You are on page 1of 85

Acunetix Website Audit 30 April, 2013

Developer Report

Generated by Acunetix WVS Reporter (v8.0 Build 20121213)

Scan of http://116.66.201.66:80/form/embed.php?id=12565
Scan details
Scan information Starttime Finish time Scan time Profile Server information Responsive Server banner Server OS Server technologies Threat level Acunetix Threat Level 3 One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these vulnerabilities and compromise the backend database and/or deface your website.

4/30/2013 5:33:16 PM 4/30/2013 7:27:12 PM 1 hours, 53 minutes Default

True Apache/2.2.22 (Ubuntu) Unix PHP

Alerts distribution Total alerts found High Medium Low Informational 114 10 71 12 21

Knowledge base
List of file extensions File extensions can provide information on what technologies are being used on this website. List of file extensions detected:

- php => 192 file(s) - css => 62 file(s)

Referer: http://116.66.201.66/form/css/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* 2. /form/js/jquery-ui/ui/jquery.ui.datepicker.js, response time 22937 ms GET /form/js/jquery-ui/ui/jquery.ui.datepicker.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/jquery-ui/ui/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* 3. /form/js/datepick/jquery.datepick-af.js, response time 19750 ms GET /form/js/datepick/jquery.datepick-af.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/datepick/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* 4. /form/js/datepick/humanity.datepick.css, response time 18547 ms GET /form/js/datepick/humanity.datepick.css HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/datepick/ Acunetix-Aspect: enabled

Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* 6. /form/css/css, response time 11313 ms GET /form/css/css HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* 7. /form/js/datepick/jquery.datepick.min.js, response time 9656 ms GET /form/js/datepick/jquery.datepick.min.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/datepick/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* 8. /form/css/pagination_classic.css, response time 6734 ms GET /form/css/pagination_classic.css HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66

Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* 10. /form/js/datepick/jquery.datepick-he.js, response time 4906 ms GET /form/js/datepick/jquery.datepick-he.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/datepick/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */*

List of client scripts These files contain Javascript code referenced from the website.

- /form/js/jquery-ui/ui/jquery.effects.core.js - /form/js/jquery-ui/ui/jquery.ui.core.js - /form/js/jquery-ui/ui/jquery.ui.widget.js - /form/js/jquery-ui/ui/jquery.ui.tabs.js - /form/js/jquery-ui/ui/jquery.ui.mouse.js - /form/js/jquery-ui/ui/jquery.ui.sortable.js - /form/js/jquery-ui/ui/jquery.ui.draggable.js - /form/js/jquery-ui/ui/jquery.ui.position.js - /form/js/jquery-ui/ui/jquery.ui.dialog.js - /form/js/jquery.ba-postmessage.min.js - /form/js/jquery.min.js - /form/js/jquery.support.borderRadius.js - /form/js/jquery.corner.js - /form/js/login_admin.js - /form/view.js - /form/includes/js/jquery.min.js - /form/includes/js/jquery.support.borderRadius.js - /form/includes/js/jquery.corner.js

List of files with inputs These files have at least one input (GET or POST).

Cross Site Scripting (verified) Affects /form/embed.php Application error message Affects /form/embed.php Variation 11 Variation 10

Directory Listing Affects /form/css /form/css/fonts /form/css/themes /form/css/themes/images/blue /form/css/themes/images/brown /form/css/themes/images/gray /form/css/themes/images/red /form/data/form_12565 /form/data/form_12565/css /form/data/themes /form/images /form/images/arrows /form/images/dropui /form/images/form_resources /form/images/icons /form/images/mini_colors /form/includes /form/js /form/js/datepick /form/js/jquery-ui /form/js/jquery-ui/themes /form/js/jquery-ui/themes/base /form/js/jquery-ui/themes/base/images /form/js/jquery-ui/ui /form/js/signaturepad /form/lib /form/lib/pear /form/lib/pear/OLE /form/lib/pear/OLE/PPS /form/lib/pear/Spreadsheet /form/lib/pear/Spreadsheet/Excel /form/lib/pear/Spreadsheet/Excel/Writer /form/lib/php-captcha /form/lib/swift-mailer /form/lib/swift-mailer/classes /form/lib/swift mailer/classes/Swift Variation 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

/form/lib/swift-mailer/classes/Swift/Plugins /form/lib/swift-mailer/classes/Swift/Plugins/Decorator /form/lib/swift-mailer/classes/Swift/Plugins/Loggers /form/lib/swift-mailer/classes/Swift/Plugins/Pop /form/lib/swift-mailer/classes/Swift/Plugins/Reporters /form/lib/swift-mailer/classes/Swift/StreamFilters /form/lib/swift-mailer/classes/Swift/Transport /form/lib/swift-mailer/classes/Swift/Transport/Esmtp /form/lib/swift-mailer/classes/Swift/Transport/Esmtp/Auth /form/lib/swift-mailer/dependency_maps User credentials are sent in clear text Affects /form Webalizer script Affects /webalizer/index.html Login page password-guessing attack Affects /form/index.php Session Cookie without HttpOnly flag set Affects / Session Cookie without Secure flag set Affects / Slow response time Affects /form/css /form/css/css /form/css/pagination_classic.css /form/js/datepick/humanity.datepick.css /form/js/datepick/jquery.datepick.min.js

1 1 1 1 1 1 1 1 1 1

Variation 1

Variation 1

Variation 1

Variation 1

Variation 1

Variation 1 1 1 1 1

Broken links Affects /form/css/css/PIE.htc /form/includes/css/bb_buttons.css /form/includes/css/main.css /form/includes/css/override.css /form/includes/css/theme.css /form/includes/js/jquery.corner.js /form/includes/js/jquery.min.js /form/includes/js/jquery.support.borderRadius.js /form/includes/logout.php /form/includes/manage_forms.php /form/includes/my_account.php Content type is not specified Affects /form/css/fonts/TitilliumText250wt.otf /form/css/fonts/TitilliumText600wt.otf /form/js/signaturepad/pen.cur /form/lib/php-captcha/VeraBd.ttf /form/lib/php-captcha/VeraSeBd.ttf GHDB: Files uploaded through FTP Affects /form/css/themes/images/blue /form/images /form/images/icons /form/js Password type input with autocomplete enabled Affects /form Variation 1 Variation 1 1 1 1 Variation 1 1 1 1 1 Variation 1 1 1 1 1 1 1 1 1 1 1

Alert details
Cross Site Scripting (verified)
Severity High Type Validation Reported by module Scripting (XSS.script) Description This script is possibly vulnerable to Cross Site Scripting (XSS) attacks. Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser. Impact Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account, impersonating the user. It is also possible to modify the content of the page presented to the user. Recommendation Your script should filter metacharacters from user input. References XSS Annihilation XSS Filter Evasion Cheat Sheet Cross site scripting How To: Prevent Cross-Site Scripting in ASP.NET The Cross Site Scripting Faq VIDEO: How Cross-Site Scripting (XSS) Works Acunetix Cross Site Scripting Attack OWASP PHP Top 5 OWASP Cross Site Scripting Affected items /form/embed.php Details URL encoded POST input form_id was set to 12565'"()&%<ScRiPt >prompt(994189)</ScRiPt> Request headers POST /form/embed.php HTTP/1.1 Content-Length: 396

/form/embed.php Details URL encoded POST input form_id was set to 12565'"()&%<ScRiPt >prompt(933449)</ScRiPt> Request headers POST /form/embed.php HTTP/1.1 Content-Length: 382 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Argentina&element_5=1&element_56=35&e lement_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst&f orm_id=12565'%22()%26%25%3cScRiPt%20%3eprompt(933449)%3c%2fScRiPt%3e&page_number=1&submi t_form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 12565'"()&%<ScRiPt >prompt(967266)</ScRiPt> Request headers POST /form/embed.php HTTP/1.1 Content-Length: 380 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Armenia&element_5=1&element_56=35&ele ment_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst&for m_id=12565'%22()%26%25%3cScRiPt%20%3eprompt(967266)%3c%2fScRiPt%3e&page_number=1&submit_ form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 12565'"()&%<ScRiPt >prompt(969525)</ScRiPt> Request headers POST /form/embed php HTTP/1 1

/form/embed.php Details URL encoded POST input form_id was set to 12565'"()&%<ScRiPt >prompt(985054)</ScRiPt> Request headers POST /form/embed.php HTTP/1.1 Content-Length: 384 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Afghanistan&element_5=1&element_56=35 &element_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst &form_id=12565'%22()%26%25%3cScRiPt%20%3eprompt(985054)%3c%2fScRiPt%3e&page_number=1&sub mit_form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 12565'"()&%<ScRiPt >prompt(973078)</ScRiPt> Request headers POST /form/embed.php HTTP/1.1 Content-Length: 380 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Albania&element_5=1&element_56=35&ele ment_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst&for m_id=12565'%22()%26%25%3cScRiPt%20%3eprompt(973078)%3c%2fScRiPt%3e&page_number=1&submit_ form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 12565'"()&%<ScRiPt >prompt(936967)</ScRiPt> Request headers POST /form/embed php HTTP/1 1

/form/embed.php Details URL encoded POST input form_id was set to 12565'"()&%<ScRiPt >prompt(968924)</ScRiPt> Request headers POST /form/embed.php HTTP/1.1 Content-Length: 383 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Azerbaijan&element_5=1&element_56=35& element_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst& form_id=12565'%22()%26%25%3cScRiPt%20%3eprompt(968924)%3c%2fScRiPt%3e&page_number=1&subm it_form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 12565'"()&%<ScRiPt >prompt(997476)</ScRiPt> Request headers POST /form/embed.php HTTP/1.1 Content-Length: 380 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Austria&element_5=1&element_56=35&ele ment_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst&for m_id=12565'%22()%26%25%3cScRiPt%20%3eprompt(997476)%3c%2fScRiPt%3e&page_number=1&submit_ form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 12565'"()&%<ScRiPt >prompt(938151)</ScRiPt> Request headers POST /form/embed php HTTP/1 1

Application error message


Severity Medium Type Validation Reported by module Scripting (Error_Message.script) Description This page contains an error/warning message that may disclose sensitive information.The message can also contain the location of the file that produced the unhandled exception. This may be a false positive if the error message is found in documentation pages. Impact The error messages may disclose sensitive information. This information can be used to launch further attacks. Recommendation Review the source code for this script. References PHP Runtime Configuration Affected items /form/embed.php Details URL encoded POST input form_id was set to 268435455 Error message found: Table 'dbForm.ap_form_268435455' doesn't exist Request headers POST /form/embed.php HTTP/1.1 Content-Length: 330 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Argentina&element_5=1&element_56=35&e lement_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst&f orm_id=268435455&page_number=1&submit_form=1&submit_primary=Lanjut /form/embed.php

ement_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Antigua%20and%20Barbuda&element_5=1& element_56=35&element_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sampl e%40email.tst&form_id=268435455&page_number=1&submit_form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 268435455 Error message found: Table 'dbForm.ap_form_268435455' doesn't exist Request headers POST /form/embed.php HTTP/1.1 Content-Length: 328 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Andorra&element_5=1&element_56=35&ele ment_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst&for m_id=268435455&page_number=1&submit_form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 268435455 Error message found: Table 'dbForm.ap_form_268435455' doesn't exist Request headers POST /form/embed.php HTTP/1.1 Content-Length: 328 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Armenia&element_5=1&element_56=35&ele ment_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst&for m_id=268435455&page_number=1&submit_form=1&submit_primary=Lanjut /form/embed.php Details

&form_id=268435455&page_number=1&submit_form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 268435455 Error message found: Table 'dbForm.ap_form_268435455' doesn't exist Request headers POST /form/embed.php HTTP/1.1 Content-Length: 328 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Austria&element_5=1&element_56=35&ele ment_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst&for m_id=268435455&page_number=1&submit_form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 268435455 Error message found: Table 'dbForm.ap_form_268435455' doesn't exist Request headers POST /form/embed.php HTTP/1.1 Content-Length: 330 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Australia&element_5=1&element_56=35&e lement_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst&f orm_id=268435455&page_number=1&submit_form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 268435455 Error message found: Table 'dbForm.ap form 268435455' doesn't exist

/form/embed.php Details URL encoded POST input form_id was set to 1 Error message found: Table 'dbForm.ap_form_0' doesn't exist Request headers POST /form/embed.php HTTP/1.1 Content-Length: 335 Content-Type: application/x-www-form-urlencoded Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Afghanistan&element_5=1&element_56=35 &element_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst &form_id[$acunetix]=1&page_number=1&submit_form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 268435455 Error message found: Table 'dbForm.ap_form_268435455' doesn't exist Request headers POST /form/embed.php HTTP/1.1 Content-Length: 332 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* element_1=TUE3004125651367318073&element_2=1&element_3=1&element_4_1=1&element_4_2=1&ele ment_4_3=1&element_4_4=1&element_4_5=1&element_4_6=Afghanistan&element_5=1&element_56=35 &element_6=http:%2f%2f&element_resume_checkbox=1&element_resume_email=sample%40email.tst &form_id=268435455&page_number=1&submit_form=1&submit_primary=Lanjut /form/embed.php Details URL encoded POST input form_id was set to 268435455 Error message found: Table 'dbForm.ap_form_268435455' doesn't exist Request headers POST /form/embed.php HTTP/1.1

Directory Listing
Severity Medium Type Information Reported by module Scripting (Directory_Listing.script) Description The web server is configured to display the list of files contained in this directory. This is not recommended because the directory may contain files that are not normally exposed through links on the web site. Impact A user can view a list of all files from this directory possibly exposing sensitive information. Recommendation You should make sure the directory does not contain sensitive information or you may want to restrict directory listings from the web server configuration. References Directory Listing and Information Disclosure Affected items /form/css Details Pattern found: Last modified</a> Request headers GET /form/css/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/css/fonts Details Pattern found: Last modified</a>

/form/css/themes Details Pattern found: Last modified</a> Request headers GET /form/css/themes/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/themes/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/css/themes/images/blue Details Pattern found: Last modified</a> Request headers GET /form/css/themes/images/blue/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/themes/images/blue/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/css/themes/images/brown Details Pattern found: Last modified</a> Request headers GET /form/css/themes/images/brown/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/themes/images/brown/

Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/themes/images/gray/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/css/themes/images/red Details Pattern found: Last modified</a> Request headers GET /form/css/themes/images/red/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/themes/images/red/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/data/form_12565 Details Pattern found: Last modified</a> Request headers GET /form/data/form_12565/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/data/form_12565/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User Agent Mo illa/5 0 (compatible MSIE 9 0 Windo s NT 6 1

WOW64

Trident/5 0)

Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/data/themes Details Pattern found: Last modified</a> Request headers GET /form/data/themes/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/data/themes/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/images Details Pattern found: Last modified</a> Request headers GET /form/images/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/images/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/images/arrows Details Pattern found: Last modified</a> Request headers

/form/images/dropui Details Pattern found: Last modified</a> Request headers GET /form/images/dropui/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/images/dropui/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/images/form_resources Details Pattern found: Last modified</a> Request headers GET /form/images/form_resources/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/images/form_resources/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/images/icons Details Pattern found: Last modified</a> Request headers GET /form/images/icons/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/images/icons/

Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/images/mini_colors/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/includes Details Pattern found: Last modified</a> Request headers GET /form/includes/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/includes/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js Details Pattern found: Last modified</a> Request headers GET /form/js/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User Agent Mo illa/5 0 (compatible MSIE 9 0 Windo s NT 6 1

WOW64

Trident/5 0)

Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js/jquery-ui Details Pattern found: Last modified</a> Request headers GET /form/js/jquery-ui/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/jquery-ui/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js/jquery-ui/themes Details Pattern found: Last modified</a> Request headers GET /form/js/jquery-ui/themes/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/jquery-ui/themes/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js/jquery-ui/themes/base Details Pattern found: Last modified</a> Request headers

/form/js/jquery-ui/themes/base/images Details Pattern found: Last modified</a> Request headers GET /form/js/jquery-ui/themes/base/images/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/jquery-ui/themes/base/images/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js/jquery-ui/ui Details Pattern found: Last modified</a> Request headers GET /form/js/jquery-ui/ui/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/jquery-ui/ui/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js/signaturepad Details Pattern found: Last modified</a> Request headers GET /form/js/signaturepad/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/signaturepad/

Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/pear Details Pattern found: Last modified</a> Request headers GET /form/lib/pear/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/pear/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/pear/OLE Details Pattern found: Last modified</a> Request headers GET /form/lib/pear/OLE/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/pear/OLE/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User Agent Mo illa/5 0 (compatible MSIE 9 0 Windo s NT 6 1

WOW64

Trident/5 0)

Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/pear/Spreadsheet Details Pattern found: Last modified</a> Request headers GET /form/lib/pear/Spreadsheet/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/pear/Spreadsheet/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/pear/Spreadsheet/Excel Details Pattern found: Last modified</a> Request headers GET /form/lib/pear/Spreadsheet/Excel/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/pear/Spreadsheet/Excel/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/pear/Spreadsheet/Excel/Writer Details Pattern found: Last modified</a> Request headers

/form/lib/php-captcha Details Pattern found: Last modified</a> Request headers GET /form/lib/php-captcha/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/php-captcha/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/

Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/ByteStream Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/ByteStream/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/ByteStream/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/CharacterReader Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/CharacterReader/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterReader/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User Agent Mo illa/5 0 (compatible MSIE 9 0 Windo s NT 6 1 WOW64 Trident/5 0)

Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/CharacterStream Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/CharacterStream/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterStream/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/Encoder Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/Encoder/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Encoder/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/Events Details Pattern found: Last modified</a>

/form/lib/swift-mailer/classes/Swift/KeyCache Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/KeyCache/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/KeyCache/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/Mailer Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/Mailer/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mailer/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/Mime Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/Mime/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/

Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/ContentEncoder/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/Mime/HeaderEncoder Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/Mime/HeaderEncoder/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/HeaderEncoder/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/Mime/Headers Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/Mime/Headers/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Headers/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User Agent Mo illa/5 0 (compatible MSIE 9 0 Windo s NT 6 1 WOW64 Trident/5 0)

Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/Plugins/Decorator Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/Plugins/Decorator/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Decorator/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/Plugins/Loggers Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/Plugins/Loggers/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Loggers/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/Plugins/Pop Details Pattern found: Last modified</a> Request headers

/form/lib/swift-mailer/classes/Swift/Plugins/Reporters Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/Plugins/Reporters/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Reporters/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/StreamFilters Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/StreamFilters/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/StreamFilters/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/Transport Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/Transport/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/

Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/Esmtp/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/classes/Swift/Transport/Esmtp/Auth Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/classes/Swift/Transport/Esmtp/Auth/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/Esmtp/Auth/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/swift-mailer/dependency_maps Details Pattern found: Last modified</a> Request headers GET /form/lib/swift-mailer/dependency_maps/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/swift-mailer/dependency_maps/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User Agent Mo illa/5 0 (compatible MSIE 9 0 Windo s NT 6 1 WOW64

Trident/5 0)

User credentials are sent in clear text


Severity Medium Type Informational Reported by module Crawler Description User credentials are transmitted over an unencrypted channel. This information should always be transferred via an encrypted channel (HTTPS) to avoid being intercepted by malicious users. Impact A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection. Recommendation Because user credentials are considered sensitive information, should always be transferred to the server over an encrypted connection (HTTPS). Affected items /form Details Form name: <empty> Form action: http://116.66.201.66/form/index.php Form method: POST Form inputs: - admin_username [Text] - admin_password [Password] - admin_remember [Checkbox] - submit [Hidden]

Request headers GET /form/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive

Webalizer script
Severity Medium Type Configuration Reported by module Scripting (Web_Statistics.script) Description The Webalizer is a fast, free web server log file analysis program. It produces highly detailed, easily configurable usage reports in HTML format, for viewing with a standard web browser. It's recommended to restrict access to this directory as it may contain sensitive information (test scripts, administrative interfaces, session tokens sent via GET, ...). This kind of information may help an attacker to learn more about the structure of your website and can be used to conduct further attacks. Impact Possible sensitive information disclosure. Recommendation Restrict (or password protect) the access to directory or make it accessible only on the local interface. References Webalizer Homepage Affected items /webalizer/index.html Details No details are available. Request headers GET /webalizer/index.html HTTP/1.1 Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */*

Login page password-guessing attack


Severity Low Type Validation Reported by module Scripting (Html_Authentication_Audit.script) Description A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. This login page doesn't have any protection against password-guessing attacks (brute force attacks). It's recommended to implement some type of account lockout after a defined number of incorrect password attempts. Consult Web references for more information about fixing this problem. Impact An attacker may attempt to discover a weak password by systematically trying every possible combination of letters, numbers, and symbols until it discovers the one correct combination that works. Recommendation It's recommended to implement some type of account lockout after a defined number of incorrect password attempts. References Blocking Brute Force Attacks Affected items /form/index.php Details The scanner tested 10 invalid credentials and no account lockout was detected. Request headers POST /form/index.php HTTP/1.1 Content-Length: 56 Content-Type: application/x-www-form-urlencoded Referer: http://116.66.201.66:80/form/embed.php?id=12565 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* admin_password=7ObMV85k&admin_username=LjJAkHuD&submit=1

Session Cookie without HttpOnly flag set


Severity Low Type Informational Reported by module Crawler Description This session cookie doesn't have the HTTPOnly flag set. When a cookie is set with the HTTPOnly flag, it instructs the browser that the cookie can only be accessed by the server and not by client-side scripts. This is an important security protection for session cookies. Impact None Recommendation If possible, you should set the HTTPOnly flag for this cookie. Affected items / Details Cookie name: "PHPSESSID" Cookie domain: "116.66.201.66" Request headers GET / HTTP/1.1

Session Cookie without Secure flag set


Severity Low Type Informational Reported by module Crawler Description This session cookie doesn't have the Secure flag set. When a cookie is set with the Secure flag, it instructs the browser that the cookie can only be accessed over secure SSL channels. This is an important security protection for session cookies. Impact None Recommendation If possible, you should set the Secure flag for this cookie. Affected items / Details Cookie name: "PHPSESSID" Cookie domain: "116.66.201.66" Request headers GET / HTTP/1.1

Slow response time


Severity Low Type Informational Reported by module Crawler Description This page had a slow response time. The response time for this page was 27750 ms while the average response time for this site is 1151.93 ms. This types of files can be targetted in denial of service attacks. An attacker can request this page repeatedly from multiple computers until the server becomes overloaded. Impact Possible denial of service. Recommendation Investigate if it's possible to reduce the response time for this page. Affected items /form/css Details No details are available. Request headers GET /form/css/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/css/css Details No details are available. Request headers GET /form/css/css HTTP/1.1 Pragma: no-cache

Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js/datepick/humanity.datepick.css Details No details are available. Request headers GET /form/js/datepick/humanity.datepick.css HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/datepick/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js/datepick/jquery.datepick.min.js Details No details are available. Request headers GET /form/js/datepick/jquery.datepick.min.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/datepick/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */*

User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js/datepick/jquery.datepick-nl-BE.js Details No details are available. Request headers GET /form/js/datepick/jquery.datepick-nl-BE.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/datepick/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js/jquery-ui/themes/base/jquery.ui.selectable.css Details No details are available. Request headers GET /form/js/jquery-ui/themes/base/jquery.ui.selectable.css HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/jquery-ui/themes/base/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js/jquery-ui/ui/jquery.ui.datepicker.js Details No details are available. Request headers GET /form/js/jquery-ui/ui/jquery.ui.datepicker.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/jquery-ui/ui/ Acunetix Aspect: enabled

Broken links
Severity Informational Type Informational Reported by module Crawler Description A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page was linked from the website but it is inaccessible. Impact Problems navigating the site. Recommendation Remove the links to this file or make it accessible. Affected items /form/css/css/PIE.htc Details No details are available. Request headers GET /form/css/css/PIE.htc HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/pagination_bright.css Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/includes/css/bb_buttons.css Details No details are available. Request headers GET /form/includes/css/bb_buttons.css HTTP/1.1 Pragma: no-cache Cache-Control: no-cache

Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/includes/header.php Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/includes/css/override.css Details No details are available. Request headers GET /form/includes/css/override.css HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/includes/header.php Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/includes/css/theme.css Details No details are available. Request headers GET /form/includes/css/theme.css HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/includes/header.php Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */*

User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/includes/js/jquery.min.js Details No details are available. Request headers GET /form/includes/js/jquery.min.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/includes/footer.php Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/includes/js/jquery.support.borderRadius.js Details No details are available. Request headers GET /form/includes/js/jquery.support.borderRadius.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/includes/footer.php Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/includes/logout.php Details No details are available. Request headers GET /form/includes/logout.php HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/includes/header.php Acunetix Aspect: enabled

Referer: http://116.66.201.66/form/includes/header.php Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/includes/my_account.php Details No details are available. Request headers GET /form/includes/my_account.php HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/includes/header.php Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */*

Content type is not specified


Severity Informational Type Informational Reported by module Crawler Description This page doesn't set a Content-Type header value. This value informs the browser what kind of data to expect. If this header is missing, the browser may incorrectly handle the data. This could lead to security problems. Impact None Recommendation Set a Content-Type header value for this page. Affected items /form/css/fonts/TitilliumText250wt.otf Details HTTP/1.0 200 OK Date: Tue, 30 Apr 2013 10:38:17 GMT Server: Apache/2.2.22 (Ubuntu) Last-Modified: Sun, 21 Oct 2012 16:54:55 GMT ETag: "10c14d1-56c0-4cc9498a8feda" Accept-Ranges: bytes Content-Length: 22208 X-Cache: MISS from ProxyStudent Connection: keep-alive Request headers GET /form/css/fonts/TitilliumText250wt.otf HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/main.css Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */*

Cache-Control: no-cache Referer: http://116.66.201.66/form/css/main.css Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js/signaturepad/pen.cur Details HTTP/1.0 200 OK Date: Tue, 30 Apr 2013 10:35:22 GMT Server: Apache/2.2.22 (Ubuntu) Last-Modified: Sun, 21 Oct 2012 16:55:09 GMT ETag: "10c16c0-10be-4cc9499832299" Accept-Ranges: bytes Content-Length: 4286 X-Cache: MISS from ProxyStudent Connection: keep-alive Request headers GET /form/js/signaturepad/pen.cur HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/data/form_12565/css/view.css Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/lib/php-captcha/VeraBd.ttf Details HTTP/1.0 200 OK Date: Tue, 30 Apr 2013 12:12:51 GMT Server: Apache/2.2.22 (Ubuntu) Last-Modified: Sun, 21 Oct 2012 16:55:15 GMT ETag: "10c16cd-e55c-4cc9499d8e3b9" Accept-Ranges: bytes Content-Length: 58716 X-Cache: MISS from ProxyStudent

/form/lib/php-captcha/VeraSeBd.ttf Details HTTP/1.0 200 OK Date: Tue, 30 Apr 2013 12:12:51 GMT Server: Apache/2.2.22 (Ubuntu) Last-Modified: Sun, 21 Oct 2012 16:55:15 GMT ETag: "10c16ce-e570-4cc9499dbf0f9" Accept-Ranges: bytes Content-Length: 58736 X-Cache: MISS from ProxyStudent Connection: keep-alive Request headers GET /form/lib/php-captcha/VeraSeBd.ttf HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/lib/php-captcha/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */*

GHDB: Files uploaded through FTP


Severity Informational Type Informational Reported by module GHDB Description The description for this alert is contributed by the GHDB community, it may contain inappropriate language. Category : Files containing juicy info Files uploaded through ftp by other people, sometimes you can find all sorts of things from movies to important stuff. The Google Hacking Database (GHDB) appears courtesy of the Google Hacking community. Impact Not available. Check description. Recommendation Not available. Check description. References The Google Hacking Database (GHDB) community Acunetix Google hacking Affected items /form/css/themes/images/blue Details We found intitle:"Index of" upload size parent directory Request headers GET /form/css/themes/images/blue/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/css/themes/images/blue/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/images

/form/images/icons Details We found intitle:"Index of" upload size parent directory Request headers GET /form/images/icons/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/images/icons/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* /form/js Details We found intitle:"Index of" upload size parent directory Request headers GET /form/js/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/js/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */*

Password type input with autocomplete enabled


Severity Informational Type Informational Reported by module Crawler Description When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be saved. Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is entered. An attacker with local access could obtain the cleartext password from the browser cache. Impact Possible sensitive information disclosure Recommendation The password autocomplete should be disabled in sensitive applications. To disable autocomplete, you may use a code similar to: <INPUT TYPE="password" AUTOCOMPLETE="off">

Affected items /form Details Password type input named admin_password from form with ID form_login with action /form/index.php has autocomplete enabled. Request headers GET /form/ HTTP/1.1 Pragma: no-cache Cache-Control: no-cache Referer: http://116.66.201.66/form/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: PHPSESSID=7s9ff756e28e4lcc1fvifc5j95 Host: 116.66.201.66 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */*

Scanned items (coverage report)


URL: http://116.66.201.66/form/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/embed.php Vulnerabilities has been identified for this URL 19 input(s) found for this URL Inputs Input scheme 1 Input name id Input scheme 2 Input name element_1 element_2 element_3 element_4_1 element_4_2 element_4_3 element_4_4 element_4_5 element_4_6 element_5 element_56 element_6 element_resume_checkbox element_resume_email form_id page_number submit_form submit_primary URL: http://116.66.201.66/form/data/ No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/data/themes/ Vulnerabilities has been identified for this URL No input(s) found for this URL Input type URL encoded GET Input type URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST URL encoded POST

URL: http://116.66.201.66/form/data/form_12565/css/view.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/data/form_12565/files/ No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.core.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.ui.core.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.ui.widget.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.ui.tabs.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.ui.mouse.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.ui.sortable.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.ui.draggable.js No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.drop.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.fade.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.blind.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.slide.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.scale.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.shake.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.bounce.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.explode.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.pulsate.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.ui.slider.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.ui.button.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.ui.resizable.js No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.ui.progressbar.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.ui.autocomplete.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.transfer.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/ui/jquery.effects.highlight.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/base/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/base/jquery.ui.all.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/base/jquery.ui.theme.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/base/images/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/base/jquery.ui.tabs.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/base/jquery.ui.button.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/base/jquery.ui.core.css No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/js/jquery-ui/themes/base/jquery.ui.accordion.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/base/jquery.ui.datepicker.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/base/jquery.ui.selectable.css Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/base/jquery.ui.progressbar.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery-ui/themes/base/jquery.ui.autocomplete.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery.ba-postmessage.min.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/signaturepad/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/signaturepad/pen.cur Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/signaturepad/json2.min.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/signaturepad/jquery.signaturepad.min.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/smoothness.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/js/datepick/jquery.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/redmond.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-vader.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-vi.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-start.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-de.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-ja.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-ko.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-fr.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-it.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-lv.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-ca.js No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/js/datepick/jquery.datepick-cs.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-is.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-et.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-es.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-eu.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-fa.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-fi.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-fo.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-id.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-el.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-hy.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-eo.js No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/js/datepick/jquery.datepick-sv.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-af.js Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-tr.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-th.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-sk.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-sq.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-sl.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-ru.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-sr.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/humanity.datepick.css Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-bg.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-az.js No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/js/datepick/jquery.datepick-ms.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-nl.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-uk.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-ur.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-pl.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-no.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick.min.js Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick.ext.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-redmond.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-gu.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-gl.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-blitzer.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/js/datepick/jquery.datepick-de-CH.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-he.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-dotluv.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-zh-CN.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-pt-BR.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-sr-SR.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-nl-BE.js Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-zh-TW.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-me-ME.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick-zh-HK.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-mintchoc.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-blacktie.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/js/datepick/ui-cupertino.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-uidarkness.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-hotsneaks.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-smoothness.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-trontastic.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick.ext.min.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-excitebike.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-southstreet.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick.lang.min.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick.ext.pack.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/ui-swankypurse.datepick.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/datepick/jquery.datepick.lang.pack.js No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/js/jquery.min.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery.support.borderRadius.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery.corner.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/login_admin.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/builder.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/add_user.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/view_user.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/embed_code.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/view_entry.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/form_manager.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/my_account.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/manage_users.js No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/js/jquery.tools.min.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery.mini_colors.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/manage_entries.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery.highlight.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/payment_settings.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery.jqplugin.min.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/jquery.ba-postmessage.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/js/notification_settings.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/view.js No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/images/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/images/icons/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/images/arrows/ Vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/index.php Vulnerabilities has been identified for this URL 4 input(s) found for this URL Inputs Input scheme 1 Input name admin_password admin_remember admin_username submit URL: http://116.66.201.66/form/css/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/main.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/theme.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/override.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/bb_buttons.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/themes/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/themes/theme_gray.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/themes/images/gray/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/themes/images/blue/ Vulnerabilities has been identified for this URL Input type URL encoded POST URL encoded POST URL encoded POST URL encoded POST

URL: http://116.66.201.66/form/css/themes/theme_blue.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/themes/theme_green.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/themes/theme_brown.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/edit_form.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/reset.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/fonts/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/fonts/TitilliumText600wt.otf Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/fonts/TitilliumText250wt.otf Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/gold No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/ie7.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/ie8.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/ie9.css No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/css/edit_entry.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/entry_print.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/jquery_minicolors.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/pagination_bright.css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/pagination_classic.css Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/css Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/css/css/PIE.htc Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/OLE/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/OLE/PPS/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/OLE/PPS/File.php No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/pear/PEAR.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/Spreadsheet/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/Spreadsheet/Excel/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/Spreadsheet/Excel/Writer/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/Spreadsheet/Excel/Writer/Format.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/Spreadsheet/Excel/Writer/Parser.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/Spreadsheet/Excel/Writer/Workbook.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/Spreadsheet/Excel/Writer/Worksheet.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/Spreadsheet/Excel/Writer/BIFFwriter.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/Spreadsheet/Excel/Writer/Validator.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/pear/Spreadsheet/Excel/Writer.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/php-captcha/ Vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/swift-mailer/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Headers/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Headers/DateHeader.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Headers/PathHeader.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Headers/MailboxHeader.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Headers/UnstructuredHeader.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Headers/AbstractHeader.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Headers/ParameterizedHeader.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Headers/IdentificationHeader.php No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Attachment.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Header.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/Grammar.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/HeaderSet.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/HeaderEncoder/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/HeaderEncoder/QpHeaderEncoder.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/HeaderEncoder/Base64HeaderEncoder.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/ContentEncoder/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/ContentEncoder/QpContentEncoder.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/ContentEncoder/PlainContentEncoder.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/ContentEncoder/Base64ContentEncoder.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/EmbeddedFile.php No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/ContentEncoder.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/CharsetObserver.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/SimpleMimeEntity.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/SimpleHeaderSet.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/EncodingObserver.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/ParameterizedHeader.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mime/SimpleHeaderFactory.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mailer/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mailer/RecipientIterator.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mailer/ArrayRecipientIterator.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/Event.php No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/CommandEvent.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/EventListener.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/ResponseEvent.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/EventDispatcher.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/ResponseListener.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/CommandListener.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/TransportChangeEvent.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/SimpleEventDispatcher.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/TransportExceptionEvent.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/TransportChangeListener.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Events/TransportExceptionListener.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/ Vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Loggers/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Loggers/EchoLogger.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Loggers/ArrayLogger.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Timer.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Logger.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Decorator/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Decorator/Replacements.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Reporters/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Reporters/HitReporter.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Reporters/HtmlReporter.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Sleeper.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/Reporter.php No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/DecoratorPlugin.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/ThrottlerPlugin.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/RedirectingPlugin.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/BandwidthMonitorPlugin.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/ImpersonatePlugin.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Plugins/PopBeforeSmtpPlugin.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Encoder/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Encoder/QpEncoder.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Encoder/Base64Encoder.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Encoder/Rfc2231Encoder.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/KeyCache/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/KeyCache/DiskKeyCache.php No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/KeyCache/KeyCacheInputStream.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/KeyCache/SimpleKeyCacheInputStream.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Image.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Spool.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Mailer.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/Esmtp/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/Esmtp/Auth/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/Esmtp/Auth/PlainAuthenticator.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/Esmtp/Auth/LoginAuthenticator.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/Esmtp/Auth/CramMd5Authenticator.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/Esmtp/AuthHandler.php No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/SmtpAgent.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/MailInvoker.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/StreamBuffer.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/NullTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/MailTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/SpoolTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/EsmtpTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/FailoverTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/SendmailTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/SimpleMailInvoker.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/LoadBalancedTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport/AbstractSmtpTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/ByteStream/ArrayByteStream.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/ByteStream/AbstractFilterableInputStream.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Encoder.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Encoding.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/KeyCache.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Validate.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/MimePart.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/FileSpool.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Transport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Filterable.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/FileStream.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/StreamFilters/ Vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Attachment.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/Preferences.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/IoException.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/EmbeddedFile.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterStream/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterStream/NgCharacterStream.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterStream/ArrayCharacterStream.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/InputByteStream.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/StreamFilter.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterReader/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterReader/Utf8Reader.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterReader/UsAsciiReader.php No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/NullTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/SwiftException.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/SpoolTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/SendmailTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/RfcComplianceException.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterReader.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterStream.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/OutputByteStream.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/FailoverTransport.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterReaderFactory/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/CharacterReaderFactory/SimpleCharacterReaderFactory. php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/LoadBalancedTransport.php

URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/TransportException.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/DependencyException.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift/DependencyContainer.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/classes/Swift.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/swift_init.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/mime_types.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/preferences.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/dependency_maps/ Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/dependency_maps/mime_deps.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/dependency_maps/cache_deps.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/dependency_maps/message_deps.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/swift-mailer/dependency_maps/transport_deps.php No vulnerabilities has been identified for this URL No input(s) found for this URL

URL: http://116.66.201.66/form/lib/recaptchalib.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/password-hash.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/lib/dbbackup.class.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/config.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/ Vulnerabilities has been identified for this URL 1 input(s) found for this URL Inputs Input scheme 1 Input name from URL: http://116.66.201.66/form/includes/init.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/json.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/check-session.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/footer.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/header.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/db-core.php No vulnerabilities has been identified for this URL Input type URL encoded GET

URL: http://116.66.201.66/form/includes/users-functions.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/view-functions2.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/entry-functions.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/setup-functions.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/theme-functions.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/helper-functions.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/filter-functions.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/common-validator.php No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/index.php No vulnerabilities has been identified for this URL 1 input(s) found for this URL Inputs Input scheme 1 Input name from URL: http://116.66.201.66/form/includes/images No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/js No vulnerabilities has been identified for this URL Input type URL encoded GET

URL: http://116.66.201.66/form/includes/logout.php Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/css No vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/css/main.css Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/css/theme.css Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/css/override.css Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/css/bb_buttons.css Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/my_account.php Vulnerabilities has been identified for this URL No input(s) found for this URL URL: http://116.66.201.66/form/includes/manage_forms.php Vulnerabilities has been identified for this URL No input(s) found for this URL

You might also like