url with time based blind sql injection payload not working. #406
Replies: 1 comment 7 replies
-
@HarshilPatel007 the latest version of httpx is 1.1.2, also make sure to feed these URLs with quotes |
Beta Was this translation helpful? Give feedback.
7 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Describe the bug
url with time based blind sql injection payload not working.
ex.
https://website.com/page.php?id=1'+/*!or*/+/*!sleep*/(5)--+-
Environment details
Please share the below details to help us quickly validate/replicate the issue.
httpx -version
:v1.1.1
go version
:go version go1.17.1 linux/amd64
Error details
given url doesn't worked.
Beta Was this translation helpful? Give feedback.
All reactions