{"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fblog.hamayanhamayan.com%2Fentry%2F2020%2F08%2F11%2F144803\" title=\"dark_eyes [LORD OF SQLINJECTION] - \u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","type":"rich","version":"1.0","title":"dark_eyes [LORD OF SQLINJECTION]","image_url":null,"blog_url":"https://blog.hamayanhamayan.com/","author_url":"https://blog.hatena.ne.jp/hamayanhamayan/","author_name":"hamayanhamayan","width":"100%","provider_name":"Hatena Blog","description":"Lord of SQLInjection include \"./config.php\"; login_chk(); $db = dbconnect(); if(preg_match('/prob|_|\\.|\\(\\)/i', $_GET[pw])) exit(\"No Hack ~_~\"); if(preg_match('/col|if|case|when|sleep|benchmark/i', $_GET[pw])) exit(\"HeHe\"); $query = \"select id from prob_dark_eyes where id='admin' and pw='{$_GET[pw]}\u2026","url":"https://blog.hamayanhamayan.com/entry/2020/08/11/144803","height":"190","published":"2020-08-11 14:48:03","categories":["Security"],"blog_title":"\u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093","provider_url":"https://hatena.blog"}