Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Using the GET HTTP method, Nessus found that :
- + The following resources may be vulnerable to injectable parameter :
- + The 'target' parameter of the /phpMyAdmin/index.php CGI :
- /phpMyAdmin/index.php?target=%00aqumwy
- -------- output --------
- </div> <input type="hidden" name="server" value="1" /></fieldset>
- <fieldset class="tblFooters">
- <input value="Go" type="submit" id="input_go" /><input type="hidden" nam
- e="target" value=".aqumwy" /><input type="hidden" name="lang" value="en"
- /><input type="hidden" name="collation_connection" value="utf8_unicode_
- ci" /><input type="hidden" name="token" value="a0bf0035955980a4e6546e545
- 5aab1f6" /></fieldset>
- </form></div></div></body></html>
- ------------------------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement