Quantcast
Channel: pastebin.com – LeakedIn
Viewing all articles
Browse latest Browse all 2834

Potential leak of data: Targeted Website

$
0
0
Detected 1 occurrence(s) of ‘^target:\s*(http|www)’: ::88::P::::88::::::::::' ':::::::88::88:::::::88::::::::' ''::::::::::::::::::::::::'' '':::::::::::::::'' @An0nGrim =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TARGET: www.nvisinc.com/product.php?id=48 (GET) identified the following injection points with a total of 55 HTTP(s) requests: --- Place: GET Parameter: id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: Source: http://pastebin.com/raw.php?i=7CHdBYqV

Viewing all articles
Browse latest Browse all 2834

Trending Articles