Advertisement
Guest User

Untitled

a guest
Mar 26th, 2017
64
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.70 KB | None | 0 0
  1. Using the GET HTTP method, Nessus found that :
  2. + The following resources may be vulnerable to injectable parameter :
  3. + The 'target' parameter of the /phpMyAdmin/index.php CGI :
  4. /phpMyAdmin/index.php?target=%00aqumwy
  5. -------- output --------
  6. </div> <input type="hidden" name="server" value="1" /></fieldset>
  7. <fieldset class="tblFooters">
  8. <input value="Go" type="submit" id="input_go" /><input type="hidden" nam
  9. e="target" value=".aqumwy" /><input type="hidden" name="lang" value="en"
  10. /><input type="hidden" name="collation_connection" value="utf8_unicode_
  11. ci" /><input type="hidden" name="token" value="a0bf0035955980a4e6546e545
  12. 5aab1f6" /></fieldset>
  13. </form></div></div></body></html>
  14. ------------------------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement