I'm using an SEO pack plugin that keeps a list of 404 errors, so we can make redirects. As of a couple of weeks ago, I keep seeing a LOT of 404s that don't
Here is the attack. press-detail.php?id=999999.9+%2f**%2fuNiOn%2f**%2faLl+%2f
I have an E-commerce site (built on OpenCart 2.0.3.1). I'm using an SEO pack plugin that keeps a list of 404 errors, so we can make redirects.
1. I have an E-commerce site (built on OpenCart 2.0.3.1). I'm using an SEO pack plugin that keeps a list of 404 errors, so we can make redirects. As of a couple of weeks ago, I keep seeing a LOT of 404s that don't even look like links
До сих пор этот нехороший чел пытается меня взломать. Заходит через IP 77.122.74.7 и 176.99.181.20. По его запросам нашел одну уязвимость, если ввести например: '0=A, можно увидеть по каким столбцам происходит выборка.
You can clearly see rules containing keywords "select", "union", "all" etc.
It could be the content is too long to be indexed. I've using hashed content as index key instead of text
In my opinion, the aim of these requests is to check the presence or absence of a sql injection. This is the part of the query that is trying to inject: 999999.9 union all select "91351456272.9"
Тогда сработает UNION ALL. Такое совпадение достигается методом перебора вариантов (16-ричные числа, судя по всему для этого и служат – идёт запрос разного количества констант с целью выяснения количества полей в штатном запросе.
It appears that I am getting floods of SQL Injection attempts. Any tips to stop this from happening? Below is a sample of the error.