1. For example, a Web horse url path http://www.xxx.com/aa.asp/1.txt
Then, after entering the web Trojan password, the submitted page is http://www.xxx.com/aa.asp, which directly reports that the password cannot be found at 404. In fact, we can
S40 is a free content management system. S40 0.4.2b has the SQL injection vulnerability, which may cause sensitive information leakage.
[+] Info:~~~~~~~~~S40 CMS 0.4.2b LFI VulnerabilityScript] S40 CMS 0.4.2 Beta[Location] http://s40.biz /? P =
Brief description: The application is not configured for security. You can remotely access the system.Description: The jmx-console can be accessed anonymously.
You can then use the default vulnerability configuration.
Finally, you can smoothly
Brief description:The Sohu spam email center is written in python. However, due to incorrect parameter filtering and incorrect program configuration, more information may be leaked.
Detailed description:HTTP/1.1 500 Internal Server Error
Server:
Detailed description:Http://game.sina.cn/download/downpage/netarea/id/1600003/wapc/5000_0005_003
The SQL injection vulnerability is caused by lax id filtering and error-free processing.
Proof of
Kerry hacker blog
Vulnerability Description: The SQL injection vulnerability is caused by loose filtering of dalyaks Cms.Official Website: http://www.dalYlak.com/
Vulnerability Testing:Http://www.bkjia.com/categories.php? Act = show & id = [SQL]
When we have a linux shell (multiple websites on the server ).This shell has the write permission to the root directory of the website, and can even view the directories of other websites.Therefore, such host settings are definitely
Author: YoCo Smart::{ Silic Group Hacker Army }::Site: http://blackbap.orgAs many people ask me questions about the problem that the injection cannot guess the table, I will give you an example. In fact, the MySql database version is enough. Instead
Multiple CSRF vulnerabilities in PHPDug 2.0. Laruence doesn't know much about CSRF. Khan!
Vulnerability details:
The vulnerability exists in that the "adm/admin_edit.php" script does not properly verify the source of the HTTP request.
Successful
I wrote some statements to determine the database type, which is convenient for manual testing. It cannot be completely correct or accurate because the statements vary according to different conditions.Xxx. xxx? Xx = x and exists (select * from
Phpopentailorshop is an order management system. phpopentailorshop has the local file inclusion vulnerability, which may cause sensitive information leakage.
[+] Info:~~~~~~~~~# Exploit Title: phpopentailorshop Multiple Vulnerabilities# Author:
Vulnerability Description: Q8portals is a foreign asp content management system. Due to design defects, it causes SQL injection vulnerabilities.
Vulnerability types: SQL Injection, script injection, blind injection, and Injection Vulnerabilities
Prepared by: h4ck3aOfficial Website: www.86CMS.com
Access this address firstCopy the content to the clipboard program code
Http://www.bkjia.com/admin/cms86eWebEditor/asp/upload.asp? Action = save & type = image & style = popup & cusdir = 1.asp
Administer-> site building-> modules-> check PHP filter and save the configuration (this step can be omitted if the other party has enabled php filter ).Administer-> site configuration-> Input formats, select php code mode, and save the
The security problem in the file "ZabetAgahiCategory. php" has been created. [~] Vulnerable File: # [+] Http://www.bkjia.com/ZabetAgahiCategory.php? Cid = [SQL]
#[+]-44 union select 1, concat (admin_name, 0x3a, pwd), 3,4, 5 FROM sbclassified_admin -
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.