Brief description:DOM-based cross-site, malicious users may inject Vulnerable applications to fool users to collect data from their JavaScript, VBScript ActiveX, HTML, or Flash. Attackers can steal session cookies and take over accounts to simulate
I saw the code two months ago. It should have been sent online ..
Code:
First
Ub savenew ()
Dim Title, Content, ClassID, sqlmoney
Title = LoseHtml (trim (request. form ("Title ")))
ClassID = LaoYRequest (request. form ("ClassID "))
CopyFrom =
11in1 CMS v1.0.1 (do. php) CRLF Injection Vulnerability
Author: 11in1 www.2cto.com official: http://www.11in1.org
Affected Version: 1.0.1
Summary: Eleven in One is an open-source content management
System (CMS) that is powered by PHP and MySQL.
Author: tenzy [ESST]
Information Source: Alibaba Cloud Security Team http://bbs.x-xox-x.com/
The complete reference source code for PHPDDOS can be searched on the Internet.
Let's take a look at the principle.
It's actually very simple,
It is to
Replace the UID.
Proof of vulnerability: a requestToken exists in the form.
However, the strange thing is that requestToken does not work.
Solution: The requestToken takes effect.
Author: androidhacker @ wooyun
WorkPress uses an "author" parameter. This parameter accepts a number as the value and returns the page corresponding to the user ID.Example: http://www.bkjia.com /? Author = 1The following problems exist:1. user IDs increase sequentially.2. If the
Www.2cto.com: can be combined with this article: http://www.bkjia.com/Article/201105/89992.html
Recently, some boring people like to exploit 0-day vulnerabilities to upload traffic attack scripts, which is a headache. Currently, the dedecms
Generally, you need to perform a security test before launching a website of a relatively large scale. (Penetration Test)
Security Testing generally includes the following steps:
1. Select a series of security question points and analyze
Author: knife
Directory0 × 00 click0 × 01 vulnerability search0 × 02 exploitation Vulnerability0 × 03 finished
0x00 click
With another authorization, I initiated a friendship penetration on a site owned by Sao Hu.
Without knowing any information, I
Vulnerabilities can be exploited if the website does not close member registration. (The fckeditor vulnerability on the main site has been supplemented) www.xxxx.com/ /login after registration. Click Edit to add information. (adding and uploading
Baidu and GG told me that too few people are using it.
The problem lies in background login verification.
Private function _ admin_login ()
{
If ((! Empty ($ _ REQUEST ['api ']) | $ _ REQUEST ['api'] = $ this-> p_site ['connection']) | $ _
Brief description: No data constraints are imposed on the submitted data on the form page. As a result, a stored Cross-Site vulnerability exists on the page.
This vulnerability can easily cause other users' cookies to be stolen and infected with
In the past 6.5 (http://www.bkjia.com/Article/201011/78510.html) was issued by the way, (enter the background --- system settings --- manage data tables --- Manage System Models --- import new modules, directly rename the modified php shell to
Title: Mailing List plugin for Wordpress Arbitrary file download
Affected Versions:
By 6 Scan (http://6scan.com) security team
: Http://wordpress.org/extend/plugins/mailz/
Official fix: This advisory is released after the vendor
The problem lies in the http://work.china.alibaba.com is a microblog, we share an image, upload, and then capture the packet, found that the image address is controllable, because there is no filter double quotation marks, resulting in closed src,
Deleting a personal domain name is not filtered. You can change the domain name in hidden to another person's/other groups, and delete the personal domain names of others/other groups. The debugging tool shows that the domain name to be deleted is
The latest version of bluecms is v1.6sp1. variables are escaped in single quotes during login verification. However, you can use gbk Double Byte encoding to close single quotes and then annotate them to enter the background. The login code for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.