{keyword}) Union All Select Null,null,null,null,null,null# May 2026
If this payload successfully returns a blank page instead of an error, it confirms to a tester that the application is vulnerable. From there, they can replace the NULL s with commands to extract sensitive data, such as: Usernames and passwords. Database version and configuration details. The entire contents of specific tables. How to Prevent It
: This treats user input as data, not as executable code. {KEYWORD}) UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL#
: This is a common reconnaissance technique. An attacker uses NULL values to determine the exact number of columns returned by the original query. If the number of NULL s doesn't match the original column count, the database will usually throw an error. By adding or removing NULL s, an attacker can find the correct structure. If this payload successfully returns a blank page