Thank you very much!
URL:
http://udopage.com/ssep/index.phpMethod="POST"
data="isajax=1&sugest=xxx"
Parameter BUG: sugest
Payload(Bitcointalk does not allow me to place the payload):
https://i.ibb.co/hcS58QN/p-iota.pngType Vulnerability: SQL Injection Boolean
The problem is that it is not filtered correctly in some parameters, and with a type of vulnerability like this, you can extract data from the server databases.