You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The text was updated successfully, but these errors were encountered:
T3qui1a
changed the title
There is a sqlinjection via admin/?n=logs&c=index&a=dodel
There is a sqlinjection in MetInfo 7.0.0 via admin/?n=logs&c=index&a=dodel
Dec 2, 2019
T3qui1a
changed the title
There is a sqlinjection in MetInfo 7.0.0 via admin/?n=logs&c=index&a=dodel
There is a sql injection in MetInfo 7.0.0 via admin/?n=logs&c=index&a=dodel
Dec 4, 2019
T3qui1a
changed the title
There is a sql injection in MetInfo 7.0.0 via admin/?n=logs&c=index&a=dodel
Metinfo7.0 SQL Blind Injection
Dec 4, 2019
Vulnerability Name: Metinfo7.0 CMS Background SQL Blind Injection
Product Homepage: https://www.metinfo.cn/
Software link: https://u.mituo.cn/api/metinfo/download/7.0.0beta
Version: V7.0.0
Vulnerability code
logs/index.class.php
line32-line45
the parameter "id" can be inject
payload:
The text was updated successfully, but these errors were encountered: