Don't miss your chance to take the Fabric Data Engineer (DP-600) exam for FREE! Find out how by watching the DP-600 session on-demand now through April 28th.
Learn moreJoin the FabCon + SQLCon recap series. Up next: Power BI, Real-Time Intelligence, IQ and AI, and Data Factory take center stage. All sessions are available on-demand after the live show. Register now
I tried to exploit a vulnerability that was found with a program that find vulnerable but sqlmap says this message though it's vulnerable to be cause and how I can go over
[WARNING] The GET parameter 'query' does not seem to be injectable
[18:18:41] [CRITICAL] all tested parameters appear to be not injectable. Try to increase '-level' / '- risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp'). If you suspect that there is some kind of protection mechanism involved (eg WAF), maybe you could try again with a '--tamper' option (eg '--tamper = space2comment')
Solved! Go to Solution.
going from what you have posted it seem that sqlmap is telling you that the tests it ran cant find a way to inject.
Have you tried using the parameters in the logs?
going from what you have posted it seem that sqlmap is telling you that the tests it ran cant find a way to inject.
Have you tried using the parameters in the logs?
i have used parameters from the documentation and vain the parameter is vulnerable as it is found with owasp zap but can not pass those waf protectors with code can use to be able to pass for filtering
Check out the April 2026 Power BI update to learn about new features.
If you have recently started exploring Fabric, we'd love to hear how it's going. Your feedback can help with product improvements.
A new Power BI DataViz World Championship is coming this June! Don't miss out on submitting your entry.
| User | Count |
|---|---|
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 1 |
| User | Count |
|---|---|
| 6 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |