### 简要描述: 0.0 ### 详细说明: live800.com 注入一枚~ http://www.szlive800.com/faq.asp?id=11 sql注入 [<img src="https://images.seebug.org/upload/201409/24173629ab00769df26057f030af5b152953b656.jpg" alt="0.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/24173629ab00769df26057f030af5b152953b656.jpg) [<img src="https://images.seebug.org/upload/201409/241736369b0bd42a1825657c64953c1f3e6f6761.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/241736369b0bd42a1825657c64953c1f3e6f6761.jpg) [<img src="https://images.seebug.org/upload/201409/24173644b42be1326827774799f999b807f0d682.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/24173644b42be1326827774799f999b807f0d682.jpg) [<img src="https://images.seebug.org/upload/201409/24173659e02593d35233f01346ca57bdba6a2df7.jpg" alt="3.jpg" width="600"...
### 简要描述: 0.0 ### 详细说明: live800.com 注入一枚~ http://www.szlive800.com/faq.asp?id=11 sql注入 [<img src="https://images.seebug.org/upload/201409/24173629ab00769df26057f030af5b152953b656.jpg" alt="0.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/24173629ab00769df26057f030af5b152953b656.jpg) [<img src="https://images.seebug.org/upload/201409/241736369b0bd42a1825657c64953c1f3e6f6761.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/241736369b0bd42a1825657c64953c1f3e6f6761.jpg) [<img src="https://images.seebug.org/upload/201409/24173644b42be1326827774799f999b807f0d682.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/24173644b42be1326827774799f999b807f0d682.jpg) [<img src="https://images.seebug.org/upload/201409/24173659e02593d35233f01346ca57bdba6a2df7.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/24173659e02593d35233f01346ca57bdba6a2df7.jpg) ok ### 漏洞证明: 如上