http://www.opticum-gmbh.de Scan Report
Made By H3Cio5.Brain
Basic Information
VersionNULL
ServerApache/2.2.22
WWWRootNULL
userNULL
IsAdmin-1
DatabaseNULL
Sa_PasswordHashNULL
Vulnerability Result
No.1
ReferURLhttp://www.opticum-gmbh.de/?y=6&PHPSESSID=99999999
ParameterPHPSESSID=99999999
TypeString
KWordActionURLOPTICUM
VulnerabilityURL SQL INJECTION
No.2
ReferURLhttp://www.opticum-gmbh.de/
Parameterprzekazanyemail
TypePOST
KWordActionURLhttp://www.opticum-gmbh.de/newsletter.php^PHPSESSID=d669b960723a5f3dfddc73a0af56e62a&przekazanyemail=WCRTESTINPUT000001<>%3c%3e%253c%253e
VulnerabilityCross Site Scripting(Form)
No.3
ReferURLhttp://www.opticum-gmbh.de/?y=3&cmd=view&category=1&hdsd=&p1=&filtrate=&s=2
Parameterhdsd
TypeGET
KWordActionURLhttp://www.opticum-gmbh.de/?y=3&cmd=view&category=1&hdsd=WCRTESTINPUT000003<>%3c%3e%253c%253e&p1=&filtrate=&s=2
VulnerabilityCross Site Scripting(URL)
No.4
ReferURLhttp://www.opticum-gmbh.de/?y=3&cmd=view&category=1&hdsd=&p1=&filtrate=&s=2
Parameterp1
TypeGET
KWordActionURLhttp://www.opticum-gmbh.de/?y=3&cmd=view&category=1&hdsd=&p1=WCRTESTINPUT000004<>%3c%3e%253c%253e&filtrate=&s=2
VulnerabilityCross Site Scripting(URL)
No.5
ReferURLhttp://www.opticum-gmbh.de/?y=3&cmd=view&category=1&hdsd=&p1=&filtrate=&s=2
Parameterfiltrate
TypeGET
KWordActionURLhttp://www.opticum-gmbh.de/?y=3&cmd=view&category=1&hdsd=&p1=&filtrate=WCRTESTINPUT000005<>%3c%3e%253c%253e&s=2
VulnerabilityCross Site Scripting(URL)
Proof Of Concept - SQL INJECTION
ParameterValue
URLhttp://www.opticum-gmbh.de/?y=6&PHPSESSID=99999999
RequestTypeGET
DatabaseTypeSQLServer
InjectionTypeString
GettingDataByBlind
//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information