Professional Documents
Culture Documents
7 June, 2016
Affected Items
Scan of http://192.168.1.3:80/
Scan details
Scan information
Start time
Finish time
Scan time
Profile
6/6/2016 5:59:47 PM
6/7/2016 9:07:29 AM
15 hours, 7 minutes
Default
Server information
Responsive
Server banner
Server OS
Server technologies
True
Microsoft-IIS/8.5
Windows
ASP.NET
Threat level
Acunetix Threat Level 3
One or more high-severity type vulnerabilities have been discovered by the scanner. A
malicious user can exploit these vulnerabilities and compromise the backend database
and/or deface your website.
Alerts distribution
Total alerts found
227
High
Medium
188
Low
14
Informational
24
Affected items
/
Alert group
Severity
Description
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
GET / HTTP/1.1
Referer: http://192.168.1.3/Account/Login?ReturnUrl=/
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Host: 192.168.1.3
Parameter
/
Alert group
Severity
Description
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Details
Cookie name: "_culture"
Cookie domain: "192.168.1.3"
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Details
Cookie name: "ace_settings"
Cookie domain: "192.168.1.3"
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Alert group
Severity
Description
Recommendations
Alert variants
Details
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Details
Cookie name: "ace_settings"
Cookie domain: "192.168.1.3"
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Details
Cookie name: "__RequestVerificationToken"
Cookie domain: "192.168.1.3"
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Details
Cookie name: "currentNavLi"
Cookie domain: "192.168.1.3"
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Details
Cookie name: "_culture"
Cookie domain: "192.168.1.3"
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Alert group
Severity
Description
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
- SearchString [Text]
GET /account HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Details
Form name: <empty>
Form action: http://192.168.1.3/account
Form method: POST
Form inputs:
- SearchString [Text]
Recommendations
Alert variants
Details
Pattern found: info@awwwce.com
GET /account HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/account/delete/enanu
Parameter
__RequestVerificationToken
Alert group
Severity
Description
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
Recommendations
10
Alert variants
Details
Recommendations
Alert variants
Details
Pattern found: info@awwwce.com
GET /account/delete/zelalem HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/account
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...UISHYb75Myuir1JzwsC0FNA9nM7TBOL8DKPCwlySYeLOgcxJ-uYkTktkPKFhAh4lOppFWGZpMQ5S9OE-KF8x5
zdY-A9dOkPP4NmkX071rFmHJATnasgOGDugGN5_p2_2qjiT1kJTD2Bu73jt9p7FzZJZTKAcG_ktKBT6Vt3cABhnA
VBpgUWs07VAAg57U2A-ePmNuZAEnIgAEnwZZOyIQ69pGGddHzM5Kx3pr3Dlpz2nJoiASwlH01Uia7Qx38MoC2ayz
rGCTNEXe9QDzjZDnJ4usa-RYZfscchlzB7F39AJ4dOnwb8beVrES8-eO_am2bq5WUVPVwOJOWY8tXgagLNjLV3BB
omYolVYqqy8qjhOEwEtRpsgtft6k8q_UdoMLZ7vDqk_cQ60rGSCLCfI3lLSl_jS1oko_ADvYHSMyfwI85Bg75Mo7
8OboIVY3P0mSc0k9xVMgCXfc1B-9ZjkCJaQxH5kjh0ASBHu; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/account/edit/enanu
Parameter
__RequestVerificationToken
Alert group
Severity
Description
Recommendations
11
Alert variants
Details
Recommendations
Alert variants
Details
12
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
13
Recommendations
Alert variants
Details
14
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
15
Severity
Description
Recommendations
Alert variants
Details
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
16
Parameter
FirstName
Alert group
Severity
Description
Recommendations
Alert variants
Details
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
17
Recommendations
Alert variants
Details
18
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
Pattern found: info@awwwce.com
GET /account/edit/zelalem HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/account
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...UISHYb75Myuir1JzwsC0FNA9nM7TBOL8DKPCwlySYeLOgcxJ-uYkTktkPKFhAh4lOppFWGZpMQ5S9OE-KF8x5
zdY-A9dOkPP4NmkX071rFmHJATnasgOGDugGN5_p2_2qjiT1kJTD2Bu73jt9p7FzZJZTKAcG_ktKBT6Vt3cABhnA
VBpgUWs07VAAg57U2A-ePmNuZAEnIgAEnwZZOyIQ69pGGddHzM5Kx3pr3Dlpz2nJoiASwlH01Uia7Qx38MoC2ayz
rGCTNEXe9QDzjZDnJ4usa-RYZfscchlzB7F39AJ4dOnwb8beVrES8-eO_am2bq5WUVPVwOJOWY8tXgagLNjLV3BB
omYolVYqqy8qjhOEwEtRpsgtft6k8q_UdoMLZ7vDqk_cQ60rGSCLCfI3lLSl_jS1oko_ADvYHSMyfwI85Bg75Mo7
8OboIVY3P0mSc0k9xVMgCXfc1B-9ZjkCJaQxH5kjh0ASBHu; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/account/login
Parameter
Password
Alert group
19
Severity
Description
Recommendations
Alert variants
Details
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
20
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
21
Alert group
Severity
Description
Recommendations
Alert variants
Details
- __RequestVerificationToken [Hidden]
- UserName [Text]
- Password [Password]
GET /account/login HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Alert group
Severity
22
Description
Recommendations
A common threat web developers face is a password-guessing attack known as a brute force
attack. A brute-force attack is an attempt to discover a password by systematically trying every
possible combination of letters, numbers, and symbols until you discover the one correct
combination that works.
This login page doesn't have any protection against password-guessing attacks (brute force
attacks). It's recommended to implement some type of account lockout after a defined number of
incorrect password attempts. Consult Web references for more information about fixing this
problem.
It's recommended to implement some type of account lockout after a defined number of incorrect
password attempts.
Alert variants
Details
The scanner tested 10 invalid credentials and no account lockout was detected.
POST /account/login HTTP/1.1
Content-Length: 214
Content-Type: application/x-www-form-urlencoded
Referer: http://192.168.1.3:80/
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Password=4PBptj6n&UserName=lwir1kAu&__RequestVerificationToken=_uDCtrunIm4qmJUlyN2TRxSyz
o-QQxlXf5sXQAyMB2-eXDGfp16Nf_78l91wFgoGrZYn74Qbtyv7bL8oCsPGV4Ooi1fJmVyukcPReECkScFY3B8QgqLyo-iz7aR0cpBrYCJ8gTzo1B_pGQQIzt8hg2
Alert group
Severity
Description
Recommendations
Alert variants
Details
Password type input named Password from unnamed form with action /Account/Login has
autocomplete enabled.
GET /account/login HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...oDOFcOoz3AqF1-FalpZl_SWT3FLPPFZnoSbp18e1eYm1KELqI461aOEgqSW6dGrMxiPzyXvsJTCYRPmcK8UVa
DLK9eY6ahO3BxsGKaSFM8xhBx5rkacvc_Q9QTBR7w9Zk-VKXHuUesCpxmp4JUxJiru9csM3VTSLnOfpqvFzuKapU
4p6wFA2rhu3vCxLOfbXRG7TpAA4HfRsl1lY5N6FYVtiGxufwAdQzR1Na9waQPHyCJ0vB-K1ztjbD8Mr5hMCQZYGs
VCO6m0Kj7gJlcpi7PcRTIimTgtPY10gCXI-4mVvnG6G77BMrygTpTY6k1QsbDLfJxNrHa3VLCK1zIIkqKB09is5Q
myIBBDRS9lLKZ9cs-w5Rz1cXsW4YCd4FhDbqy2wThl2u70vvPsCm_CCMrip0WHswFbpNS437EcivGC8ST1qhMZhY
qvgpbyzQFOVR2O74ktxWQ0ij_U4Hpb0znFvV8aKDQgDv3FKMNCv6WROL-age7fl
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/account/login (1f2dc0e26bedda9d5aebd00f748cb9d1)
Alert group
Severity
23
Description
Recommendations
When a new name and password is entered in a form and the form is submitted, the browser asks
if the password should be saved.Thereafter when the form is displayed, the name and password
are filled in automatically or are completed as the name is entered. An attacker with local access
could obtain the cleartext password from the browser cache.
The password auto-complete should be disabled in sensitive applications.
To disable auto-complete, you may use a code similar to:
<INPUT TYPE="password" AUTOCOMPLETE="off">
Alert variants
Details
Password type input named Password from unnamed form with action
/Account/Login?ReturnUrl=%2Froles has autocomplete enabled.
GET /account/login?ReturnUrl=/roles HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/roles
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...xnsdSs-WJm2vPKGIEmtDE-XKwOk-XSFJ6DEW7R4pXv9V2r3EIVZ3a06CubQeDQlBX7aznpeHIoMPjDcyQ1vJx
IR7On9Rqe1JKB4AgCTtqV-SnoA7rw7m0I2YOzR9Q3AQ0bjb_EkD5sVyU3DJoFfFYq5D5p17_XV2k5QyskPeo28J3
TxOFsvi2qKkKUjtz8oUqiSQ4JlMY8a2Ug80Fb9YUsdGQGORe42CwrMcRc068gs-XxlgDyxj1Gm-2s33eQPQFw12d
olvrBc6yDvykD_uF6sOtGPXCLiFNrjwTp5dTP8mJcWchnJMenky-fIiTvP_Hm_uDO6r33O6F73-mdKSJxCmOQLgp
YyNiZmTKgbDKXRnKTaMUOLYKzs0DAbk7NYarkSqqYc2plWuSJ7MJOnMI2IFiNNUsnLpGW03V8hv7XZn0eociDXiO
luNjnMHKM-JryeCxYTaqrb8Sg8wDvkmMpkAfMJvuhuSwCL8; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/account/login (8f687fa47b22a02f27a3174aed84ccc0)
Alert group
Severity
Description
Recommendations
Alert variants
Details
Password type input named Password from unnamed form with action
/Account/Login?ReturnUrl=%2Fhr%2Fallowances has autocomplete enabled.
GET /account/login?ReturnUrl=/hr/allowances HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/hr/allowances
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...xnsdSs-WJm2vPKGIEmtDE-XKwOk-XSFJ6DEW7R4pXv9V2r3EIVZ3a06CubQeDQlBX7aznpeHIoMPjDcyQ1vJx
IR7On9Rqe1JKB4AgCTtqV-SnoA7rw7m0I2YOzR9Q3AQ0bjb_EkD5sVyU3DJoFfFYq5D5p17_XV2k5QyskPeo28J3
TxOFsvi2qKkKUjtz8oUqiSQ4JlMY8a2Ug80Fb9YUsdGQGORe42CwrMcRc068gs-XxlgDyxj1Gm-2s33eQPQFw12d
olvrBc6yDvykD_uF6sOtGPXCLiFNrjwTp5dTP8mJcWchnJMenky-fIiTvP_Hm_uDO6r33O6F73-mdKSJxCmOQLgp
YyNiZmTKgbDKXRnKTaMUOLYKzs0DAbk7NYarkSqqYc2plWuSJ7MJOnMI2IFiNNUsnLpGW03V8hv7XZn0eociDXiO
luNjnMHKM-JryeCxYTaqrb8Sg8wDvkmMpkAfMJvuhuSwCL8; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Acunetix Website Audit
24
/account/login (943495a8bf6f8beb8b22c44cf845bd3f)
Alert group
Severity
Description
Recommendations
Alert variants
Details
- __RequestVerificationToken [Hidden]
- UserName [Text]
- Password [Password]
POST /account/login HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/account/login
Content-Length: 222
Content-Type: application/x-www-form-urlencoded
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...xnsdSs-WJm2vPKGIEmtDE-XKwOk-XSFJ6DEW7R4pXv9V2r3EIVZ3a06CubQeDQlBX7aznpeHIoMPjDcyQ1vJx
IR7On9Rqe1JKB4AgCTtqV-SnoA7rw7m0I2YOzR9Q3AQ0bjb_EkD5sVyU3DJoFfFYq5D5p17_XV2k5QyskPeo28J3
TxOFsvi2qKkKUjtz8oUqiSQ4JlMY8a2Ug80Fb9YUsdGQGORe42CwrMcRc068gs-XxlgDyxj1Gm-2s33eQPQFw12d
olvrBc6yDvykD_uF6sOtGPXCLiFNrjwTp5dTP8mJcWchnJMenky-fIiTvP_Hm_uDO6r33O6F73-mdKSJxCmOQLgp
YyNiZmTKgbDKXRnKTaMUOLYKzs0DAbk7NYarkSqqYc2plWuSJ7MJOnMI2IFiNNUsnLpGW03V8hv7XZn0eociDXiO
luNjnMHKM-JryeCxYTaqrb8Sg8wDvkmMpkAfMJvuhuSwCL8; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Password=g00dPa%24%24w0rD&UserName=glpscbtu&__RequestVerificationToken=p-Ya6dj2VyJop_m5E
xsk2R3Ct821rXO6ASuxLaEOUjpM5gT_fIl_HaWhg9uZ5bW-QMQx9ae7oZvshfI_q25E-Qwm9FCmr4VYF3L34UBZb
UxQndssCSydRmQ7cPytqX1_vGWfaK0vsHo4sjtmZlPu1w2
/account/login (d4c7aaa78ab87dfcc2f6d60cf3c9605e)
Alert group
Severity
Description
Recommendations
Alert variants
Details
25
Recommendations
Alert variants
Details
Password type input named Password from unnamed form with action
/Account/Login?ReturnUrl=%2Fhr%2Fcosigns has autocomplete enabled.
GET /account/login?ReturnUrl=/hr/cosigns HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/hr/cosigns
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...xnsdSs-WJm2vPKGIEmtDE-XKwOk-XSFJ6DEW7R4pXv9V2r3EIVZ3a06CubQeDQlBX7aznpeHIoMPjDcyQ1vJx
IR7On9Rqe1JKB4AgCTtqV-SnoA7rw7m0I2YOzR9Q3AQ0bjb_EkD5sVyU3DJoFfFYq5D5p17_XV2k5QyskPeo28J3
TxOFsvi2qKkKUjtz8oUqiSQ4JlMY8a2Ug80Fb9YUsdGQGORe42CwrMcRc068gs-XxlgDyxj1Gm-2s33eQPQFw12d
olvrBc6yDvykD_uF6sOtGPXCLiFNrjwTp5dTP8mJcWchnJMenky-fIiTvP_Hm_uDO6r33O6F73-mdKSJxCmOQLgp
YyNiZmTKgbDKXRnKTaMUOLYKzs0DAbk7NYarkSqqYc2plWuSJ7MJOnMI2IFiNNUsnLpGW03V8hv7XZn0eociDXiO
luNjnMHKM-JryeCxYTaqrb8Sg8wDvkmMpkAfMJvuhuSwCL8; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/account/logoff
Parameter
Alert group
Severity
Description
Recommendations
Alert variants
Details
__RequestVerificationToken
Internal server error
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
URL encoded POST input __RequestVerificationToken was set to
Error message found: Internal Server Error
26
Recommendations
Alert variants
Details
__RequestVerificationToken
Internal server error
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Alert variants
27
Details
- __RequestVerificationToken [Hidden]
- UserName [Text]
- Password [Password]
- ConfirmPassword [Password]
- LastName [Text]
- FirstName [Text]
- Email [Text]
GET /account/register HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/account
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...5_p2_2qjiT1kJTD2Bu73jt9p7FzZJZTKAcG_ktKBT6Vt3cABhnAVBpgUWs07VAAg57U2A-ePmNuZAEnIgAEnw
ZZOyIQ69pGGddHzM5Kx3pr3Dlpz2nJoiASwlH01Uia7Qx38MoC2ayzrGCTNEXe9QDzjZDnJ4usa-RYZfscchlzB7
F39AJ4dOnwb8beVrES8-eO_am2bq5WUVPVwOJOWY8tXgagLNjLV3BBomYolVYqqy8qjhOEwEtRpsgtft6k8q_Udo
MLZ7vDqk_cQ60rGSCLCfI3lLSl_jS1oko_ADvYHSMyfwI85Bg75Mo78OboIVY3P0mSc0k9xVMgCXfc1B-9ZjkCJa
QxH5kjh0ASBHu; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Alert group
Severity
Description
Recommendations
Alert variants
Details
28
Recommendations
Alert variants
Details
XwF2g1elPPTFmU52vjD83PT41gWMJauef1e7KjdtlWrCM29OxOOPyAn2XRcNl8b56U1wQqCL3u91rNumArzqW7hT
fIOF6WB5-4bnKw; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[0].GroupId"
1
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[0].Selected"
false
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[1].GroupId"
4
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[2].GroupId"
5
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[2].Selected"
false
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[3].GroupId"
6
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[3].Selected"
true
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[4].GroupId"
7
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[4].Selected"
true
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[5].GroupId"
8
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[5].Selected"
true
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[6].GroupId"
9
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[6].Selected"
true
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[7].GroupId"
10
Acunetix Website Audit
30
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[7].Selected"
true
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[8].GroupId"
11
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="Groups[8].Selected"
true
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_RAUJOURFRB
Content-Disposition: form-data; name="__RequestVerificationToken"
-------AcunetixBoundary_RAUJOURFRB-Parameter
Groups[0].GroupId
Alert group
Severity
Description
Recommendations
Alert variants
Details
31
5
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[2].Selected"
false
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[3].GroupId"
6
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[3].Selected"
true
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[4].GroupId"
7
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[4].Selected"
true
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[5].GroupId"
8
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[5].Selected"
true
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[6].GroupId"
9
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[6].Selected"
true
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[7].GroupId"
10
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[7].Selected"
true
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[8].GroupId"
11
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="Groups[8].Selected"
true
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_VEJPINKYXH
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_VEJPINKYXH-Parameter
Groups[1].GroupId
Alert group
32
Severity
Description
Recommendations
Alert variants
Details
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
33
8
-------AcunetixBoundary_FGDQVSWTNK
Content-Disposition: form-data; name="Groups[5].Selected"
true
-------AcunetixBoundary_FGDQVSWTNK
Content-Disposition: form-data; name="Groups[6].GroupId"
9
-------AcunetixBoundary_FGDQVSWTNK
Content-Disposition: form-data; name="Groups[6].Selected"
true
-------AcunetixBoundary_FGDQVSWTNK
Content-Disposition: form-data; name="Groups[7].GroupId"
10
-------AcunetixBoundary_FGDQVSWTNK
Content-Disposition: form-data; name="Groups[7].Selected"
true
-------AcunetixBoundary_FGDQVSWTNK
Content-Disposition: form-data; name="Groups[8].GroupId"
11
-------AcunetixBoundary_FGDQVSWTNK
Content-Disposition: form-data; name="Groups[8].Selected"
true
-------AcunetixBoundary_FGDQVSWTNK
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_FGDQVSWTNK
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_FGDQVSWTNK-Parameter
Groups[2].GroupId
Alert group
Severity
Description
Recommendations
Alert variants
Details
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[0].GroupId"
1
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[0].Selected"
false
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[1].GroupId"
4
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[2].GroupId[]"
5
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[2].Selected"
false
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[3].GroupId"
6
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[3].Selected"
true
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[4].GroupId"
7
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[4].Selected"
true
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[5].GroupId"
8
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[5].Selected"
true
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[6].GroupId"
9
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[6].Selected"
true
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[7].GroupId"
10
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[7].Selected"
true
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[8].GroupId"
Acunetix Website Audit
35
11
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="Groups[8].Selected"
true
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_CGJAHGVTBE
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_CGJAHGVTBE-Parameter
Groups[3].GroupId
Alert group
Severity
Description
Recommendations
Alert variants
Details
36
false
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[3].GroupId[]"
6
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[3].Selected"
true
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[4].GroupId"
7
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[4].Selected"
true
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[5].GroupId"
8
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[5].Selected"
true
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[6].GroupId"
9
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[6].Selected"
true
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[7].GroupId"
10
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[7].Selected"
true
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[8].GroupId"
11
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="Groups[8].Selected"
true
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_ISPFJXUXSR
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_ISPFJXUXSR-Parameter
Groups[3].Selected
Alert group
Severity
37
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
38
true
-------AcunetixBoundary_IWDXKLYMHS
Content-Disposition: form-data; name="Groups[6].GroupId"
9
-------AcunetixBoundary_IWDXKLYMHS
Content-Disposition: form-data; name="Groups[6].Selected"
true
-------AcunetixBoundary_IWDXKLYMHS
Content-Disposition: form-data; name="Groups[7].GroupId"
10
-------AcunetixBoundary_IWDXKLYMHS
Content-Disposition: form-data; name="Groups[7].Selected"
true
-------AcunetixBoundary_IWDXKLYMHS
Content-Disposition: form-data; name="Groups[8].GroupId"
11
-------AcunetixBoundary_IWDXKLYMHS
Content-Disposition: form-data; name="Groups[8].Selected"
true
-------AcunetixBoundary_IWDXKLYMHS
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_IWDXKLYMHS
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_IWDXKLYMHS-Parameter
Groups[4].GroupId
Alert group
Severity
Description
Recommendations
Alert variants
Details
39
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[0].GroupId"
1
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[0].Selected"
false
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[1].GroupId"
4
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[2].GroupId"
5
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[2].Selected"
false
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[3].GroupId"
6
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[3].Selected"
true
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[4].GroupId[]"
7
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[4].Selected"
true
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[5].GroupId"
8
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[5].Selected"
true
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[6].GroupId"
9
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[6].Selected"
true
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[7].GroupId"
10
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[7].Selected"
true
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[8].GroupId"
11
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="Groups[8].Selected"
Acunetix Website Audit
40
true
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_DNVDDGLXSV
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_DNVDDGLXSV-Parameter
Groups[4].Selected
Alert group
Severity
Description
Recommendations
Alert variants
Details
41
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="Groups[3].Selected"
true
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="Groups[4].GroupId"
7
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="Groups[5].GroupId"
8
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="Groups[5].Selected"
true
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="Groups[6].GroupId"
9
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="Groups[6].Selected"
true
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="Groups[7].GroupId"
10
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="Groups[7].Selected"
true
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="Groups[8].GroupId"
11
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="Groups[8].Selected"
true
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_RJHNRTUOGK
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_RJHNRTUOGK-Parameter
Groups[5].GroupId
Alert group
Severity
Description
Recommendations
Alert variants
Details
42
(line truncated)
...Lu9oqJmnPHBFavIacie1xFtX1g8MmPCIAcinTl3koAYBSCb_bjlhVlSyWg4rcDXzJzEPICJoukYjWngZ6ykWu
z6c4giemFeWbArlAQEsfswhgQX7oxuMGQjO_MgNdraqhXI9zRxyx34RWdTOJ-oKtUUWHw--BfbJPe_QWW2hQfXtw
PO84jcxsib7bt2_4Jrd5zVmi8vnz1YPo3OUBcM3Bgzq8Gj5w2WhT9Qb2Pde7T1S8kxo_9kFjsPPnmWeZv9Ce3CBh
H6_wArZshAnUsx4tNxkx16f10fmmQfs78kqGwx2Rt3J08oh2GwK6ep23iy0TLCa4jFTnp_ElkTG8Yx9VS1T01UfB
P2pBBs8Vvd_m_; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[0].GroupId"
1
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[0].Selected"
false
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[1].GroupId"
4
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[2].GroupId"
5
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[2].Selected"
false
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[3].GroupId"
6
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[3].Selected"
true
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[4].GroupId"
7
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[4].Selected"
true
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[5].GroupId[]"
8
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[5].Selected"
true
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[6].GroupId"
9
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[6].Selected"
true
Acunetix Website Audit
43
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[7].GroupId"
10
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[7].Selected"
true
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[8].GroupId"
11
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="Groups[8].Selected"
true
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_MVVBBEOTBY
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_MVVBBEOTBY-Parameter
Groups[5].Selected
Alert group
Severity
Description
Recommendations
Alert variants
Details
44
45
Alert group
Severity
Description
Recommendations
Alert variants
Details
46
-------AcunetixBoundary_OHUOPLUDVW
Content-Disposition: form-data; name="Groups[5].GroupId"
8
-------AcunetixBoundary_OHUOPLUDVW
Content-Disposition: form-data; name="Groups[5].Selected"
true
-------AcunetixBoundary_OHUOPLUDVW
Content-Disposition: form-data; name="Groups[6].GroupId[]"
9
-------AcunetixBoundary_OHUOPLUDVW
Content-Disposition: form-data; name="Groups[6].Selected"
true
-------AcunetixBoundary_OHUOPLUDVW
Content-Disposition: form-data; name="Groups[7].GroupId"
10
-------AcunetixBoundary_OHUOPLUDVW
Content-Disposition: form-data; name="Groups[7].Selected"
true
-------AcunetixBoundary_OHUOPLUDVW
Content-Disposition: form-data; name="Groups[8].GroupId"
11
-------AcunetixBoundary_OHUOPLUDVW
Content-Disposition: form-data; name="Groups[8].Selected"
true
-------AcunetixBoundary_OHUOPLUDVW
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_OHUOPLUDVW
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_OHUOPLUDVW-Parameter
Groups[6].Selected
Alert group
Severity
Description
Recommendations
Alert variants
Details
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[0].GroupId"
1
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[0].Selected"
false
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[1].GroupId"
4
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[2].GroupId"
5
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[2].Selected"
false
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[3].GroupId"
6
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[3].Selected"
true
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[4].GroupId"
7
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[4].Selected"
true
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[5].GroupId"
8
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[5].Selected"
true
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[6].GroupId"
9
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[7].GroupId"
10
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[7].Selected"
true
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[8].GroupId"
11
Acunetix Website Audit
48
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="Groups[8].Selected"
true
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_SYTJYGTPBW
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_SYTJYGTPBW-Parameter
Groups[7].GroupId
Alert group
Severity
Description
Recommendations
Alert variants
Details
49
Recommendations
50
Alert variants
Details
51
-------AcunetixBoundary_MMEWNHJWYL
Content-Disposition: form-data; name="Groups[6].GroupId"
9
-------AcunetixBoundary_MMEWNHJWYL
Content-Disposition: form-data; name="Groups[6].Selected"
true
-------AcunetixBoundary_MMEWNHJWYL
Content-Disposition: form-data; name="Groups[7].GroupId"
10
-------AcunetixBoundary_MMEWNHJWYL
Content-Disposition: form-data; name="Groups[8].GroupId"
11
-------AcunetixBoundary_MMEWNHJWYL
Content-Disposition: form-data; name="Groups[8].Selected"
true
-------AcunetixBoundary_MMEWNHJWYL
Content-Disposition: form-data; name="UserName"
Enanu
-------AcunetixBoundary_MMEWNHJWYL
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_MMEWNHJWYL-Parameter
Groups[8].GroupId
Alert group
Severity
Description
Recommendations
Alert variants
Details
52
53
-------AcunetixBoundary_QAWAULLAVY
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_QAWAULLAVY-Parameter
Groups[8].Selected
Alert group
Severity
Description
Recommendations
Alert variants
Details
54
Recommendations
Alert variants
Details
56
-------AcunetixBoundary_KSYNUQKWLN
Content-Disposition: form-data; name="__RequestVerificationToken"
id4F7HKEp-2NoCOhw57NBlpZvNECOZtalrV62dIubpxQ0QMVYmeiX6EMxWyNt0yCsbwdxWaUR1huDrpuOu6CGNC0
aauRQWG4ksGXIuIGS4ZIezE8zze5i4rCulTLJ7xkD1pvhHfanh2M4bbr0At7QQ2
-------AcunetixBoundary_KSYNUQKWLN-/account/usergroups/endalamaw
Parameter
UserName
Alert group
Severity
Description
Recommendations
Alert variants
Details
57
wQPBgCaWefS24PKZL5ANOW3BmbgLmGpHm8iANuuR-7jymWN_ildjlN9jsa1PjTg2
-------AcunetixBoundary_DWREWXOHXT-/content/ace/font-awesome/4.2.0/css/font-awesome.min.css
Alert group
Severity
Description
Broken links
Informational
A broken link refers to any link that should take you to a document, image or webpage, that actually
results in an error. This page was linked from the website but it is inaccessible.
Remove the links to this file or make it accessible.
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file
(marked as "Not Found") > select Referrers Tab from the bottom of the Information pane.
GET /content/kendo/2016.1.112/%23clip HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/content/kendo/2016.1.112/kendo.mobile.all.min.css
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/accountstransactions
Alert group
Severity
59
Description
Recommendations
Alert variants
Details
- CategoryNames [Select]
- Period [Select]
- Source [Text]
- JournalReferences [Text]
- EffectiveDates [Text]
GET /finance/accountstransactions HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/accountstransactions/details/11140-1-00-cb0001%20%c2%a0
Alert group
Severity
Description
Recommendations
Alert variants
Details
Broken links
Informational
A broken link refers to any link that should take you to a document, image or webpage, that actually
results in an error. This page was linked from the website but it is inaccessible.
Remove the links to this file or make it accessible.
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file
(marked as "Not Found") > select Referrers Tab from the bottom of the Information pane.
60
Recommendations
Alert variants
Details
61
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
62
Recommendations
Alert variants
Details
63
Severity
Description
Recommendations
Alert variants
Details
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
64
Recommendations
Alert variants
Details
65
Severity
Description
Recommendations
Alert variants
Details
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
66
Recommendations
Alert variants
Details
67
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
68
Recommendations
Alert variants
Details
69
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
70
Recommendations
Alert variants
Details
71
Alert group
Severity
Description
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
72
Recommendations
Alert variants
Details
73
Severity
Description
Recommendations
Alert variants
Details
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
74
Recommendations
Alert variants
Details
75
Severity
Description
Recommendations
Alert variants
Details
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
76
Recommendations
Alert variants
Details
77
Severity
Description
Recommendations
Alert variants
Details
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
78
Recommendations
Alert variants
Details
79
Severity
Description
Recommendations
Alert variants
Details
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
80
Recommendations
Alert variants
Details
Alert group
Severity
Description
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
82
Recommendations
Alert variants
Details
83
Alert group
Severity
Description
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
84
Recommendations
Alert variants
Details
85
Description
Recommendations
Alert variants
Details
- period [Select]
GET /finance/budgetagainstpreviousyear HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/budgetallocationandusage
Alert group
Severity
Description
Recommendations
Alert variants
Details
86
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
87
GET
/finance/budgetallocationandusage/budgetallocationandusageexcel?BudgetMonth=NA&BudgetYea
r=12345'"\'\");|]*%00{%0d%0a<%00>%bf%27' HTTP/1.1
Referer: http://192.168.1.3:80/
(line truncated)
...lg_W4JZUZLzFcZ16WR4m2WqXMTcN_bT4OKJRROQLdc4IhjGMku4kEZkTCyWmgfq7UnaM3s0TNT2n1WyIGz9rW
LUel-3jOAJo4kifE9gh3sYw97zF0LcxBgK3eOVWqys5NnaR0495W2zh3lSrDMS16cGJxR3VIbiOqXOqyq-tJTf9h
iRt7gpfomAvLLP0u_WoyVDyrpPIS0hEIwLs1_tGq9qYcTLtokWrLUSGW0jjvsPBLdWtdUlZ2eVXoSV81FBLJdPXq
n1WEivbQKSlT4Q-36uvnJn2fJJ3Dx8uPcdI0GeefZD8oCrKtU1yhNmfBmL0aeqEosUMW6fLQo4lZ9KCiYACy3oVg
yPEkzbLNgBmcc; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/budgetallocationandusage/budgetallocationandusageprint
Parameter
BudgetYear
Alert group
Severity
Description
Recommendations
Alert variants
Details
GET
/finance/budgetallocationandusage/budgetallocationandusageprint?BudgetMonth=NA&BudgetYea
r=12345'"\'\");|]*%00{%0d%0a<%00>%bf%27' HTTP/1.1
Referer: http://192.168.1.3:80/
(line truncated)
...cnBcB0mBDXweyHq8QSx91oMDsyM-jFrIkS6l04jSNkCMTXHF-gnxV5NvJgpGeh2Xg9ZNzWcMxoh0o8wu9kqGK
pnZa9WGi8KPYlt7KlLzoSSRwp3jkQLWEIzoqEJar8jDgRaHSDtxtO6XGU_2aXFNEsvbEZMBBROmHuYrJBbwCDn-S
xc51B05xsHkshOnLMtusF-eKvP39OskgurwoWfmT2WWYhKf6ig0odnIxCxz46b6Asp4HpXiOpUhadws6_L0v-ia7
GWIkYcFCioSrrDXhOz5Xd8RiF0RkzASVeZOzgyUwn7E2qMwirbXu8h9qVMnsVosck80Q0wkN10UE6uqVAsUPSQRb
GrDZTQG2en1Gw; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/json/bankaccounts (6e57e52fb25f1aa27d063b6c42189ce6)
Alert group
Severity
88
Description
Recommendations
Alert variants
Details
No details are available.
POST /finance/json/bankaccounts HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/finance/json/bankaccounts
Content-Length: 71
Content-Type: application/x-www-form-urlencoded
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...5_p2_2qjiT1kJTD2Bu73jt9p7FzZJZTKAcG_ktKBT6Vt3cABhnAVBpgUWs07VAAg57U2A-ePmNuZAEnIgAEnw
ZZOyIQ69pGGddHzM5Kx3pr3Dlpz2nJoiASwlH01Uia7Qx38MoC2ayzrGCTNEXe9QDzjZDnJ4usa-RYZfscchlzB7
F39AJ4dOnwb8beVrES8-eO_am2bq5WUVPVwOJOWY8tXgagLNjLV3BBomYolVYqqy8qjhOEwEtRpsgtft6k8q_Udo
MLZ7vDqk_cQ60rGSCLCfI3lLSl_jS1oko_ADvYHSMyfwI85Bg75Mo78OboIVY3P0mSc0k9xVMgCXfc1B-9ZjkCJa
QxH5kjh0ASBHu; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Accounts=1001160141&CostCenter=1&Location=1&SubAccount=4111111111111111
/finance/json/description
Alert group
Severity
Description
Recommendations
Alert variants
Details
89
Recommendations
Alert variants
Details
90
Description
Recommendations
Alert variants
Details
No details are available.
POST /finance/json/description HTTP/1.1
Accept: */*
Referer: http://192.168.1.3/finance/bankaccounts/edit/16
Origin: http://192.168.1.3
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 20
(line truncated)
...5_p2_2qjiT1kJTD2Bu73jt9p7FzZJZTKAcG_ktKBT6Vt3cABhnAVBpgUWs07VAAg57U2A-ePmNuZAEnIgAEnw
ZZOyIQ69pGGddHzM5Kx3pr3Dlpz2nJoiASwlH01Uia7Qx38MoC2ayzrGCTNEXe9QDzjZDnJ4usa-RYZfscchlzB7
F39AJ4dOnwb8beVrES8-eO_am2bq5WUVPVwOJOWY8tXgagLNjLV3BBomYolVYqqy8qjhOEwEtRpsgtft6k8q_Udo
MLZ7vDqk_cQ60rGSCLCfI3lLSl_jS1oko_ADvYHSMyfwI85Bg75Mo78OboIVY3P0mSc0k9xVMgCXfc1B-9ZjkCJa
QxH5kjh0ASBHu; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Connection: Keep-alive
Accept-Encoding: gzip,deflate
Accept-Language: en-US,*
Host: 192.168.1.3
Pragma: no-cache
Cache-Control: no-cache
id=11140-1-00-CB0022
/finance/json/fromaccountcode
Alert group
Severity
Description
Recommendations
Alert variants
91
Details
- Accounts [Select]
- Location [Select]
- CostCenter [Select]
- SubAccount [Select]
GET /finance/json/fromaccountcode HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/finance/reportfinance/accountanalysisbysegment
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...5_p2_2qjiT1kJTD2Bu73jt9p7FzZJZTKAcG_ktKBT6Vt3cABhnAVBpgUWs07VAAg57U2A-ePmNuZAEnIgAEnw
ZZOyIQ69pGGddHzM5Kx3pr3Dlpz2nJoiASwlH01Uia7Qx38MoC2ayzrGCTNEXe9QDzjZDnJ4usa-RYZfscchlzB7
F39AJ4dOnwb8beVrES8-eO_am2bq5WUVPVwOJOWY8tXgagLNjLV3BBomYolVYqqy8qjhOEwEtRpsgtft6k8q_Udo
MLZ7vDqk_cQ60rGSCLCfI3lLSl_jS1oko_ADvYHSMyfwI85Bg75Mo78OboIVY3P0mSc0k9xVMgCXfc1B-9ZjkCJa
QxH5kjh0ASBHu; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/json/fromaccountcode (6e57e52fb25f1aa27d063b6c42189ce6)
Alert group
Severity
Description
Recommendations
Alert variants
Details
92
Recommendations
Alert variants
Details
93
Recommendations
Alert variants
Details
- Category [Select]
- dt1 [Text]
- dt2 [Text]
GET /finance/reportfinance/accountanalysis HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/reportfinance/accountanalysisbysegment
Acunetix Website Audit
94
Alert group
Severity
Description
Recommendations
Alert variants
Details
- acctFrom [Text]
- acctTo [Text]
- dt1 [Text]
- dt2 [Text]
GET /finance/reportfinance/accountanalysisbysegment HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...a9ypgKQo4IresNGJH8_NRq5DiOP6Y2m0iecgt7NNnDylKHT5lRR2DVFqh0m54hGM42pc9D6jtqf6weLnqyI1F
MOC8-ah4KDIlxepuRhlSRKtGCkCyEY9yCpwdjJHsMAc4OyDw_KHB1Oafa_HTDW_reknckNNMEJDM1jv25SeOaqIG
lDrfsB-9APFBAe_oaYr6X9gCgenPqWwsWFCpqbczhPQvN_4Q62s33235rE9Z1dS_FEd_cTjmyCiVfqxLbhsknhbN
m-5sMfEWq7ch-z_sh2zHcKGWBAkmZvpV-oOlc_RJu3vxFauBfPDIe6ZDCdRsr1XeCJYJOVcoXFDkqprTihRJVUjY
Zz4U6J48ONLzDUMM-FCRr1qO39a8QQQG6FupR97RmNacgEkCW6Ez5c8kA3lDBOcfIF57aEgfbToZQTlEuoQCBtZg
FD3uri91RhvgQGcpjmXnPnAX48B7YLISvvBhQT8K7gzbUXh; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/reportfinance/aragingbyinvoice
Alert group
Severity
Description
Recommendations
Alert variants
Details
95
Recommendations
Alert variants
Details
- branchCode [Select]
- dt2 [Text]
GET /finance/reportfinance/cashflow HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/reportfinance/chartofaccount
Alert group
Severity
96
Description
Recommendations
Alert variants
Details
- Account [Select]
- AccountType [Select]
GET /finance/reportfinance/chartofaccount HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/reportfinance/customerlist
Alert group
Severity
Description
Recommendations
Alert variants
Details
97
Recommendations
Alert variants
Details
- branchCode [Select]
- dt1 [Text]
- dt2 [Text]
GET /finance/reportfinance/incomestatement HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/reportfinance/incomestatementbyproject
Alert group
Severity
98
Description
Recommendations
Alert variants
Details
- costcenterCode [Select]
- dt1 [Text]
- dt2 [Text]
GET /finance/reportfinance/incomestatementbyproject HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...a9ypgKQo4IresNGJH8_NRq5DiOP6Y2m0iecgt7NNnDylKHT5lRR2DVFqh0m54hGM42pc9D6jtqf6weLnqyI1F
MOC8-ah4KDIlxepuRhlSRKtGCkCyEY9yCpwdjJHsMAc4OyDw_KHB1Oafa_HTDW_reknckNNMEJDM1jv25SeOaqIG
lDrfsB-9APFBAe_oaYr6X9gCgenPqWwsWFCpqbczhPQvN_4Q62s33235rE9Z1dS_FEd_cTjmyCiVfqxLbhsknhbN
m-5sMfEWq7ch-z_sh2zHcKGWBAkmZvpV-oOlc_RJu3vxFauBfPDIe6ZDCdRsr1XeCJYJOVcoXFDkqprTihRJVUjY
Zz4U6J48ONLzDUMM-FCRr1qO39a8QQQG6FupR97RmNacgEkCW6Ez5c8kA3lDBOcfIF57aEgfbToZQTlEuoQCBtZg
FD3uri91RhvgQGcpjmXnPnAX48B7YLISvvBhQT8K7gzbUXh; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/finance/reportfinance/supplierlist
Alert group
Severity
Description
Recommendations
Alert variants
Details
99
Recommendations
Alert variants
Details
- Branch [Select]
- dt1 [Text]
GET /finance/reportfinance/trialbalance HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/fleetmanagement/fleetsetupequipmentcategory/fleetsetupequipmentcategories_read
Alert group
Severity
Description
Recommendations
Alert variants
100
Details
Pattern found: Internal Server Error
GET /fleetmanagement/fleetsetupequipmentcategory/fleetsetupequipmentcategories_read
HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/fleetmanagement/fleetsetupequipmentcategory
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/fleetmanagement/fleetsetupequipmentfuelstandard/fleetsetupequipmentfuelstandards_read
Alert group
Severity
Description
Recommendations
Alert variants
Details
Pattern found: Internal Server Error
GET
/fleetmanagement/fleetsetupequipmentfuelstandard/fleetsetupequipmentfuelstandards_read
HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/fleetmanagement/fleetsetupequipmentfuelstandard
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/fleetmanagement/fleetsetupequipmentfueltype/fleetsetupequipmentfueltypes_read
Alert group
Severity
Description
Recommendations
Alert variants
Details
101
GET /fleetmanagement/fleetsetupequipmentfueltype/fleetsetupequipmentfueltypes_read
HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/fleetmanagement/fleetsetupequipmentfueltype
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
Parameter
filter
Alert group
Severity
Description
Recommendations
Alert variants
Details
POST
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
HTTP/1.1
Content-Length: 81
Content-Type: application/x-www-form-urlencoded
Referer: http://192.168.1.3:80/
(line truncated)
...twr3VSr3Ljq2b7xef3Mot0Zd_s0KpKrUcg4MTSm2Qeaxj0HOsBOdwvu9e2EdaetEibPl2vGiMm4rLQ0r3LLFP
jhxnLrk9F6o29vqTaklFxUr_QImSozn0JtA1cj_01VOI7wm25r3KY3eI1_vVROouvLh2qopX5wy3BLjRbQy-hJ6L
v7pJ1l3uB96ddkaDjV1qe0Gnw_n4eSbVqMnDe-e2y-1OBE4Z2ZqGSZswicF3iSRKaDWZDMqgGCEiIepva_Hkgrws
VyUlak-mQoCGfY_mhG2d7hNRsabXDuirpBnWE4mL6S_OEdbEg46u6Eg_B33IDSz1VysDiEhDHgDeE7TJ-ZwCSXG7
neGpgotdyWsJD; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
filter=12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'&group=&page=1&pageSize=10&sort=
Parameter
group
Alert group
Severity
Description
Recommendations
Alert variants
Details
102
POST
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
HTTP/1.1
Content-Length: 81
Content-Type: application/x-www-form-urlencoded
Referer: http://192.168.1.3:80/
(line truncated)
...twr3VSr3Ljq2b7xef3Mot0Zd_s0KpKrUcg4MTSm2Qeaxj0HOsBOdwvu9e2EdaetEibPl2vGiMm4rLQ0r3LLFP
jhxnLrk9F6o29vqTaklFxUr_QImSozn0JtA1cj_01VOI7wm25r3KY3eI1_vVROouvLh2qopX5wy3BLjRbQy-hJ6L
v7pJ1l3uB96ddkaDjV1qe0Gnw_n4eSbVqMnDe-e2y-1OBE4Z2ZqGSZswicF3iSRKaDWZDMqgGCEiIepva_Hkgrws
VyUlak-mQoCGfY_mhG2d7hNRsabXDuirpBnWE4mL6S_OEdbEg46u6Eg_B33IDSz1VysDiEhDHgDeE7TJ-ZwCSXG7
neGpgotdyWsJD; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
filter=&group=12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'&page=1&pageSize=10&sort=
Parameter
page
Alert group
Severity
Description
Recommendations
Alert variants
Details
POST
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
HTTP/1.1
Content-Length: 38
Content-Type: application/x-www-form-urlencoded
Referer: http://192.168.1.3:80/
(line truncated)
...twr3VSr3Ljq2b7xef3Mot0Zd_s0KpKrUcg4MTSm2Qeaxj0HOsBOdwvu9e2EdaetEibPl2vGiMm4rLQ0r3LLFP
jhxnLrk9F6o29vqTaklFxUr_QImSozn0JtA1cj_01VOI7wm25r3KY3eI1_vVROouvLh2qopX5wy3BLjRbQy-hJ6L
v7pJ1l3uB96ddkaDjV1qe0Gnw_n4eSbVqMnDe-e2y-1OBE4Z2ZqGSZswicF3iSRKaDWZDMqgGCEiIepva_Hkgrws
VyUlak-mQoCGfY_mhG2d7hNRsabXDuirpBnWE4mL6S_OEdbEg46u6Eg_B33IDSz1VysDiEhDHgDeE7TJ-ZwCSXG7
neGpgotdyWsJD; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
filter=&group=&page=&pageSize=10&sort=
Parameter
pageSize
Alert group
Severity
Description
Recommendations
103
Alert variants
Details
POST
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
HTTP/1.1
Content-Length: 37
Content-Type: application/x-www-form-urlencoded
Referer: http://192.168.1.3:80/
(line truncated)
...twr3VSr3Ljq2b7xef3Mot0Zd_s0KpKrUcg4MTSm2Qeaxj0HOsBOdwvu9e2EdaetEibPl2vGiMm4rLQ0r3LLFP
jhxnLrk9F6o29vqTaklFxUr_QImSozn0JtA1cj_01VOI7wm25r3KY3eI1_vVROouvLh2qopX5wy3BLjRbQy-hJ6L
v7pJ1l3uB96ddkaDjV1qe0Gnw_n4eSbVqMnDe-e2y-1OBE4Z2ZqGSZswicF3iSRKaDWZDMqgGCEiIepva_Hkgrws
VyUlak-mQoCGfY_mhG2d7hNRsabXDuirpBnWE4mL6S_OEdbEg46u6Eg_B33IDSz1VysDiEhDHgDeE7TJ-ZwCSXG7
neGpgotdyWsJD; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
filter=&group=&page=1&pageSize=&sort=
Parameter
sort
Alert group
Severity
Description
Recommendations
Alert variants
Details
POST
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
HTTP/1.1
Content-Length: 81
Content-Type: application/x-www-form-urlencoded
Referer: http://192.168.1.3:80/
(line truncated)
...twr3VSr3Ljq2b7xef3Mot0Zd_s0KpKrUcg4MTSm2Qeaxj0HOsBOdwvu9e2EdaetEibPl2vGiMm4rLQ0r3LLFP
jhxnLrk9F6o29vqTaklFxUr_QImSozn0JtA1cj_01VOI7wm25r3KY3eI1_vVROouvLh2qopX5wy3BLjRbQy-hJ6L
v7pJ1l3uB96ddkaDjV1qe0Gnw_n4eSbVqMnDe-e2y-1OBE4Z2ZqGSZswicF3iSRKaDWZDMqgGCEiIepva_Hkgrws
VyUlak-mQoCGfY_mhG2d7hNRsabXDuirpBnWE4mL6S_OEdbEg46u6Eg_B33IDSz1VysDiEhDHgDeE7TJ-ZwCSXG7
neGpgotdyWsJD; _culture=en-us; currentNavLi=link246;
ace_settings=%7B%22sidebar-collapsed%22%3A1%2C%22navbar-fixed%22%3A1%2C%22sidebar-fixed%
22%3A-1%7D
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
filter=&group=&page=1&pageSize=10&sort=12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
(11e076bff3d87afafd26c723d1fdc6a3)
Alert group
Severity
104
Description
Recommendations
Alert variants
Details
No details are available.
POST
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
HTTP/1.1
Accept: */*
Referer: http://192.168.1.3/fleetmanagement/fleetsetupequipmentmanufacturer
Origin: http://192.168.1.3
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 39
(line truncated)
...A9nM7TBOL8DKPCwlySYeLOgcxJ-uYkTktkPKFhAh4lOppFWGZpMQ5S9OE-KF8x5zdY-A9dOkPP4NmkX071rFm
HJATnasgOGDugGN5_p2_2qjiT1kJTD2Bu73jt9p7FzZJZTKAcG_ktKBT6Vt3cABhnAVBpgUWs07VAAg57U2A-ePm
NuZAEnIgAEnwZZOyIQ69pGGddHzM5Kx3pr3Dlpz2nJoiASwlH01Uia7Qx38MoC2ayzrGCTNEXe9QDzjZDnJ4usaRYZfscchlzB7F39AJ4dOnwb8beVrES8-eO_am2bq5WUVPVwOJOWY8tXgagLNjLV3BBomYolVYqqy8qjhOEwEtRps
gtft6k8q_UdoMLZ7vDqk_cQ60rGSCLCfI3lLSl_jS1oko_ADvYHSMyfwI85Bg75Mo78OboIVY3P0mSc0k9xVMgCX
fc1B-9ZjkCJaQxH5kjh0ASBHu; _culture=en-us; currentNavLi=link300
Connection: Keep-alive
Accept-Encoding: gzip,deflate
Accept-Language: en-US,*
Host: 192.168.1.3
Pragma: no-cache
Cache-Control: no-cache
sort=&page=1&pageSize=10&group=&filter=
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
(65ba3a10b77a6c16224ffc9314b599f2)
Alert group
Severity
Description
Recommendations
Alert variants
Acunetix Website Audit
105
Details
No details are available.
POST
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
HTTP/1.1
Accept: */*
Referer: http://192.168.1.3/fleetmanagement/fleetsetupequipmentmanufacturer
Origin: http://192.168.1.3
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 66
(line truncated)
...A9nM7TBOL8DKPCwlySYeLOgcxJ-uYkTktkPKFhAh4lOppFWGZpMQ5S9OE-KF8x5zdY-A9dOkPP4NmkX071rFm
HJATnasgOGDugGN5_p2_2qjiT1kJTD2Bu73jt9p7FzZJZTKAcG_ktKBT6Vt3cABhnAVBpgUWs07VAAg57U2A-ePm
NuZAEnIgAEnwZZOyIQ69pGGddHzM5Kx3pr3Dlpz2nJoiASwlH01Uia7Qx38MoC2ayzrGCTNEXe9QDzjZDnJ4usaRYZfscchlzB7F39AJ4dOnwb8beVrES8-eO_am2bq5WUVPVwOJOWY8tXgagLNjLV3BBomYolVYqqy8qjhOEwEtRps
gtft6k8q_UdoMLZ7vDqk_cQ60rGSCLCfI3lLSl_jS1oko_ADvYHSMyfwI85Bg75Mo78OboIVY3P0mSc0k9xVMgCX
fc1B-9ZjkCJaQxH5kjh0ASBHu; _culture=en-us; currentNavLi=link246
Connection: Keep-alive
Accept-Encoding: gzip,deflate
Accept-Language: en-US,*
Host: 192.168.1.3
Pragma: no-cache
Cache-Control: no-cache
sort=&page=1&pageSize=10&group=&filter=Manufacturer~isnotempty~'e'
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
(b585c40490c5c63ee711d1bbe6e3a118)
Alert group
Severity
Description
Recommendations
Alert variants
Details
106
POST
/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
HTTP/1.1
Accept: */*
Referer: http://192.168.1.3/fleetmanagement/fleetsetupequipmentmanufacturer
Origin: http://192.168.1.3
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 57
(line truncated)
...A9nM7TBOL8DKPCwlySYeLOgcxJ-uYkTktkPKFhAh4lOppFWGZpMQ5S9OE-KF8x5zdY-A9dOkPP4NmkX071rFm
HJATnasgOGDugGN5_p2_2qjiT1kJTD2Bu73jt9p7FzZJZTKAcG_ktKBT6Vt3cABhnAVBpgUWs07VAAg57U2A-ePm
NuZAEnIgAEnwZZOyIQ69pGGddHzM5Kx3pr3Dlpz2nJoiASwlH01Uia7Qx38MoC2ayzrGCTNEXe9QDzjZDnJ4usaRYZfscchlzB7F39AJ4dOnwb8beVrES8-eO_am2bq5WUVPVwOJOWY8tXgagLNjLV3BBomYolVYqqy8qjhOEwEtRps
gtft6k8q_UdoMLZ7vDqk_cQ60rGSCLCfI3lLSl_jS1oko_ADvYHSMyfwI85Bg75Mo78OboIVY3P0mSc0k9xVMgCX
fc1B-9ZjkCJaQxH5kjh0ASBHu; _culture=en-us; currentNavLi=link246
Connection: Keep-alive
Accept-Encoding: gzip,deflate
Accept-Language: en-US,*
Host: 192.168.1.3
Pragma: no-cache
Cache-Control: no-cache
sort=&page=1&pageSize=10&group=&filter=Description~eq~'e'
/fleetmanagement/fleetsetupequipmentname/fleetsetupequipmentnames_read
Alert group
Severity
Description
This may be a false positive if the error message is found in documentation pages.
Recommendations Review the source code for this script.
Alert variants
Details
Pattern found: Internal Server Error
GET /fleetmanagement/fleetsetupequipmentname/fleetsetupequipmentnames_read HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/fleetmanagement/fleetsetupequipmentname
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/fleetmanagement/fleetsetupequipmentstatus/fleetsetupequipmentstatus_read
Alert group
Severity
Description
Recommendations
Alert variants
107
Details
Pattern found: Internal Server Error
GET /fleetmanagement/fleetsetupequipmentstatus/fleetsetupequipmentstatus_read HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/fleetmanagement/fleetsetupequipmentstatus
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
Alert group
Severity
Description
Recommendations
Alert variants
Details
Pattern found: Internal Server Error
GET /fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/fleetmanagement/fleetsetupequipmenttype
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
Parameter
filter
Alert group
Severity
Description
Recommendations
Alert variants
Details
108
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
109
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
110
Recommendations
Alert variants
Details
111
This may be a false positive if the error message is found in documentation pages.
Recommendations Review the source code for this script.
Alert variants
Details
Pattern found: Internal Server Error
GET /fleetmanagement/fleetsetupinsurancetype/fleetsetupinsurancetypes_read HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/fleetmanagement/fleetsetupinsurancetype
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/fleetmanagement/fleetsetupmaintenancecenter/fleetsetupmaintenancecenters_read
Alert group
Severity
Description
Recommendations
Alert variants
Details
112
GET /fleetmanagement/fleetsetupmaintenancecenter/fleetsetupmaintenancecenters_read
HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/fleetmanagement/fleetsetupmaintenancecenter
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/fleetmanagement/fleetsetupoperatorposition/fleetsetupoperatorpositions_read
Alert group
Severity
Description
This may be a false positive if the error message is found in documentation pages.
Recommendations Review the source code for this script.
Alert variants
Details
Pattern found: Internal Server Error
GET /fleetmanagement/fleetsetupoperatorposition/fleetsetupoperatorpositions_read
HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/fleetmanagement/fleetsetupoperatorposition
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
Alert group
Severity
Description
Recommendations
Alert variants
Details
113
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
114
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
115
Recommendations
Alert variants
Details
116
Description
Recommendations
Alert variants
Details
No details are available.
POST /fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read HTTP/1.1
Accept: */*
Referer: http://192.168.1.3/fleetmanagement/fleetsetuprepairtype
Origin: http://192.168.1.3
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 39
(line truncated)
...UISHYb75Myuir1JzwsC0FNA9nM7TBOL8DKPCwlySYeLOgcxJ-uYkTktkPKFhAh4lOppFWGZpMQ5S9OE-KF8x5
zdY-A9dOkPP4NmkX071rFmHJATnasgOGDugGN5_p2_2qjiT1kJTD2Bu73jt9p7FzZJZTKAcG_ktKBT6Vt3cABhnA
VBpgUWs07VAAg57U2A-ePmNuZAEnIgAEnwZZOyIQ69pGGddHzM5Kx3pr3Dlpz2nJoiASwlH01Uia7Qx38MoC2ayz
rGCTNEXe9QDzjZDnJ4usa-RYZfscchlzB7F39AJ4dOnwb8beVrES8-eO_am2bq5WUVPVwOJOWY8tXgagLNjLV3BB
omYolVYqqy8qjhOEwEtRpsgtft6k8q_UdoMLZ7vDqk_cQ60rGSCLCfI3lLSl_jS1oko_ADvYHSMyfwI85Bg75Mo7
8OboIVY3P0mSc0k9xVMgCXfc1B-9ZjkCJaQxH5kjh0ASBHu; _culture=en-us
Connection: Keep-alive
Accept-Encoding: gzip,deflate
Accept-Language: en-US,*
Host: 192.168.1.3
Pragma: no-cache
Cache-Control: no-cache
sort=&page=1&pageSize=10&group=&filter=
/home/setculture
Parameter
Alert group
Severity
Description
Recommendations
Alert variants
Details
Referer
Internal server error
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
HTTP Header input Referer was set to 12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'??
Error message found: Internal Server Error
117
Recommendations
Alert variants
118
Details
- choice [Select]
- EmpID [Text]
- EmpFullName [Text]
GET /hr/certificatesandletters HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...a9ypgKQo4IresNGJH8_NRq5DiOP6Y2m0iecgt7NNnDylKHT5lRR2DVFqh0m54hGM42pc9D6jtqf6weLnqyI1F
MOC8-ah4KDIlxepuRhlSRKtGCkCyEY9yCpwdjJHsMAc4OyDw_KHB1Oafa_HTDW_reknckNNMEJDM1jv25SeOaqIG
lDrfsB-9APFBAe_oaYr6X9gCgenPqWwsWFCpqbczhPQvN_4Q62s33235rE9Z1dS_FEd_cTjmyCiVfqxLbhsknhbN
m-5sMfEWq7ch-z_sh2zHcKGWBAkmZvpV-oOlc_RJu3vxFauBfPDIe6ZDCdRsr1XeCJYJOVcoXFDkqprTihRJVUjY
Zz4U6J48ONLzDUMM-FCRr1qO39a8QQQG6FupR97RmNacgEkCW6Ez5c8kA3lDBOcfIF57aEgfbToZQTlEuoQCBtZg
FD3uri91RhvgQGcpjmXnPnAX48B7YLISvvBhQT8K7gzbUXh; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/hr/disciplinaymeasureranks/edit/2
Parameter
DisciplinayMeasureRank
Alert group
Severity
Description
Recommendations
Alert variants
Details
119
/hr/disciplinaymeasureranks/edit/3
Parameter
DisciplinayMeasureRank
Alert group
Severity
Description
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
120
Recommendations
Alert variants
Details
The response time for this page was 5101 ms while the average response time for this site is 54.78
ms
GET /hr/disciplinaymeasuretypes HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...UISHYb75Myuir1JzwsC0FNA9nM7TBOL8DKPCwlySYeLOgcxJ-uYkTktkPKFhAh4lOppFWGZpMQ5S9OE-KF8x5
zdY-A9dOkPP4NmkX071rFmHJATnasgOGDugGN5_p2_2qjiT1kJTD2Bu73jt9p7FzZJZTKAcG_ktKBT6Vt3cABhnA
VBpgUWs07VAAg57U2A-ePmNuZAEnIgAEnwZZOyIQ69pGGddHzM5Kx3pr3Dlpz2nJoiASwlH01Uia7Qx38MoC2ayz
rGCTNEXe9QDzjZDnJ4usa-RYZfscchlzB7F39AJ4dOnwb8beVrES8-eO_am2bq5WUVPVwOJOWY8tXgagLNjLV3BB
omYolVYqqy8qjhOEwEtRpsgtft6k8q_UdoMLZ7vDqk_cQ60rGSCLCfI3lLSl_jS1oko_ADvYHSMyfwI85Bg75Mo7
8OboIVY3P0mSc0k9xVMgCXfc1B-9ZjkCJaQxH5kjh0ASBHu; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/hr/disciplinaymeasuretypes/delete/10
Parameter
__RequestVerificationToken
Alert group
Severity
Description
Recommendations
Alert variants
Details
121
Recommendations
Alert variants
Details
Recommendations
122
Alert variants
Details
Recommendations
Alert variants
Details
123
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
124
Recommendations
Alert variants
Details
125
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
126
Recommendations
Alert variants
Details
127
Severity
Description
Recommendations
Alert variants
Details
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
128
Recommendations
Alert variants
Details
129
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
130
Recommendations
Alert variants
Details
131
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
132
Recommendations
Alert variants
Details
133
Severity
Description
Recommendations
Alert variants
Details
Medium
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
134
Recommendations
Alert variants
Details
135
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
136
Recommendations
Alert variants
Details
137
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
138
Recommendations
Alert variants
Details
139
Alert group
Severity
Description
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
140
Recommendations
Alert variants
Details
141
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
142
Recommendations
Alert variants
Details
143
Recommendations
Alert variants
Details
144
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
145
Recommendations
Alert variants
Details
146
Description
Recommendations
Alert variants
Details
This page contains an error/warning message that may disclose sensitive information. The
message can also contain the location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Review the source code for this script.
Recommendations
Alert variants
Details
147
Recommendations
Alert variants
Details
148
/hr/empbscappraisalperiods/edit/6
Parameter
AppraisalPeriod
Alert group
Severity
Description
Recommendations
Alert variants
Details
Recommendations
Alert variants
Details
149
Recommendations
Alert variants
Details
File upload
Low
This page allows visitors to upload files to the server. Various web applications allow users to
upload files (such as pictures, images, sounds, ...). Uploaded files may pose a significant risk if not
handled correctly. A remote attacker could send a multipart/form-data POST request with a
specially-crafted filename or mime type and execute arbitrary code.
Restrict file types accepted for upload: check the file extension and only allow certain files to be
uploaded. Use a whitelist approach instead of a blacklist. Check for double extensions such as
.php.png. Check for files without a filename like .htaccess (on ASP.NET, check for configuration
files like web.config). Change the permissions on the upload folder so the files within it are not
executable. If possible, rename the files that are uploaded.
Form name: <empty>
Form action: http://192.168.1.3/hr/upload
Form method: POST
Form inputs:
- File [File]
GET /hr/upload HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...a9ypgKQo4IresNGJH8_NRq5DiOP6Y2m0iecgt7NNnDylKHT5lRR2DVFqh0m54hGM42pc9D6jtqf6weLnqyI1F
MOC8-ah4KDIlxepuRhlSRKtGCkCyEY9yCpwdjJHsMAc4OyDw_KHB1Oafa_HTDW_reknckNNMEJDM1jv25SeOaqIG
lDrfsB-9APFBAe_oaYr6X9gCgenPqWwsWFCpqbczhPQvN_4Q62s33235rE9Z1dS_FEd_cTjmyCiVfqxLbhsknhbN
m-5sMfEWq7ch-z_sh2zHcKGWBAkmZvpV-oOlc_RJu3vxFauBfPDIe6ZDCdRsr1XeCJYJOVcoXFDkqprTihRJVUjY
Zz4U6J48ONLzDUMM-FCRr1qO39a8QQQG6FupR97RmNacgEkCW6Ez5c8kA3lDBOcfIF57aEgfbToZQTlEuoQCBtZg
FD3uri91RhvgQGcpjmXnPnAX48B7YLISvvBhQT8K7gzbUXh; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/inventory/reportinventory/issueitem
Alert group
Severity
150
Description
Recommendations
Alert variants
Details
- dt1 [Text]
- dt2 [Text]
GET /inventory/reportinventory/issueitem HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie:
__RequestVerificationToken=e3M3FFaN4xn7_5JYT9bTO0ghoR1X0NvrSRJW9BSleFbsl2xeomBv0bUZ518uE
LYgh-lz-hQWX6qvi6oZD_Mo9JvxVQ7wbqYKsD2u40lIVQ81; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/inventory/reportinventory/stockbalance
Alert group
Severity
Description
Recommendations
Alert variants
Details
151
Recommendations
Alert variants
Details
- fyear [Select]
GET /payroll/payrollreports/bonusincometaxreport HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...a9ypgKQo4IresNGJH8_NRq5DiOP6Y2m0iecgt7NNnDylKHT5lRR2DVFqh0m54hGM42pc9D6jtqf6weLnqyI1F
MOC8-ah4KDIlxepuRhlSRKtGCkCyEY9yCpwdjJHsMAc4OyDw_KHB1Oafa_HTDW_reknckNNMEJDM1jv25SeOaqIG
lDrfsB-9APFBAe_oaYr6X9gCgenPqWwsWFCpqbczhPQvN_4Q62s33235rE9Z1dS_FEd_cTjmyCiVfqxLbhsknhbN
m-5sMfEWq7ch-z_sh2zHcKGWBAkmZvpV-oOlc_RJu3vxFauBfPDIe6ZDCdRsr1XeCJYJOVcoXFDkqprTihRJVUjY
Zz4U6J48ONLzDUMM-FCRr1qO39a8QQQG6FupR97RmNacgEkCW6Ez5c8kA3lDBOcfIF57aEgfbToZQTlEuoQCBtZg
FD3uri91RhvgQGcpjmXnPnAX48B7YLISvvBhQT8K7gzbUXh; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/payroll/payrollreports/monthlypensionreport
Alert group
Severity
152
Description
Recommendations
Alert variants
Details
- period [Select]
GET /payroll/payrollreports/monthlypensionreport HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...a9ypgKQo4IresNGJH8_NRq5DiOP6Y2m0iecgt7NNnDylKHT5lRR2DVFqh0m54hGM42pc9D6jtqf6weLnqyI1F
MOC8-ah4KDIlxepuRhlSRKtGCkCyEY9yCpwdjJHsMAc4OyDw_KHB1Oafa_HTDW_reknckNNMEJDM1jv25SeOaqIG
lDrfsB-9APFBAe_oaYr6X9gCgenPqWwsWFCpqbczhPQvN_4Q62s33235rE9Z1dS_FEd_cTjmyCiVfqxLbhsknhbN
m-5sMfEWq7ch-z_sh2zHcKGWBAkmZvpV-oOlc_RJu3vxFauBfPDIe6ZDCdRsr1XeCJYJOVcoXFDkqprTihRJVUjY
Zz4U6J48ONLzDUMM-FCRr1qO39a8QQQG6FupR97RmNacgEkCW6Ez5c8kA3lDBOcfIF57aEgfbToZQTlEuoQCBtZg
FD3uri91RhvgQGcpjmXnPnAX48B7YLISvvBhQT8K7gzbUXh; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/payroll/payrollreports/reportbycontributiontypelist
Alert group
Severity
Description
Recommendations
Alert variants
Details
153
Recommendations
Alert variants
Details
Pattern found: Internal Server Error
GET /procurement/reportprocurement HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...a9ypgKQo4IresNGJH8_NRq5DiOP6Y2m0iecgt7NNnDylKHT5lRR2DVFqh0m54hGM42pc9D6jtqf6weLnqyI1F
MOC8-ah4KDIlxepuRhlSRKtGCkCyEY9yCpwdjJHsMAc4OyDw_KHB1Oafa_HTDW_reknckNNMEJDM1jv25SeOaqIG
lDrfsB-9APFBAe_oaYr6X9gCgenPqWwsWFCpqbczhPQvN_4Q62s33235rE9Z1dS_FEd_cTjmyCiVfqxLbhsknhbN
m-5sMfEWq7ch-z_sh2zHcKGWBAkmZvpV-oOlc_RJu3vxFauBfPDIe6ZDCdRsr1XeCJYJOVcoXFDkqprTihRJVUjY
Zz4U6J48ONLzDUMM-FCRr1qO39a8QQQG6FupR97RmNacgEkCW6Ez5c8kA3lDBOcfIF57aEgfbToZQTlEuoQCBtZg
FD3uri91RhvgQGcpjmXnPnAX48B7YLISvvBhQT8K7gzbUXh; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/procurement/reportprocurement/getlotdetails
Alert group
Severity
Description
Recommendations
Alert variants
Details
154
Recommendations
Alert variants
Details
The response time for this page was 5710 ms while the average response time for this site is 54.78
ms
GET /projectmanagement/projectestimationnames HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://192.168.1.3/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
(line truncated)
...a9ypgKQo4IresNGJH8_NRq5DiOP6Y2m0iecgt7NNnDylKHT5lRR2DVFqh0m54hGM42pc9D6jtqf6weLnqyI1F
MOC8-ah4KDIlxepuRhlSRKtGCkCyEY9yCpwdjJHsMAc4OyDw_KHB1Oafa_HTDW_reknckNNMEJDM1jv25SeOaqIG
lDrfsB-9APFBAe_oaYr6X9gCgenPqWwsWFCpqbczhPQvN_4Q62s33235rE9Z1dS_FEd_cTjmyCiVfqxLbhsknhbN
m-5sMfEWq7ch-z_sh2zHcKGWBAkmZvpV-oOlc_RJu3vxFauBfPDIe6ZDCdRsr1XeCJYJOVcoXFDkqprTihRJVUjY
Zz4U6J48ONLzDUMM-FCRr1qO39a8QQQG6FupR97RmNacgEkCW6Ez5c8kA3lDBOcfIF57aEgfbToZQTlEuoQCBtZg
FD3uri91RhvgQGcpjmXnPnAX48B7YLISvvBhQT8K7gzbUXh; _culture=en-us
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
/upload
Alert group
Severity
Description
Recommendations
Alert variants
Details
155
Recommendations
Alert variants
Details
Methods allowed: OPTIONS, TRACE, GET, HEAD, POST
OPTIONS / HTTP/1.1
Host: 192.168.1.3
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko)
Chrome/41.0.2228.0 Safari/537.21
Accept: */*
156
Input type
Path Fragment
Path Fragment
Input scheme 2
Input name
/
/
/
Input type
Path Fragment
Path Fragment
Path Fragment
Input scheme 3
Input name
/
/
/
/
Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Input scheme 4
Input name
/
/
/
/
Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Input scheme 5
Input name
/
Input type
Path Fragment
Input scheme 6
Input name
/
/
/
/
Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Input scheme 7
Input name
/
/
/
/
Acunetix Website Audit
Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
157
Input scheme 8
Input name
/
/
/
/
Input scheme 9
Input name
/
/
/
/
Input scheme 10
Input name
Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
/
/
/
/
Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Input scheme 11
Input name
Host
Input type
HTTP Header
URL: http://192.168.1.3/account
Vulnerabilities have been identified for this URL
4 input(s) found for this URL
Input scheme 1
Input name
SearchString
Input type
URL encoded POST
Input scheme 2
Input name
page
Input type
URL encoded GET
Input scheme 3
Input name
page
SearchString
Input type
URL encoded GET
URL encoded POST
URL: http://192.168.1.3/account/login
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Input scheme 1
Input name
Acunetix Website Audit
Input type
158
ReturnUrl
Input scheme 2
Input name
ReturnUrl
__RequestVerificationToken
Password
UserName
Input type
URL encoded GET
URL encoded POST
URL encoded POST
URL encoded POST
Input scheme 3
Input name
__RequestVerificationToken
Password
UserName
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/account/logoff
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/account/manage
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/delete/bizuneh
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/delete/abeje
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/delete/admin
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/delete/abiyu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/delete/meaza
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/delete/animaw
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/delete/abrham
No vulnerabilities have been identified for this URL
No input(s) found for this URL
159
URL: http://192.168.1.3/account/delete/abeyus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/delete/alemnew
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/delete/birhanu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/delete/zelalem
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/account/delete/enanu
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/account/delete/endalamaw
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/account/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/edit/admin
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/edit/meaza
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/edit/abeje
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/edit/abiyu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/edit/animaw
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
160
URL: http://192.168.1.3/account/edit/abeyus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/edit/abrham
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/edit/bizuneh
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/edit/birhanu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/edit/alemnew
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/edit/zelalem
Vulnerabilities have been identified for this URL
5 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Email
FirstName
LastName
UserName
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/account/edit/enanu
Vulnerabilities have been identified for this URL
5 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Email
FirstName
LastName
UserName
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/account/edit/endalamaw
Vulnerabilities have been identified for this URL
5 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Email
FirstName
LastName
UserName
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
161
URL: http://192.168.1.3/account/usergroups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/usergroups/bizuneh
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/usergroups/abeje
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/usergroups/abiyu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/usergroups/meaza
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/usergroups/admin
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/usergroups/abrham
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/usergroups/animaw
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/usergroups/birhanu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/usergroups/abeyus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/usergroups/alemnew
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/usergroups/zelalem
No vulnerabilities have been identified for this URL
20 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Groups[0].GroupId
Groups[0].Selected
Groups[1].GroupId
Groups[1].Selected
Groups[2].GroupId
Groups[2].Selected
Groups[3].GroupId
Acunetix Website Audit
Input type
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
162
Groups[3].Selected
Groups[4].GroupId
Groups[4].Selected
Groups[5].GroupId
Groups[5].Selected
Groups[6].GroupId
Groups[6].Selected
Groups[7].GroupId
Groups[7].Selected
Groups[8].GroupId
Groups[8].Selected
UserName
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
URL: http://192.168.1.3/account/usergroups/endalamaw
Vulnerabilities have been identified for this URL
20 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Groups[0].GroupId
Groups[0].Selected
Groups[1].GroupId
Groups[1].Selected
Groups[2].GroupId
Groups[2].Selected
Groups[3].GroupId
Groups[3].Selected
Groups[4].GroupId
Groups[4].Selected
Groups[5].GroupId
Groups[5].Selected
Groups[6].GroupId
Groups[6].Selected
Groups[7].GroupId
Groups[7].Selected
Groups[8].GroupId
Groups[8].Selected
UserName
Input type
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
URL: http://192.168.1.3/account/usergroups/enanu
Vulnerabilities have been identified for this URL
20 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Groups[0].GroupId
Groups[0].Selected
Groups[1].GroupId
Groups[1].Selected
Groups[2].GroupId
Groups[2].Selected
Groups[3].GroupId
Groups[3].Selected
Groups[4].GroupId
Acunetix Website Audit
Input type
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
163
Groups[4].Selected
Groups[5].GroupId
Groups[5].Selected
Groups[6].GroupId
Groups[6].Selected
Groups[7].GroupId
Groups[7].Selected
Groups[8].GroupId
Groups[8].Selected
UserName
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
URL: http://192.168.1.3/account/userpermissions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/bizuneh
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/meaza
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/animaw
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/birhanu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/abeje
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/admin
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/abeyus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/abrham
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/abiyu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/alemnew
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/zelalem
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
164
URL: http://192.168.1.3/account/userpermissions/endalamaw
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/userpermissions/enanu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/account/register
Vulnerabilities have been identified for this URL
7 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
ConfirmPassword
Email
FirstName
LastName
Password
UserName
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/content/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/images/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/css/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/css/ace.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/css/ace-rtl.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/css/bootstrap.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/css/images/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/fonts/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
165
URL: http://192.168.1.3/content/ace/fonts/fonts.googleapis.com.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/font-awesome/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/font-awesome/4.2.0/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/font-awesome/4.2.0/css/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/font-awesome/4.2.0/css/font-awesome.min.css
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/font-awesome/4.2.0/fonts/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/jquery.2.1.1.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/ace-extra.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/bootstrap.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/jquery-ui.custom.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/jquery.ui.touch-punch.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/jquery.easypiechart.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/jquery.sparkline.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/jquery.flot.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
166
URL: http://192.168.1.3/content/ace/js/jquery.flot.pie.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/jquery.flot.resize.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/ace-elements.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/ace/js/ace.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/exceedstyle.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/jqury-ui/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/jqury-ui/jquery-ui.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/jqury-ui/jquery-ui.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/jqury-ui/images
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/jstree/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/jstree/themes/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/jstree/themes/default/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/jstree/themes/default/style.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/jstree/jstree.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
167
URL: http://192.168.1.3/content/kendo/2016.1.112/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/kendo.dataviz.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/kendo.bootstrap.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/kendo.mobile.all.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/kendo.common-bootstrap.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/kendo.dataviz.bootstrap.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/bootstrap/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/%23clip
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/images/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/textures/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/fonts/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/fonts/dejavu/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/content/kendo/2016.1.112/fonts/glyphs/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/home
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/home/setculture
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Acunetix Website Audit
168
Input scheme 1
Input name
culture
Input type
URL encoded POST
URL: http://192.168.1.3/home/index
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/cosigns
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/allowances
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/ranks
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/steps
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/discipline
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/leavetypes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/attendance
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/orgcharts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/assignment
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/orglocations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/teamjobtitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/sexes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
169
URL: http://192.168.1.3/hr/regions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/nations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/religions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/fiscalyears
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/persontitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/nationalities
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/mothertongues
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/maritalstatus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/trainingcourses
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empleaveperiods
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/incomingletters
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/healthincidents
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/orginformations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscbehaviors
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/publicdocuments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
170
URL: http://192.168.1.3/hr/salarystructures
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/employmentstatus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/recruitmentplans
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/educationalfields
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/trainingproviders
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/educationallevels
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/outgoingletters
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/upload
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
File
Input type
POST (multipart)
URL: http://192.168.1.3/hr/upload/download
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/employeeprofiles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/sectionjobtitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/divisionjobtitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/terminationletters
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/orgglobaljobtitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
171
URL: http://192.168.1.3/hr/terminationreasons
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/retirementlauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/reports
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/reports/detailreports
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/reports/summaryreports
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/supportingdocuments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/transportallowances
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/departmentjobtitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/trainingapplications
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscappraisalperiods
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscappraisalperiods/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscappraisalperiods/edit/5
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AppraisalPeriod
CreatedBy
CreatedOn
DayFrom
DayTo
EmpBSCAppraisalPeriodID
IsClosed
Acunetix Website Audit
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
172
MonthFrom
MonthTo
YearFrom
YearTo
URL: http://192.168.1.3/hr/empbscappraisalperiods/edit/4
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AppraisalPeriod
CreatedBy
CreatedOn
DayFrom
DayTo
EmpBSCAppraisalPeriodID
IsClosed
MonthFrom
MonthTo
YearFrom
YearTo
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/hr/empbscappraisalperiods/edit/6
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AppraisalPeriod
CreatedBy
CreatedOn
DayFrom
DayTo
EmpBSCAppraisalPeriodID
IsClosed
MonthFrom
MonthTo
YearFrom
YearTo
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/hr/empbscappraisalperiods/edit/2
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AppraisalPeriod
CreatedBy
CreatedOn
DayFrom
DayTo
EmpBSCAppraisalPeriodID
IsClosed
Acunetix Website Audit
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
173
MonthFrom
MonthTo
YearFrom
YearTo
URL: http://192.168.1.3/hr/empbscappraisalperiods/edit/1
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AppraisalPeriod
CreatedBy
CreatedOn
DayFrom
DayTo
EmpBSCAppraisalPeriodID
IsClosed
MonthFrom
MonthTo
YearFrom
YearTo
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/hr/empbscappraisalperiods/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscappraisalperiods/delete/2
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/hr/empbscappraisalperiods/delete/6
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/hr/empbscappraisalperiods/delete/5
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/hr/empbscappraisalperiods/delete/4
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Acunetix Website Audit
Input type
URL encoded POST
174
URL: http://192.168.1.3/hr/empbscappraisalperiods/delete/1
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/hr/empbscappraisalperiods/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscappraisalperiods/details/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscappraisalperiods/details/5
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscappraisalperiods/details/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscappraisalperiods/details/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscappraisalperiods/details/1
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscappraisalperiods/create
Vulnerabilities have been identified for this URL
9 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AppraisalPeriod
DayFrom
DayTo
IsClosed
MonthFrom
MonthTo
YearFrom
YearTo
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/hr/retirementnotification
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empleavetakenslauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/trainingneedassesments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
175
URL: http://192.168.1.3/hr/empbscperformanceplans
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/trainingreportbycourse
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/addallowancetoemployees
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/earlyretirementlauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasureranks
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasureranks/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasureranks/edit/3
Vulnerabilities have been identified for this URL
5 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRank
DisciplinayMeasureRanksID
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/hr/disciplinaymeasureranks/edit/2
Vulnerabilities have been identified for this URL
5 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRank
DisciplinayMeasureRanksID
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/hr/disciplinaymeasureranks/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasureranks/delete/3
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Acunetix Website Audit
Input type
URL encoded POST
176
URL: http://192.168.1.3/hr/disciplinaymeasureranks/delete/2
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/hr/disciplinaymeasureranks/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasureranks/details/3
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasureranks/details/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/trainingcoursetrackings
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/emppayrollnodaysworkeds
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/employeerequisitionforms
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/trainingreportbyemployee
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/outsourcecompanyprofiles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/terminationotherslauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empannualleaveusagereport
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/outsourcecompanyworkeddays
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/applicantprobationslauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empbscperformanceevaluations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
177
URL: http://192.168.1.3/hr/contractemployeerequisitions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplineemployeerecognition
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empannualleavepaidincashes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/annualleaveentitlementupdate
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empdisciplinayrecognitiontypes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empannualleaveusagesingereport
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empannualleavetransferonebyones
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empterminationclearancelauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/outsourcecompanyworkeddaysreport
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/recruitmentresultreportbyvacancy
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/certificatesandletters
Vulnerabilities have been identified for this URL
3 input(s) found for this URL
Input scheme 1
Input name
choice
EmpFullName
EmpID
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/hr/certificatesandletters/experience
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/certificatesandletters/certificate
No vulnerabilities have been identified for this URL
No input(s) found for this URL
178
URL: http://192.168.1.3/hr/promotionandtransferapplicantlists
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/empannualleaveentitlementviewmodels
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasuretypes
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/edit/9
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Measure
PercentageEffectOnPromotion
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/edit/8
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Measure
PercentageEffectOnPromotion
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/edit/11
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Acunetix Website Audit
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
179
Measure
PercentageEffectOnPromotion
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/edit/12
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Measure
PercentageEffectOnPromotion
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/edit/10
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Measure
PercentageEffectOnPromotion
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/delete/9
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/delete/8
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/delete/10
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
Acunetix Website Audit
Input type
180
__RequestVerificationToken
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/delete/11
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/delete/12
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/details/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/details/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/details/12
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/details/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/hr/disciplinaymeasuretypes/details/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/roles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/groups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/uoms
No vulnerabilities have been identified for this URL
No input(s) found for this URL
181
URL: http://192.168.1.3/inventory/items
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/stores
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/issues
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/goodreceives
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/storereturns
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/itemcategories
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/itemtransfers
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/purchasereturns
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/stockadjustments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/storerequisitions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/purchaserequisitions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/storeitemassignments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/departmentcostcenters
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/reportinventory
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/inventory/reportinventory/issueitem
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Acunetix Website Audit
182
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/inventory/reportinventory/transferitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/inventory/reportinventory/stockbalance
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
category
Input type
URL encoded POST
URL: http://192.168.1.3/inventory/reportinventory/goodsreceive
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/inventory/reportinventory/adjustmentitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/inventory/reportinventory/storereturnitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/inventory/reportinventory/purchasereturnitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded POST
URL encoded POST
183
URL: http://192.168.1.3/inventory/reportinventory/storerequisitionitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/inventory/reportinventory/issueitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/issueitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/transferitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/transferitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/stockbalanceprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
category
Input type
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/stockbalanceexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
category
Acunetix Website Audit
Input type
URL encoded GET
184
URL: http://192.168.1.3/inventory/reportinventory/goodsreceiveprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/goodsreceiveexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/storereturnitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/storereturnitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/adjustmentitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/adjustmentitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/purchasereturnitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
Acunetix Website Audit
Input type
185
dt1
dt2
URL: http://192.168.1.3/inventory/reportinventory/purchasereturnitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/storerequisitionitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/reportinventory/storerequisitionitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/inventory/storekeeperassignments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/globaluseraccesslogs
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/orgbranchusermappings
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/glledgerposting
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/glrecordjournals
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/arinvoices
No vulnerabilities have been identified for this URL
No input(s) found for this URL
186
URL: http://192.168.1.3/finance/bankaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/edit/14
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/edit/16
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/edit/17
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
Acunetix Website Audit
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
187
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
URL: http://192.168.1.3/finance/bankaccounts/edit/15
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/edit/7
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/edit/9
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
Acunetix Website Audit
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
188
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
URL: http://192.168.1.3/finance/bankaccounts/edit/8
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/edit/6
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/edit/10
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
Acunetix Website Audit
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
189
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
URL: http://192.168.1.3/finance/bankaccounts/edit/13
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/edit/12
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/edit/11
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
Acunetix Website Audit
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
190
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
URL: http://192.168.1.3/finance/bankaccounts/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/delete/6
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/delete/13
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/delete/9
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/delete/7
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/delete/11
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/delete/8
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
191
URL: http://192.168.1.3/finance/bankaccounts/delete/16
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/delete/17
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/delete/14
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/delete/12
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/delete/15
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/delete/10
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
__RequestVerificationToken
Input type
URL encoded POST
URL: http://192.168.1.3/finance/bankaccounts/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/details/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/details/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
192
URL: http://192.168.1.3/finance/bankaccounts/details/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/details/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/details/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/details/16
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/details/17
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/details/15
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/details/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/details/12
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/details/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/bankaccounts/details/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/budgetusages
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/apsetupitems
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/budgetdefines
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/budgetmonthlies
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/arcustomertypes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
193
URL: http://192.168.1.3/finance/arremitaddresses
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/appaybleinvoices
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/approcurementsuppliers
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/budgetallocationandusage
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
BudgetMonth
BudgetYear
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/budgetallocationandusage/budgetallocationandusageexcel
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
BudgetMonth
BudgetYear
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/finance/budgetallocationandusage/budgetallocationandusageprint
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
BudgetMonth
BudgetYear
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/finance/reconciliationschedules
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/reconcilationbankaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/budgetagainstpreviousyear
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
period
Input type
URL encoded POST
URL: http://192.168.1.3/finance/budgetagainstpreviousyear/budgetyearlyprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
194
Input scheme 1
Input name
period
Input type
URL encoded GET
URL: http://192.168.1.3/finance/budgetagainstpreviousyear/budgetyearlyexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
period
Input type
URL encoded GET
URL: http://192.168.1.3/finance/reconcilationbookaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/arsetupreceiptbalanceaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/arsetupproductserviceaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/arcustomerprofiles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/gljournalcategoriers
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Input scheme 1
Input name
CategoryNames
EffectiveDates
JournalReferences
Period
Source
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
Input scheme 2
Input name
page
Input type
URL encoded GET
Input scheme 3
Input name
page
CategoryNames
EffectiveDates
JournalReferences
Period
Source
Input type
URL encoded GET
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
195
URL: http://192.168.1.3/finance/accountstransactions/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1684
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1683
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1685
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1690
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1689
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1680
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1681
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1679
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1677
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1678
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1621
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1620
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1623
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1625
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
196
URL: http://192.168.1.3/finance/accountstransactions/details/1624
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1616
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1617
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1615
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1619
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1618
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1101
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1102
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1103
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1098
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1099
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1100
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1673
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1672
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1674
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
197
URL: http://192.168.1.3/finance/accountstransactions/details/1676
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1675
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1669
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1670
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1668
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1671
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1667
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1663
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1662
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1664
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1666
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1665
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1659
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1660
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1658
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
198
URL: http://192.168.1.3/finance/accountstransactions/details/1661
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1657
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1611
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1610
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1612
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1614
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1613
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1606
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1607
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1605
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1609
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1608
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1590
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1589
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1591
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
199
URL: http://192.168.1.3/finance/accountstransactions/details/1593
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1592
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1585
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1586
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1584
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1588
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1587
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1653
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1652
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1654
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1656
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1655
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1649
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1650
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1648
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
200
URL: http://192.168.1.3/finance/accountstransactions/details/1651
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1647
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1601
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1600
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1602
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1604
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1603
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1595
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1596
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1594
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1598
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1597
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1643
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1642
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1644
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
201
URL: http://192.168.1.3/finance/accountstransactions/details/1646
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1645
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1639
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1640
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1638
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1641
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1637
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1633
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1632
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1634
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1636
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1635
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1629
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1630
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1627
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
202
URL: http://192.168.1.3/finance/accountstransactions/details/1631
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/1626
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/53105-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/53101-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/53104-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/53103-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/63172-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/63171-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/63177-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/63174-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11350-1-00-ta0003
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/18000-1-00-ba0003
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11399-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11110-1-00-ch0055
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11110%20-1-00-ch0055
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
203
URL: http://192.168.1.3/finance/accountstransactions/details/69050%20-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11110%20%c2%a0-1-00-ch0055
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11130-1-00-rf0020
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11140-1-00-cb0021
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11140-1-00-cb0001
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/51602-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/21370-1-00-tl0002
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/12312-1-00-ba0003
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11140-1-00-cb0001%20%c2%a0
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/63120-1-fs-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11120-1-00-pc0006
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/12304-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/51290-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/51199-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/51206-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
204
URL: http://192.168.1.3/finance/accountstransactions/details/12100-1-00-in0004
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/30030-1-00-3060gn
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11110-1-00-ch0045
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/62101-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11320-1-00-y00125
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/18000-1-00-ba0004
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11499-1-00-pi0000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/21370-1-00-tl0003
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11350-1-00-ta0001
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/21370-1-00-tl0008
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/11330-1-00-s00984
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/63106-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/accountstransactions/details/62102-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/arstandardcollections
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/glchartofaccountaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
205
URL: http://192.168.1.3/finance/glchartofaccountlocations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/armiscelaneouscollections
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/glchartofaccountsubaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/glchartofaccountcostcenters
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/budgetagainstpreviousyearmonthly
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
period
Input type
URL encoded POST
URL: http://192.168.1.3/finance/budgetagainstpreviousyearmonthly/budgetmonthlyexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
period
Input type
URL encoded GET
URL: http://192.168.1.3/finance/budgetagainstpreviousyearmonthly/budgetmonthlyprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
period
Input type
URL encoded GET
URL: http://192.168.1.3/finance/gltaxrates
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/paymentterms
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/glfiscalyears
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/glcountrytypes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/paymentmethods
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
206
URL: http://192.168.1.3/finance/glvatwithholdings
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/finsetupcurrencies
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/reportfinance
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/reportfinance/cashflow
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
branchCode
dt2
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/reportfinance/balancesheet
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
branchCode
dt2
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/reportfinance/supplierlist
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
businessType
supplierType
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/reportfinance/customerlist
Vulnerabilities have been identified for this URL
9 input(s) found for this URL
Input scheme 1
Input name
custype
Input type
URL encoded POST
Input scheme 2
Input name
page
Input type
URL encoded GET
Input scheme 3
Input name
custype
page
Input type
URL encoded GET
URL encoded GET
Input scheme 4
Input name
page
custype
Input type
URL encoded GET
URL encoded POST
207
Input scheme 5
Input name
custype
page
custype
Input type
URL encoded GET
URL encoded GET
URL encoded POST
URL: http://192.168.1.3/finance/reportfinance/trialbalance
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
Branch
dt1
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/reportfinance/chartofaccount
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
Account
AccountType
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/reportfinance/accountanalysis
Vulnerabilities have been identified for this URL
3 input(s) found for this URL
Input scheme 1
Input name
Category
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/reportfinance/incomestatement
Vulnerabilities have been identified for this URL
3 input(s) found for this URL
Input scheme 1
Input name
branchCode
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/reportfinance/aragingbyinvoice
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
agetype
Input type
URL encoded POST
URL: http://192.168.1.3/finance/reportfinance/aragingbycustomer
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
agetype
Acunetix Website Audit
Input type
URL encoded POST
208
URL: http://192.168.1.3/finance/reportfinance/accountanalysisbysegment
Vulnerabilities have been identified for this URL
4 input(s) found for this URL
Input scheme 1
Input name
acctFrom
acctTo
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/reportfinance/incomestatementbyproject
Vulnerabilities have been identified for this URL
3 input(s) found for this URL
Input scheme 1
Input name
costcenterCode
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/reportfinance/chartofaccountexcel
No vulnerabilities have been identified for this URL
3 input(s) found for this URL
Input scheme 1
Input name
AccountType
Input type
URL encoded GET
Input scheme 2
Input name
Account
AccountType
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/accountanalysisexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/reportfinance/trialbalanceexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
CostCenter
dt1
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/trialbalanceprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
CostCenter
dt1
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/incomestatementprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Acunetix Website Audit
209
Input scheme 1
Input name
dt2
Input type
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/customerlistexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
custype
Input type
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/customerlistprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
custype
Input type
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/supplierlistexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
businessType
supplierType
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/supplierlistprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
businessType
supplierType
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/aragingbyinvoiceprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
agetype
Input type
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/aragingbyinvoiceexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
agetype
Input type
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/aragingbycustomerprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
agetype
Acunetix Website Audit
Input type
URL encoded GET
210
URL: http://192.168.1.3/finance/reportfinance/aragingbycustomerexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
agetype
Input type
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/accountanalysisbysegmentexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/reportfinance/incomestatementbyprojectprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
costcenterCode
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/finance/reportfinance/incomestatementbyprojectexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
costcenterCode
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/finance/finsetupcurrencyexchanges
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/finsetupcashflowconfigurations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/json
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/finance/json/fromaccountcode
Vulnerabilities have been identified for this URL
4 input(s) found for this URL
Input scheme 1
Input name
Accounts
CostCenter
Location
SubAccount
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/finance/json/toaccountcode
No vulnerabilities have been identified for this URL
4 input(s) found for this URL
Input scheme 1
Input name
Accounts
Acunetix Website Audit
Input type
URL encoded POST
211
CostCenter
Location
SubAccount
URL: http://192.168.1.3/finance/json/description
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
id
Input type
URL encoded POST
URL: http://192.168.1.3/finance/json/bankaccounts
No vulnerabilities have been identified for this URL
4 input(s) found for this URL
Input scheme 1
Input name
Accounts
CostCenter
Location
SubAccount
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/userprofile
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/userprofile/mybranches
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/pensions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollbonus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollprocess
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/emppayrollloans
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/empcontributions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/emppayrolladavances
No vulnerabilities have been identified for this URL
No input(s) found for this URL
212
URL: http://192.168.1.3/payroll/emppayrolladditions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/empfixedcontributions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/emppayrolllabourunions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/emppayrollovertimetwoes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/emppayrollcalculatebonus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/emppayrollcreditassociations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollpayslip
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/overtimehours
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/bonusbanksliplist
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/payrollbanksliplist
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/detailreport
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/summaryreport
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/monthlypensionreport
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
period
Acunetix Website Audit
Input type
URL encoded POST
213
URL: http://192.168.1.3/payroll/payrollreports/bonusincometaxreport
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
fyear
Input type
URL encoded POST
URL: http://192.168.1.3/payroll/payrollreports/payrollbasicsalarylist
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
page
Input type
URL encoded GET
URL: http://192.168.1.3/payroll/payrollreports/monthlyincometaxreport
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
period
Input type
URL encoded POST
URL: http://192.168.1.3/payroll/payrollreports/reportbycontributiontypelist
Vulnerabilities have been identified for this URL
3 input(s) found for this URL
Input scheme 1
Input name
period
source
type
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/payroll/payrollreports/monthlylabourandcreditreport
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
period
Input type
URL encoded POST
URL: http://192.168.1.3/payroll/payrollreports/bonusincometaxreportprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/bonusincometaxreportexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/monthlypensionreportprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/monthlypensionreportexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
214
URL: http://192.168.1.3/payroll/payrollreports/monthlyincometaxreportprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/monthlyincometaxreportexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/payrollbasicsalarylistexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/payrollbasicsalarylistprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/monthlylabourandcreditreportprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/monthlylabourandcreditreportexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/reportbycontributiontypelistprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollreports/reportbycontributiontypelistexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollperiods
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/overtimetypetwoes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollpaymentbanks
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollemployeeaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollcontributiontypes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/payroll/payrollemployeebankaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/globalbranchsetups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
215
URL: http://192.168.1.3/fixedasset
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fixedasset/fixedassetgroups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fixedasset/fixedassetdepreciationsetups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fixedasset/fixedassetclearingaccountsetups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fixedasset/usercards
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fixedasset/fixedassetcategories
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fixedasset/fixedassetsubcategories
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fixedasset/fixedassetregistrations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/etp/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/etp/jquery.calendars.picker.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/etp/jquery.plugin.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/etp/jquery.calendars.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/etp/jquery.calendars.plus.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/etp/jquery.calendars.picker.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
216
URL: http://192.168.1.3/scripts/etp/jquery.calendars.ethiopian.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/etp/jquery.calendars.ethiopian-am.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/kendo/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/kendo/2016.1.112/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/kendo/2016.1.112/jquery.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/kendo/2016.1.112/jszip.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/kendo/2016.1.112/kendo.all.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/kendo/2016.1.112/kendo.aspnetmvc.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/kendo.modernizr.custom.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/jquery.unobtrusive-ajax.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/jquery.validate.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/jquery.validate.unobtrusive.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/js.cookie.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/matrixscript.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/matrixscript1.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
217
URL: http://192.168.1.3/scripts/matrixcommon.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/selector.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/scripts/jquery-1.10.2.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/tenders
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/purchaseorders
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/itempriceindexes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementplans
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/purchasefollowups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/proformapurchases
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliers
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementlcmanagements
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementbankguarantees
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcpomanagements
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Acunetix Website Audit
218
Input scheme 1
Input name
page
Input type
URL encoded GET
URL: http://192.168.1.3/procurement/reportprocurement/tenderreport
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
SearchString
Input type
URL encoded POST
URL: http://192.168.1.3/procurement/reportprocurement/purchaseorderitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/procurement/reportprocurement/purchaserequisitionitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/procurement/reportprocurement/tenderdetails
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/tenderdetails/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/tenderdetails/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/tenderdetails/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/tenderdetails/12
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/tenderdetails/15
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/tenderdetails/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL
219
URL: http://192.168.1.3/procurement/reportprocurement/tenderdetails/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/tenderdetails/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/tenderdetails/17
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/tenderdetails/16
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/purchaseorderitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/procurement/reportprocurement/purchaseorderitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/procurement/reportprocurement/purchaserequisitionitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/procurement/reportprocurement/purchaserequisitionitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
dt1
dt2
Input type
URL encoded GET
URL encoded GET
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
220
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/12
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/15
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/16
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/22
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/24
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/23
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/18
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/19
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/20
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/21
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
221
URL: http://192.168.1.3/procurement/reportprocurement/getlotdetails/17
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
SearchString
Input type
URL encoded POST
URL: http://192.168.1.3/procurement/procurementcontractmanagements/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/edit/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/edit/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/edit/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/edit/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/edit/1
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/delete/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/delete/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/delete/1
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/delete/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/delete/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
222
URL: http://192.168.1.3/procurement/procurementcontractmanagements/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/details/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/details/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/details/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/details/1
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementcontractmanagements/details/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
SearchString
Input type
URL encoded POST
URL: http://192.168.1.3/procurement/procurementsuppliercategories/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/edit/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/edit/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/edit/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/edit/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/edit/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/edit/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
223
URL: http://192.168.1.3/procurement/procurementsuppliercategories/edit/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/edit/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/delete/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/delete/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/delete/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/delete/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/delete/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/delete/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/delete/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/delete/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/details/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/details/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/details/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
224
URL: http://192.168.1.3/procurement/procurementsuppliercategories/details/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/details/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/details/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/details/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementsuppliercategories/details/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Input scheme 1
Input name
SearchString
Input type
URL encoded POST
Input scheme 2
Input name
page
Input type
URL encoded GET
URL: http://192.168.1.3/procurement/procurementannualneedassesments/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/edit/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/edit/24
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/edit/23
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/edit/17
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/edit/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/edit/25
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
225
URL: http://192.168.1.3/procurement/procurementannualneedassesments/edit/26
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/delete/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/delete/23
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/delete/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/delete/25
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/delete/26
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/delete/24
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/delete/17
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/details/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/details/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/details/25
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/details/23
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/details/24
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
226
URL: http://192.168.1.3/procurement/procurementannualneedassesments/details/26
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/details/17
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/details/18
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/details/20
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/procurement/procurementannualneedassesments/details/19
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/globalorginformations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fleetmanagement
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fleetmanagement/fleetsetuprepairtype
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
Vulnerabilities have been identified for this URL
6 input(s) found for this URL
Input scheme 1
Input name
grid-mode
Input type
URL encoded GET
Input scheme 2
Input name
filter
group
page
pageSize
sort
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmenttype
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
Vulnerabilities have been identified for this URL
6 input(s) found for this URL
Input scheme 1
Input name
grid-mode
Acunetix Website Audit
Input type
URL encoded GET
227
Input scheme 2
Input name
filter
group
page
pageSize
sort
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmentname
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmentname/fleetsetupequipmentnames_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
grid-mode
Input type
URL encoded GET
URL: http://192.168.1.3/fleetmanagement/fleetsetupinsurancetype
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fleetmanagement/fleetsetupinsurancetype/fleetsetupinsurancetypes_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
grid-mode
Input type
URL encoded GET
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmentstatus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmentstatus/fleetsetupequipmentstatus_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
grid-mode
Input type
URL encoded GET
URL: http://192.168.1.3/fleetmanagement/fleetsetupmaintenancecenter
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fleetmanagement/fleetsetupmaintenancecenter/fleetsetupmaintenancecenters_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
grid-mode
Input type
URL encoded GET
URL: http://192.168.1.3/fleetmanagement/fleetsetupoperatorposition
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
228
URL: http://192.168.1.3/fleetmanagement/fleetsetupoperatorposition/fleetsetupoperatorpositions_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
grid-mode
Input type
URL encoded GET
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmentfueltype
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmentfueltype/fleetsetupequipmentfueltypes_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
grid-mode
Input type
URL encoded GET
URL: http://192.168.1.3/fleetmanagement/fleetequipmentregistrations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmentcategory
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmentcategory/fleetsetupequipmentcategories_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
grid-mode
Input type
URL encoded GET
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmentmanufacturer
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL:
http://192.168.1.3/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
Vulnerabilities have been identified for this URL
6 input(s) found for this URL
Input scheme 1
Input name
grid-mode
Input type
URL encoded GET
Input scheme 2
Input name
filter
group
page
pageSize
sort
Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL: http://192.168.1.3/fleetmanagement/fleetsetupequipmentfuelstandard
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
229
URL:
http://192.168.1.3/fleetmanagement/fleetsetupequipmentfuelstandard/fleetsetupequipmentfuelstandards_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Input scheme 1
Input name
grid-mode
Input type
URL encoded GET
URL: http://192.168.1.3/projectmanagement
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/projectmanagement/projectestimationnames
Vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/fonts/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
URL: http://192.168.1.3/upload
Vulnerabilities have been identified for this URL
No input(s) found for this URL
230