Vous êtes sur la page 1sur 65

Acunetix Website Audit

20 June, 2016

Developer Report

Generated by Acunetix WVS Reporter (v9.0 Build 20130904)

Scan of http://ns1.war2.ru:80/
Scan details
Scan information
Start time
Finish time
Scan time
Profile

6/20/2016 6:24:23 PM
The scan was aborted
42 minutes, 46 seconds
Default

Server information
Responsive
Server banner
Server OS
Server technologies

True
Apache/2.2.25 (FreeBSD) PHP/5.2.17 with Suhosin-Patch mod_ssl/2.2.25 OpenSSL/1.0.1e DAV/2
Unix
PHP

Threat level
Acunetix Threat Level 3
One or more high-severity type vulnerabilities have been discovered by the scanner. A
malicious user can exploit these vulnerabilities and compromise the backend database
and/or deface your website.

Alerts distribution
Total alerts found

46

High

Medium

Low

17

Informational

16

Alerts summary
Blind SQL Injection
Affects
/modules/news/
/modules/news/index.php

Variation
s1
1

PHP Hash Collision denial of service vulnerability


Affects
Web Server

Variation
s1

Slow HTTP Denial of Service Attack


Affects
Web Server

Variation
s1

Application error message


Affects
/modules/news/index.php

Acunetix Website Audit

Variation
s6

Backup files
Affects
/serverdat.php_

Variation
s1

User credentials are sent in clear text


Affects
/register.php

Variation
s2

Login page password-guessing attack


Affects
/webmail/src/redirect.php

Variation
s1

Possible sensitive directories


Affects
/cache/system
/class/database
/class/fckeditor
/include
/manager
/modules/news/admin
/modules/news/include
/modules/news/sql
/temp

Variation
s1
1
1
1
1
1
1
1
1

Possible sensitive files


Affects
/admin.php
/manual/INSTALL.txt

Variation
s1
1

Session Cookie without HttpOnly flag set


Affects
/

Variation
s1

Session Cookie without Secure flag set


Affects
/

Variation
s3

TRACE method is enabled


Affects
Web Server

Variation
s1

Broken links
Variation
Affects
/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20XOOPS_U s1
RL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www/www.war2.ru/include/fu
nctions.php%3C/b%3E%20on%20line%20%3Cb%3E69%3C/b%3E%3Cbr%20/%3EXOOPS_URL/include/sty
le.css
/function.include
/function.include-once
/function.readfile

Acunetix Website Audit

1
1
1
3

Email address found


Affects
/modules/news
/modules/news/index.php

Variation
s1
1

GHDB: Default phpinfo page


Affects
/temp/1.php

Variation
s1

GHDB: Mp3 file


Affects
/files
/files/other/ksa2005
/image/other

Variation
s1
1
1

GHDB: phpinfo()
Affects
/temp/1.php

Variation
s1

GHDB: SquirrelMail login page


Affects
/webmail/src/login.php

Variation
s1

Password type input with auto-complete enabled


Affects
/modules/news
/register.php
/webmail/src/login.php

Variation
s1
2
1

Acunetix Website Audit

Alert details
Blind SQL Injection
Severity
High
Type
Validation
Reported by module Scripting (Blind_Sql_Injection.script)
Description
This script is possibly vulnerable to SQL Injection attacks.
SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input.
An SQL injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't
properly filter out dangerous characters.
This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is
relatively easy to protect against, there is a large number of web applications vulnerable.
Impact
An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of your
database and/or expose sensitive information.
Depending on the back-end database in use, SQL injection vulnerabilities lead to varying levels of data/system access
for the attacker. It may be possible to not only manipulate existing queries, but to UNION in arbitrary data, use sub
selects, or append additional queries. In some cases, it may be possible to read in or write out to files, or to execute shell
commands on the underlying operating system.
Certain SQL Servers such as Microsoft SQL Server contain stored and extended procedures (database server
functions). If an attacker can obtain access to these procedures it may be possible to compromise the entire machine.
Recommendation
Your script should filter metacharacters from user input.
Check detailed information for more information about fixing this vulnerability.
References
VIDEO: SQL Injection tutorial
OWASP PHP Top 5
SQL Injection Walkthrough
OWASP Injection Flaws
Acunetix SQL Injection Attack
How to check for SQL injection vulnerabilities
Affected items
/modules/news/
Details
HTTP Header input Client-IP was set to
if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"*/
Tests performed:
- if(now()=sysdate(),sleep(6),0)/*'XOR(if(now()=sysdate(),sleep(6),0))OR'"XOR(if(now()=sysdate(),sleep(6),0))OR"*/ =>
13.39 s
- if(now()=sysdate(),sleep(9),0)/*'XOR(if(now()=sysdate(),sleep(9),0))OR'"XOR(if(now()=sysdate(),sleep(9),0))OR"*/ ...
(line truncated)
Request headers
GET /modules/news/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Client-IP:
if(now()=sysdate(),sleep(0),0)/*'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sys
date(),sleep(0),0))OR"*/
Acunetix Website Audit
5

X-Requested-With: XMLHttpRequest
Referer: http://ns1.war2.ru:80/
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
Accept: */*
/modules/news/index.php
Details
HTTP Header input X-Forwarded-For was set to
(select(0)from(select(sleep(0)))v)/*'+(select(0)from(select(sleep(0)))v)+'"+(select(0)from(select(sleep(0)))v)+"*/
Tests performed:
- (select(0)from(select(sleep(9)))v)/*'+(select(0)from(select(sleep(9)))v)+'"+(select(0)from(select(sleep(9)))v)+"*/ =>
20.015 s
- (select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'"+(select(0)from(select(slee ... (line truncated)
Request headers
GET /modules/news/index.php HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
X-Forwarded-For:
(select(0)from(select(sleep(0)))v)/*'+(select(0)from(select(sleep(0)))v)+'"+(select(0)fr
om(select(sleep(0)))v)+"*/
X-Requested-With: XMLHttpRequest
Referer: http://ns1.war2.ru:80/
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
Accept: */*

Acunetix Website Audit

PHP Hash Collision denial of service vulnerability


Severity
High
Type
Configuration
Reported by module Scripting (PHP_Hash_Collision_Denial_Of_Service.script)
Description
This alert was generated using only banner information. It may be a false positive.
Hash tables are a commonly used data structure in most programming languages. Web application servers or platforms
commonly parse attacker-controlled POST form data into hash tables automatically, so that they can be accessed by
application developers. If the language does not provide a randomized hash function or the application server does not
recognize attacks using multi-collisions, an attacker can degenerate the hash table by sending lots of colliding keys. The
algorithmic complexity of inserting n elements into the table then goes to O(n**2), making it possible to exhaust hours of
CPU time using a single HTTP request.
Affected PHP versions (up to 5.3.8).
Impact
Denial of service
Recommendation
Upgrade PHP to version 5.3.9 or higher.
References
Denial of Service through hash table multi-collisions
PHP 5.3.9 Changelog
#2011-003 multiple implementations denial-of-service via hash algorithm collision
Affected items
Web Server
Details
Current version is : 5.2.17

Acunetix Website Audit

Slow HTTP Denial of Service Attack


Severity
High
Type
Configuration
Reported by module Slow_HTTP_DOS
Description
Your web server is vulnerable to Slow HTTP DoS (Denial of Service) attacks.
Slowloris and Slow HTTP POST DoS attacks rely on the fact that the HTTP protocol, by design, requires requests to be
completely received by the server before they are processed. If an HTTP request is not complete, or if the transfer rate is
very low, the server keeps its resources busy waiting for the rest of the data. If the server keeps too many resources
busy, this creates a denial of service.
Impact
A single machine can take down another machine's web server with minimal bandwidth and side effects on unrelated
services and ports.
Recommendation
Consult Web references for information about protecting your web server against this type of attack.
References
Slowloris HTTP DoS
Slowloris DOS Mitigation Guide
Protect Apache Against Slowloris Attack
Affected items
Web Server
Details
Time difference between connections: 10328 ms

Acunetix Website Audit

Application error message


Severity
Medium
Type
Validation
Reported by module Scripting (MongoDB_Injection.script)
Description
This page contains an error/warning message that may disclose sensitive information.The message can also contain the
location of the file that produced the unhandled exception.
This may be a false positive if the error message is found in documentation pages.
Impact
The error messages may disclose sensitive information. This information can be used to launch further attacks.
Recommendation
Review the source code for this script.
References
PHP Runtime Configuration
Affected items
/modules/news/index.php
Details
URL encoded GET input start was set to 1
Error message found: <b>Warning</b>: preg_match() expects parameter 2 to be string, array given in
<b>/home/war2/data/www/www.war2.ru/include/common.php</b> on line <b>78</b><br />
Request headers
GET /modules/news/index.php?start[$acunetix]=1&storynum=5&storytopic=0 HTTP/1.1
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/modules/news/index.php
Details
URL encoded GET input start was set to 10
Error message found: <b>Warning</b>: preg_match() expects parameter 2 to be string, array given in
<b>/home/war2/data/www/www.war2.ru/include/common.php</b> on line <b>78</b><br />
Request headers
GET /modules/news/index.php?start[]=10&storynum=5&storytopic=0 HTTP/1.1
Referer: http://ns1.war2.ru:80/
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/modules/news/index.php
Details
URL encoded GET input storynum was set to 1
Error message found: <b>Warning</b>: preg_match() expects parameter 2 to be string, array given in
<b>/home/war2/data/www/www.war2.ru/include/common.php</b> on line <b>78</b><br />
Request headers
GET /modules/news/index.php?start=105&storynum[$acunetix]=1&storytopic=0 HTTP/1.1
Host: ns1.war2.ru
Connection: Keep-alive
Acunetix Website Audit

Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/modules/news/index.php
Details
URL encoded GET input storynum was set to 5
Error message found: <b>Warning</b>: preg_match() expects parameter 2 to be string, array given in
<b>/home/war2/data/www/www.war2.ru/include/common.php</b> on line <b>78</b><br />
Request headers
GET /modules/news/index.php?start=105&storynum[]=5&storytopic=0 HTTP/1.1
Referer: http://ns1.war2.ru:80/
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/modules/news/index.php
Details
URL encoded GET input storytopic was set to 1
Error message found: <b>Warning</b>: preg_match() expects parameter 2 to be string, array given in
<b>/home/war2/data/www/www.war2.ru/include/common.php</b> on line <b>78</b><br />
Request headers
GET /modules/news/index.php?start=105&storynum=5&storytopic[$acunetix]=1 HTTP/1.1
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/modules/news/index.php
Details
URL encoded GET input storytopic was set to 0
Error message found: <b>Warning</b>: preg_match() expects parameter 2 to be string, array given in
<b>/home/war2/data/www/www.war2.ru/include/common.php</b> on line <b>78</b><br />
Request headers
GET /modules/news/index.php?start=105&storynum=5&storytopic[]=0 HTTP/1.1
Referer: http://ns1.war2.ru:80/
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

10

Backup files
Severity
Medium
Type
Validation
Reported by module Scripting (Backup_File.script)
Description
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Impact
Backup files can contain script sources, configuration files or other sensitive information that may help an malicious user
to prepare more advanced attacks.
Recommendation
Remove the file(s) if they are not required on your website. As an additional step, it is recommended to implement a
security policy within your organization to disallow creation of backup files in directories accessible from the web.
References
Testing for Old, Backup and Unreferenced Files (OWASP-CM-006)
Security Tips for Server Configuration
Protecting Confidential Documents at Your Site
Affected items

Acunetix Website Audit

11

/serverdat.php_
Details
This file was found using the pattern ${fileName}${fileExt}_.
Original filename: serverdat.php
Source code pattern found:
<?php
function Lecho($arrmsg)
{
global $lang;
if(isset($arrmsg[$lang]))echo $arrmsg[$lang];
elseif(isset($arrmsg["en"]))echo $arrmsg["en"];
}
$url_date = 'http://report.war2.ru/server.dat';
if(isset($_GET["server"]))
{
switch($_GET["server"])
{
case "reportb":$url_date = 'http://reportb.war2.ru/server.dat';break;
}
}
$lang="en";
if(isset($_GET["lang"]))
{
switch($_GET["lang"])
{
case "ru":
$lang="ru"; break;
default:
$lang="en";
}
}
if($lang=="ru")header("Content-type: text/html; charset=windows-1251");
if(!@$fd = file($url_date))
{
Lecho(array("en"=>'Server unavailable<br />',"ru"=>'
Request headers
GET /serverdat.php_ HTTP/1.1
Range: bytes=0-99999
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

12

User credentials are sent in clear text


Severity
Medium
Type
Informational
Reported by module Crawler
Description
User credentials are transmitted over an unencrypted channel. This information should always be transferred via an
encrypted channel (HTTPS) to avoid being intercepted by malicious users.
Impact
A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection.
Recommendation
Because user credentials are considered sensitive information, should always be transferred to the server over an
encrypted connection (HTTPS).
Affected items
/register.php
Details
Form name: userinfo
Form action: http://ns1.war2.ru/register.php
Form method: POST
Form inputs:
- uname [Text]
- email [Text]
- user_viewemail [Checkbox]
- timezone_offset [Select]
- user_avatar [Select]
- pass [Password]
- vpass [Password]
- zonetext [TextArea]
- user_mailok [Radio]
- verify_text [Text]
- verify_crc [Hidden]
- op [Hidden]
- submit [ ... (line truncated)
Request headers
GET /register.php HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

13

/register.php
Details
Form name: userinfo
Form action: http://ns1.war2.ru/register.php
Form method: POST
Form inputs:
- uname [Text]
- email [Text]
- user_viewemail [Checkbox]
- timezone_offset [Select]
- user_avatar [Select]
- pass [Password]
- vpass [Password]
- zonetext [TextArea]
- user_mailok [Radio]
- verify_text [Text]
- verify_crc [Hidden]
- op [Hidden]
- submit [ ... (line truncated)
Request headers
GET /register.php HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

14

Login page password-guessing attack


Severity
Low
Type
Validation
Reported by module Scripting (Html_Authentication_Audit.script)
Description
A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack
is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and
symbols until you discover the one correct combination that works.
This login page doesn't have any protection against password-guessing attacks (brute force attacks). It's recommended
to implement some type of account lockout after a defined number of incorrect password attempts. Consult Web
references for more information about fixing this problem.
Impact
An attacker may attempt to discover a weak password by systematically trying every possible combination of letters,
numbers, and symbols until it discovers the one correct combination that works.
Recommendation
It's recommended to implement some type of account lockout after a defined number of incorrect password attempts.
References
Blocking Brute Force Attacks
Affected items
/webmail/src/redirect.php
Details
The scanner tested 10 invalid credentials and no account lockout was detected.
Request headers
POST /webmail/src/redirect.php HTTP/1.1
Content-Length: 83
Content-Type: application/x-www-form-urlencoded
Referer: http://ns1.war2.ru:80/
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
js_autodetect_results=1&just_logged_in=1&login_username=BpyhY7Jt&secretkey=1n73Y7Kd

Acunetix Website Audit

15

Possible sensitive directories


Severity
Low
Type
Validation
Reported by module Scripting (Possible_Sensitive_Directories.script)
Description
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for
common sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each
one of these directories could help an attacker to learn more about his target.
Impact
This directory may expose sensitive information that could help a malicious user to prepare more advanced attacks.
Recommendation
Restrict access to this directory or remove it from the website.
References
Web Server Security and Database Server Security
Affected items
/cache/system
Details
No details are available.
Request headers
GET /cache/system HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
/class/database
Details
No details are available.
Request headers
GET /class/database HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
/class/fckeditor
Details
No details are available.
Request headers
GET /class/fckeditor HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Acunetix Website Audit

16

/include
Details
No details are available.
Request headers
GET /include HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
/manager
Details
No details are available.
Request headers
GET /manager HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
/modules/news/admin
Details
No details are available.
Request headers
GET /modules/news/admin HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
/modules/news/include
Details
No details are available.
Request headers
GET /modules/news/include HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
/modules/news/sql
Details
No details are available.
Request headers
GET /modules/news/sql HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
Acunetix Website Audit

17

User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)


Chrome/28.0.1500.63 Safari/537.36
/temp
Details
No details are available.
Request headers
GET /temp HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36

Acunetix Website Audit

18

Possible sensitive files


Severity
Low
Type
Validation
Reported by module Scripting (Possible_Sensitive_Files.script)
Description
A possible sensitive file has been found. This file is not directly linked from the website. This check looks for common
sensitive resources like password files, configuration files, log files, include files, statistics data, database dumps. Each
one of these files could help an attacker to learn more about his target.
Impact
This file may expose sensitive information that could help a malicious user to prepare more advanced attacks.
Recommendation
Restrict access to this file or remove it from the website.
References
Web Server Security and Database Server Security
Affected items
/admin.php
Details
No details are available.
Request headers
GET /admin.php HTTP/1.1
Accept: acunetix/wvs
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
/manual/INSTALL.txt
Details
No details are available.
Request headers
GET /manual/INSTALL.txt HTTP/1.1
Accept: acunetix/wvs
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36

Acunetix Website Audit

19

Session Cookie without HttpOnly flag set


Severity
Low
Type
Informational
Reported by module Crawler
Description
This cookie does not have the HTTPOnly flag set. When a cookie is set with the HTTPOnly flag, it instructs the browser
that the cookie can only be accessed by the server and not by client-side scripts. This is an important security protection
for session cookies.
Impact
None
Recommendation
If possible, you should set the HTTPOnly flag for this cookie.
Affected items
/
Details
Cookie name: "PPA_ID"
Cookie domain: "ns1.war2.ru"
Request headers
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

20

Session Cookie without Secure flag set


Severity
Low
Type
Informational
Reported by module Crawler
Description
This cookie does not have the Secure flag set. When a cookie is set with the Secure flag, it instructs the browser that the
cookie can only be accessed over secure SSL channels. This is an important security protection for session cookies.
Impact
None
Recommendation
If possible, you should set the Secure flag for this cookie.
Affected items
/
Details
Cookie name: "SQMSESSID"
Cookie domain: "ns1.war2.ru"
Request headers
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/
Details
Cookie name: "squirrelmail_language"
Cookie domain: "ns1.war2.ru"
Request headers
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

21

/
Details
Cookie name: "PPA_ID"
Cookie domain: "ns1.war2.ru"
Request headers
GET / HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

22

TRACE method is enabled


Severity
Low
Type
Validation
Reported by module Scripting (Track_Trace_Server_Methods.script)
Description
HTTP TRACE method is enabled on this web server. In the presence of other cross-domain vulnerabilities in web
browsers, sensitive header information could be read from any domains that support the HTTP TRACE method.
Impact
Attackers may abuse HTTP TRACE functionality to gain access to information in HTTP headers such as cookies and
authentication data.
Recommendation
Disable TRACE Method on the web server.
References
W3C - RFC 2616
US-CERT VU#867593
Cross-site tracing (XST)
Affected items
Web Server
Details
No details are available.
Request headers
TRACE /0XX1x4a3AM HTTP/1.1
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

23

Broken links
Severity
Informational
Type
Informational
Reported by module Crawler
Description
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error.
This page was linked from the website but it is inaccessible.
Impact
Problems navigating the site.
Recommendation
Remove the links to this file or make it accessible.
Affected items
/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www/www.war2.ru/include/functions.php%
3C/b%3E%20on%20line%20%3Cb%3E69%3C/b%3E%3Cbr%20/%3EXOOPS_URL/include/style.css
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as "Not Found") >
select Referrers Tab from the bottom of the Information pane.
Request headers
GET
/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www/www.war2.ru/include/functions
.php%3C/b%3E%20on%20line%20%3Cb%3E69%3C/b%3E%3Cbr%20/%3EXOOPS_URL/include/style.css
HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/header.php
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/function.include
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as "Not Found") >
select Referrers Tab from the bottom of the Information pane.
Request headers
GET /function.include HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/header.php
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Acunetix Website Audit

24

Accept: */*
/function.include-once
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as "Not Found") >
select Referrers Tab from the bottom of the Information pane.
Request headers
GET /function.include-once HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/header.php
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/function.readfile
Details
For a complete list of URLs linking to this file, go to Site Structure > Locate and select the file (marked as "Not Found") >
select Referrers Tab from the bottom of the Information pane.
Request headers
GET /function.readfile HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/header.php
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

25

Email address found


Severity
Informational
Type
Informational
Reported by module Scripting (Text_Search_Dir.script)
Description
One or more email addresses have been found on this page. The majority of spam comes from email addresses
harvested off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour
the internet looking for email addresses on any website they come across. Spambot programs look for strings like
myname@mydomain.com and then record any addresses found.
Impact
Email addresses posted on Web sites may attract spam.
Recommendation
Check references for details on how to solve this problem.
References
Email Address Disclosed on Website Can be Used for Spam
Affected items
/modules/news
Details
Pattern found: ksa@graalksa.ru
Request headers
GET /modules/news/ HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/modules/news/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/modules/news/index.php
Details
Pattern found: ksa@graalksa.ru
Request headers
GET /modules/news/index.php HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/modules/news/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Acunetix Website Audit

26

Accept: */*

Acunetix Website Audit

27

GHDB: Default phpinfo page


Severity
Informational
Type
Informational
Reported by module GHDB
Description
The description for this alert is contributed by the GHDB community, it may contain inappropriate language.
Category : Files containing passwords
This will look throught default phpinfo pages for ones that have a default mysql password.
The Google Hacking Database (GHDB) appears courtesy of the Google Hacking community.
Impact
Not available. Check description.
Recommendation
Not available. Check description.
References
The Google Hacking Database (GHDB) community
Acunetix Google hacking
Affected items
/temp/1.php
Details
We found intitle:"phpinfo()" +"mysql.default_password" +"Zend Scripting Language Engine"
Request headers
GET /temp/1.php HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/temp/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

28

GHDB: Mp3 file


Severity
Informational
Type
Informational
Reported by module GHDB
Description
The description for this alert is contributed by the GHDB community, it may contain inappropriate language.
Category : Sensitive Directories
Yes! I probably have should have told you guys earlier, but this is how ive been getting 100% of my mp3s. It fricken
rocks, use it and abuse it. Downfalls to it... a)sometimes you shouldnt include mp3 in the query and getting what you
want takes several different methods of searching b)a lot of the time google gives you results and they are not there
thanks to good old friend 404 c)finding stuff takes a lot of practice. Goods... a)ive found whole albums b)ive mass
downloaded directories of hundreds of songs that i have intrest in c)its exciting seeing the results, like fining treasure.
The Google Hacking Database (GHDB) appears courtesy of the Google Hacking community.
Impact
Not available. Check description.
Recommendation
Not available. Check description.
References
Acunetix Google hacking
The Google Hacking Database (GHDB) community
Affected items
/files
Details
We found intitle:"index of" -inurl:htm -inurl:html mp3
Request headers
GET /files/ HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/files/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/files/other/ksa2005
Details
We found intitle:"index of" -inurl:htm -inurl:html mp3
Request headers
GET /files/other/ksa2005/ HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/files/other/ksa2005/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: PPA_ID=2oe42d1pb80rre6l17qnrdml07
Host: ns1.war2.ru
Acunetix Website Audit

29

Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/image/other
Details
We found intitle:"index of" -inurl:htm -inurl:html mp3
Request headers
GET /image/other/ HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/image/other/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

30

GHDB: phpinfo()
Severity
Informational
Type
Informational
Reported by module GHDB
Description
The description for this alert is contributed by the GHDB community, it may contain inappropriate language.
Category : Files containing juicy info
this brings up sites with phpinfo(). There is SO much cool stuff in here that you just have to check one out for yourself! I
mean full blown system versioning, SSL version, sendmail version and path, ftp, LDAP, SQL info, Apache mods, Apache
env vars, *sigh* the list goes on and on! Thanks "joe!" =)
The Google Hacking Database (GHDB) appears courtesy of the Google Hacking community.
Impact
Not available. Check description.
Recommendation
Not available. Check description.
References
The Google Hacking Database (GHDB) community
Acunetix Google hacking
Affected items
/temp/1.php
Details
We found intitle:phpinfo "PHP Version"
Request headers
GET /temp/1.php HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/temp/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

31

GHDB: SquirrelMail login page


Severity
Informational
Type
Informational
Reported by module GHDB
Description
The description for this alert is contributed by the GHDB community, it may contain inappropriate language.
Category : Pages containing login portals
SquirrelMail is a standards-based webmail package written in PHP4. It includes built-in pure PHP support for the IMAP
and SMTP protocols, and all pages render in pure HTML 4.0 (with no JavaScript required) for maximum compatibility
across browsers. It has very few requirements and is very easy to configure and install. SquirrelMail has all the
functionality you would want from an email client, including strong MIME support, address books, and folder
manipulation.
The Google Hacking Database (GHDB) appears courtesy of the Google Hacking community.
Impact
Not available. Check description.
Recommendation
Not available. Check description.
References
The Google Hacking Database (GHDB) community
Acunetix Google hacking
Affected items
/webmail/src/login.php
Details
We found inurl:login.php "SquirrelMail version"
Request headers
GET /webmail/src/login.php HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/webmail/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

32

Password type input with auto-complete enabled


Severity
Informational
Type
Informational
Reported by module Crawler
Description
When a new name and password is entered in a form and the form is submitted, the browser asks if the password
should be saved. Thereafter when the form is displayed, the name and password are filled in automatically or are
completed as the name is entered. An attacker with local access could obtain the cleartext password from the browser
cache.
Impact
Possible sensitive information disclosure
Recommendation
The password auto-complete should be disabled in sensitive applications.
To disable auto-complete, you may use a code similar to:
<INPUT TYPE="password" AUTOCOMPLETE="off">

Affected items
/modules/news
Details
Password type input named pass from unnamed form with action http://www.war2.ru/user.php has autocomplete
enabled.
Request headers
GET /modules/news/ HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/modules/news/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/register.php
Details
Password type input named pass from form named userinfo with action register.php has autocomplete enabled.
Request headers
GET /register.php HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
Acunetix Website Audit

33

/register.php
Details
Password type input named vpass from form named userinfo with action register.php has autocomplete enabled.
Request headers
GET /register.php HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*
/webmail/src/login.php
Details
Password type input named secretkey from form named login_form with action redirect.php has autocomplete enabled.
Request headers
GET /webmail/src/login.php HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: http://ns1.war2.ru/webmail/
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: ns1.war2.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Acunetix Website Audit

34

Scanned items (coverage report)


Scanned 430 URLs. Found 18 vulnerable.
URL: http://ns1.war2.ru/
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/modules/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/modules/news/
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/modules/news/index.php
Vulnerabilities has been identified for this URL
3 input(s) found for this URL
Inputs
Input scheme 1
Input name
start
storynum
storytopic

Input type
URL encoded GET
URL encoded GET
URL encoded GET

URL: http://ns1.war2.ru/modules/news/admin/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/modules/news/sql/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/modules/news/include/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/modules/news/cache/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/modules/news/class/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/modules/news/images/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/modules/banners/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/modules/messages/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/robots.txt
No vulnerabilities has been identified for this URL
No input(s) found for this URL
Acunetix Website Audit

35

URL: http://ns1.war2.ru/cache/
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/cache/system/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/cache/cache/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/admin/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/class/
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/class/database/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/class/database.php
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/class/fckeditor/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/class/class/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/include/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/themes/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/images/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/images/menu/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/images/editor/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/images/icons/
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

36

URL: http://ns1.war2.ru/images/messages/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/images/avatar/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/language/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/language/english/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/_install/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/system/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/manual/
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/manual/INSTALL.txt
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/manual/README.txt
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/manual/manual/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/serverdat.php?lang=ru&server=reportb
Vulnerabilities has been identified for this URL
2 input(s) found for this URL
Inputs
Input scheme 1
Input name
lang
server

Input type
URL encoded GET
URL encoded GET

URL: http://ns1.war2.ru/serverdat.php_
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/admin.php
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/temp/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
Acunetix Website Audit

37

URL: http://ns1.war2.ru/temp/1.php
Vulnerabilities has been identified for this URL
1 input(s) found for this URL
Inputs
Input scheme 1
Input name

Input type
URL encoded GET

URL: http://ns1.war2.ru/temp/pgadmin/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/manager/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/js/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/js/main.js
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/js/ajax.js
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/js/common.js
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/js/jquery.js
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/js/winscript.js
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/register.php
Vulnerabilities has been identified for this URL
13 input(s) found for this URL
Inputs
Input scheme 1
Input name
email
op
pass
submit
timezone_offset
uname
user_avatar
user_mailok
user_viewemail
verify_crc
verify_text
vpass
Acunetix Website Audit

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST
38

zonetext

URL encoded POST

URL: http://ns1.war2.ru/readme.txt
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/header.php
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/footer.php
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/misc.php
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/map/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/map/KSA8PL_Super_Droch.pud
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/map/Garden%20of%20War%20TE.pud
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/other/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/other/ksa2005/
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/other/torney60.swf
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/other/gateways.reg
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/other/Gena_cheb.swf
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/film/
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

39

URL: http://ns1.war2.ru/files/repley/film/requital.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/Grunt/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/Grunt/Sergey=kf_gow.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/Grunt/skyangel=foxzero_gow.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/2jugger/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/2jugger/tabac=gimli_HSC.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/2jugger/gimli=spbwar_HSC.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/desant/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/desant/grim=gimli_hsc.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/desant/tabac=gimli_foc.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/towers/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/towers/towers_fight.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/towers/StudyTowers_Hornet=SkyAngel_gow.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/Submarine/
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

40

URL: http://ns1.war2.ru/files/repley/study/Submarine/incin=foon_foc.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/BloodPower_gowbne.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study/Ogr_4level_gowbne.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/DKbomb.dk2
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/MageBomb.dk2
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/9s_classic.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study_ksa2catapult.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/10years_ksa=leon_gow.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/ldir_kill_gimli.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/10Years_Gimli=KF_gow.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/study_gimli2catapult.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/10Years_KF=Gimli_HSC.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/x[x[_ksa_blizzard.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/10years_alexon=KF_1vs1.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/10Years_Gimli=KF_GoldSep.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

41

URL: http://ns1.war2.ru/files/repley/Ldir=Gimli_1vs1_verygood.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/10years_ksa_ldir=B_B_1vs1.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/repley/10years_Gimli_Artemm=B_B_gow.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/Loss/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/Loss/gr_20051201160329_000484
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/Loss/gr_20051130215638_000446
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/Loss/gr_20051202202645_000093
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/Loss/gr_20051202195448_000088
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/Loss/gr_20051031205741_000053
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/Loss/gr_20051012142756_000006
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/Loss/gr_20051012145025_000011
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/Loss/gr_20051012221807_000073
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

42

URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051130235024_000459
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201151910_000477
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051130232557_000455
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051130234035_000456
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201154454_000482
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201181817_000494
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201183010_000497
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201172039_000487
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201180249_000489
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051124203721_000042
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051124221943_000053
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051117183044_000556
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051124180129_000032
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051129195801_000362
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051130230149_000452
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

43

URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051130231448_000453
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051130214420_000445
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051130221443_000448
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051203192102_000178
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051203192505_000179
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051202234415_000134
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051203191107_000177
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051203210932_000192
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051203214531_000200
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051203215330_000201
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051203212029_000193
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051203213635_000195
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201193817_000511
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201195348_000512
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201184131_000501
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

44

URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201185739_000503
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201200922_000513
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051202200457_000092
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051202205306_000096
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051201203719_000521
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051202000020_000016
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051019182907_000245
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051019183823_000246
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051014202208_000120
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051018175853_000140
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051020171937_000298
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051031195757_000049
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051031201349_000051
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051021143115_000396
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051030124259_001103
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

45

URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051012135417_000003
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051012144112_000009
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051012131711_000001
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051012133223_000002
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051012145840_000013
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051012223225_000075
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051014200718_000114
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051012154122_000017
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051012220908_000070
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051108181043_000240
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051108182259_000241
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051107003606_000111
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051107005801_000117
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051113231418_000327
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051117180541_000551
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

46

URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051117182032_000552
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051113232122_000328
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051117175544_000550
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051102175914_000008
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051102183723_000013
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051031204321_000052
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051101135804_000097
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051102201230_000025
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051106204542_000088
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051107001011_000109
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051103000050_000055
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gimli/gr_20051106203854_000086
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/Loss/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/Loss/gr_20051202225341_000118
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

47

URL: http://ns1.war2.ru/files/10years/reports/Artemm/Loss/gr_20051202235033_000136
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/Loss/gr_20051203000552_000140
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/Loss/gr_20051202210916_000099
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/Loss/gr_20051202222827_000111
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/gr_20051202213417_000102
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/gr_20051202193530_000080
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/gr_20051203231855_000205
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/gr_20051202233500_000132
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/gr_20051030210002_001130
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/gr_20051013230600_000069
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/gr_20051202190751_000074
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Artemm/gr_20051130214853_000443
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/Loss/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/Loss/gr_20051119040006_000699
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

48

URL: http://ns1.war2.ru/files/10years/reports/Gadzila/Loss/gr_20051119043459_000703
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/Loss/gr_20051119044326_000704
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/Loss/gr_20051015185259_000258
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/Loss/gr_20051115013057_000405
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051119054240_000707
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051201233553_000010
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051119050401_000705
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051119052750_000706
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051201234813_000014
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051203042456_000157
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051203044422_000159
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051202000821_000019
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051203040807_000156
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051024202126_000687
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051029022150_001025
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

49

URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051024011031_000635
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051024012505_000636
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051029024825_001028
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051119040824_000700
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051119041658_000702
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051104005040_000056
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Gadzila/gr_20051115005821_000403
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051108163955_000232
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051108181043_000240
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051108182259_000241
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051101232339_000163
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051029005248_001017
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051101225414_000154
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

50

URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051101230908_000158
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051128190052_000294
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051202213417_000102
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051202231953_000127
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051126015311_000175
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051125213432_000139
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051125215349_000142
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051126001824_000161
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051029004146_001015
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051012144112_000009
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051012145840_000013
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051012154122_000017
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051012131711_000001
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051012133223_000002
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051012135417_000003
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

51

URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051013144502_000010
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051026184213_000801
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051027164340_000880
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051027191136_000884
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051013164011_000021
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051013194936_000043
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/Loss/gr_20051026183146_000800
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051124125515_000010
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051122211356_000018
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051122210109_000017
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051124143313_000015
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051125225229_000145
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051125221500_000144
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051124211803_000039
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051107174739_000149
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

52

URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051107172800_000148
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051101231459_000161
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051107180225_000151
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051108230421_000287
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051108200249_000259
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051108165652_000233
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051125234917_000154
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051202171244_000059
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051130161228_000421
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051129154914_000355
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051202204733_000097
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051203011109_000147
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051203005526_000146
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051202210916_000099
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051128180654_000292
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

53

URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051126021245_000178
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051126010516_000168
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051128183527_000293
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051129153003_000353
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051129140641_000350
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051128191919_000297
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051020181831_000308
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051020180542_000306
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051019174639_000239
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051026190021_000804
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051027165937_000881
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051026193349_000812
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051026192301_000811
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051013165616_000023
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051012145025_000011
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

54

URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051012142756_000006
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051013174545_000024
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051019160350_000228
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051019155012_000226
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051014195633_000113
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051027171714_000882
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051101154342_000100
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051031150705_000019
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051029013436_001022
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051101171855_000104
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051101223704_000153
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051101182622_000113
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051101173250_000106
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051028224150_000982
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051027201006_000892
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

55

URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051027192700_000889
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051029001138_001013
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051029012050_001021
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051029011025_001020
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/MasterKsa/gr_20051029002347_001014
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/Loss/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/Loss/gr_20051109192715_000023
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/Loss/gr_20051020171937_000298
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/Loss/gr_20051202200457_000092
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/Loss/gr_20051115180243_000426
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/Loss/gr_20051014155439_000083
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/Loss/gr_20051015224623_000293
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/Loss/gr_20051018165849_000134
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051116123732_000480
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

56

URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051115182416_000428
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051116130150_000483
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051116124925_000481
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051115160431_000423
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051108230011_000289
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051103191856_000015
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051109004451_000304
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051108231013_000298
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051204020926_000227
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051202211352_000098
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051204022309_000230
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051204021518_000229
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051202202645_000093
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051120172545_000748
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051117174031_000549
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

57

URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051202195448_000088
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051202192841_000079
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051015225751_000295
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051015225343_000294
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051017182046_000036
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051017170902_000029
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051013194936_000043
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051012234524_000089
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051012213820_000068
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051013144502_000010
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051013022503_000102
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051022151252_000522
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051019175059_000240
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051024200649_000685
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051024155450_000663
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

58

URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051019174000_000238
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051018164336_000131
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051017183515_000037
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051019142342_000222
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/10years/reports/Kind_Friend/gr_20051018170429_000135
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/june.swf
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/ksa8pl.pud
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/gowbne.pud
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/combat.swf
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/cdkeys.txt
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/bnetwar2.reg
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/seminar2005/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/seminar2005/Seminar1x2.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/seminar2005/Seminar1x3.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/seminar2005/Seminar3x1.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

59

URL: http://ns1.war2.ru/files/seminar2005/Garden_of_War_study.pud
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/one_vs_one.pud
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/ksa_vs_leon.wir
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/war2bne_full.txt
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/files/combat_changelog.txt
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/maps/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/cert/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/ksa30/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/other/
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/kf2009/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/about/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/about/cmds/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/about/main/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/about/icons/
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

60

URL: http://ns1.war2.ru/image/about/resource/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/sample/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/ksa2006/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/gog2008/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/10years/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/10years/party/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/image/seminar2005/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/cgi-bin/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/webmail/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/webmail/src/
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/webmail/src/login.php
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/webmail/src/redirect.php
Vulnerabilities has been identified for this URL
4 input(s) found for this URL
Inputs
Input scheme 1
Input name
js_autodetect_results
just_logged_in
login_username
secretkey

Input type
URL encoded POST
URL encoded POST
URL encoded POST
URL encoded POST

URL: http://ns1.war2.ru/webmail/images/
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

61

URL: http://ns1.war2.ru/webmail/index.php
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/index.php
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/function.include
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/function.readfile
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/function.include-once
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/%3Cbr%20
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www/www.war2.ru
No vulnerabilities has been identified for this URL
No input(s) found for this URL
Acunetix Website Audit

62

URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www/www.war2.ru/includ
e
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www/www.war2.ru/includ
e/functions.php%3C
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www/www.war2.ru/includ
e/functions.php%3C/b%3E%20on%20line%20%3Cb%3E69%3C
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www/www.war2.ru/includ
e/functions.php%3C/b%3E%20on%20line%20%3Cb%3E69%3C/b%3E%3Cbr%20
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www/www.war2.ru/includ
e/functions.php%3C/b%3E%20on%20line%20%3Cb%3E69%3C/b%3E%3Cbr%20/%3EXOOPS_URL
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www/www.war2.ru/includ
e/functions.php%3C/b%3E%20on%20line%20%3Cb%3E69%3C/b%3E%3Cbr%20/%3EXOOPS_URL/include
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Use%20of%20undefined%20constant%20
XOOPS_URL%20-%20assumed%20'XOOPS_URL'%20in%20%3Cb%3E/home/war2/data/www/www.war2.ru/includ
e/functions.php%3C/b%3E%20on%20line%20%3Cb%3E69%3C/b%3E%3Cbr%20/%3EXOOPS_URL/include/style.c
ss
Vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/<br%20
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL: http://ns1.war2.ru/<br%20/><b>Notice<
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>
No vulnerabilities has been identified for this URL
No input(s) found for this URL
Acunetix Website Audit

63

URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home/war2
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home/war2/data
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home/war2/data/www
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home/war2/data/www/www.war2.ru
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home/war2/data/www/www.war2.ru/include
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home/war2/data/www/www.war2.ru/include/functions.php<
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home/war2/data/www/www.war2.ru/include/functions.php</b>%20o
n%20line%20<b>69<
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home/war2/data/www/www.war2.ru/include/functions.php</b>%20o
n%20line%20<b>69</b><br%20
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home/war2/data/www/www.war2.ru/include/functions.php</b>%20o
n%20line%20<b>69</b><br%20/>XOOPS_URL
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

64

URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home/war2/data/www/www.war2.ru/include/functions.php</b>%20o
n%20line%20<b>69</b><br%20/>XOOPS_URL/include
No vulnerabilities has been identified for this URL
No input(s) found for this URL
URL:
http://ns1.war2.ru/<br%20/><b>Notice</b>:%20%20Use%20of%20undefined%20constant%20XOOPS_URL%20-%
20assumed%20'XOOPS_URL'%20in%20<b>/home/war2/data/www/www.war2.ru/include/functions.php</b>%20o
n%20line%20<b>69</b><br%20/>XOOPS_URL/include/style.css
No vulnerabilities has been identified for this URL
No input(s) found for this URL

Acunetix Website Audit

65

Vous aimerez peut-être aussi