From a9618ab034eb6ee2f2a476a5c73fce1221a52375 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Fri, 12 Jun 2020 15:06:09 +0800 Subject: [PATCH] =?UTF-8?q?add=20=E6=9E=81=E8=87=B4=20CMS=EF=BC=88?= =?UTF-8?q?=E4=BB=A5=E4=B8=8B=E7=AE=80=E7=A7=B0:=20JIZHICMS=EF=BC=89?= =?UTF-8?q?=E7=9A=84=E4=B8=80=E6=AC=A1=E5=AE=A1=E8=AE=A1=20-=20SQL=20?= =?UTF-8?q?=E6=B3=A8=E5=85=A5=20+=20=E5=82=A8=E5=AD=98=E8=A1=8C=20XSS=20+?= =?UTF-8?q?=20=E9=80=BB=E8=BE=91=E6=BC=8F=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 7f062b4..cb0f122 100644 --- a/README.md +++ b/README.md @@ -447,7 +447,7 @@ - [入门KKCMS代码审计](./books/入门KKCMS代码审计.pdf) - [SpringBoot 相关漏洞学习资料,利用方法和技巧合集,黑盒安全评估 checklist](https://github.com/LandGrey/SpringBootVulExploit) - [文件上传突破waf总结](./books/文件上传突破waf总结.pdf) -- [极致CMS(以下简称_JIZHICMS)的一次审计-SQL注入+储存行XSS+逻辑漏洞](./books/极致CMS(以下简称_JIZHICMS)的一次审计-SQL注入+储存行XSS+逻辑漏洞.pdf) +- [极致CMS(以下简称_JIZHICMS)的一次审计-SQL注入+储存行XSS+逻辑漏洞](./books/极致CMS(以下简称_JIZHICMS)的一次审计-SQL注入+储存行XSS+逻辑漏洞.pdf)|[原文地址](https://xz.aliyun.com/t/7872) ## 说明