DB: 2020-05-04

1 changes to exploits/shellcodes
This commit is contained in:
Offensive Security 2020-05-04 05:01:47 +00:00
parent 9de5d20d13
commit ba366e9374

View file

@ -12,8 +12,7 @@
# cf
#
# Three stages:
# 1. Use the SQL Injection to get the contents of the cache for current
endpoint
# 1. Use the SQL Injection to get the contents of the cache for current endpoint
# along with admin credentials and hash
# 2. Alter the cache to allow us to write a file and do so
# 3. Restore the cache
@ -67,8 +66,7 @@ class DatabaseCondition
class SelectQueryExtender {
# Contains a DatabaseCondition object instead of a SelectQueryInterface
# so that $query->compile() exists and (string) $query is controlled by
us.
# so that $query->compile() exists and (string) $query is controlled by us.
protected $query = null;
protected $uniqueIdentifier = QID;