Compliance ISO 27001
Compliance ISO 27001
Compliance ISO 27001
27001:2013
Compliance Report
25 November 2016
ISO/IEC 27001 is an information security management system (ISMS) standard published in September 2013 by the International
Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Its full name is ISO/IEC
27001:2013 - Information technology - Security techniques - Information security management systems - Requirements.
The objective of this standard is to provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining,
and improving an Information Security Management System.
Disclaimer
This document or any of its content cannot account for, or be included in any form of legal advice. The outcome of a vulnerability
scan (or security evaluation) should be utilized to ensure that diligent measures are taken to lower the risk of potential exploits
carried out to compromise data.
Legal advice must be supplied according to its legal context. All laws and the environments in which they are applied, are
constantly changed and revised. Therefore no information provided in this document may ever be used as an alternative to a
qualified legal body or representative.
Scan
URL http://testphp.vulnweb.com
Scan date 17/11/2016, 19:22:12
Duration 14 minutes, 35 seconds
Profile Full Scan
Compliance at a Glance
This section of the report is a summary and lists the number of alerts found according to individual compliance categories.
- Inventory of assets(8.1.1)
No alerts in this category
- Handling of assets(8.2.3)
Total number of alerts in this category: 54
- Electronic messaging(13.2.3)
Total number of alerts in this category: 2
- Protection of records(18.1.3)
Total number of alerts in this category: 101
This section is a detailed report that explains each vulnerability found according to individual compliance categories.
(8.1.1)Inventory of assets
Assets associated with information and information processing facilities shall be identified and an inventory of these assets shall
be drawn up and maintained.
(8.2.3)Handling of assets
Procedures for handling assets shall be developed and implemented in accordance with the information classification scheme
adopted by the organization.
Directory traversal
Directory Traversal is a vulnerability which allows attackers to access restricted directories and read files outside of the web
server's root directory.
It is possible to read the source code of this script by using script filename as a parameter. It seems that this script includes a file
which name is determined using user-supplied data. This data is not properly validated before being passed to the include
function.
Weak password
This page is using a weak password. Acunetix WVS was able to guess the credentials required to access this page. A weak
password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using
a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common
variations on these themes.
This directory contains an .htaccess file that is readable. This may indicate a server misconfiguration. htaccess files are
designed to be parsed by web server and should not be directly accessible. These files could contain sensitive information that
could help an attacker to conduct further attacks. It's recommended to restrict access to this file.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-538
Affected item /wvstests/pmwiki_2_1_19
Affected parameter
Variants
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected item /pictures/path-disclosure-unix.html
Affected parameter
Variants
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information core
to the project itself, such as names and locations of its component modules, compiler settings, etc. If you've defined a data source
the file dataSources.ids contains information for connecting to the database and credentials. The workspace.xml file stores
personal settings such as placement and positions of your windows, your VCS and History settings, and other data pertaining to
the development environment. It also contains a list of changed files and other sensitive information. These files should not be
present on a production system.
This script is using phpinfo() function. This function outputs a large amount of information about the current state of PHP. This
includes information about PHP compilation options and extensions, the PHP version, server information and environment (if
compiled as a module), the PHP environment, OS version information, paths, master and local values of configuration options,
HTTP headers, and the PHP License.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
WS_FTP is a popular FTP client. This application creates a log file named WS_FTP.LOG. This file contains sensitive data such as
file source/destination and file name, date/time of upload etc.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or pool of
servers). This allows one server to share its resources, such as memory and processor cycles, without requiring all services
provided to use the same host name.
This web server is responding differently when the Host header is manipulated and various common virtual hosts are tested. This
could indicate there is a Virtual Host present.
One or more email addresses have been found on this page. The majority of spam comes from email addresses harvested off the
internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour the internet looking for
email addresses on any website they come across. Spambot programs look for strings like myname@mydomain.com and then
record any addresses found.
This document has been converted to HTML using Microsoft Office. It seems that Office has included sensitive information during
the conversion.
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
A username and/or password was found in this file. This information could be sensitive.
A username and/or password was found in this file. This information could be sensitive.
Users shall only be provided with access to the network and network services that they have been specifically authorized to use.
The allocation and use of privileged access rights shall be restricted and controlled.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack is an
attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you
discover the one correct combination that works.
This login page doesn't have any protection against password-guessing attacks (brute force attacks). It's recommended to
implement some type of account lockout after a defined number of incorrect password attempts. Consult Web references for more
information about fixing this problem.
The allocation of secret authentication information shall be controlled through a formal management process.
Users shall be required to follow the organization's practices in the use of secret authentication information.
Weak password
This page is using a weak password. Acunetix WVS was able to guess the credentials required to access this page. A weak
password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using
a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common
variations on these themes.
A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack is an
attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you
discover the one correct combination that works.
This login page doesn't have any protection against password-guessing attacks (brute force attacks). It's recommended to
implement some type of account lockout after a defined number of incorrect password attempts. Consult Web references for more
information about fixing this problem.
Access to information and application system functions shall be restricted in accordance with the access control policy.
It is possible to read the source code of this script by using script filename as a parameter. It seems that this script includes a file
which name is determined using user-supplied data. This data is not properly validated before being passed to the include
function.
Weak password
This page is using a weak password. Acunetix WVS was able to guess the credentials required to access this page. A weak
password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using
a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common
variations on these themes.
This directory contains an .htaccess file that is readable. This may indicate a server misconfiguration. htaccess files are
designed to be parsed by web server and should not be directly accessible. These files could contain sensitive information that
could help an attacker to conduct further attacks. It's recommended to restrict access to this file.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-538
Affected item /wvstests/pmwiki_2_1_19
Affected parameter
Variants
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected item /pictures/path-disclosure-unix.html
Affected parameter
Variants
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information core
to the project itself, such as names and locations of its component modules, compiler settings, etc. If you've defined a data source
the file dataSources.ids contains information for connecting to the database and credentials. The workspace.xml file stores
personal settings such as placement and positions of your windows, your VCS and History settings, and other data pertaining to
the development environment. It also contains a list of changed files and other sensitive information. These files should not be
present on a production system.
This script is using phpinfo() function. This function outputs a large amount of information about the current state of PHP. This
includes information about PHP compilation options and extensions, the PHP version, server information and environment (if
compiled as a module), the PHP environment, OS version information, paths, master and local values of configuration options,
HTTP headers, and the PHP License.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
WS_FTP is a popular FTP client. This application creates a log file named WS_FTP.LOG. This file contains sensitive data such as
file source/destination and file name, date/time of upload etc.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or pool of
servers). This allows one server to share its resources, such as memory and processor cycles, without requiring all services
provided to use the same host name.
This web server is responding differently when the Host header is manipulated and various common virtual hosts are tested. This
could indicate there is a Virtual Host present.
One or more email addresses have been found on this page. The majority of spam comes from email addresses harvested off the
internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour the internet looking for
email addresses on any website they come across. Spambot programs look for strings like myname@mydomain.com and then
record any addresses found.
This document has been converted to HTML using Microsoft Office. It seems that Office has included sensitive information during
the conversion.
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
A username and/or password was found in this file. This information could be sensitive.
A username and/or password was found in this file. This information could be sensitive.
Where required by the access control policy, access to systems and applications shall be controlled by a secure log-on
procedure.
Password management systems shall be interactive and shall ensure quality passwords.
Weak password
This page is using a weak password. Acunetix WVS was able to guess the credentials required to access this page. A weak
password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using
a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common
variations on these themes.
A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack is an
attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you
discover the one correct combination that works.
This login page doesn't have any protection against password-guessing attacks (brute force attacks). It's recommended to
implement some type of account lockout after a defined number of incorrect password attempts. Consult Web references for more
information about fixing this problem.
The use of utility programs that might be capable of overriding system and application controls shall be restricted and tightly
controlled.
Directory traversal
Directory Traversal is a vulnerability which allows attackers to access restricted directories and read files outside of the web
server's root directory.
It is possible to read the source code of this script by using script filename as a parameter. It seems that this script includes a file
which name is determined using user-supplied data. This data is not properly validated before being passed to the include
function.
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information core
to the project itself, such as names and locations of its component modules, compiler settings, etc. If you've defined a data source
the file dataSources.ids contains information for connecting to the database and credentials. The workspace.xml file stores
personal settings such as placement and positions of your windows, your VCS and History settings, and other data pertaining to
the development environment. It also contains a list of changed files and other sensitive information. These files should not be
present on a production system.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-538
Affected item /index.bak
Affected parameter
Variants
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
WS_FTP is a popular FTP client. This application creates a log file named WS_FTP.LOG. This file contains sensitive data such as
file source/destination and file name, date/time of upload etc.
Development, testing, and operational environments shall be separated to reduce the risks of unauthorized access or changes to
the operational environment.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information core
to the project itself, such as names and locations of its component modules, compiler settings, etc. If you've defined a data source
the file dataSources.ids contains information for connecting to the database and credentials. The workspace.xml file stores
personal settings such as placement and positions of your windows, your VCS and History settings, and other data pertaining to
the development environment. It also contains a list of changed files and other sensitive information. These files should not be
present on a production system.
This script is using phpinfo() function. This function outputs a large amount of information about the current state of PHP. This
includes information about PHP compilation options and extensions, the PHP version, server information and environment (if
compiled as a module), the PHP environment, OS version information, paths, master and local values of configuration options,
HTTP headers, and the PHP License.
WS_FTP is a popular FTP client. This application creates a log file named WS_FTP.LOG. This file contains sensitive data such as
file source/destination and file name, date/time of upload etc.
Detection, prevention and recovery controls to protect against malware shall be implemented, combined with appropriate user
awareness.
Macromedia Dreamweaver has created a directory (_mmServerScripts or _mmDBScripts) that contains scripts for testing
database connectivity. One of these scripts (mmhttpdb.php or mmhttpdb.asp) can be accessed without user ID or password and
contains numerous operations, such as listing Datasource Names or executing arbitrary SQL queries.
It is possible to read the source code of this script by using script filename as a parameter. It seems that this script includes a file
which name is determined using user-supplied data. This data is not properly validated before being passed to the include
function.
Weak password
This page is using a weak password. Acunetix WVS was able to guess the credentials required to access this page. A weak
password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using
a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common
variations on these themes.
This directory contains an .htaccess file that is readable. This may indicate a server misconfiguration. htaccess files are
designed to be parsed by web server and should not be directly accessible. These files could contain sensitive information that
could help an attacker to conduct further attacks. It's recommended to restrict access to this file.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected item /AJAX/infotitle.php
Affected parameter
Variants
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information core
to the project itself, such as names and locations of its component modules, compiler settings, etc. If you've defined a data source
the file dataSources.ids contains information for connecting to the database and credentials. The workspace.xml file stores
personal settings such as placement and positions of your windows, your VCS and History settings, and other data pertaining to
the development environment. It also contains a list of changed files and other sensitive information. These files should not be
present on a production system.
This script is using phpinfo() function. This function outputs a large amount of information about the current state of PHP. This
includes information about PHP compilation options and extensions, the PHP version, server information and environment (if
compiled as a module), the PHP environment, OS version information, paths, master and local values of configuration options,
HTTP headers, and the PHP License.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
WS_FTP is a popular FTP client. This application creates a log file named WS_FTP.LOG. This file contains sensitive data such as
file source/destination and file name, date/time of upload etc.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or pool of
servers). This allows one server to share its resources, such as memory and processor cycles, without requiring all services
provided to use the same host name.
This web server is responding differently when the Host header is manipulated and various common virtual hosts are tested. This
could indicate there is a Virtual Host present.
This document has been converted to HTML using Microsoft Office. It seems that Office has included sensitive information during
the conversion.
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
CWE CWE-200
Affected item /secured/phpinfo.php
Affected parameter
Variants
A username and/or password was found in this file. This information could be sensitive.
A username and/or password was found in this file. This information could be sensitive.
A username and/or password was found in this file. This information could be sensitive.
System administrator and system operator activities shall be logged and the logs protected and regularly reviewed.
Macromedia Dreamweaver has created a directory (_mmServerScripts or _mmDBScripts) that contains scripts for testing
database connectivity. One of these scripts (mmhttpdb.php or mmhttpdb.asp) can be accessed without user ID or password and
contains numerous operations, such as listing Datasource Names or executing arbitrary SQL queries.
It is possible to read the source code of this script by using script filename as a parameter. It seems that this script includes a file
which name is determined using user-supplied data. This data is not properly validated before being passed to the include
function.
Weak password
This page is using a weak password. Acunetix WVS was able to guess the credentials required to access this page. A weak
password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using
a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common
variations on these themes.
Base Score: 7.5
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected item /userinfo.php
Affected parameter
Variants
This directory contains an .htaccess file that is readable. This may indicate a server misconfiguration. htaccess files are
designed to be parsed by web server and should not be directly accessible. These files could contain sensitive information that
could help an attacker to conduct further attacks. It's recommended to restrict access to this file.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Affected item /showimage.php
Affected parameter
Variants
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-538
Affected item /pictures
Affected parameter
Variants
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information core
to the project itself, such as names and locations of its component modules, compiler settings, etc. If you've defined a data source
the file dataSources.ids contains information for connecting to the database and credentials. The workspace.xml file stores
personal settings such as placement and positions of your windows, your VCS and History settings, and other data pertaining to
the development environment. It also contains a list of changed files and other sensitive information. These files should not be
present on a production system.
This script is using phpinfo() function. This function outputs a large amount of information about the current state of PHP. This
includes information about PHP compilation options and extensions, the PHP version, server information and environment (if
compiled as a module), the PHP environment, OS version information, paths, master and local values of configuration options,
HTTP headers, and the PHP License.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
WS_FTP is a popular FTP client. This application creates a log file named WS_FTP.LOG. This file contains sensitive data such as
file source/destination and file name, date/time of upload etc.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or pool of
servers). This allows one server to share its resources, such as memory and processor cycles, without requiring all services
provided to use the same host name.
This web server is responding differently when the Host header is manipulated and various common virtual hosts are tested. This
could indicate there is a Virtual Host present.
One or more email addresses have been found on this page. The majority of spam comes from email addresses harvested off the
internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour the internet looking for
email addresses on any website they come across. Spambot programs look for strings like myname@mydomain.com and then
record any addresses found.
This document has been converted to HTML using Microsoft Office. It seems that Office has included sensitive information during
the conversion.
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
A username and/or password was found in this file. This information could be sensitive.
A username and/or password was found in this file. This information could be sensitive.
A username and/or password was found in this file. This information could be sensitive.
Macromedia Dreamweaver has created a directory (_mmServerScripts or _mmDBScripts) that contains scripts for testing
database connectivity. One of these scripts (mmhttpdb.php or mmhttpdb.asp) can be accessed without user ID or password and
contains numerous operations, such as listing Datasource Names or executing arbitrary SQL queries.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2
Exploitability: High
Remediation Level: Official_fix
Report Confidence: Confirmed
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CVE CVE-2004-1893
CWE CWE-16
Affected item Web Server
Affected parameter
Variants
A heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote
attackers to execute arbitrary code via a crafted request. The problem affects nginx compiled with the ngx_http_spdy_module
module (which is not compiled by default) and without --with-debug configure option, if the "spdy" option of the "listen" directive is
used in a configuration file.
The PHP configuration directive allow_url_fopen is enabled. When enabled, this directive allows data retrieval from remote
locations (web site or FTP server). A large number of code injection vulnerabilities reported in PHP-based web applications are
caused by the combination of enabling allow_url_fopen and bad input filtering.
Weak password
This page is using a weak password. Acunetix WVS was able to guess the credentials required to access this page. A weak
password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using
a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common
variations on these themes.
This directory contains an .htaccess file that is readable. This may indicate a server misconfiguration. htaccess files are
designed to be parsed by web server and should not be directly accessible. These files could contain sensitive information that
could help an attacker to conduct further attacks. It's recommended to restrict access to this file.
This page is possibly vulnerable to Cross domain data hijacking. If an attacker can create/upload a malicious Flash (SWF) file or
control the top part of any page he can perform an attack known as Cross domain data hijacking. The Content-Type of the
response doesn't matter. If the file is embedded using an <object> tag, it will be executed as a Flash file as long as the content of
the file looks like a valid Flash file.
There are many ways to perform this attack. The attacker doesn't need to upload a file. The only requirement is that an attacker
can control the data on a location of the target domain. One way is to abuse a JSONP API. Usually, the attacker can control the
output of a JSONP API endpoint by changing the callback parameter. However, if an attacker uses an entire Flash file as callback,
we can use it just like we would use an uploaded file in this attack.
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
CWE CWE-538
Affected item /Mod_Rewrite_Shop/images
Affected parameter
Variants
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
The browser security model normally prevents web content from one domain from accessing data from another domain. This is
commonly known as the "same origin policy". URL policy files grant cross-domain permissions for reading data. They permit
operations that are not permitted by default. The URL policy file is located, by default, in the root directory of the target server, with
the name crossdomain.xml (for example, at www.example.com/crossdomain.xml).
When a domain is specified in crossdomain.xml file, the site declares that it is willing to allow the operators of any servers in that
domain to obtain any document on the server where the policy file resides. The crossdomain.xml file deployed on this website
opens the server to all domains (use of a single asterisk "*" as a pure wildcard is supported) like so:
<cross-domain-policy>
</cross-domain-policy>
This practice is suitable for public servers, but should not be used for sites located behind a firewall because it could permit
access to protected areas. It should not be used for sites that require authentication in the form of passwords or cookies. Sites
that use the common practice of authentication based on cookies to access private or user-specific data should be especially
careful when using cross-domain policy files.
The display_errors directive determines whether error messages should be sent to the browser. These messages frequently
contain sensitive information about your web application environment, and should never be presented to untrusted sources.
display_errors is on by default.
A hidden form input named price was found. It's not recommended to hide sensitive information in hidden form fields.
A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack is an
attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you
discover the one correct combination that works.
This login page doesn't have any protection against password-guessing attacks (brute force attacks). It's recommended to
implement some type of account lockout after a defined number of incorrect password attempts. Consult Web references for more
information about fixing this problem.
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
Security mechanisms, service levels and management requirements of all network services shall be identified and included in
network services agreements, whether these services are provided in-house or outsourced.
Formal transfer policies, procedures and controls shall be in place to protect the transfer of information through the use of all
types of communication facilities.
User credentials are transmitted over an unencrypted channel. This information should always be transferred via an encrypted
channel (HTTPS) to avoid being intercepted by malicious users.
(13.2.3)Electronic messaging
User credentials are transmitted over an unencrypted channel. This information should always be transferred via an encrypted
channel (HTTPS) to avoid being intercepted by malicious users.
User credentials are transmitted over an unencrypted channel. This information should always be transferred via an encrypted
channel (HTTPS) to avoid being intercepted by malicious users.
Information involved in application services passing over public networks shall be protected from fraudulent activity, contract
dispute and unauthorized disclosure and modification.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Affected item /secured/newuser.php
Affected parameter
Variants
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Base Score: 6.4
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 5.3
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: Low
Availability Impact: None
CWE CWE-79
Affected item /search.php
Affected parameter
Variants
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Macromedia Dreamweaver has created a directory (_mmServerScripts or _mmDBScripts) that contains scripts for testing
database connectivity. One of these scripts (mmhttpdb.php or mmhttpdb.asp) can be accessed without user ID or password and
contains numerous operations, such as listing Datasource Names or executing arbitrary SQL queries.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: High
Remediation Level: Official_fix
Report Confidence: Confirmed
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CVE CVE-2004-1893
CWE CWE-16
Affected item Web Server
Affected parameter
Variants
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. The server opens arbitrary URLs and puts the content retrieved from the URL into the response
without filtering.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
This script is possibly vulnerable to SQL Injection attacks.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
This script is possibly vulnerable to SQL Injection attacks.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Information involved in application service transactions shall be protected to prevent incomplete transmission, mis-routing,
unauthorized message alteration, unauthorized disclosure, unauthorized message duplication or replay.
User credentials are transmitted over an unencrypted channel. This information should always be transferred via an encrypted
channel (HTTPS) to avoid being intercepted by malicious users.
User credentials are transmitted over an unencrypted channel. This information should always be transferred via an encrypted
channel (HTTPS) to avoid being intercepted by malicious users.
Rules for the development of software and systems shall be established and applied to developments within the organization.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
CWE CWE-79
Affected item /listproducts.php
Affected parameter
Variants
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Macromedia Dreamweaver has created a directory (_mmServerScripts or _mmDBScripts) that contains scripts for testing
database connectivity. One of these scripts (mmhttpdb.php or mmhttpdb.asp) can be accessed without user ID or password and
contains numerous operations, such as listing Datasource Names or executing arbitrary SQL queries.
A heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote
attackers to execute arbitrary code via a crafted request. The problem affects nginx compiled with the ngx_http_spdy_module
module (which is not compiled by default) and without --with-debug configure option, if the "spdy" option of the "listen" directive is
used in a configuration file.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. The server opens arbitrary URLs and puts the content retrieved from the URL into the response
without filtering.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
This script is possibly vulnerable to SQL Injection attacks.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
This script is possibly vulnerable to SQL Injection attacks.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
HTTP headers have the structure "Key: Value", where each line is separated by the CRLF combination. If the user input is
injected into the value section without properly escaping/removing CRLF characters it is possible to alter the HTTP headers
structure.
HTTP Response Splitting is a new application attack technique which enables various new attacks such as web cache poisoning,
cross user defacement, hijacking pages with sensitive user information and cross-site scripting (XSS). The attacker sends a
single HTTP request that forces the web server to form an output stream, which is then interpreted by the target as two HTTP
responses instead of one response.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
HPP attacks consist of injecting encoded query string delimiters into other existing parameters. If the web application does not
properly sanitize the user input, a malicious user can compromise the logic of the application to perform either clientside or
server-side attacks.
HPP attacks consist of injecting encoded query string delimiters into other existing parameters. If the web application does not
properly sanitize the user input, a malicious user can compromise the logic of the application to perform either clientside or
server-side attacks.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: Partial
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 9.1
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-88
Affected item /hpp/index.php
Affected parameter
Variants
URL redirection
URL redirection is sometimes used as a part of phishing attacks that confuse visitors about which web site they are visiting.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
This script is using phpinfo() function. This function outputs a large amount of information about the current state of PHP. This
includes information about PHP compilation options and extensions, the PHP version, server information and environment (if
compiled as a module), the PHP environment, OS version information, paths, master and local values of configuration options,
HTTP headers, and the PHP License.
WS_FTP is a popular FTP client. This application creates a log file named WS_FTP.LOG. This file contains sensitive data such as
file source/destination and file name, date/time of upload etc.
Information processing facilities shall be implemented with redundancy sufficient to meet availability requirements.
(18.1.3)Protection of records
Records shall be protected from loss, destruction, falsification, unauthorized access and unauthorized release, in accordance with
legislatory, regulatory, contractual and business requirements.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
It is possible to read the source code of this script by using script filename as a parameter. It seems that this script includes a file
which name is determined using user-supplied data. This data is not properly validated before being passed to the include
function.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Affected item /search.php
Affected parameter
Variants
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Affected item /AJAX/infocateg.php
Affected parameter
Variants
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Affected item /product.php
Affected parameter
Variants
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Weak password
This page is using a weak password. Acunetix WVS was able to guess the credentials required to access this page. A weak
password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using
a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common
variations on these themes.
This directory contains an .htaccess file that is readable. This may indicate a server misconfiguration. htaccess files are
designed to be parsed by web server and should not be directly accessible. These files could contain sensitive information that
could help an attacker to conduct further attacks. It's recommended to restrict access to this file.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-538
Affected item /.idea
Affected parameter
Variants
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information core
to the project itself, such as names and locations of its component modules, compiler settings, etc. If you've defined a data source
the file dataSources.ids contains information for connecting to the database and credentials. The workspace.xml file stores
personal settings such as placement and positions of your windows, your VCS and History settings, and other data pertaining to
the development environment. It also contains a list of changed files and other sensitive information. These files should not be
present on a production system.
This script is using phpinfo() function. This function outputs a large amount of information about the current state of PHP. This
includes information about PHP compilation options and extensions, the PHP version, server information and environment (if
compiled as a module), the PHP environment, OS version information, paths, master and local values of configuration options,
HTTP headers, and the PHP License.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
WS_FTP is a popular FTP client. This application creates a log file named WS_FTP.LOG. This file contains sensitive data such as
file source/destination and file name, date/time of upload etc.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or pool of
servers). This allows one server to share its resources, such as memory and processor cycles, without requiring all services
provided to use the same host name.
This web server is responding differently when the Host header is manipulated and various common virtual hosts are tested. This
could indicate there is a Virtual Host present.
One or more email addresses have been found on this page. The majority of spam comes from email addresses harvested off the
internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour the internet looking for
email addresses on any website they come across. Spambot programs look for strings like myname@mydomain.com and then
record any addresses found.
This document has been converted to HTML using Microsoft Office. It seems that Office has included sensitive information during
the conversion.
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
A username and/or password was found in this file. This information could be sensitive.
A username and/or password was found in this file. This information could be sensitive.
A username and/or password was found in this file. This information could be sensitive.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Affected item /product.php
Affected parameter
Variants
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Macromedia Dreamweaver has created a directory (_mmServerScripts or _mmDBScripts) that contains scripts for testing
database connectivity. One of these scripts (mmhttpdb.php or mmhttpdb.asp) can be accessed without user ID or password and
contains numerous operations, such as listing Datasource Names or executing arbitrary SQL queries.
It is possible to read the source code of this script by using script filename as a parameter. It seems that this script includes a file
which name is determined using user-supplied data. This data is not properly validated before being passed to the include
function.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Affected item /search.php
Affected parameter
Variants
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Affected item /listproducts.php
Affected parameter
Variants
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
Weak password
This page is using a weak password. Acunetix WVS was able to guess the credentials required to access this page. A weak
password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using
a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common
variations on these themes.
This directory contains an .htaccess file that is readable. This may indicate a server misconfiguration. htaccess files are
designed to be parsed by web server and should not be directly accessible. These files could contain sensitive information that
could help an attacker to conduct further attacks. It's recommended to restrict access to this file.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-538
Affected item /Connections
Affected parameter
Variants
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information core
to the project itself, such as names and locations of its component modules, compiler settings, etc. If you've defined a data source
the file dataSources.ids contains information for connecting to the database and credentials. The workspace.xml file stores
personal settings such as placement and positions of your windows, your VCS and History settings, and other data pertaining to
the development environment. It also contains a list of changed files and other sensitive information. These files should not be
present on a production system.
This script is using phpinfo() function. This function outputs a large amount of information about the current state of PHP. This
includes information about PHP compilation options and extensions, the PHP version, server information and environment (if
compiled as a module), the PHP environment, OS version information, paths, master and local values of configuration options,
HTTP headers, and the PHP License.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
WS_FTP is a popular FTP client. This application creates a log file named WS_FTP.LOG. This file contains sensitive data such as
file source/destination and file name, date/time of upload etc.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or pool of
servers). This allows one server to share its resources, such as memory and processor cycles, without requiring all services
provided to use the same host name.
This web server is responding differently when the Host header is manipulated and various common virtual hosts are tested. This
could indicate there is a Virtual Host present.
One or more email addresses have been found on this page. The majority of spam comes from email addresses harvested off the
internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour the internet looking for
email addresses on any website they come across. Spambot programs look for strings like myname@mydomain.com and then
record any addresses found.
This document has been converted to HTML using Microsoft Office. It seems that Office has included sensitive information during
the conversion.
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
A username and/or password was found in this file. This information could be sensitive.
A username and/or password was found in this file. This information could be sensitive.
A username and/or password was found in this file. This information could be sensitive.
Cryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations.
This section provides full details of the types of vulnerabilities found according to individual affected items.
/search.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/sendcommand.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/listproducts.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/userinfo.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/search.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/AJAX/infoartist.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/artists.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/AJAX/infotitle.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/product.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/secured/newuser.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/AJAX/infocateg.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/listproducts.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/Mod_Rewrite_Shop/buy.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Parameter Variations
/Mod_Rewrite_Shop/details.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/Mod_Rewrite_Shop/rate.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
Web Server
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Parameter Variations
/search.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/cart.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/artists.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Parameter Variations
/userinfo.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/guestbook.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/product.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Parameter Variations
/listproducts.php
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/hpp/params.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/search.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/guestbook.php
Cross site scripting
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/hpp
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/listproducts.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/comment.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/secured/newuser.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/hpp/index.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/listproducts.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/guestbook.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/AJAX/showxml.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/404.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/showimage.php
Directory traversal
Directory Traversal is a vulnerability which allows attackers to access restricted directories and read files outside of the web
server's root directory.
Web Server
Macromedia Dreamweaver has created a directory (_mmServerScripts or _mmDBScripts) that contains scripts for testing
database connectivity. One of these scripts (mmhttpdb.php or mmhttpdb.asp) can be accessed without user ID or password and
contains numerous operations, such as listing Datasource Names or executing arbitrary SQL queries.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 14.1.2, 14.2.1, 18.1.3, 18.1.4
A heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote
attackers to execute arbitrary code via a crafted request. The problem affects nginx compiled with the ngx_http_spdy_module
module (which is not compiled by default) and without --with-debug configure option, if the "spdy" option of the "listen" directive is
used in a configuration file.
The PHP configuration directive allow_url_fopen is enabled. When enabled, this directive allows data retrieval from remote
locations (web site or FTP server). A large number of code injection vulnerabilities reported in PHP-based web applications are
caused by the combination of enabling allow_url_fopen and bad input filtering.
/showimage.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. The server opens arbitrary URLs and puts the content retrieved from the URL into the response
without filtering.
This alert belongs to the following categories: 14.1.2, 14.2.1
It is possible to read the source code of this script by using script filename as a parameter. It seems that this script includes a file
which name is determined using user-supplied data. This data is not properly validated before being passed to the include
function.
This alert belongs to the following categories: 8.2.3, 9.4.1, 9.4.5, 12.4.2, 12.4.3, 18.1.3, 18.1.4
SSRF as in Server Side Request Forgery is a vulnerability that allows an attacker to force server interfaces into sending packets
initiated by the victim server to the local interface or to another server behind the firewall. Consult Web References for more
information about this problem.
This alert belongs to the following categories: 14.1.2
/search.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/sendcommand.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Parameter Variations
/listproducts.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/userinfo.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/AJAX/infoartist.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/artists.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/secured/newuser.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Parameter Variations
/AJAX/infotitle.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/product.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/AJAX/infocateg.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
Base Score: 6.8
Access Vector: Network_accessible
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 10.0
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Changed
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: None
CWE CWE-89
Parameter Variations
/listproducts.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
CWE CWE-89
Parameter Variations
/Mod_Rewrite_Shop/buy.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/Mod_Rewrite_Shop/details.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/Mod_Rewrite_Shop/rate.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
Web Server
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/search.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/cart.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/artists.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/userinfo.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/guestbook.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/product.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/listproducts.php
SQL injection
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL
injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out
dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively
easy to protect against, there is a large number of web applications vulnerable.
This alert belongs to the following categories: 14.1.2, 14.2.1, 18.1.3, 18.1.4
/userinfo.php
Weak password
This page is using a weak password. Acunetix WVS was able to guess the credentials required to access this page. A weak
password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using
a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common
variations on these themes.
This alert belongs to the following categories: 8.2.3, 9.3.1, 9.4.1, 9.4.3, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/Mod_Rewrite_Shop
This directory contains an .htaccess file that is readable. This may indicate a server misconfiguration. htaccess files are
designed to be parsed by web server and should not be directly accessible. These files could contain sensitive information that
could help an attacker to conduct further attacks. It's recommended to restrict access to this file.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/showimage.php
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/listproducts.php
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/secured/newuser.php
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/listproducts.php
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/index.bak
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.1.4, 12.4.2, 12.4.3, 14.3.1, 18.1.3, 18.1.4
/index.zip
Backup files
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.1.4, 12.4.2, 12.4.3, 14.3.1, 18.1.3, 18.1.4
/redir.php
HTTP headers have the structure "Key: Value", where each line is separated by the CRLF combination. If the user input is
injected into the value section without properly escaping/removing CRLF characters it is possible to alter the HTTP headers
structure.
HTTP Response Splitting is a new application attack technique which enables various new attacks such as web cache poisoning,
cross user defacement, hijacking pages with sensitive user information and cross-site scripting (XSS). The attacker sends a
single HTTP request that forces the web server to form an output stream, which is then interpreted by the target as two HTTP
responses instead of one response.
/hpp/params.php
This page is possibly vulnerable to Cross domain data hijacking. If an attacker can create/upload a malicious Flash (SWF) file or
control the top part of any page he can perform an attack known as Cross domain data hijacking. The Content-Type of the
response doesn't matter. If the file is embedded using an <object> tag, it will be executed as a Flash file as long as the content of
the file looks like a valid Flash file.
There are many ways to perform this attack. The attacker doesn't need to upload a file. The only requirement is that an attacker
can control the data on a location of the target domain. One way is to abuse a JSONP API. Usually, the attacker can control the
output of a JSONP API endpoint by changing the callback parameter. However, if an attacker uses an entire Flash file as callback,
we can use it just like we would use an uploaded file in this attack.
/showimage.php
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form
of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the
user context allowing the attacker to access any cookies or session tokens retained by the browser.
/Flash
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/images
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/Templates
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/Mod_Rewrite_Shop/images
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/.idea
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2
Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-538
Parameter Variations
/.idea/scopes
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/Connections
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/pictures
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/wvstests
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/wvstests/pmwiki_2_1_19
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/wvstests/pmwiki_2_1_19/scripts
Directory listing
The web server is configured to display the list of files contained in this directory. This is not recommended because the directory
may contain files that are not normally exposed through links on the web site.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 12.5.1, 18.1.3, 18.1.4
/listproducts.php
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/AJAX/infoartist.php
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/AJAX/infocateg.php
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/AJAX/infotitle.php
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/Connections/DB_Connection.php
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/pictures/path-disclosure-unix.html
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/secured/database_connect.php
This page contains an error/warning message that may disclose sensitive information. The message can also contain the location
of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
Web Server
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
/login.php
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
/guestbook.php
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
/comment.php
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
/signup.php
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
/hpp
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the
affected HTML form.
HPP attacks consist of injecting encoded query string delimiters into other existing parameters. If the web application does not
properly sanitize the user input, a malicious user can compromise the logic of the application to perform either clientside or
server-side attacks.
/hpp/index.php
HPP attacks consist of injecting encoded query string delimiters into other existing parameters. If the web application does not
properly sanitize the user input, a malicious user can compromise the logic of the application to perform either clientside or
server-side attacks.
Web Server
When a domain is specified in crossdomain.xml file, the site declares that it is willing to allow the operators of any servers in that
domain to obtain any document on the server where the policy file resides. The crossdomain.xml file deployed on this website
opens the server to all domains (use of a single asterisk "*" as a pure wildcard is supported) like so:
<cross-domain-policy>
</cross-domain-policy>
This practice is suitable for public servers, but should not be used for sites located behind a firewall because it could permit
access to protected areas. It should not be used for sites that require authentication in the form of passwords or cookies. Sites
that use the common practice of authentication based on cookies to access private or user-specific data should be especially
careful when using cross-domain policy files.
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information core
to the project itself, such as names and locations of its component modules, compiler settings, etc. If you've defined a data source
the file dataSources.ids contains information for connecting to the database and credentials. The workspace.xml file stores
personal settings such as placement and positions of your windows, your VCS and History settings, and other data pertaining to
the development environment. It also contains a list of changed files and other sensitive information. These files should not be
present on a production system.
This alert belongs to the following categories: 8.2.3, 9.4.1, 9.4.5, 12.1.4, 12.4.2, 12.4.3, 14.3.1, 18.1.3, 18.1.4
The display_errors directive determines whether error messages should be sent to the browser. These messages frequently
contain sensitive information about your web application environment, and should never be presented to untrusted sources.
display_errors is on by default.
/secured/phpinfo.php
This script is using phpinfo() function. This function outputs a large amount of information about the current state of PHP. This
includes information about PHP compilation options and extensions, the PHP version, server information and environment (if
compiled as a module), the PHP environment, OS version information, paths, master and local values of configuration options,
HTTP headers, and the PHP License.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.1.4, 12.4.2, 12.4.3, 14.3.1, 18.1.3, 18.1.4
/index.bak
Looks like the source code for this script is available. This check is using pattern matching to determine if server side tags are
found in the file. In some cases this alert may generate false positives.
This alert belongs to the following categories: 8.2.3, 9.4.1, 9.4.5, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/pictures/wp-config.bak
This alert belongs to the following categories: 8.2.3, 9.4.1, 9.4.5, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/redir.php
URL redirection
URL redirection is sometimes used as a part of phishing attacks that confuse visitors about which web site they are visiting.
/login.php
User credentials are transmitted over an unencrypted channel. This information should always be transferred via an encrypted
channel (HTTPS) to avoid being intercepted by malicious users.
/signup.php
User credentials are transmitted over an unencrypted channel. This information should always be transferred via an encrypted
channel (HTTPS) to avoid being intercepted by malicious users.
/pictures/WS_FTP.LOG
WS_FTP is a popular FTP client. This application creates a log file named WS_FTP.LOG. This file contains sensitive data such as
file source/destination and file name, date/time of upload etc.
This alert belongs to the following categories: 8.2.3, 9.4.1, 9.4.5, 12.1.4, 12.4.2, 12.4.3, 14.3.1, 18.1.3, 18.1.4
/product.php
A hidden form input named price was found. It's not recommended to hide sensitive information in hidden form fields.
/userinfo.php
A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack is an
attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you
discover the one correct combination that works.
This login page doesn't have any protection against password-guessing attacks (brute force attacks). It's recommended to
implement some type of account lockout after a defined number of incorrect password attempts. Consult Web references for more
information about fixing this problem.
This alert belongs to the following categories: 9.2.3, 9.3.1, 9.4.3, 12.5.1
/Connections/DB_Connection.php
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
Base Score: 0.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
CWE CWE-538
Parameter Variations
/secured/database_connect.php
For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name
of the host where the server is running and the user name and password of your MySQL account.
When the connection to the database cannot be established, the server returns an error message including the MySQL username
and host that were used. This information should not be present on a production system.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/admin
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/CVS
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/secured
Possible sensitive directories
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common
sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these
directories could help an attacker to learn more about his target.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
Web Server
Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or pool of
servers). This allows one server to share its resources, such as memory and processor cycles, without requiring all services
provided to use the same host name.
This web server is responding differently when the Host header is manipulated and various common virtual hosts are tested. This
could indicate there is a Virtual Host present.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/privacy.php
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
/Mod_Rewrite_Shop/Details/color-printer/3
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
/Mod_Rewrite_Shop/Details/web-camera-a4tech/2
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
/Mod_Rewrite_Shop/Details/network-attached-storage-dlink/1
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
/medias/js/common_functions.js
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
/secured/office_files/filelist.xml
Broken links
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page
was linked from the website but it is inaccessible.
This alert belongs to the following categories: 12.5.1
Web Server
One or more email addresses have been found on this page. The majority of spam comes from email addresses harvested off the
internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour the internet looking for
email addresses on any website they come across. Spambot programs look for strings like myname@mydomain.com and then
record any addresses found.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/secured/office.htm
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/login.php
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/signup.php
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be
saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is
entered. An attacker with local access could obtain the cleartext password from the browser cache.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/404.php
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/pictures/ipaddresses.txt
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/secured/phpinfo.php
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/pictures/path-disclosure-unix.html
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/secured/phpinfo.php
One or more fully qualified path names were found on this page. From this information the attacker may learn the file system
structure from the web server. This information can be used to conduct further attacks.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/Connections/DB_Connection.php
A username and/or password was found in this file. This information could be sensitive.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
Base Score: 5.0
Access Vector: Network_accessible
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
cvss2 Exploitability: Not_defined
Remediation Level: Not_defined
Report Confidence: Not_defined
Availability Requirement: Not_defined
Collateral Damage Potential: Not_defined
Confidentiality Requirement: Not_defined
Integrity Requirement: Not_defined
Target Distribution: Not_defined
Base Score: 7.5
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
cvss3 User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
CWE CWE-200
Parameter Variations
/pictures/credentials.txt
A username and/or password was found in this file. This information could be sensitive.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
/secured/database_connect.php
A username and/or password was found in this file. This information could be sensitive.
This alert belongs to the following categories: 8.2.3, 9.4.1, 12.4.2, 12.4.3, 18.1.3, 18.1.4
URL:http://testphp.vulnweb.com/.idea
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/.idea/.name
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/.idea/acuart.iml
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/.idea/encodings.xml
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/.idea/misc.xml
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/.idea/modules.xml
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/.idea/scopes
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/.idea/scopes/scope_settings.xml
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/.idea/vcs.xml
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/.idea/workspace.xml
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/_mmServerScripts
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/_mmServerScripts/MMHTTPDB.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/_mmServerScripts/mysql.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/404.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/adm1nPan3l
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/adm1nPan3l/index.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/admin
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/admin/create.sql
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/AJAX
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/AJAX/artists.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/AJAX/categories.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/AJAX/htaccess.conf
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/AJAX/index.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/AJAX/infoartist.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/AJAX/infocateg.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/AJAX/infotitle.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/AJAX/showxml.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/AJAX/styles.css
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/AJAX/titles.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/artists.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/bxss
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/bxss/adminPan3l
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/bxss/adminPan3l/index.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/bxss/adminPan3l/style.css
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/bxss/cleanDatabase.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/bxss/database_connect.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/bxss/index.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/bxss/test.js
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/bxss/vuln.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/cart.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/categories.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/clearguestbook.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/clientaccesspolicy.xml
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/comment.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Connections
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Connections/DB_Connection.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/crossdomain.xml
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/CVS
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/CVS/Entries
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/CVS/Entries.Log
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/CVS/Repository
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/CVS/Root
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/database_connect.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/disclaimer.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/favicon.ico
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Flash
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Flash/add.fla
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Flash/add.swf
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/guestbook.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/hpp
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/hpp/index.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/hpp/params.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/hpp/test.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/images
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/index.bak
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/index.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/index.zip
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/listproducts.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/login.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/logout.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/medias
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/medias/css
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/medias/css/main.css
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/medias/img
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/medias/js
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/medias/js/common_functions.js
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/.htaccess
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/buy.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/details.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/color-printer
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/color-printer/3
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/network-attached-storage-dlink
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/network-attached-storage-dlink/1
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/web-camera-a4tech
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/Details/web-camera-a4tech/2
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/images
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/index.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Mod_Rewrite_Shop/rate.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/1.jpg.tn
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/2.jpg.tn
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/3.jpg.tn
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/4.jpg.tn
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/5.jpg.tn
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/6.jpg.tn
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/7.jpg.tn
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/8.jpg.tn
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/credentials.txt
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/ipaddresses.txt
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/path-disclosure-unix.html
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/path-disclosure-win.html
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/wp-config.bak
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/pictures/WS_FTP.LOG
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/privacy.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/product.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/redir.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/search.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/secured
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/secured/database_connect.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/secured/index.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/secured/newuser.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/secured/office.htm
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/secured/office_files
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/secured/office_files/filelist.xml
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/secured/phpinfo.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/secured/style.css
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/sendcommand.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/showimage.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/signup.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/style.css
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Templates
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/Templates/main_dynamic_template.dwt.php
No vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/userinfo.php
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/wvstests
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/scripts
Vulnerabilities have been identified for this URL
URL:http://testphp.vulnweb.com/wvstests/pmwiki_2_1_19/scripts/version.php
No vulnerabilities have been identified for this URL