comprehensive tool li>
Ha ha. . . The above code is from the hacking animation. . Haha. . Surprisingly, it is ClassID = no filtration at all.
Analyze the above code, and other code integrate. . We can also construct such url http://www.hack58.com/soft_search.asp?field=softname&classID=8
The result is also the search result of a certain heap. . .
Submit http://www.hack58.com/soft_search.asp?field=softname&classID=8 and 1 = 1 Return to normal
Submit http://www.hack58.com/soft_search.asp?field=softname&classid=8 and 1 = 2 Possible causes of errors:
Hoo. . . The vulnerability has come out. .
Example 3:
Huaxia Hacker Alliance I have to know. . Ha ha. . Some time ago was also black once. . Still watching the code. . I heard that China is using the power of the power. .
gosh. . . Huaxia is not going to go today. . . The proactive principle is the same. . But this is a bit for a long time.
I constructed my URL to see you http://www.77169.org/soft1/search.asp?ss_name=winrara&sor=01 how to play you. . . .
Summary: This vulnerability should have a certain universality, huh, huh. . There is this problem in the black nest security site, don't say it is other sites. Hacker animation and Huaxia hackers seem to use power. . Ha ha. . Perhaps some prawns have long been discovered, and the younger brother is in this ugly. The first time I write articles, there is a mistake in it. . Welcome to contact me.
Zhouzhen on September 29, 2004