au moins Dépasser De moisi sysdate sleep 12 0 XOR Taché de sang la neige va décider
Lu3ky13 on Twitter: "how I found XSS AND SQL INJECTION 1 I found text.php 2 I used Arjun to find parameters 3 text.Php?m=1'xss and SQL done, I submitted to h1 #bugbounty #hackerone #
N$ 🍥 on Twitter: "Blind #SQLInjection on #GraphQL The API accepts queries for user "gender" data and accepts 3 keywords "M,F,NA", I found the parader "xxxkeyword_xx_xx" is vulnerable to blind-SQL injection attacks
Search results for: '0"XOR(if(now()=sysdate(),sleep(12),0))XOR"Z" AND 2*3*8=6*8 AND "Z0cm"="Z0cm'
N$ 🍥 on Twitter: "I was testing an app's #oauth2 today and randomly inject the payload "0'XOR(if(now()=sysdate(),sleep(6-2),0))XOR'Z", with php extension, and booom it was blind #SQLinjection...wt**, never knew SQLi payloads can be
Test Payload: 'XOR(if(now()=sysdate(),sleep(10),0))OR' · Issue #4091 · sqlmapproject/sqlmap · GitHub
I Earned $3500 and 40 Points for A GraphQL Blind SQL Injection Vulnerability. | by nav1n🍥 | Mar, 2023 | Medium
Hammad 🇵🇰 on Twitter: "Found another SQLi on @Bugcrowd 's private program #ItTakesACrowd #BugBounty #bugbountytips #bugbountytip Tip: Use this payload 0'XOR(if(now()=sysdate(),sleep(15),0))XOR'Z In the value of every parameter and check if response ...