Sie sind auf Seite 1von 173

Acunetix Website Audit

7 June, 2016

Web Application Security Consortium:


Threat Classification
~ compliance report ~

Generated by Acunetix WVS Reporter (v10.0 Build 20150707)

Web Application Security Consortium: Threat Classification

Scan
URL
Scan date
Duration
Profile

http://192.168.1.3:80/
6/6/2016 5:59:47 PM
15 hours, 7 minutes
Default

Compliance at a Glance
This section of the report is a summary and lists the number of alerts found according to individual compliance categories.

- Authentication: Brute Force (1.1)


No alerts in this category
- Insufficient Authentication (1.2)
No alerts in this category
- Weak Password Recovery Validation (1.3)
No alerts in this category
- Credential/Session Prediction (2.1)
No alerts in this category
- Insufficient Authorization (2.2)
No alerts in this category
- Insufficient Session Expiration (2.3)
No alerts in this category
- Session Fixation (2.4)
No alerts in this category
- Content Spoofing (3.1)
No alerts in this category
Acunetix Website Audit

- Cross-site Scripting (3.2)


No alerts in this category
- Buffer Overflow (4.1)
No alerts in this category
- Format String Attack (4.2)
No alerts in this category
- LDAP Injection (4.3)
No alerts in this category
- OS Commanding (4.4)
No alerts in this category
- SQL Injection (4.5)
No alerts in this category
- SSI Injection (4.6)
No alerts in this category
- XPath Injection (4.7)
No alerts in this category
- Directory Indexing (5.1)
No alerts in this category
- Information Leakage (5.2)
Total number of alerts in this category: 176
- Path Traversal (5.3)
No alerts in this category
- Predictable Resource Location (5.4)
No alerts in this category
- Abuse of Functionality (6.1)
Total number of alerts in this category: 58
- Denial of Service (6.2)
Total number of alerts in this category: 2
- Insufficient Anti-automation (6.3)
No alerts in this category
- Insufficient Process Validation (6.4)
No alerts in this category

Acunetix Website Audit

Compliance According to Categories: A Detailed Report


This section is a detailed report that explains each vulnerability found according to individual compliance categories.

(1.1) Authentication: Brute Force


A Brute Force attack is an automated process of trial and error used to guess a person's username, password, credit-card
number or cryptographic key.
Acunetix authentication tester can be used to bruteforce authentication schemes based either on HTTP protocol NTLM or
Basic authentication or HTML form based authentication.
No alerts in this category.

(1.2) Insufficient Authentication


Insufficient Authentication occurs when a web site permits an attacker to access sensitive content or functionality without
having to properly authenticate. Web-based administration tools are a good example of web sites providing access to
sensitive functionality. Depending on the specific online resource, these web applications should not be directly accessible
without the user required to properly verify their identity.
To get around setting up authentication, some resources are protected by "hiding" the specific location and not linking the
location into the main web site or other public places. However, this approach is nothing more than "Security Through
Obscurity". Its important to understand that simply because a resource is unknown to an attacker, it still remains
accessible directly through a specific URL. The specific URL could be discovered through a Brute Force probing for
common file and directory locations (/admin for example), error messages, referrer logs, or perhaps documented in help
files. These resources, whether they are content or functionality driven, should be adequately protected.
No alerts in this category.

(1.3) Weak Password Recovery Validation


Weak Password Recovery Validation is when a web site permits an attacker to illegally obtain, change or recover another
user's password. Conventional web site authentication methods require users to select and remember a password or
passphrase. The user should be the only person that knows the password and it must be remembered precisely. As time
passes, a user's ability to remember a password fades. The matter is further complicated when the average user visits 20
sites requiring them to supply a password. (RSA Survey: http://news.bbc.co.uk/1/hi/technology/3639679.stm) Thus,
Password Recovery is an important part in servicing online users.
No alerts in this category.

(2.1) Credential/Session Prediction


Credential/Session Prediction is a method of hijacking or impersonating a web site user. Deducing or guessing the unique
value that identifies a particular session or user accomplishes the attack. Also known as Session Hijacking, the
consequences could allow attackers the ability to issue web site requests with the compromised user's privileges.
No alerts in this category.

(2.2) Insufficient Authorization


Insufficient Authorization is when a web site permits access to sensitive content or functionality that should require
increased access control restrictions. When a user is authenticated to a web site, it does not necessarily mean that he
should have full access to all content and that functionality should be granted arbitrarily.
Authorization procedures are performed after authentication, enforcing what a user, service or application is permitted to
do. Thoughtful restrictions should govern particular web site activity according to policy. Sensitive portions of a web site
may need to be restricted to everyone expect to perhaps an administrator.
No alerts in this category.

(2.3) Insufficient Session Expiration


Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for
authorization. Insufficient Session Expiration increases a web site's exposure to attacks that steal or impersonate other
users.
No alerts in this category.

Acunetix Website Audit

(2.4) Session Fixation


Session Fixation is an attack technique that forces a user's session ID to an explicit value. Depending on the functionality
of the target web site, a number of techniques can be utilized to "fix" the session ID value. These techniques range from
Cross-site Scripting exploits to peppering the web site with previously made HTTP requests. After a user's session ID has
been fixed, the attacker will wait for them to login. Once the user does so, the attacker uses the predefined session ID
value to assume their online identity.
No alerts in this category.

(3.1) Content Spoofing


Content Spoofing is an attack technique used to trick a user into believing that certain content appearing on a web site is
legitimate and not from an external source.
Some web pages are served using dynamically built HTML content sources. For example, the source location of a frame
<frame src="http://foo.example/file.html">
could be specified by a URL parameter value:
http://foo.example/page?frame_src=http://foo.example/file.html
An attacker may be able to replace the "frame_src" parameter value with "
frame_src=http://attacker.example/spoof.html
". When the resulting web page is served, the browser location bar visibly remains under the user expected domain
(foo.example), but the foreign data (attacker.example) is shrouded by legitimate content.
No alerts in this category.

(3.2) Cross-site Scripting


Cross-site Scripting (XSS) is an attack technique that forces a web site to echo attacker-supplied executable code, which
loads in a user's browser. The code itself is usually written in HTML/JavaScript, but may also extend to VBScript, ActiveX,
Java, Flash, or any other browser-supported technology.
When an attacker gets a user's browser to execute his code, the code will run within the security context (or zone) of the
hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data
accessible by the browser. A Cross-site Scripted user could have his account hijacked (cookie theft), their browser
redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Crosssite
Scripting attacks essentially compromise the trust relationship between a user and the web site.
No alerts in this category.

(4.1) Buffer Overflow


Buffer Overflow exploits are attacks that alter the flow of an application by overwriting parts of memory. Buffer Overflow is
a common software flaw that results in an error condition. This error condition occurs when data written to memory
exceed the allocated size of the buffer. As the buffer is overflowed, adjacent memory addresses are overwritten causing
the software to fault or crash. When unrestricted, properly-crafted input can be used to overflow the buffer resulting in a
number of security issues.
A Buffer Overflow can be used as a Denial of Service attack when memory is corrupted, resulting in software failure. Even
more critical is the ability of a Buffer Overflow attack to alter application flow and force unintended actions. This scenario
can occur in several ways. Buffer Overflow vulnerabilities have been used to overwrite stack pointers and redirect the
program to execute malicious instructions. Buffer Overflows have also been used to change program variables.
No alerts in this category.

Acunetix Website Audit

(4.2) Format String Attack


Format String Attacks alter the flow of an application by using string formatting library features to access other memory
space. Vulnerabilities occur when user-supplied data are used directly as formatting string input for certain C/C++
functions (e.g. fprintf, printf, sprintf, setproctitle, syslog, ...).
If an attacker passes a format string consisting of printf conversion characters (e.g. "%f", "%p", "%n", etc.) as parameter
value to the web application, they may:
- Execute arbitrary code on the server
- Read values off the stack
- Cause segmentation faults / software crashes
No alerts in this category.

(4.3) LDAP Injection


LDAP Injection is an attack technique used to exploit web sites that construct LDAP statements from user-supplied input.
Lightweight Directory Access Protocol (LDAP) is an open-standard protocol for both querying and manipulating X.500
directory services. The LDAP protocol runs over Internet transport protocols, such as TCP. Web applications may use
user-supplied input to create custom LDAP statements for dynamic web page requests.
No alerts in this category.

(4.4) OS Commanding
OS Commanding is an attack technique used to exploit web sites by executing Operating System commands through
manipulation of application input.
When a web application does not properly sanitize user-supplied input before using it within application code, it may be
possible to trick the application into executing Operating System commands. The executed commands will run with the
same permissions of the component that executed the command (e.g. Database server, Web application server, Web
server, etc.).
No alerts in this category.

(4.5) SQL Injection


SQL Injection is an attack technique used to exploit web sites that construct SQL statements from user-supplied input.
When a web application fails to properly sanitize user-supplied input, it is possible for an attacker to alter the construction
of backend SQL statements. When an attacker is able to modify a SQL statement, the process will run with the same
permissions as the component that executed the command. (e.g. Database server, Web application server, Web server,
etc.). The impact of this attack can allow attackers to gain total control of the database or even execute commands on the
system.
No alerts in this category.

(4.6) SSI Injection

SSI Injection (Server-side Include) is a server-side exploit technique that allows an attacker to send code into a web
application, which will later be executed locally by the web server. SSI Injection exploits a web application's failure to
sanitize user-supplied data before they are inserted into a server-side interpreted HTML file.
If an attacker submits a Server-side Include statement, he may have the ability to execute arbitrary operating system
commands, or include a restricted file's contents the next time the page is served.
No alerts in this category.

(4.7) XPath Injection


XPath Injection is an attack technique used to exploit web sites that construct XPath queries from user-supplied input.
XPath 1.0 is a language used to refer to parts of an XML document. It can be used directly by an application to query an
XML document, or as part of a larger operation such as applying an XSLT transformation to an XML document, or
applying an XQuery to an XML document.
No alerts in this category.

Acunetix Website Audit

(5.1) Directory Indexing


Automatic directory listing/indexing is a web server function that lists all of the files within a requested directory if the
normal base file (index.html/home.html/default.htm) is not present. When a user requests the main page of a web site,
they normally type in a URL such as: http://www.example.com - using the domain name and excluding a specific file. The
web server processes this request and searches the document root directory for the default file name and sends this page
to the client. If this page is not present, the web server will issue a directory listing and send the output to the client.
Essentially, this is equivalent to issuing an "ls" (Unix) or "dir" (Windows) command within this directory and showing the
results in HTML form. From an attack and countermeasure perspective, it is important to realize that unintended directory
listings may be possible due to software vulnerabilities.
No alerts in this category.

(5.2) Information Leakage


Information Leakage is when a web site reveals sensitive data, such as developer comments or error messages, which
may aid an attacker in exploiting the system. Sensitive information may be present within HTML comments, error
messages, source code, or simply left in plain sight. There are many ways a web site can be coaxed into revealing this
type of information. While leakage does not necessarily represent a breach in security, it does give an attacker useful
guidance for future exploitation. Leakage of sensitive information may carry various levels of risk and should be limited
whenever possible.
Total number of alerts in this category: 176
Alerts in this category
Microsoft IIS tilde directory enumeration
It is possible to detect short names of files and directories which have an 8.3 file naming scheme equivalent in Windows
by using some vectors in several versions of Microsoft IIS. For instance, it is possible to detect all short-names of ".aspx"
files as they have 4 letters in their extensions. This can be a major issue especially for the .Net websites which are
vulnerable to direct URL access as an attacker can find important files and folders that they are not normally visible.
CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-20

Affected item
/
Affected parameter
Variants
1

Application error message


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Affected item
Affected parameter
Variants
Affected item

/account/edit/endalamaw
FirstName
1
/account/edit/endalamaw

Acunetix Website Audit


Affected parameter UserName
Variants
1
Affected item
/account/edit/zelalem
Affected parameter LastName
Variants
1
Affected item
/account/login
Affected parameter Password
Variants
1
Affected item
/account/usergroups/endalamaw
Affected parameter UserName
Variants
1
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/finance/bankaccounts/edit/10
AccountName
1
/finance/bankaccounts/edit/10
BankAdress
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/finance/bankaccounts/edit/11
AccountName
1
/finance/bankaccounts/edit/11
BankAdress
1
/finance/bankaccounts/edit/11
BankBranch
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item

/finance/bankaccounts/edit/12
AccountName
1
/finance/bankaccounts/edit/12
BankAdress
1
/finance/bankaccounts/edit/12

Affected parameter BankBranch


Variants
1
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/finance/bankaccounts/edit/13
BankAdress
1
/finance/bankaccounts/edit/13
BankBranch
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/finance/bankaccounts/edit/14
__RequestVerificationToken
1
/finance/bankaccounts/edit/14
AccountName
1
/finance/bankaccounts/edit/14
AccountNumber
1

Acunetix Website Audit


Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/finance/bankaccounts/edit/15
BankAdress
1
/finance/bankaccounts/edit/15
BankBranch
1
/finance/bankaccounts/edit/15
BankName
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/finance/bankaccounts/edit/16
AccountName
1
/finance/bankaccounts/edit/16
BankAdress
1
/finance/bankaccounts/edit/16
BankBranch
1
/finance/bankaccounts/edit/16
BankName
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/finance/bankaccounts/edit/17
AccountName
1
/finance/bankaccounts/edit/17
BankAdress
1
/finance/bankaccounts/edit/17
BankBranch
1

Affected item
/finance/bankaccounts/edit/6
Affected parameter AccountName
Variants
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/finance/bankaccounts/edit/6
BankAdress
1
/finance/bankaccounts/edit/6
BankBranch
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/finance/bankaccounts/edit/7
AccountName
1
/finance/bankaccounts/edit/7
BankAdress
1
/finance/bankaccounts/edit/7
BankBranch
1
/finance/bankaccounts/edit/7
BankName
1

Affected item

/finance/bankaccounts/edit/8

Acunetix Website Audit


Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

AccountName
1
/finance/bankaccounts/edit/8
BankAdress
1
/finance/bankaccounts/edit/8
BankBranch
1
/finance/bankaccounts/edit/8
BankName
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/finance/bankaccounts/edit/9
AccountName
1
/finance/bankaccounts/edit/9
BankAdress
1
/finance/bankaccounts/edit/9
BankBranch
1

Affected item
/hr/disciplinaymeasureranks/edit/2
Affected parameter DisciplinayMeasureRank
Variants
1
Affected item
/hr/disciplinaymeasureranks/edit/3
Affected parameter DisciplinayMeasureRank
Variants
1
Affected item
/hr/disciplinaymeasuretypes/edit/10
Affected parameter Measure
Variants
1
Affected item
/hr/disciplinaymeasuretypes/edit/11
Affected parameter Measure

Variants

Affected item
/hr/disciplinaymeasuretypes/edit/12
Affected parameter Measure
Variants
1
Affected item
/hr/disciplinaymeasuretypes/edit/8
Affected parameter Measure
Variants
1
Affected item
/hr/disciplinaymeasuretypes/edit/9
Affected parameter Measure
Variants
1
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/hr/empbscappraisalperiods/edit/1
__RequestVerificationToken
1
/hr/empbscappraisalperiods/edit/1
AppraisalPeriod
1

Affected item
/hr/empbscappraisalperiods/edit/2
Affected parameter AppraisalPeriod
Variants
1
Acunetix Website Audit

10

Affected item
/hr/empbscappraisalperiods/edit/4
Affected parameter AppraisalPeriod
Variants
1
Affected item
/hr/empbscappraisalperiods/edit/5
Affected parameter AppraisalPeriod
Variants
1
Affected item
/hr/empbscappraisalperiods/edit/6
Affected parameter AppraisalPeriod
Variants
1
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Affected item
/finance/json/description
Affected parameter
Variants
1
Affected item
/fleetmanagement/fleetsetupequipmentcategory/fleetsetupequipmentcategories_read
Affected parameter
Variants
1
Affected item

/fleetmanagement/fleetsetupequipmentfuelstandard/fleetsetupequipmentfuelstandards_read

Affected parameter
Variants
1
Affected item
/fleetmanagement/fleetsetupequipmentfueltype/fleetsetupequipmentfueltypes_read
Affected parameter
Variants
1
Affected item
/fleetmanagement/fleetsetupequipmentname/fleetsetupequipmentnames_read
Affected parameter
Variants
1
Affected item
/fleetmanagement/fleetsetupequipmentstatus/fleetsetupequipmentstatus_read
Affected parameter
Variants
1
Affected item
/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
Affected parameter
Variants
1
Affected item
/fleetmanagement/fleetsetupinsurancetype/fleetsetupinsurancetypes_read
Affected parameter
Variants
1
Affected item
/fleetmanagement/fleetsetupmaintenancecenter/fleetsetupmaintenancecenters_read
Affected parameter
Acunetix Website Audit
Variants

11

Affected item
/fleetmanagement/fleetsetupoperatorposition/fleetsetupoperatorpositions_read
Affected parameter
Variants
1
Affected item
/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
Affected parameter
Variants
1
Affected item
/hr/disciplinaymeasuretypes
Affected parameter
Variants
1
Affected item
/procurement/reportprocurement
Affected parameter
Variants
1
Affected item
/procurement/reportprocurement/getlotdetails
Affected parameter
Variants
1
Affected item
/upload
Affected parameter
Variants
1
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.

CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Affected item
/
Affected parameter /
Variants
3
Affected item
/account/delete/enanu
Affected parameter __RequestVerificationToken
Variants
1
Affected item
/account/delete/endalamaw
Affected parameter __RequestVerificationToken
Variants
1
Affected item
/account/delete/zelalem
Affected parameter __RequestVerificationToken
Variants
1
Affected item
Affected parameter
Variants
Affected item
Affected parameter

/account/edit/enanu
__RequestVerificationToken
1
/account/edit/enanu
Email

Acunetix Website Audit


Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

1
/account/edit/enanu
FirstName
1
/account/edit/enanu
LastName
1
/account/edit/enanu
UserName
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/account/edit/endalamaw
__RequestVerificationToken
1
/account/edit/endalamaw
Email
1
/account/edit/endalamaw
FirstName
1
/account/edit/endalamaw
LastName
1
/account/edit/endalamaw
UserName
1

12

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/account/login
__RequestVerificationToken
2
/account/login
Password
1
/account/login
ReturnUrl
1
/account/login
UserName
1

Affected item
/account/logoff
Affected parameter __RequestVerificationToken
Variants
1
Affected item
/account/register
Affected parameter __RequestVerificationToken
Variants
1
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/account/usergroups/enanu
__RequestVerificationToken
1
/account/usergroups/enanu
Groups[0].GroupId
1
/account/usergroups/enanu
Groups[1].GroupId
1

Acunetix Website Audit


Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item

/account/usergroups/enanu
Groups[2].GroupId
1
/account/usergroups/enanu
Groups[3].GroupId
1
/account/usergroups/enanu
Groups[3].Selected
1
/account/usergroups/enanu
Groups[4].GroupId
1
/account/usergroups/enanu
Groups[4].Selected
1
/account/usergroups/enanu
Groups[5].GroupId
1
/account/usergroups/enanu
Groups[5].Selected
1
/account/usergroups/enanu
Groups[6].GroupId
1
/account/usergroups/enanu

13

Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

Groups[6].Selected
1
/account/usergroups/enanu
Groups[7].GroupId
1
/account/usergroups/enanu
Groups[7].Selected
1
/account/usergroups/enanu
Groups[8].GroupId
1
/account/usergroups/enanu
Groups[8].Selected
1
/account/usergroups/enanu
UserName
1

Affected item
/finance/budgetallocationandusage/
Affected parameter BudgetYear
Variants
1
Affected item
/finance/budgetallocationandusage/budgetallocationandusageexcel
Affected parameter BudgetYear
Variants
1
Affected item
/finance/budgetallocationandusage/budgetallocationandusageprint
Affected parameter BudgetYear
Variants
1
Affected item

/finance/json/description

Acunetix Website Audit

14

Affected parameter id
Variants
1
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/
fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
filter

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
filter
1
/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
group
1

1
/
fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
group
1
/
fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
page
1
/
fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
pageSize
1
/
fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
sort
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
page
1
/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
pageSize
1
/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
sort
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
filter
1
/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
group
1
/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
page
1
/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
pageSize
1
/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
sort
1

Affected item
/home/setculture
Affected parameter Referer
Variants
1
Affected item
/hr/disciplinaymeasuretypes/delete/10
Affected parameter __RequestVerificationToken
Acunetix Website Audit
Variants

Affected item
/hr/disciplinaymeasuretypes/delete/11
Affected parameter __RequestVerificationToken
Variants
1
Affected item
/hr/disciplinaymeasuretypes/delete/12
Affected parameter __RequestVerificationToken
Variants
1
Affected item
/hr/disciplinaymeasuretypes/delete/8
Affected parameter __RequestVerificationToken
Variants
1
Affected item
/hr/disciplinaymeasuretypes/delete/9
Affected parameter __RequestVerificationToken
Variants
1
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter

/hr/disciplinaymeasuretypes/edit/10
__RequestVerificationToken
1
/hr/disciplinaymeasuretypes/edit/10
CreatedBy
1
/hr/disciplinaymeasuretypes/edit/10
CreatedOn

15

Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

1
/hr/disciplinaymeasuretypes/edit/10
DisciplinayMeasureRanksID
1
/hr/disciplinaymeasuretypes/edit/10
DisciplinayMeasureTypesID
1
/hr/disciplinaymeasuretypes/edit/10
ExpireYear
1
/hr/disciplinaymeasuretypes/edit/10
Measure
1
/hr/disciplinaymeasuretypes/edit/10
PercentageEffectOnPromotion
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter

/hr/disciplinaymeasuretypes/edit/11
__RequestVerificationToken
1
/hr/disciplinaymeasuretypes/edit/11
CreatedBy
1
/hr/disciplinaymeasuretypes/edit/11
CreatedOn
1
/hr/disciplinaymeasuretypes/edit/11
DisciplinayMeasureRanksID
1
/hr/disciplinaymeasuretypes/edit/11
DisciplinayMeasureTypesID

Acunetix Website Audit


Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

1
/hr/disciplinaymeasuretypes/edit/11
ExpireYear
1
/hr/disciplinaymeasuretypes/edit/11
Measure
1
/hr/disciplinaymeasuretypes/edit/11
PercentageEffectOnPromotion
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter

/hr/disciplinaymeasuretypes/edit/12
__RequestVerificationToken
1
/hr/disciplinaymeasuretypes/edit/12
CreatedBy
1
/hr/disciplinaymeasuretypes/edit/12
CreatedOn
1
/hr/disciplinaymeasuretypes/edit/12
DisciplinayMeasureRanksID

16

Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

1
/hr/disciplinaymeasuretypes/edit/12
DisciplinayMeasureTypesID
1
/hr/disciplinaymeasuretypes/edit/12
ExpireYear
1
/hr/disciplinaymeasuretypes/edit/12
Measure
1
/hr/disciplinaymeasuretypes/edit/12
PercentageEffectOnPromotion
1

Affected item
Affected parameter
Variants
Affected item
Affected parameter
Variants

/hr/empbscappraisalperiods/create
__RequestVerificationToken
1
/hr/empbscappraisalperiods/create
IsClosed
1

ASP.NET version disclosure


The HTTP responses returned by this web application include anheader named X-AspNet-Version. The value of this
header is used by Visual Studio to determine which version of ASP.NET is in use. It is not necessary for production sites
and should be disabled.
CVSS

Base Score: 0.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
CWE-200

Acunetix Website Audit

17

Affected item
/
Affected parameter
Variants
1
Email address found
One or more email addresses have been found on this page. The majority of spam comes from email addresses
harvested off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour
the internet looking for email addresses on any website they come across. Spambot programs look for strings like
myname@mydomain.com and then record any addresses found.
CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Affected item
/account
Affected parameter
Variants
1

Affected item
/account/delete/zelalem
Affected parameter
Variants
1
Affected item
/account/edit/zelalem
Affected parameter
Variants
1
Microsoft IIS version disclosure
The HTTP responses returned by this web application include a header named Server. The value of this header includes
the version of Microsoft IIS server.
CVSS

Base Score: 0.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
CWE-200

Affected item
/
Affected parameter
Variants
1
Password type input with auto-complete enabled
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should
be saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as
the name is entered. An attacker with local access could obtain the cleartext password from the browser cache.
CVSS

Base Score: 0.0


- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None

Acunetix Website Audit


CWE

CWE-200

Affected item
/account/login
Affected parameter
Variants
1
Affected item
/account/login (1f2dc0e26bedda9d5aebd00f748cb9d1)
Affected parameter
Variants
1
Affected item
/account/login (8f687fa47b22a02f27a3174aed84ccc0)
Affected parameter
Variants
1
Affected item
/account/login (d4c7aaa78ab87dfcc2f6d60cf3c9605e)
Affected parameter
Variants
1
Affected item
/account/login (f679e9569fc981ca88e5e9c01ef99b87)
Affected parameter
Variants
1
Affected item

/account/register

18

Affected parameter
Variants
2
Possible internal IP address disclosure
A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
This alert may be a false positive, manual confirmation is required.
CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Affected item
/home/setculture
Affected parameter
Variants
1
Possible username or password disclosure
A username and/or password was found in this file. This information could be sensitive.
This alert may be a false positive, manual confirmation is required.
CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Affected item
/content/ace/font-awesome/4.2.0/css/font-awesome.min.css
Affected parameter
Acunetix Website Audit
Variants

19

(5.3) Path Traversal


The Path Traversal attack technique forces access to files, directories, and commands that potentially reside outside the
web document root directory. An attacker may manipulate a URL in such a way that the web site will execute or reveal the
contents of arbitrary files anywhere on the web server. Any device that exposes an HTTPbased interface is potentially
vulnerable to Path Traversal.
Most web sites restrict user access to a specific portion of the filesystem, typically called the "web document root" or "CGI
root" directory. These directories contain the files intended for user access and the executables necessary to drive web
application functionality. To access files or execute commands anywhere on the file-system, Path Traversal attacks will
utilize the ability of special-characters sequences.
No alerts in this category.

(5.4) Predictable Resource Location

Predictable Resource Location is an attack technique used to uncover hidden web site content and functionality. By
making educated guesses, the attack is a brute force search looking for content that is not intended for public viewing.
Temporary files, backup files, configuration files, and sample files are all examples of potentially leftover files. These brute
force searches are easy because hidden files will often have common naming convention and reside in standard
locations. These files may disclose sensitive information about web application internals, database information,
passwords, machine names, file paths to other sensitive areas, or possibly contain vulnerabilities. Disclosure of this
information is valuable to an attacker.
No alerts in this category.

(6.1) Abuse of Functionality


Abuse of Functionality is an attack technique that uses a web site's own features and functionality to consume, defraud, or
circumvents access controls mechanisms. Some functionality of a web site, possibly even security features, may be
abused to cause unexpected behavior. When a piece of functionality is open to abuse, an attacker could potentially annoy
other users or perhaps defraud the system entirely. The potential and level of abuse will vary from web site to web site
and application to application.
Total number of alerts in this category: 58
Alerts in this category
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
CVSS

Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Affected item
/
Affected parameter
Variants
2
Affected item
/account
Affected parameter
Variants
4
Affected item
/finance/accountstransactions
Acunetix Website Audit
Affected parameter
Variants
2
Affected item
/finance/budgetagainstpreviousyear
Affected parameter
Variants
2
Affected item
/finance/budgetallocationandusage
Affected parameter
Variants
2
Affected item
/finance/json/fromaccountcode
Affected parameter
Variants
2

20

Affected item
/finance/reportfinance/accountanalysis
Affected parameter
Variants
2
Affected item
/finance/reportfinance/accountanalysisbysegment
Affected parameter
Variants
2
Affected item
/finance/reportfinance/aragingbyinvoice
Affected parameter
Variants
2
Affected item
/finance/reportfinance/cashflow
Affected parameter
Variants
2
Affected item
/finance/reportfinance/chartofaccount
Affected parameter
Variants
2
Affected item
/finance/reportfinance/customerlist
Affected parameter
Variants
2
Affected item
/finance/reportfinance/incomestatement
Affected parameter
Variants
2
Affected item
/finance/reportfinance/incomestatementbyproject
Affected parameter
Variants
2
Affected item
/finance/reportfinance/supplierlist
Affected parameter
Variants
2
Affected item
/finance/reportfinance/trialbalance
Affected parameter
Variants
2
Affected item
/hr/certificatesandletters
Affected parameter
Variants
2
Affected item
/hr/upload
Affected parameter
Variants
2
Acunetix Website Audit
Affected item
/inventory/reportinventory/issueitem
Affected parameter
Variants
2
Affected item
/inventory/reportinventory/stockbalance
Affected parameter
Variants
2
Affected item
/payroll/payrollreports/bonusincometaxreport
Affected parameter
Variants
2
Affected item

/payroll/payrollreports/monthlypensionreport

21

Affected parameter
Variants
2
Affected item
/payroll/payrollreports/reportbycontributiontypelist
Affected parameter
Variants
2
Login page password-guessing attack
A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack
is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols
until you discover the one correct combination that works.
This login page doesn't have any protection against password-guessing attacks (brute force attacks). It's recommended to
implement some type of account lockout after a defined number of incorrect password attempts. Consult Web references
for more information about fixing this problem.
CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-307

Affected item
/account/login
Affected parameter
Variants
1
Possible CSRF (Cross-site request forgery)
Manual confirmation is required for this alert.
This script is possibly vulnerable to cross-site request forgery. Cross Site Reference Forgery (CSRF/XSRF) is a class of
attack that affects web based applications with a predictable structure for invocation. An attacker tricks the user into
performing an action of the attackers choosing by directing the victim's actions on the target application with a link or other
content.
The attack works by including a link or script in a page that accesses a site to which the user is known (or is supposed) to
have authenticated. Here is an example:
<img src="http://bank.example/withdraw?from=victim&amount=1000000&to=attacker">
If the bank keeps authentication information in a cookie, and if the cookie hasn't expired, then victim's browser's attempt
to load the image will submit the withdrawal form with his cookie.
This vulnerability is also known by several other names including Session Riding and One-Click Attack.
Affected item
/finance/json/bankaccounts (6e57e52fb25f1aa27d063b6c42189ce6)
Affected parameter
Variants
1
Affected item
/finance/json/description (c002f292f84915c9792f54c0abc710d4)
Affected parameter
Acunetix Website Audit
Variants

22

Affected item
/finance/json/fromaccountcode (6e57e52fb25f1aa27d063b6c42189ce6)
Affected parameter
Variants
1
Affected item
/finance/json/toaccountcode (6e57e52fb25f1aa27d063b6c42189ce6)
Affected parameter
Variants
1
Affected item
/
Affected parameter fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read

Variants

Affected item
/
Affected parameter fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
Variants
1
Affected item
/
Affected parameter fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
Variants
1
Affected item
/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
Affected parameter (11e076bff3d87afafd26c723d1fdc6a3)
Variants
1
Affected item
/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
Affected parameter (11e076bff3d87afafd26c723d1fdc6a3)
Variants
1

(6.2) Denial of Service


Denial of Service (DoS) is an attack technique with the intent of preventing a web site from serving normal user activity.
DoS attacks, which are easily normally applied to the network layer, are also possible at the application layer. These
malicious attacks can succeed by starving a system of critical resources, vulnerability exploit, or abuse of functionality.
Total number of alerts in this category: 2
Alerts in this category
Slow response time
This page had a slow response time. This type of files can be targeted in denial of service attacks. An attacker can
request this page repeatedly from multiple computers until the server becomes overloaded.
CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Partial
CWE-400

Affected item
/hr/disciplinaymeasuretypes
Affected parameter
Variants
1
Affected item
/projectmanagement/projectestimationnames
Affected parameter
Variants
1

Acunetix Website Audit

23

(6.3) Insufficient Anti-automation


Insufficient Anti-automation is when a web site permits an attacker to automate a process that should only be performed
manually. Certain web site functionalities should be protected against automated attacks.
Left unchecked, automated robots (programs) or attackers could repeatedly exercise web site functionality attempting to
exploit or defraud the system. An automated robot could potentially execute thousands of requests a minute, causing
potential loss of performance or service.
No alerts in this category.

(6.4) Insufficient Process Validation


Insufficient Process Validation is when a web site permits an attacker to bypass or circumvent the intended flow control of
an application. If the user state through a process is not verified and enforced, the web site could be vulnerable to
exploitation or fraud.
No alerts in this category.

Acunetix Website Audit

Affected Items: A Detailed Report


This section provides full details of the types of vulnerabilities found according to individual affected items.

/
Microsoft IIS tilde directory enumeration

24

It is possible to detect short names of files and directories which have an 8.3 file naming scheme equivalent in Windows
by using some vectors in several versions of Microsoft IIS. For instance, it is possible to detect all short-names of ".aspx"
files as they have 4 letters in their extensions. This can be a major issue especially for the .Net websites which are
vulnerable to direct URL access as an attacker can find important files and folders that they are not normally visible.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-20

Parameter

Variations
1

HTML form without CSRF protection


This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

Internal server error


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2

Acunetix Website Audit


CVSS

Base Score: 5.0


- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None

25

CWE

CWE-200

Parameter
/

Variations
3

ASP.NET version disclosure


The HTTP responses returned by this web application include anheader named X-AspNet-Version. The value of this
header is used by Visual Studio to determine which version of ASP.NET is in use. It is not necessary for production sites
and should be disabled.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 0.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

Microsoft IIS version disclosure


The HTTP responses returned by this web application include a header named Server. The value of this header includes
the version of Microsoft IIS server.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 0.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Acunetix Website Audit

/account
HTML form without CSRF protection

Variations
1

26

This alert may be a false positive, manual confirmation is required.


Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
2

Email address found


One or more email addresses have been found on this page. The majority of spam comes from email addresses
harvested off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour
the internet looking for email addresses on any website they come across. Spambot programs look for strings like
myname@mydomain.com and then record any addresses found.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Acunetix Website Audit

/account/delete/enanu
Internal server error

Variations
1

27

This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken

Variations
1

/account/delete/endalamaw
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken

Acunetix Website Audit

/account/delete/zelalem

Variations
1

28

Internal server error


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken

Variations
1

Email address found


One or more email addresses have been found on this page. The majority of spam comes from email addresses
harvested off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour
the internet looking for email addresses on any website they come across. Spambot programs look for strings like
myname@mydomain.com and then record any addresses found.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Acunetix Website Audit

/account/edit/enanu

Variations
1

29

Internal server error


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken
Email
FirstName
LastName
UserName

Acunetix Website Audit

Variations
1
1
1
1
1

30

/account/edit/endalamaw
Application error message

This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
FirstName
UserName

Variations
1
1

Internal server error


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken
Email
FirstName
LastName
UserName

Acunetix Website Audit

/account/edit/zelalem
Application error message

Variations
1
1
1
1
1

31

This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
LastName

Variations
1

Email address found


One or more email addresses have been found on this page. The majority of spam comes from email addresses
harvested off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour
the internet looking for email addresses on any website they come across. Spambot programs look for strings like
myname@mydomain.com and then record any addresses found.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Acunetix Website Audit

/account/login

Variations
1

32

Application error message


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
Password

Variations
1

Internal server error


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken
Password
ReturnUrl
UserName

Variations
2
1
1
1

Login page password-guessing attack


A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack
is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols
until you discover the one correct combination that works.
This login page doesn't have any protection against password-guessing attacks (brute force attacks). It's recommended to
implement some type of account lockout after a defined number of incorrect password attempts. Consult Web references
for more information about fixing this problem.
This alert belongs to the following categories: 6.1

Acunetix Website Audit

33

CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-307

Parameter

Variations
1

Password type input with auto-complete enabled


When a new name and password is entered in a form and the form is submitted, the browser asks if the password should
be saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as
the name is entered. An attacker with local access could obtain the cleartext password from the browser cache.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 0.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

/account/login (1f2dc0e26bedda9d5aebd00f748cb9d1)
Password type input with auto-complete enabled
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should
be saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as
the name is entered. An attacker with local access could obtain the cleartext password from the browser cache.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 0.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Acunetix Website Audit

Variations
1

34

/account/login (8f687fa47b22a02f27a3174aed84ccc0)
Password type input with auto-complete enabled
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should
be saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as
the name is entered. An attacker with local access could obtain the cleartext password from the browser cache.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 0.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

/account/login (d4c7aaa78ab87dfcc2f6d60cf3c9605e)
Password type input with auto-complete enabled
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should
be saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as
the name is entered. An attacker with local access could obtain the cleartext password from the browser cache.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 0.0

CWE
Parameter

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
CWE-200
Variations
1

Acunetix Website Audit

35

/account/login (f679e9569fc981ca88e5e9c01ef99b87)
Password type input with auto-complete enabled
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should
be saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as
the name is entered. An attacker with local access could obtain the cleartext password from the browser cache.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 0.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

/account/logoff
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken

Variations
1

Acunetix Website Audit

36

/account/register
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken

Variations
1

Password type input with auto-complete enabled


When a new name and password is entered in a form and the form is submitted, the browser asks if the password should
be saved.Thereafter when the form is displayed, the name and password are filled in automatically or are completed as
the name is entered. An attacker with local access could obtain the cleartext password from the browser cache.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 0.0

CWE
Parameter

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: None
CWE-200
Variations
2

Acunetix Website Audit

37

/account/usergroups/enanu
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken
Groups[0].GroupId
Groups[1].GroupId
Groups[2].GroupId
Groups[3].GroupId
Groups[3].Selected
Groups[4].GroupId
Groups[4].Selected
Groups[5].GroupId
Groups[5].Selected
Groups[6].GroupId
Groups[6].Selected
Groups[7].GroupId
Groups[7].Selected
Groups[8].GroupId
Groups[8].Selected
UserName

Variations
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

Acunetix Website Audit

38

/account/usergroups/endalamaw
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
UserName

/content/ace/font-awesome/4.2.0/css/font-awesome.min.css
Possible username or password disclosure
A username and/or password was found in this file. This information could be sensitive.
This alert may be a false positive, manual confirmation is required.
This alert belongs to the following categories: 5.2

Variations
1

CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

Acunetix Website Audit

39

/finance/accountstransactions
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

/finance/bankaccounts/edit/10
Application error message

Variations
1

This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AccountName
BankAdress

Variations
1
1

Acunetix Website Audit

40

/finance/bankaccounts/edit/11
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AccountName
BankAdress
BankBranch

/finance/bankaccounts/edit/12
Application error message

Variations
1
1
1

This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AccountName
BankAdress
BankBranch

Variations
1
1
1

Acunetix Website Audit

41

/finance/bankaccounts/edit/13
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
BankAdress
BankBranch

/finance/bankaccounts/edit/14
Application error message

Variations
1
1

This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken
AccountName
AccountNumber

Variations
1
1
1

Acunetix Website Audit

42

/finance/bankaccounts/edit/15
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
BankAdress
BankBranch
BankName

/finance/bankaccounts/edit/16

Variations
1
1
1

Application error message


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AccountName
BankAdress
BankBranch
BankName

Variations
1
1
1
1

Acunetix Website Audit

43

/finance/bankaccounts/edit/17
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AccountName
BankAdress
BankBranch

/finance/bankaccounts/edit/6

Variations
1
1
1

Application error message


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AccountName
BankAdress
BankBranch

Variations
1
1
1

Acunetix Website Audit

44

/finance/bankaccounts/edit/7
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AccountName
BankAdress
BankBranch
BankName

Variations
1
1
1
1

/finance/bankaccounts/edit/8
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AccountName
BankAdress
BankBranch
BankName

Variations
1
1
1
1

Acunetix Website Audit

45

/finance/bankaccounts/edit/9
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AccountName
BankAdress
BankBranch

Variations
1
1
1

/finance/budgetagainstpreviousyear
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

Acunetix Website Audit

46

/finance/budgetallocationandusage
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE
Parameter

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352
Variations

/finance/budgetallocationandusage/
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
BudgetYear

Variations
1

Acunetix Website Audit

47

/finance/budgetallocationandusage/budgetallocationandusageexcel
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE
Parameter
BudgetYear

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200
Variations
1

/finance/budgetallocationandusage/budgetallocationandusageprint
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
BudgetYear

Variations
1

Acunetix Website Audit

48

/finance/json/bankaccounts (6e57e52fb25f1aa27d063b6c42189ce6)
Possible CSRF (Cross-site request forgery)
Manual confirmation is required for this alert.
This script is possibly vulnerable to cross-site request forgery. Cross Site Reference Forgery (CSRF/XSRF) is a class of
attack that affects web based applications with a predictable structure for invocation. An attacker tricks the user into
performing an action of the attackers choosing by directing the victim's actions on the target application with a link or other
content.
The attack works by including a link or script in a page that accesses a site to which the user is known (or is supposed) to
have authenticated. Here is an example:
<img src="http://bank.example/withdraw?from=victim&amount=1000000&to=attacker">
If the bank keeps authentication information in a cookie, and if the cookie hasn't expired, then victim's browser's attempt
to load the image will submit the withdrawal form with his cookie.
This vulnerability is also known by several other names including Session Riding and One-Click Attack.
This alert belongs to the following categories: 6.1
Parameter

Variations
1

Acunetix Website Audit

49

/finance/json/description
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

Internal server error


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
id

Acunetix Website Audit

Variations
1

50

/finance/json/description (c002f292f84915c9792f54c0abc710d4)
Possible CSRF (Cross-site request forgery)
Manual confirmation is required for this alert.
This script is possibly vulnerable to cross-site request forgery. Cross Site Reference Forgery (CSRF/XSRF) is a class of
attack that affects web based applications with a predictable structure for invocation. An attacker tricks the user into
performing an action of the attackers choosing by directing the victim's actions on the target application with a link or other
content.
The attack works by including a link or script in a page that accesses a site to which the user is known (or is supposed) to
have authenticated. Here is an example:
<img src="http://bank.example/withdraw?from=victim&amount=1000000&to=attacker">
If the bank keeps authentication information in a cookie, and if the cookie hasn't expired, then victim's browser's attempt
to load the image will submit the withdrawal form with his cookie.
This vulnerability is also known by several other names including Session Riding and One-Click Attack.
This alert belongs to the following categories: 6.1

Parameter

Variations
1

/finance/json/fromaccountcode
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Acunetix Website Audit

Variations
1

51

/finance/json/fromaccountcode (6e57e52fb25f1aa27d063b6c42189ce6)
Possible CSRF (Cross-site request forgery)
Manual confirmation is required for this alert.
This script is possibly vulnerable to cross-site request forgery. Cross Site Reference Forgery (CSRF/XSRF) is a class of
attack that affects web based applications with a predictable structure for invocation. An attacker tricks the user into
performing an action of the attackers choosing by directing the victim's actions on the target application with a link or other
content.
The attack works by including a link or script in a page that accesses a site to which the user is known (or is supposed) to
have authenticated. Here is an example:
<img src="http://bank.example/withdraw?from=victim&amount=1000000&to=attacker">
If the bank keeps authentication information in a cookie, and if the cookie hasn't expired, then victim's browser's attempt
to load the image will submit the withdrawal form with his cookie.
This vulnerability is also known by several other names including Session Riding and One-Click Attack.
This alert belongs to the following categories: 6.1

Parameter

Variations
1

/finance/json/toaccountcode (6e57e52fb25f1aa27d063b6c42189ce6)
Possible CSRF (Cross-site request forgery)
Manual confirmation is required for this alert.
This script is possibly vulnerable to cross-site request forgery. Cross Site Reference Forgery (CSRF/XSRF) is a class of
attack that affects web based applications with a predictable structure for invocation. An attacker tricks the user into
performing an action of the attackers choosing by directing the victim's actions on the target application with a link or other
content.
The attack works by including a link or script in a page that accesses a site to which the user is known (or is supposed) to
have authenticated. Here is an example:
<img src="http://bank.example/withdraw?from=victim&amount=1000000&to=attacker">
If the bank keeps authentication information in a cookie, and if the cookie hasn't expired, then victim's browser's attempt
to load the image will submit the withdrawal form with his cookie.
This vulnerability is also known by several other names including Session Riding and One-Click Attack.
This alert belongs to the following categories: 6.1
Parameter

Acunetix Website Audit

Variations
1

52

/finance/reportfinance/accountanalysis
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1

CVSS

Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

/finance/reportfinance/accountanalysisbysegment
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Acunetix Website Audit

Variations
1

53

/finance/reportfinance/aragingbyinvoice
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.

This alert belongs to the following categories: 6.1, 6.1


CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

/finance/reportfinance/cashflow
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Acunetix Website Audit

Variations
1

54

/finance/reportfinance/chartofaccount
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.

This alert belongs to the following categories: 6.1, 6.1


CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

/finance/reportfinance/customerlist
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Acunetix Website Audit

/finance/reportfinance/incomestatement
HTML form without CSRF protection

Variations
1

55

This alert may be a false positive, manual confirmation is required.


Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

/finance/reportfinance/incomestatementbyproject
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Acunetix Website Audit

/finance/reportfinance/supplierlist
HTML form without CSRF protection

Variations
1

56

This alert may be a false positive, manual confirmation is required.


Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

/finance/reportfinance/trialbalance
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

Acunetix Website Audit

/fleetmanagement/fleetsetupequipmentcategory/fleetsetupequipmentcategories_read

57

Error message on page


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

/fleetmanagement/fleetsetupequipmentfuelstandard/fleetsetupequipmentfuelstandards_read
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

Acunetix Website Audit

/fleetmanagement/fleetsetupequipmentfueltype/fleetsetupequipmentfueltypes_read

58

Error message on page


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
filter
group
page
pageSize
sort

Acunetix Website Audit

Variations
1
1
1
1
1

59

/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
Possible CSRF (Cross-site request forgery)
Manual confirmation is required for this alert.
This script is possibly vulnerable to cross-site request forgery. Cross Site Reference Forgery (CSRF/XSRF) is a class of
attack that affects web based applications with a predictable structure for invocation. An attacker tricks the user into
performing an action of the attackers choosing by directing the victim's actions on the target application with a link or other
content.
The attack works by including a link or script in a page that accesses a site to which the user is known (or is supposed) to
have authenticated. Here is an example:
<img src="http://bank.example/withdraw?from=victim&amount=1000000&to=attacker">
If the bank keeps authentication information in a cookie, and if the cookie hasn't expired, then victim's browser's attempt
to load the image will submit the withdrawal form with his cookie.
This vulnerability is also known by several other names including Session Riding and One-Click Attack.
This alert belongs to the following categories: 6.1
Parameter

Variations
1

/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
Possible CSRF (Cross-site request forgery)
Manual confirmation is required for this alert.
This script is possibly vulnerable to cross-site request forgery. Cross Site Reference Forgery (CSRF/XSRF) is a class of
attack that affects web based applications with a predictable structure for invocation. An attacker tricks the user into
performing an action of the attackers choosing by directing the victim's actions on the target application with a link or other
content.
The attack works by including a link or script in a page that accesses a site to which the user is known (or is supposed) to
have authenticated. Here is an example:
<img src="http://bank.example/withdraw?from=victim&amount=1000000&to=attacker">
If the bank keeps authentication information in a cookie, and if the cookie hasn't expired, then victim's browser's attempt
to load the image will submit the withdrawal form with his cookie.
This vulnerability is also known by several other names including Session Riding and One-Click Attack.
This alert belongs to the following categories: 6.1
Parameter

Acunetix Website Audit

Variations
1

60

/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
Possible CSRF (Cross-site request forgery)
Manual confirmation is required for this alert.
This script is possibly vulnerable to cross-site request forgery. Cross Site Reference Forgery (CSRF/XSRF) is a class of
attack that affects web based applications with a predictable structure for invocation. An attacker tricks the user into
performing an action of the attackers choosing by directing the victim's actions on the target application with a link or other
content.
The attack works by including a link or script in a page that accesses a site to which the user is known (or is supposed) to
have authenticated. Here is an example:
<img src="http://bank.example/withdraw?from=victim&amount=1000000&to=attacker">
If the bank keeps authentication information in a cookie, and if the cookie hasn't expired, then victim's browser's attempt
to load the image will submit the withdrawal form with his cookie.
This vulnerability is also known by several other names including Session Riding and One-Click Attack.
This alert belongs to the following categories: 6.1
Parameter

Variations
1

/fleetmanagement/fleetsetupequipmentname/fleetsetupequipmentnames_read
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE
Parameter

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200
Variations
1

Acunetix Website Audit

61

/fleetmanagement/fleetsetupequipmentstatus/fleetsetupequipmentstatus_read
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE
Parameter

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200
Variations
1

Acunetix Website Audit

62

/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE
Parameter

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200
Variations

1
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
filter
group
page
pageSize
sort

Variations
1
1
1
1
1

Acunetix Website Audit

63

/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
Possible CSRF (Cross-site request forgery)
Manual confirmation is required for this alert.
This script is possibly vulnerable to cross-site request forgery. Cross Site Reference Forgery (CSRF/XSRF) is a class of
attack that affects web based applications with a predictable structure for invocation. An attacker tricks the user into
performing an action of the attackers choosing by directing the victim's actions on the target application with a link or other
content.
The attack works by including a link or script in a page that accesses a site to which the user is known (or is supposed) to
have authenticated. Here is an example:
<img src="http://bank.example/withdraw?from=victim&amount=1000000&to=attacker">
If the bank keeps authentication information in a cookie, and if the cookie hasn't expired, then victim's browser's attempt
to load the image will submit the withdrawal form with his cookie.
This vulnerability is also known by several other names including Session Riding and One-Click Attack.
This alert belongs to the following categories: 6.1
Parameter

Variations

/fleetmanagement/fleetsetupinsurancetype/fleetsetupinsurancetypes_read
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

Acunetix Website Audit

64

/fleetmanagement/fleetsetupmaintenancecenter/fleetsetupmaintenancecenters_read
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

/fleetmanagement/fleetsetupoperatorposition/fleetsetupoperatorpositions_read
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

Acunetix Website Audit

65

/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None

CWE

CWE-200

Parameter

Variations
1

Internal server error


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
filter
group
page
pageSize
sort

Acunetix Website Audit

Variations
1
1
1
1
1

66

/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
Possible CSRF (Cross-site request forgery)
Manual confirmation is required for this alert.
This script is possibly vulnerable to cross-site request forgery. Cross Site Reference Forgery (CSRF/XSRF) is a class of
attack that affects web based applications with a predictable structure for invocation. An attacker tricks the user into
performing an action of the attackers choosing by directing the victim's actions on the target application with a link or other
content.
The attack works by including a link or script in a page that accesses a site to which the user is known (or is supposed) to
have authenticated. Here is an example:
<img src="http://bank.example/withdraw?from=victim&amount=1000000&to=attacker">
If the bank keeps authentication information in a cookie, and if the cookie hasn't expired, then victim's browser's attempt
to load the image will submit the withdrawal form with his cookie.
This vulnerability is also known by several other names including Session Riding and One-Click Attack.

This alert belongs to the following categories: 6.1


Parameter

Acunetix Website Audit

Variations
1

67

/home/setculture
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2

CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
Referer

Variations
1

Possible internal IP address disclosure


A string matching an internal IPv4 address was found on this page. This may disclose information about the IP addressing
scheme of the internal network. This information can be used to conduct further attacks.
This alert may be a false positive, manual confirmation is required.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Acunetix Website Audit

/hr/certificatesandletters
HTML form without CSRF protection

Variations
1

68

This alert may be a false positive, manual confirmation is required.


Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

/hr/disciplinaymeasureranks/edit/2
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
DisciplinayMeasureRank

Acunetix Website Audit

/hr/disciplinaymeasureranks/edit/3
Application error message

Variations
1

69

This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
DisciplinayMeasureRank

Acunetix Website Audit

/hr/disciplinaymeasuretypes

Variations
1

70

Error message on page


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

Slow response time


This page had a slow response time. This type of files can be targeted in denial of service attacks. An attacker can
request this page repeatedly from multiple computers until the server becomes overloaded.
This alert belongs to the following categories: 6.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Partial
CWE-400

Parameter

Acunetix Website Audit

/hr/disciplinaymeasuretypes/delete/10

Variations
1

71

Internal server error


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken

Variations
1

/hr/disciplinaymeasuretypes/delete/11
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken

Acunetix Website Audit

Variations
1

72

/hr/disciplinaymeasuretypes/delete/12
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken

Variations
1

/hr/disciplinaymeasuretypes/delete/8
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken

Acunetix Website Audit

Variations
1

73

/hr/disciplinaymeasuretypes/delete/9
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken

Variations
1

Acunetix Website Audit

74

/hr/disciplinaymeasuretypes/edit/10
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
Measure

Variations
1

Internal server error


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Measure
PercentageEffectOnPromotion

Variations
1
1
1
1
1
1
1
1

Acunetix Website Audit

75

/hr/disciplinaymeasuretypes/edit/11
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
Measure

Variations
1

Internal server error


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Measure

Variations
1
1
1
1
1
1
1

PercentageEffectOnPromotion

Acunetix Website Audit

76

/hr/disciplinaymeasuretypes/edit/12
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
Measure

Variations
1

Internal server error


This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear

Variations
1
1
1
1
1
1

Measure
PercentageEffectOnPromotion

1
1

Acunetix Website Audit

77

/hr/disciplinaymeasuretypes/edit/8
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
Measure

Variations
1

/hr/disciplinaymeasuretypes/edit/9
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE
Parameter
Measure

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200
Variations
1

Acunetix Website Audit

78

/hr/empbscappraisalperiods/create
Internal server error
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken
IsClosed

Variations
1
1

/hr/empbscappraisalperiods/edit/1
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
__RequestVerificationToken
AppraisalPeriod

Variations
1
1

Acunetix Website Audit

79

/hr/empbscappraisalperiods/edit/2
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AppraisalPeriod

Variations
1

/hr/empbscappraisalperiods/edit/4
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AppraisalPeriod

Variations
1

Acunetix Website Audit

80

/hr/empbscappraisalperiods/edit/5
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AppraisalPeriod

Variations
1

/hr/empbscappraisalperiods/edit/6
Application error message
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter
AppraisalPeriod

Variations
1

Acunetix Website Audit

81

/hr/upload
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

/inventory/reportinventory/issueitem
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1

CVSS

Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

Acunetix Website Audit

82

/inventory/reportinventory/stockbalance
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

/payroll/payrollreports/bonusincometaxreport
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.

This alert belongs to the following categories: 6.1, 6.1


CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

Acunetix Website Audit

83

/payroll/payrollreports/monthlypensionreport
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.
This alert belongs to the following categories: 6.1, 6.1
CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

/payroll/payrollreports/reportbycontributiontypelist
HTML form without CSRF protection
This alert may be a false positive, manual confirmation is required.
Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type
of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information
about the affected HTML form.

This alert belongs to the following categories: 6.1, 6.1


CVSS
Base Score: 2.6

CWE

- Access Vector: Network


- Access Complexity: High
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
CWE-352

Parameter

Variations
1

Acunetix Website Audit

84

/procurement/reportprocurement
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

/procurement/reportprocurement/getlotdetails
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2

CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

Acunetix Website Audit

85

/projectmanagement/projectestimationnames
Slow response time
This page had a slow response time. This type of files can be targeted in denial of service attacks. An attacker can
request this page repeatedly from multiple computers until the server becomes overloaded.
This alert belongs to the following categories: 6.2
CVSS
Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Partial
CWE-400

Parameter

Variations
1

/upload
Error message on page
This page contains an error/warning message that may disclose sensitive information. The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
This alert belongs to the following categories: 5.2

CVSS

Base Score: 5.0

CWE

- Access Vector: Network


- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
CWE-200

Parameter

Variations
1

Acunetix Website Audit

86

Scanned items (coverage report)


http://192.168.1.3/
Vulnerabilities have been identified for this URL
56 input(s) found for this URL
Inputs
Input scheme 1
Input name
/
/

Input type
Path Fragment
Path Fragment

Input scheme 2
Input name
/
/
/

Input type
Path Fragment
Path Fragment
Path Fragment

Input scheme 3
Input name
/
/
/
/

Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment

Input scheme 4
Input name
-

Input type
Path Fragment

/
/
/
/

Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment

Input scheme 5
Input name
/

Input type
Path Fragment

Input scheme 6
Input name
/
/
/
/

Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment

Input scheme 7
Input name
/
/

Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment

Acunetix Website Audit

87

/
/

Path Fragment
Path Fragment

Input scheme 8
Input name
/
/
/
/

Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment

Input scheme 9
Input name
/
/
/
/
Input scheme 10
Input name

Input type
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Input type
Path Fragment

/
/
/
/

Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment
Path Fragment

Input scheme 11
Input name
Host

Input type
HTTP Header

http://192.168.1.3/account
Vulnerabilities have been identified for this URL
4 input(s) found for this URL
Inputs
Input scheme 1
Input name
SearchString

Input type
URL encoded POST

Input scheme 2
Input name
page

Input type
URL encoded GET

Input scheme 3
Input name
page
SearchString

Input type
URL encoded GET
URL encoded POST

Acunetix Website Audit

88

http://192.168.1.3/account/login
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Inputs
Input scheme 1
Input name
ReturnUrl

Input type
URL encoded GET

Input scheme 2
Input name
ReturnUrl
__RequestVerificationToken
Password
UserName

Input type
URL encoded GET
URL encoded POST
URL encoded POST
URL encoded POST

Input scheme 3
Input name
__RequestVerificationToken
Password
UserName

Input type
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/account/logoff
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs

Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/account/manage
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/delete/bizuneh
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/delete/abeje
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/delete/admin
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/delete/abiyu
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit


http://192.168.1.3/account/delete/meaza
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/delete/animaw
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/delete/abrham
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/delete/abeyus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/delete/alemnew
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/delete/birhanu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/delete/zelalem

89

Vulnerabilities have been identified for this URL


1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/account/delete/enanu
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/account/delete/endalamaw
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/account/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit


http://192.168.1.3/account/edit/admin
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/edit/meaza
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/edit/abeje
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/edit/abiyu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/edit/animaw
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/edit/abeyus
No vulnerabilities have been identified for this URL
No input(s) found for this URL

90

http://192.168.1.3/account/edit/abrham
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/edit/bizuneh
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/edit/birhanu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/edit/alemnew
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/edit/zelalem
Vulnerabilities have been identified for this URL
5 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
Email
FirstName
LastName
UserName

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/account/edit/enanu
Vulnerabilities have been identified for this URL
5 input(s) found for this URL
Acunetix Website Audit

91

Inputs
Input scheme 1
Input name
__RequestVerificationToken
Email
FirstName
LastName
UserName

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/account/edit/endalamaw
Vulnerabilities have been identified for this URL
5 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
Email
FirstName
LastName
UserName
http://192.168.1.3/account/usergroups

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

No vulnerabilities have been identified for this URL


No input(s) found for this URL
http://192.168.1.3/account/usergroups/bizuneh
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/usergroups/abeje
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/usergroups/abiyu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/usergroups/meaza
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/usergroups/admin
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/usergroups/abrham
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/usergroups/animaw
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

92

http://192.168.1.3/account/usergroups/birhanu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/usergroups/abeyus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/usergroups/alemnew
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/usergroups/zelalem
No vulnerabilities have been identified for this URL
20 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
Groups[0].GroupId

Input type
POST (multipart)
POST (multipart)

Groups[0].Selected
Groups[1].GroupId
Groups[1].Selected
Groups[2].GroupId
Groups[2].Selected
Groups[3].GroupId
Groups[3].Selected
Groups[4].GroupId
Groups[4].Selected
Groups[5].GroupId
Groups[5].Selected
Groups[6].GroupId
Groups[6].Selected
Groups[7].GroupId
Groups[7].Selected
Groups[8].GroupId
Groups[8].Selected
UserName

POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)

http://192.168.1.3/account/usergroups/endalamaw
Vulnerabilities have been identified for this URL
20 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
Groups[0].GroupId
Groups[0].Selected
Groups[1].GroupId
Groups[1].Selected
Groups[2].GroupId
Groups[2].Selected
Groups[3].GroupId

Input type
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)

Acunetix Website Audit


Groups[3].Selected
Groups[4].GroupId
Groups[4].Selected
Groups[5].GroupId
Groups[5].Selected
Groups[6].GroupId
Groups[6].Selected
Groups[7].GroupId
Groups[7].Selected
Groups[8].GroupId
Groups[8].Selected
UserName

93
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)

http://192.168.1.3/account/usergroups/enanu
Vulnerabilities have been identified for this URL
20 input(s) found for this URL
Inputs
Input scheme 1
Input name

Input type

__RequestVerificationToken
Groups[0].GroupId
Groups[0].Selected
Groups[1].GroupId
Groups[1].Selected
Groups[2].GroupId
Groups[2].Selected
Groups[3].GroupId
Groups[3].Selected
Groups[4].GroupId
Groups[4].Selected
Groups[5].GroupId
Groups[5].Selected
Groups[6].GroupId
Groups[6].Selected
Groups[7].GroupId
Groups[7].Selected
Groups[8].GroupId
Groups[8].Selected
UserName

POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)
POST (multipart)

http://192.168.1.3/account/userpermissions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/userpermissions/bizuneh
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/userpermissions/meaza
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit


http://192.168.1.3/account/userpermissions/animaw
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/userpermissions/birhanu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/userpermissions/abeje
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/userpermissions/admin
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/userpermissions/abeyus
No vulnerabilities have been identified for this URL
No input(s) found for this URL

94

http://192.168.1.3/account/userpermissions/abrham
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/userpermissions/abiyu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/userpermissions/alemnew
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/userpermissions/zelalem
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/userpermissions/endalamaw
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/userpermissions/enanu
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/account/register
Vulnerabilities have been identified for this URL
7 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
ConfirmPassword
Email
FirstName
LastName

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

Acunetix Website Audit


Password
UserName
http://192.168.1.3/content/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/images/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/css/
No vulnerabilities have been identified for this URL
No input(s) found for this URL

95
URL encoded POST
URL encoded POST

http://192.168.1.3/content/ace/css/ace.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/css/ace-rtl.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/css/bootstrap.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/css/images/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/fonts/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/fonts/fonts.googleapis.com.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/font-awesome/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/font-awesome/4.2.0/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/font-awesome/4.2.0/css/
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit


http://192.168.1.3/content/ace/font-awesome/4.2.0/css/font-awesome.min.css
Vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/font-awesome/4.2.0/fonts/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/js/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/js/jquery.2.1.1.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/js/ace-extra.min.js

96

No vulnerabilities have been identified for this URL


No input(s) found for this URL
http://192.168.1.3/content/ace/js/bootstrap.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/js/jquery-ui.custom.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/js/jquery.ui.touch-punch.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/js/jquery.easypiechart.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/js/jquery.sparkline.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/js/jquery.flot.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/js/jquery.flot.pie.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/js/jquery.flot.resize.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/ace/js/ace-elements.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/content/ace/js/ace.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/exceedstyle.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/jqury-ui/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/jqury-ui/jquery-ui.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL

97

http://192.168.1.3/content/jqury-ui/jquery-ui.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/jqury-ui/images
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/jstree/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/jstree/themes/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/jstree/themes/default/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/jstree/themes/default/style.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/jstree/jstree.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/2016.1.112/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/2016.1.112/kendo.dataviz.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/content/kendo/2016.1.112/kendo.bootstrap.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/2016.1.112/kendo.mobile.all.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/2016.1.112/kendo.common-bootstrap.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/2016.1.112/kendo.dataviz.bootstrap.min.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL

98

http://192.168.1.3/content/kendo/2016.1.112/bootstrap/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/2016.1.112/%23clip
Vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/2016.1.112/images/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/2016.1.112/textures/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/2016.1.112/fonts/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/2016.1.112/fonts/dejavu/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/content/kendo/2016.1.112/fonts/glyphs/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/home
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/home/setculture
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
culture
Acunetix Website Audit
http://192.168.1.3/home/index
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/cosigns
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/allowances
No vulnerabilities have been identified for this URL

Input type
URL encoded POST
99

No input(s) found for this URL


http://192.168.1.3/hr/ranks
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/steps
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/discipline
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/leavetypes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/attendance
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/orgcharts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/assignment
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/orglocations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/teamjobtitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/sexes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/hr/regions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/nations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/religions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/fiscalyears

100

No vulnerabilities have been identified for this URL


No input(s) found for this URL
http://192.168.1.3/hr/persontitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/nationalities
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/mothertongues
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/maritalstatus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/trainingcourses
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empleaveperiods
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/incomingletters
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/healthincidents
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/orginformations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscbehaviors
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/hr/publicdocuments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/salarystructures
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/employmentstatus
No vulnerabilities have been identified for this URL
No input(s) found for this URL

101

http://192.168.1.3/hr/recruitmentplans
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/educationalfields
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/trainingproviders
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/educationallevels
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/outgoingletters
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/upload
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
File

Input type
POST (multipart)

http://192.168.1.3/hr/upload/download
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/employeeprofiles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/sectionjobtitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/divisionjobtitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/hr/terminationletters
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/orgglobaljobtitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/terminationreasons
No vulnerabilities have been identified for this URL
No input(s) found for this URL

102

http://192.168.1.3/hr/retirementlauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/reports
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/reports/detailreports
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/reports/summaryreports
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/supportingdocuments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/transportallowances
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/departmentjobtitles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/trainingapplications
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscappraisalperiods
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscappraisalperiods/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscappraisalperiods/edit/5
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Acunetix Website Audit
Input scheme 1
Input name
__RequestVerificationToken
AppraisalPeriod
CreatedBy
CreatedOn
DayFrom
DayTo
EmpBSCAppraisalPeriodID
IsClosed

103

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

MonthFrom
MonthTo
YearFrom
YearTo

URL encoded POST


URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/empbscappraisalperiods/edit/4
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AppraisalPeriod
CreatedBy
CreatedOn
DayFrom
DayTo
EmpBSCAppraisalPeriodID
IsClosed
MonthFrom
MonthTo
YearFrom
YearTo

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/empbscappraisalperiods/edit/6
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AppraisalPeriod
CreatedBy
CreatedOn
DayFrom
DayTo
EmpBSCAppraisalPeriodID
IsClosed
MonthFrom
MonthTo
YearFrom
YearTo

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

Acunetix Website Audit

104

http://192.168.1.3/hr/empbscappraisalperiods/edit/2
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AppraisalPeriod

Input type
URL encoded POST
URL encoded POST

CreatedBy
CreatedOn
DayFrom
DayTo
EmpBSCAppraisalPeriodID
IsClosed
MonthFrom
MonthTo
YearFrom
YearTo

URL encoded POST


URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/empbscappraisalperiods/edit/1
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AppraisalPeriod
CreatedBy
CreatedOn
DayFrom
DayTo
EmpBSCAppraisalPeriodID
IsClosed
MonthFrom
MonthTo
YearFrom
YearTo

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/empbscappraisalperiods/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscappraisalperiods/delete/2
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/hr/empbscappraisalperiods/delete/6
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Acunetix Website Audit

105

Inputs
Input scheme 1
Input name
__RequestVerificationToken
http://192.168.1.3/hr/empbscappraisalperiods/delete/5
No vulnerabilities have been identified for this URL
1 input(s) found for this URL

Input type
URL encoded POST

Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/hr/empbscappraisalperiods/delete/4
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/hr/empbscappraisalperiods/delete/1
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/hr/empbscappraisalperiods/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscappraisalperiods/details/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscappraisalperiods/details/5
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscappraisalperiods/details/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscappraisalperiods/details/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscappraisalperiods/details/1
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

106

http://192.168.1.3/hr/empbscappraisalperiods/create
Vulnerabilities have been identified for this URL
9 input(s) found for this URL
Inputs
Input scheme 1
Input name

Input type

__RequestVerificationToken
AppraisalPeriod
DayFrom
DayTo
IsClosed
MonthFrom
MonthTo
YearFrom
YearTo

URL encoded POST


URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/retirementnotification
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empleavetakenslauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/trainingneedassesments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscperformanceplans
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/trainingreportbycourse
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/addallowancetoemployees
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/earlyretirementlauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasureranks
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasureranks/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasureranks/edit/3
Vulnerabilities have been identified for this URL
5 input(s) found for this URL
Acunetix Website Audit

107

Inputs
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy

Input type
URL encoded POST
URL encoded POST

CreatedOn
DisciplinayMeasureRank
DisciplinayMeasureRanksID

URL encoded POST


URL encoded POST
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasureranks/edit/2
Vulnerabilities have been identified for this URL
5 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRank
DisciplinayMeasureRanksID

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasureranks/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasureranks/delete/3
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasureranks/delete/2
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasureranks/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasureranks/details/3
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasureranks/details/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit


http://192.168.1.3/hr/trainingcoursetrackings
No vulnerabilities have been identified for this URL
No input(s) found for this URL

108

http://192.168.1.3/hr/emppayrollnodaysworkeds
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/employeerequisitionforms
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/trainingreportbyemployee
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/outsourcecompanyprofiles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/terminationotherslauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empannualleaveusagereport
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/outsourcecompanyworkeddays
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/applicantprobationslauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empbscperformanceevaluations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/contractemployeerequisitions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplineemployeerecognition
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empannualleavepaidincashes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/annualleaveentitlementupdate
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/hr/empdisciplinayrecognitiontypes
No vulnerabilities have been identified for this URL
No input(s) found for this URL

109

http://192.168.1.3/hr/empannualleaveusagesingereport
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empannualleavetransferonebyones
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empterminationclearancelauncher
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/outsourcecompanyworkeddaysreport
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/recruitmentresultreportbyvacancy
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/certificatesandletters
Vulnerabilities have been identified for this URL
3 input(s) found for this URL
Inputs
Input scheme 1
Input name
choice
EmpFullName
EmpID

Input type
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/certificatesandletters/experience
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/certificatesandletters/certificate
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/promotionandtransferapplicantlists
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/empannualleaveentitlementviewmodels
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasuretypes
Vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit


http://192.168.1.3/hr/disciplinaymeasuretypes/edit
No vulnerabilities have been identified for this URL

110

No input(s) found for this URL


http://192.168.1.3/hr/disciplinaymeasuretypes/edit/9
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Measure
PercentageEffectOnPromotion

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasuretypes/edit/8
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Measure
PercentageEffectOnPromotion

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasuretypes/edit/11
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Measure
PercentageEffectOnPromotion

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasuretypes/edit/12
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Inputs
Acunetix Website Audit
Input scheme 1

111

Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Measure
PercentageEffectOnPromotion

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasuretypes/edit/10
Vulnerabilities have been identified for this URL
8 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
CreatedBy
CreatedOn
DisciplinayMeasureRanksID
DisciplinayMeasureTypesID
ExpireYear
Measure
PercentageEffectOnPromotion

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasuretypes/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasuretypes/delete/9
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasuretypes/delete/8
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasuretypes/delete/10
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
Acunetix Website Audit

Input type
URL encoded POST
112

http://192.168.1.3/hr/disciplinaymeasuretypes/delete/11
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasuretypes/delete/12
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/hr/disciplinaymeasuretypes/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasuretypes/details/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasuretypes/details/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasuretypes/details/12
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasuretypes/details/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/hr/disciplinaymeasuretypes/details/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/roles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/groups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

113

http://192.168.1.3/inventory/uoms
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/items
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/stores
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/issues
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/goodreceives
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/storereturns
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/itemcategories
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/itemtransfers
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/purchasereturns
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/stockadjustments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/storerequisitions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/purchaserequisitions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/storeitemassignments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/departmentcostcenters
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

114

http://192.168.1.3/inventory/reportinventory
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/inventory/reportinventory/issueitem
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/inventory/reportinventory/transferitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/inventory/reportinventory/stockbalance
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
category

Input type
URL encoded POST

http://192.168.1.3/inventory/reportinventory/goodsreceive
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/inventory/reportinventory/adjustmentitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2
http://192.168.1.3/inventory/reportinventory/storereturnitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs

Input type
URL encoded POST
URL encoded POST

Acunetix Website Audit


Input scheme 1
Input name
dt1
dt2

115

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/inventory/reportinventory/purchasereturnitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/inventory/reportinventory/storerequisitionitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/inventory/reportinventory/issueitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/reportinventory/issueitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/reportinventory/transferitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2
http://192.168.1.3/inventory/reportinventory/transferitemexcel
No vulnerabilities have been identified for this URL

Input type
URL encoded GET
URL encoded GET

2 input(s) found for this URL


Acunetix Website Audit

116

Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/reportinventory/stockbalanceprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
category

Input type
URL encoded GET

http://192.168.1.3/inventory/reportinventory/stockbalanceexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
category

Input type
URL encoded GET

http://192.168.1.3/inventory/reportinventory/goodsreceiveprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/reportinventory/goodsreceiveexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/reportinventory/storereturnitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2
http://192.168.1.3/inventory/reportinventory/storereturnitemprint
No vulnerabilities have been identified for this URL

Input type
URL encoded GET
URL encoded GET

2 input(s) found for this URL


Inputs
Acunetix Website Audit
Input scheme 1
Input name
dt1
dt2

117

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/reportinventory/adjustmentitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/reportinventory/adjustmentitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/reportinventory/purchasereturnitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/reportinventory/purchasereturnitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/reportinventory/storerequisitionitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/reportinventory/storerequisitionitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Acunetix Website Audit

118

Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/inventory/storekeeperassignments
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/globaluseraccesslogs
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/orgbranchusermappings
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/glledgerposting
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/glrecordjournals
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/arinvoices
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/edit/14
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl

Input type
URL encoded POST
URL encoded POST
URL encoded POST

AccountDesc
AccountName
AccountNumber
AccountUse

URL encoded POST


URL encoded POST
URL encoded POST
URL encoded POST

Acunetix Website Audit


BankAccountID
BankAdress
BankBranch
BankName
Status

119
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/bankaccounts/edit/16
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/bankaccounts/edit/17
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status
http://192.168.1.3/finance/bankaccounts/edit/15
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl

Input type
URL encoded POST
URL encoded POST
URL encoded POST

Acunetix Website Audit


AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status

120
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/bankaccounts/edit/7
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/bankaccounts/edit/9
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/bankaccounts/edit/8
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs

Acunetix Website Audit


Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status

121

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/bankaccounts/edit/6
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/bankaccounts/edit/10
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status

URL encoded POST


URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

Acunetix Website Audit

122

http://192.168.1.3/finance/bankaccounts/edit/13
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/bankaccounts/edit/12
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID
BankAdress
BankBranch
BankName
Status

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/bankaccounts/edit/11
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name

Input type

__RequestVerificationToken
AccountCode
AccountControl
AccountDesc
AccountName
AccountNumber
AccountUse
BankAccountID

URL encoded POST


URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

Acunetix Website Audit


BankAdress
BankBranch
BankName
Status

123
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/bankaccounts/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/delete/6
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/finance/bankaccounts/delete/13
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/finance/bankaccounts/delete/9
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/finance/bankaccounts/delete/7
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken
http://192.168.1.3/finance/bankaccounts/delete/11
No vulnerabilities have been identified for this URL
1 input(s) found for this URL

Input type
URL encoded POST

Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/finance/bankaccounts/delete/8
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Acunetix Website Audit
Input scheme 1
Input name
__RequestVerificationToken

124

Input type
URL encoded POST

http://192.168.1.3/finance/bankaccounts/delete/16
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/finance/bankaccounts/delete/17
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/finance/bankaccounts/delete/14
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/finance/bankaccounts/delete/12
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Input type
URL encoded POST

http://192.168.1.3/finance/bankaccounts/delete/15
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name

Input type

__RequestVerificationToken

URL encoded POST

http://192.168.1.3/finance/bankaccounts/delete/10
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
__RequestVerificationToken

Acunetix Website Audit


http://192.168.1.3/finance/bankaccounts/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/details/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/details/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/details/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/details/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/details/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/details/16
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/details/17
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/details/15
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/details/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/details/12
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Input type
URL encoded POST

125

http://192.168.1.3/finance/bankaccounts/details/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/bankaccounts/details/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/budgetusages
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit

126

http://192.168.1.3/finance/apsetupitems
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/budgetdefines
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/budgetmonthlies
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/arcustomertypes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/arremitaddresses
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/appaybleinvoices
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/approcurementsuppliers
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/budgetallocationandusage
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
BudgetMonth
BudgetYear

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/budgetallocationandusage/budgetallocationandusageexcel
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs

Input scheme 1
Input name
BudgetMonth
BudgetYear

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/finance/budgetallocationandusage/budgetallocationandusageprint
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
BudgetMonth
BudgetYear

Input type
URL encoded GET
URL encoded GET

Acunetix Website Audit

127

http://192.168.1.3/finance/reconciliationschedules
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/reconcilationbankaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/budgetagainstpreviousyear
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
period

Input type
URL encoded POST

http://192.168.1.3/finance/budgetagainstpreviousyear/budgetyearlyprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
period

Input type
URL encoded GET

http://192.168.1.3/finance/budgetagainstpreviousyear/budgetyearlyexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
period
http://192.168.1.3/finance/reconcilationbookaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/arsetupreceiptbalanceaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Input type
URL encoded GET

http://192.168.1.3/finance/arsetupproductserviceaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/arcustomerprofiles
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/gljournalcategoriers
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

128

http://192.168.1.3/finance/accountstransactions
Vulnerabilities have been identified for this URL
12 input(s) found for this URL
Inputs
Input scheme 1
Input name
CategoryNames
EffectiveDates
JournalReferences
Period
Source

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

Input scheme 2
Input name
page

Input type
URL encoded GET

Input scheme 3
Input name
page
CategoryNames
EffectiveDates
JournalReferences
Period
Source

Input type
URL encoded GET
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/accountstransactions/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1684
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1683
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1685
No vulnerabilities have been identified for this URL
No input(s) found for this URL

http://192.168.1.3/finance/accountstransactions/details/1690
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1689
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1680
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit


http://192.168.1.3/finance/accountstransactions/details/1681
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1679
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1677
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1678
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1621
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1620
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1623
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1625
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1624
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1616
No vulnerabilities have been identified for this URL
No input(s) found for this URL

129

http://192.168.1.3/finance/accountstransactions/details/1617
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1615
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1619
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1618
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/finance/accountstransactions/details/1101
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1102
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1103
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1098
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1099
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1100
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1673
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1672
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1674
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1676
No vulnerabilities have been identified for this URL
No input(s) found for this URL

130

http://192.168.1.3/finance/accountstransactions/details/1675
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1669
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1670
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1668
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/finance/accountstransactions/details/1671
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1667
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1663
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1662
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1664
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1666
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1665
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1659
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1660
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1658
No vulnerabilities have been identified for this URL

131

No input(s) found for this URL


http://192.168.1.3/finance/accountstransactions/details/1661
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1657
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1611
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1610
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/finance/accountstransactions/details/1612
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1614
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1613
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1606
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1607
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1605
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1609
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1608
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1590
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1589

132

No vulnerabilities have been identified for this URL


No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1591
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1593
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1592
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1585
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/finance/accountstransactions/details/1586
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1584
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1588
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1587
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1653
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1652
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1654
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1656
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1655
No vulnerabilities have been identified for this URL
No input(s) found for this URL

133

http://192.168.1.3/finance/accountstransactions/details/1649
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1650
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1648
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1651
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1647
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/finance/accountstransactions/details/1601
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1600
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1602
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1604
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1603
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1595
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1596
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1594
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1598
No vulnerabilities have been identified for this URL
No input(s) found for this URL

134

http://192.168.1.3/finance/accountstransactions/details/1597
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1643
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1642
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1644
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1646
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/finance/accountstransactions/details/1645
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1639
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1640
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1638
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1641
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1637
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1633
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1632
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1634
No vulnerabilities have been identified for this URL

135

No input(s) found for this URL


http://192.168.1.3/finance/accountstransactions/details/1636
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1635
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1629
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1630
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1627
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/finance/accountstransactions/details/1631
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/1626
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/53105-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/53101-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/53104-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/53103-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/63172-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/63171-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/63177-1-00-000000

136

No vulnerabilities have been identified for this URL


No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/63174-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11350-1-00-ta0003
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/18000-1-00-ba0003
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11399-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11110-1-00-ch0055
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/finance/accountstransactions/details/11110%20-1-00-ch0055
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/69050%20-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11110%20%c2%a0-1-00-ch0055
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11130-1-00-rf0020
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11140-1-00-cb0021
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11140-1-00-cb0001
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/51602-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/21370-1-00-tl0002
No vulnerabilities have been identified for this URL
No input(s) found for this URL

137

http://192.168.1.3/finance/accountstransactions/details/12312-1-00-ba0003
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11140-1-00-cb0001%20%c2%a0
Vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/63120-1-fs-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11120-1-00-pc0006
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/12304-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/51290-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/finance/accountstransactions/details/51199-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/51206-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/12100-1-00-in0004
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/30030-1-00-3060gn
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11110-1-00-ch0045
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/62101-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11320-1-00-y00125
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/18000-1-00-ba0004
No vulnerabilities have been identified for this URL
No input(s) found for this URL

138

http://192.168.1.3/finance/accountstransactions/details/11499-1-00-pi0000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/21370-1-00-tl0003
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11350-1-00-ta0001
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/21370-1-00-tl0008
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/11330-1-00-s00984
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/accountstransactions/details/63106-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/finance/accountstransactions/details/62102-1-00-000000
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/arstandardcollections
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/glchartofaccountaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/glchartofaccountlocations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/armiscelaneouscollections
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/glchartofaccountsubaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/glchartofaccountcostcenters
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/budgetagainstpreviousyearmonthly
No vulnerabilities have been identified for this URL

139

1 input(s) found for this URL


Inputs
Input scheme 1
Input name
period

Input type
URL encoded POST

http://192.168.1.3/finance/budgetagainstpreviousyearmonthly/budgetmonthlyexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
period

Input type
URL encoded GET

http://192.168.1.3/finance/budgetagainstpreviousyearmonthly/budgetmonthlyprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
period

Acunetix Website Audit


http://192.168.1.3/finance/gltaxrates
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/paymentterms
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/glfiscalyears
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/glcountrytypes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/paymentmethods
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/glvatwithholdings
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/finsetupcurrencies
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/reportfinance

Input type
URL encoded GET

140

No vulnerabilities have been identified for this URL


No input(s) found for this URL
http://192.168.1.3/finance/reportfinance/cashflow
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
branchCode
dt2

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/reportfinance/balancesheet
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
branchCode
dt2

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/reportfinance/supplierlist
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Acunetix Website Audit
Input scheme 1
Input name
businessType
supplierType

141

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/reportfinance/customerlist
Vulnerabilities have been identified for this URL
9 input(s) found for this URL
Inputs
Input scheme 1
Input name
custype

Input type
URL encoded POST

Input scheme 2
Input name
page

Input type
URL encoded GET

Input scheme 3
Input name
custype
page

Input type
URL encoded GET
URL encoded GET

Input scheme 4
Input name
page
custype

Input type
URL encoded GET
URL encoded POST

Input scheme 5
Input name

Input type

custype
page
custype

URL encoded GET


URL encoded GET
URL encoded POST

http://192.168.1.3/finance/reportfinance/trialbalance
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
Branch
dt1

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/reportfinance/chartofaccount
Vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
Account
AccountType

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/reportfinance/accountanalysis
Vulnerabilities have been identified for this URL
3 input(s) found for this URL
Inputs
Acunetix Website Audit
Input scheme 1
Input name
Category
dt1
dt2

142

Input type
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/reportfinance/incomestatement
Vulnerabilities have been identified for this URL
3 input(s) found for this URL
Inputs
Input scheme 1
Input name
branchCode
dt1
dt2

Input type
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/reportfinance/aragingbyinvoice
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
agetype
http://192.168.1.3/finance/reportfinance/aragingbycustomer
No vulnerabilities have been identified for this URL

Input type
URL encoded POST

1 input(s) found for this URL


Inputs
Input scheme 1
Input name
agetype

Input type
URL encoded POST

http://192.168.1.3/finance/reportfinance/accountanalysisbysegment
Vulnerabilities have been identified for this URL
4 input(s) found for this URL
Inputs
Input scheme 1
Input name
acctFrom
acctTo
dt1
dt2

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/reportfinance/incomestatementbyproject
Vulnerabilities have been identified for this URL
3 input(s) found for this URL
Inputs
Input scheme 1
Input name
costcenterCode
dt1
dt2

Input type
URL encoded POST
URL encoded POST
URL encoded POST

Acunetix Website Audit

143

http://192.168.1.3/finance/reportfinance/chartofaccountexcel
No vulnerabilities have been identified for this URL
3 input(s) found for this URL
Inputs
Input scheme 1
Input name
AccountType

Input type
URL encoded GET

Input scheme 2
Input name
Account
AccountType

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/finance/reportfinance/accountanalysisexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/reportfinance/trialbalanceexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
CostCenter
dt1

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/finance/reportfinance/trialbalanceprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
CostCenter
dt1

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/finance/reportfinance/incomestatementprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt2

Input type
URL encoded GET

http://192.168.1.3/finance/reportfinance/customerlistexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
custype

Input type
URL encoded GET

Acunetix Website Audit

144

http://192.168.1.3/finance/reportfinance/customerlistprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
custype

Input type
URL encoded GET

http://192.168.1.3/finance/reportfinance/supplierlistexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
businessType
supplierType

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/finance/reportfinance/supplierlistprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name

Input type

businessType
supplierType

URL encoded GET


URL encoded GET

http://192.168.1.3/finance/reportfinance/aragingbyinvoiceprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
agetype

Input type
URL encoded GET

http://192.168.1.3/finance/reportfinance/aragingbyinvoiceexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
agetype

Input type
URL encoded GET

http://192.168.1.3/finance/reportfinance/aragingbycustomerprint
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
agetype

Input type
URL encoded GET

Acunetix Website Audit

145

http://192.168.1.3/finance/reportfinance/aragingbycustomerexcel
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
agetype

Input type
URL encoded GET

http://192.168.1.3/finance/reportfinance/accountanalysisbysegmentexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/reportfinance/incomestatementbyprojectprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
costcenterCode
dt2
http://192.168.1.3/finance/reportfinance/incomestatementbyprojectexcel
No vulnerabilities have been identified for this URL

Input type
URL encoded GET
URL encoded GET

2 input(s) found for this URL


Inputs
Input scheme 1
Input name
costcenterCode
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/finance/finsetupcurrencyexchanges
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/finsetupcashflowconfigurations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/json
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/finance/json/fromaccountcode
Vulnerabilities have been identified for this URL
4 input(s) found for this URL
Inputs
Input scheme 1
Input name
Accounts
CostCenter
Location
SubAccount

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

Acunetix Website Audit

146

http://192.168.1.3/finance/json/toaccountcode
No vulnerabilities have been identified for this URL
4 input(s) found for this URL
Inputs
Input scheme 1
Input name
Accounts
CostCenter
Location
SubAccount

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/finance/json/description
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
id
http://192.168.1.3/finance/json/bankaccounts
No vulnerabilities have been identified for this URL
4 input(s) found for this URL

Input type
URL encoded POST

Inputs
Input scheme 1
Input name
Accounts
CostCenter
Location
SubAccount

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/userprofile
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/userprofile/mybranches
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/pensions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollbonus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollprocess
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/payroll/emppayrollloans
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/empcontributions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/emppayrolladavances
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/emppayrolladditions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/empfixedcontributions
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/emppayrolllabourunions
No vulnerabilities have been identified for this URL
No input(s) found for this URL

147

http://192.168.1.3/payroll/emppayrollovertimetwoes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/emppayrollcalculatebonus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/emppayrollcreditassociations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollpayslip
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/overtimehours
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/bonusbanksliplist
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/payrollbanksliplist
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit

148

http://192.168.1.3/payroll/payrollreports/detailreport
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/summaryreport
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/monthlypensionreport
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
period
http://192.168.1.3/payroll/payrollreports/bonusincometaxreport
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs

Input type
URL encoded POST

Input scheme 1
Input name
fyear

Input type
URL encoded POST

http://192.168.1.3/payroll/payrollreports/payrollbasicsalarylist
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
page

Input type
URL encoded GET

http://192.168.1.3/payroll/payrollreports/monthlyincometaxreport
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
period

Input type
URL encoded POST

http://192.168.1.3/payroll/payrollreports/reportbycontributiontypelist
Vulnerabilities have been identified for this URL
3 input(s) found for this URL
Inputs
Input scheme 1
Input name
period
source
type

Input type
URL encoded POST
URL encoded POST
URL encoded POST

Acunetix Website Audit

149

http://192.168.1.3/payroll/payrollreports/monthlylabourandcreditreport
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
period
http://192.168.1.3/payroll/payrollreports/bonusincometaxreportprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/bonusincometaxreportexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/monthlypensionreportprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Input type
URL encoded POST

http://192.168.1.3/payroll/payrollreports/monthlypensionreportexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/monthlyincometaxreportprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/monthlyincometaxreportexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/payrollbasicsalarylistexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/payrollbasicsalarylistprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/monthlylabourandcreditreportprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/monthlylabourandcreditreportexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/reportbycontributiontypelistprint
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollreports/reportbycontributiontypelistexcel
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/payroll/payrollperiods
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/overtimetypetwoes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollpaymentbanks
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollemployeeaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/payroll/payrollcontributiontypes
No vulnerabilities have been identified for this URL
No input(s) found for this URL

150

http://192.168.1.3/payroll/payrollemployeebankaccounts
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/globalbranchsetups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fixedasset
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fixedasset/fixedassetgroups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fixedasset/fixedassetdepreciationsetups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fixedasset/fixedassetclearingaccountsetups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fixedasset/usercards
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fixedasset/fixedassetcategories
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fixedasset/fixedassetsubcategories
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/fixedasset/fixedassetregistrations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/etp/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/etp/jquery.calendars.picker.css
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/etp/jquery.plugin.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL

151

http://192.168.1.3/scripts/etp/jquery.calendars.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/etp/jquery.calendars.plus.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/etp/jquery.calendars.picker.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/etp/jquery.calendars.ethiopian.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/etp/jquery.calendars.ethiopian-am.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/kendo/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/kendo/2016.1.112/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/kendo/2016.1.112/jquery.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/kendo/2016.1.112/jszip.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/scripts/kendo/2016.1.112/kendo.all.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/kendo/2016.1.112/kendo.aspnetmvc.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/kendo.modernizr.custom.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/jquery.unobtrusive-ajax.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/jquery.validate.min.js
No vulnerabilities have been identified for this URL

152

No input(s) found for this URL


http://192.168.1.3/scripts/jquery.validate.unobtrusive.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/js.cookie.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/matrixscript.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/matrixscript1.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/matrixcommon.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/selector.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/scripts/jquery-1.10.2.min.js
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/tenders
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/procurement/purchaseorders
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/itempriceindexes
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementplans
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/purchasefollowups
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/proformapurchases

153

No vulnerabilities have been identified for this URL


No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliers
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementlcmanagements
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementbankguarantees
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcpomanagements
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
page

Input type
URL encoded GET

http://192.168.1.3/procurement/reportprocurement/tenderreport
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
SearchString

Input type
URL encoded POST

Acunetix Website Audit

154

http://192.168.1.3/procurement/reportprocurement/purchaseorderitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2
http://192.168.1.3/procurement/reportprocurement/purchaserequisitionitem
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1

Input type
URL encoded POST
URL encoded POST

Input name
dt1
dt2

Input type
URL encoded POST
URL encoded POST

http://192.168.1.3/procurement/reportprocurement/tenderdetails
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/tenderdetails/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/tenderdetails/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/tenderdetails/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/tenderdetails/12
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/tenderdetails/15
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/tenderdetails/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/tenderdetails/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/tenderdetails/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

155

http://192.168.1.3/procurement/reportprocurement/tenderdetails/17
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/tenderdetails/16
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/purchaseorderitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name

Input type

dt1
dt2

URL encoded GET


URL encoded GET

http://192.168.1.3/procurement/reportprocurement/purchaseorderitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/procurement/reportprocurement/purchaserequisitionitemexcel
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/procurement/reportprocurement/purchaserequisitionitemprint
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
dt1
dt2

Input type
URL encoded GET
URL encoded GET

http://192.168.1.3/procurement/reportprocurement/getlotdetails
Vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit


http://192.168.1.3/procurement/reportprocurement/getlotdetails/12
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/15
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/9
No vulnerabilities have been identified for this URL

156

No input(s) found for this URL


http://192.168.1.3/procurement/reportprocurement/getlotdetails/16
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/22
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/24
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/23
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/18
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/19
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/20
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/procurement/reportprocurement/getlotdetails/21
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/reportprocurement/getlotdetails/17
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs

157

Input scheme 1
Input name
SearchString

Input type
URL encoded POST

http://192.168.1.3/procurement/procurementcontractmanagements/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/edit/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/edit/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/edit/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/edit/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/edit/1
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/delete/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/delete/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/delete/1
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/procurement/procurementcontractmanagements/delete/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/delete/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL

158

http://192.168.1.3/procurement/procurementcontractmanagements/details/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/details/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/details/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/details/1
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementcontractmanagements/details/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories
No vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
SearchString

Input type
URL encoded POST

http://192.168.1.3/procurement/procurementsuppliercategories/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/edit/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/edit/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/edit/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/procurement/procurementsuppliercategories/edit/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/edit/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/edit/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL

159

http://192.168.1.3/procurement/procurementsuppliercategories/edit/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/edit/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/delete/7
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/delete/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/delete/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/delete/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/delete/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/delete/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/delete/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/delete/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/procurement/procurementsuppliercategories/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/details/4
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/details/7
No vulnerabilities have been identified for this URL

160

No input(s) found for this URL


http://192.168.1.3/procurement/procurementsuppliercategories/details/10
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/details/2
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/details/6
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/details/8
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/details/9
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementsuppliercategories/details/11
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments
No vulnerabilities have been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
SearchString

Input type
URL encoded POST

Input scheme 2
Input name
page

Input type
URL encoded GET

http://192.168.1.3/procurement/procurementannualneedassesments/edit
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/edit/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/procurement/procurementannualneedassesments/edit/24
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/edit/23
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/edit/17

161

No vulnerabilities have been identified for this URL


No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/edit/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/edit/25
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/edit/26
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/delete
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/delete/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/delete/23
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/delete/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/delete/25
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/delete/26
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/delete/24
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/delete/17
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit
http://192.168.1.3/procurement/procurementannualneedassesments/details
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/details/13
No vulnerabilities have been identified for this URL
No input(s) found for this URL

162

http://192.168.1.3/procurement/procurementannualneedassesments/details/14
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/details/25
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/details/23
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/details/24
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/details/26
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/details/17
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/details/18
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/details/20
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/procurement/procurementannualneedassesments/details/19
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/globalorginformations
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fleetmanagement
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fleetmanagement/fleetsetuprepairtype
No vulnerabilities have been identified for this URL
No input(s) found for this URL
Acunetix Website Audit

163

http://192.168.1.3/fleetmanagement/fleetsetuprepairtype/fleetsetuprepairtypes_read
Vulnerabilities have been identified for this URL
6 input(s) found for this URL
Inputs
Input scheme 1
Input name

Input type

grid-mode

URL encoded GET

Input scheme 2
Input name
filter
group
page
pageSize
sort

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/fleetmanagement/fleetsetupequipmenttype
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fleetmanagement/fleetsetupequipmenttype/fleetsetupequipmenttypes_read
Vulnerabilities have been identified for this URL
6 input(s) found for this URL
Inputs
Input scheme 1
Input name
grid-mode

Input type
URL encoded GET

Input scheme 2
Input name
filter
group
page
pageSize
sort

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/fleetmanagement/fleetsetupequipmentname
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fleetmanagement/fleetsetupequipmentname/fleetsetupequipmentnames_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
grid-mode

Input type
URL encoded GET

http://192.168.1.3/fleetmanagement/fleetsetupinsurancetype
No vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit


http://192.168.1.3/fleetmanagement/fleetsetupinsurancetype/fleetsetupinsurancetypes_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1

164

Input name
grid-mode

Input type
URL encoded GET

http://192.168.1.3/fleetmanagement/fleetsetupequipmentstatus
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fleetmanagement/fleetsetupequipmentstatus/fleetsetupequipmentstatus_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
grid-mode

Input type
URL encoded GET

http://192.168.1.3/fleetmanagement/fleetsetupmaintenancecenter
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fleetmanagement/fleetsetupmaintenancecenter/fleetsetupmaintenancecenters_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
grid-mode

Input type
URL encoded GET

http://192.168.1.3/fleetmanagement/fleetsetupoperatorposition
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fleetmanagement/fleetsetupoperatorposition/fleetsetupoperatorpositions_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
grid-mode

Input type
URL encoded GET

http://192.168.1.3/fleetmanagement/fleetsetupequipmentfueltype
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fleetmanagement/fleetsetupequipmentfueltype/fleetsetupequipmentfueltypes_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Acunetix Website Audit
Input scheme 1
Input name
grid-mode
http://192.168.1.3/fleetmanagement/fleetequipmentregistrations
No vulnerabilities have been identified for this URL

165

Input type
URL encoded GET

No input(s) found for this URL


http://192.168.1.3/fleetmanagement/fleetsetupequipmentcategory
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fleetmanagement/fleetsetupequipmentcategory/fleetsetupequipmentcategories_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
grid-mode

Input type
URL encoded GET

http://192.168.1.3/fleetmanagement/fleetsetupequipmentmanufacturer
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fleetmanagement/fleetsetupequipmentmanufacturer/fleetsetupequipmentmanufacturers_read
Vulnerabilities have been identified for this URL
6 input(s) found for this URL
Inputs
Input scheme 1
Input name
grid-mode

Input type
URL encoded GET

Input scheme 2
Input name
filter
group
page
pageSize
sort

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

http://192.168.1.3/fleetmanagement/fleetsetupequipmentfuelstandard
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/fleetmanagement/fleetsetupequipmentfuelstandard/fleetsetupequipmentfuelstandards_read
Vulnerabilities have been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name
grid-mode

Acunetix Website Audit


http://192.168.1.3/projectmanagement
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/projectmanagement/projectestimationnames

Input type
URL encoded GET

166

Vulnerabilities have been identified for this URL


No input(s) found for this URL
http://192.168.1.3/fonts/
No vulnerabilities have been identified for this URL
No input(s) found for this URL
http://192.168.1.3/upload
Vulnerabilities have been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

167

Das könnte Ihnen auch gefallen