We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SQL Injection
1.1
Vulnerability Documentation:adminpost.php
Parameter: name
POST /admin/loginpost.php HTTP/1.1 Content-Type: application/x-www-form-urlencoded X-Requested-With: XMLHttpRequest Referer: http://192.168.2.101/ Cookie: PHPSESSID=28s17sili7ldmc68goe212s593 Content-Length: 29 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,br User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Host: 192.168.2.101 Connection: Keep-alive login=&name=1232*&pass=123456
Vulnerability Documentation:cha.php
POST /cha.php HTTP/1.1 Host: 192.168.2.24 Content-Length: 57 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.2.24 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.102 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.2.24/cha.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=qhndee8uhjmf0g0nrul6nmcurs Connection: close name=1*&go=%E6%9F%A5%E8%AF%A2%E7%95%99%E8%A8%80
Filtering of user input or using magic methods.
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Forget Heart Message Box 1.1 has multiple SQL injections
Vulnerability Type :
SQL Injection
Vulnerability Version :
1.1
Recurring environment:
Vulnerability Description AND recurrence:
Vulnerability Documentation:adminpost.php
Parameter: name
Vulnerability Documentation:cha.php
Parameter: name
Restoration suggestions
Filtering of user input or using magic methods.
The text was updated successfully, but these errors were encountered: