2019
01-17
01-17
,该漏洞属于参数注入漏洞 NEW
”title”: “=end `curl -X POST -d \”fizz=buzz\” `” Java “paths”: { ”/a\”; try{java.lang.Runtime.getRuntime().exec(\”ls\”);}catch(Exception e){} \”": 修复简述 仔细检查Swagger特定语言的转义字符, “description”: “*/ echo system(chr(0x6c).chr(0×73)); /*”。该漏洞属于参数注入...
Read More >