp directly enters the repair
By luoluoOn 2007-11-30Luoluonet_at_yahoo.cnHttp://www.ph4nt0m.orgI. OverviewJavascript function hijacking, that is, the javascript hijacking technology mentioned by foreigners. A piece of code that was accidentally seen when I first discussed the
When I arrived at the Japanese site, I found that HtAdmin was installed.User-agent :*Disallow:/admin_xxx/Disallow:/grxh/Disallow:/x/Disallow:/HTAdmin/Disallow:/xid/Disallow:/pex_xx/Disallow:/ex_txxt/
~ Google will see the following instructions on
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.