Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ##### #####
- # # ##### # # ##### ##### #### # # # # #### ##### ###### # #
- # # # # # # # # # # # # # # # # ## ##
- # # # # # # # # # ##### # #### # ##### # ## #
- # ##### # ##### # # # # # # # # # #
- # # # # # # # # # # # # # # # # # #
- ##### # # # # # #### ##### # #### # ###### # #
- ####### ###### #####
- # # # ###### # # # # #### #### # ## # # # # # # # #
- # # # # # # # # # # # # # ## # # # # # #
- # ###### ##### ###### # # #### #### # # # # # # # #### # # #
- # # # # # # # # # # # ###### # # # # # # # #
- # # # # # # # # # # # # # # # # ## # # # # #
- # # # ###### # # #### #### #### # # # # # ##### #### #
- # ##### #####
- # ## ##### #### # # # #
- # # # # # # # #
- # # # ##### #### ##### #####
- # ###### # # # # #
- # # # # # # # # #
- ####### # # ##### #### ####### #######
- ####### #####
- # # # ###### # # # # # # # # ###### #####
- # # # # # # # ## # ## # # # #
- # ###### ##### # #### # # # # # # # # ##### # #
- # # # # # # # # # # # # # # # #####
- # # # # # # # # # ## # ## # # #
- # # # ###### ##### #### # # # # ###### # #
- ####### # # #
- # # ## ## ## #### #### # #### # # ####
- # # # # # # # # # # # # # # # # # # #
- ##### # # # # # # # # # # # # #### # #
- # # # # ###### # ### # # # # # # # # #
- # # # # # # # # # # # # # # # # #
- ####### ###### # # # # #### #### ####### #### # # ####
- Statement.
- Enjoy your rest of your day sweet mastercard.
- It's time to cryptocurrency
- server: https://216.119.209.235
- Using the POST HTTP method, Nessus found that :
- + The following resources may be vulnerable to blind SQL injection :
- + The 'username' parameter of the /pkmslogin.form CGI :
- /pkmslogin.form [login-form-type=token&password=699117&username=zztoken&
- password=699117&username=yy]
- -------- output --------
- <!--- END Cookie check block --->
- <BR>
- <!--
- -------- vs --------
- <!--- END Cookie check block --->
- HPDIA0200W Authentication failed. You have used an invalid user name,
- password or client certificate.
- <BR>
- <!--
- ------------------------
- /pkmslogin.form [login-form-type=token&password=699117&username=zztoken&
- password=699117&username=yy] {2}
- -------- output --------
- <!--- END Cookie check block --->
- <BR>
- <!--
- -------- vs --------
- <!--- END Cookie check block --->
- HPDIA0200W Authentication failed. You have used an invalid user name,
- password or client certificate.
- <BR>
- <!--
- ------------------------
- /pkmslogin.form [login-form-type=token&password=699117&username=zztoken&
- password=699117&username=yy] {3}
- -------- output --------
- <!--- END Cookie check block --->
- <BR>
- <!--
- -------- vs --------
- <!--- END Cookie check block --->
- HPDIA0200W Authentication failed. You have used an invalid user name,
- password or client certificate.
- <BR>
- <!--
- ------------------------
- + The 'password' parameter of the /pkmslogin.form CGI :
- /pkmslogin.form [login-form-type=token&username=154601&password=zztoken&
- username=154601&password=yy]
- -------- output --------
- <!--- END Cookie check block --->
- <BR>
- <!--
- -------- vs --------
- <!--- END Cookie check block --->
- HPDIA0200W Authentication failed. You have used an invalid user name,
- password or client certificate.
- <BR>
- <!--
- ------------------------
- /pkmslogin.form [login-form-type=token&username=154601&password=zztoken&
- username=154601&password=yy] {2}
- -------- output --------
- <!--- END Cookie check block --->
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement