漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple SQL injection vulnerabilities in Milkeyway Captive Portal 0.1 and 0.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) username, (2) password, (3) team, (4) level, (5) status, (6) teamname, and (7) teamlead parameters in (a) auth.php; the (8) username, (9) action, and (10) filter parameters in (b) authuser.php; the (11) username parameter in (c) utils.php; the (12) id and (13) date parameters in (d) traffic.php; the (14) username parameter in (e) userstatistics.php; and the (15) USERNAME and (16) PASSWORD parameters in a cookie to (f) chgpwd.php.
漏洞信息
N/A
漏洞
N/A
漏洞
Milkeyway Captive Portal 多个SQL注入漏洞
漏洞信息
Milkeyway Captive Portal 0.1和0.1.1中存在多个SQL注入漏洞,远程攻击者可通过以下途径执行任意SQL命令:在(a) auth.php中的(1)username,(2)password,(3) team,(4) level,(5) status,(6) teamname,和(7) teamlead参数;在(b) authuser.php中的(8) username,(9) action,和(10) filter参数;在(c) utils.php中的(11) username参
漏洞信息
N/A
漏洞
N/A