-
```php
function add_func($did){
$did=$_GET['maple'];
$pid="random";
$pid=$pid.$did;
$a = $pid ^ 'randow';
$b = $a.'aaaaaaaaaaaaaaaaaaaaaaaaaaa';
mysql_query($b);
}
```
为什么这里会选择略过呢? 考虑了…
m4p1e updated
3 years ago
-
I request http://localhost:8081/search/user?foo=new java.lang.ProcessBuilder({'/bin/bash','-c','echo 3vilhax0r>/tmp/hacked'}).start() and /tmp/hacked file is not created.
----------------------------…
-
4u
-
test issue
-
删除以下内容导致漏洞提交失败
![image](https://user-images.githubusercontent.com/111113703/210744884-5eb7663b-764a-431d-a181-5abe15b33297.png)
![image](https://user-images.githubusercontent.com/111113703/210745178…
-
RLRep为智能合约开发者自动提供智能合约修复建议。希望可以复现该工具。在复现过程中遇到以下几个问题,希望您可以解答:
1. 运行该命令python main.py multistep_RLRep dataset_vul/newALLBUGS,出现:
line 1:8 mismatched input '(' expecting 'constant'
line 1:16 mismatched…
-
New XD design spec:
Move title into the purple component.
Update font.
Add shadow to the equation box in the upper left.
-
good tool but,, i try one vul heroku site,but somehow your tool cant detect it
-
Hi, I found multiple XSS vulnerabilities in Codiad-2.8.4.
Detail:
1. path: Codiad-2.8.4/components/user/dialog.php
parameter: ?action=projects&username=alert(1)
2. path: Codiad-2.8.4/c…
-
Vulnerable Library - spring-boot-starter-web-2.2.0.RELEASE.jar
Path to dependency file: /java/ssti/pom.xml
Path to vulnerable library: /java/ssti/pom.xml,/java/des-yaml/pom.xml
Found in HEAD com…