Program: Wangqu Online Shopping System Multi-User fashion version Build 101101
Download: http://www.bkjia.com/ym/201011/24548.html
/Admin/listshj. asp? Id = 4567 is thrown into the ah d to run.
Listshj. asp is not verified, where
Shjiaid =
Testing Points for WEB Security TestingTest points to be considered for Security Testing
1,Problem: no input verifiedTest method:
Data Type (string, integer, real number, etc)Supported character sets
Minimum and maximum lengthWhether empty input is
Brief description: After you access the XSS page, a prompt box is displayed for cookie information, account password, and other information;If you re-create a page, insert the page containing XSS and obtain the prompt box content;The Administrator
Author: zhimaLobularForum:Http://www.sinhack.comToday I met a site with injection points, but smartManualInjection, because it is an accessDatabase, Open SourceProgram,ManagementIf you modify the name of a management table and leave a false value,
Brief description:
Modify a function to get for submission.Detailed description:
Set the blog permission to GET and submit. you can insert a link image in the blog, so that the target user can open the permission.Proof of vulnerability:
For
Legend of the wind
Affected Versions: Xiaoyao online shop system V3.0Official Website:Http://www.buyok.cn/
Vulnerability Type: Cookie SpoofingVulnerability description:
OK. This is an online store. I originally wanted to find the injection first. It
Author: akensTarget: about 800 of domestic comprehensive game sitesThere is no technical content in the intrusion process. It is just some ideas and experiences. If you write something wrong, please contact Daniel. Although it was detected in, the
Author: Mind
Learning and analyzing simple article system a star Official SystemA star officially uses this system. Today, a netizen asked me if this program could be used daily. For this star, I decided to help me read it.
Learning and analyzing
There are two methods to break through the first-class monitoring system to write shell (PS: I only know 2)
Another method is to bind images. The second method is introduced.
Set xPost = CreateObject ("Microsoft. XMLHTTP ")
XPost. Open "GET", "http:
Vulnerability Description: QuarkMail is an email system launched by Beijing xiongzhi weiye Technology Co., Ltd. It is widely used in e-mail solutions in various fields. Its webmail is partially compiled using perl cgi, however, 80sec has discovered
I didn't see the front-end. A friend threw it to me. admin is the default backend.Go in and read it. Analyzed the webshell method.
1. admin/UpPicFile. asp? Path = ../Include traverse the whole site
2. admin/UpFileSave. asp has no verification.
Lanke enterprise website management system (w78) V1.0 Vulnerability
The backend image--marker search word is also found--(but the file name is different --)
Nothing--ewebeditor 5.5 ghost Vulnerability http: // XXXXXXXXXXXX/eWebEditorasp/upload.
Google Keyword: inurl: P_view asp? Pid =
Vulnerability file: Clkj_Inc/WebOut. asp
FROM http://www.st999.cn/blog
Use cookies: username = uname = admin; userpas = upas = admin;
Open the ah d injection tool or other tools that can modify the cookie,
Vulnerable To Blind SQL Injection # By Jackh4xor @ W4ck1ng-Http://www.jackh4xor.com/
Http://www.hackerregiment.com/mysql-com-vulnerable-to-blind-sql-injection.html
The Mysql website offers database software, services and support for your business,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.