Scanning file /home/rab/Downloads/bWAPP/aim.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/aim.php. Scanning file /home/rab/Downloads/bWAPP/ba_captcha_bypass.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_captcha_bypass.php. Scanning file /home/rab/Downloads/bWAPP/ba_forgotten.php In file ba_forgotten.php, line 45, col 17: $sql = "SELECT * FROM users WHERE email = '" . $email . "'"; Injectable variable $email. Other ocurrences: L31 $email = $_POST["email"]; L33 if(!filter_var($email, FILTER_VALIDATE_EMAIL)) L43 $email = mysqli_real_escape_string($link, $email); L43 $email = mysqli_real_escape_string($link, $email); L45 $sql = "SELECT * FROM users WHERE email = '" . $email . "'"; L112 $status = @mail($email, $subject, $content, "From: $sender"); L161 $email_enc = urlencode($email); L161 $email_enc = urlencode($email); L164 $content.= "Click the link to reset and change your secret: http://" . $server . "/bWAPP/secret_change.php?email=" . $email_enc . "&reset_code=" . $reset_code . "\n\n"; L167 $status = @mail($email, $subject, $content, "From: $sender"); L183 $sql = "UPDATE users SET reset_code = '" . $reset_code . "' WHERE email = '" . $email . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/ba_forgotten.php. Scanning file /home/rab/Downloads/bWAPP/ba_insecure_login.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_insecure_login.php. Scanning file /home/rab/Downloads/bWAPP/ba_insecure_login_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_insecure_login_1.php. Scanning file /home/rab/Downloads/bWAPP/ba_insecure_login_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_insecure_login_2.php. Scanning file /home/rab/Downloads/bWAPP/ba_insecure_login_3.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_insecure_login_3.php. Scanning file /home/rab/Downloads/bWAPP/ba_logout.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_logout.php. Scanning file /home/rab/Downloads/bWAPP/ba_logout_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_logout_1.php. Scanning file /home/rab/Downloads/bWAPP/ba_pwd_attacks.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_pwd_attacks.php. Scanning file /home/rab/Downloads/bWAPP/ba_pwd_attacks_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_pwd_attacks_1.php. Scanning file /home/rab/Downloads/bWAPP/ba_pwd_attacks_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_pwd_attacks_2.php. Scanning file /home/rab/Downloads/bWAPP/ba_pwd_attacks_3.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_pwd_attacks_3.php. Scanning file /home/rab/Downloads/bWAPP/ba_pwd_attacks_4.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_pwd_attacks_4.php. Scanning file /home/rab/Downloads/bWAPP/ba_weak_pwd.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ba_weak_pwd.php. Scanning file /home/rab/Downloads/bWAPP/backdoor.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/backdoor.php. Scanning file /home/rab/Downloads/bWAPP/bof_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/bof_1.php. Scanning file /home/rab/Downloads/bWAPP/bof_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/bof_2.php. Scanning file /home/rab/Downloads/bWAPP/captcha.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/captcha.php. Scanning file /home/rab/Downloads/bWAPP/captcha_box.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/captcha_box.php. Scanning file /home/rab/Downloads/bWAPP/clickjacking.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/clickjacking.php. Scanning file /home/rab/Downloads/bWAPP/commandi.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/commandi.php. Scanning file /home/rab/Downloads/bWAPP/commandi_blind.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/commandi_blind.php. Scanning file /home/rab/Downloads/bWAPP/config.inc.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/config.inc.php. Scanning file /home/rab/Downloads/bWAPP/connect.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/connect.php. Scanning file /home/rab/Downloads/bWAPP/connect_i.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/connect_i.php. Scanning file /home/rab/Downloads/bWAPP/credits.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/credits.php. Scanning file /home/rab/Downloads/bWAPP/cs_validation.php In file cs_validation.php, line 102, col 17: $sql = "SELECT password FROM users WHERE login = '" . $login . "' AND password = '" . $password_curr . "'"; Injectable variable $login. Other ocurrences: L93 $login = $_SESSION["login"]; L102 $sql = "SELECT password FROM users WHERE login = '" . $login . "' AND password = '" . $password_curr . "'"; L129 $sql = "UPDATE users SET password = '" . $password_new . "' WHERE login = '" . $login . "'"; queries here:1 Injectable variable $password_curr. Other ocurrences: L98 $password_curr = $_REQUEST["password_curr"]; L99 $password_curr = mysqli_real_escape_string($link, $password_curr); L99 $password_curr = mysqli_real_escape_string($link, $password_curr); L100 $password_curr = hash("sha1", $password_curr, false); L100 $password_curr = hash("sha1", $password_curr, false); L102 $sql = "SELECT password FROM users WHERE login = '" . $login . "' AND password = '" . $password_curr . "'"; queries here:2 Found 2 SQL injections in /home/rab/Downloads/bWAPP/cs_validation.php. Scanning file /home/rab/Downloads/bWAPP/csrf_1.php In file csrf_1.php, line 88, col 29: $sql = "SELECT password FROM users WHERE login = '" . $login . "' AND password = '" . $password_curr . "'"; Injectable variable $login. Other ocurrences: L52 $login = $_SESSION["login"]; L60 $sql = "UPDATE users SET password = '" . $password_new . "' WHERE login = '" . $login . "'"; L88 $sql = "SELECT password FROM users WHERE login = '" . $login . "' AND password = '" . $password_curr . "'"; L115 $sql = "UPDATE users SET password = '" . $password_new . "' WHERE login = '" . $login . "'"; queries here:1 Injectable variable $password_curr. Other ocurrences: L84 $password_curr = $_REQUEST["password_curr"]; L85 $password_curr = mysqli_real_escape_string($link, $password_curr); L85 $password_curr = mysqli_real_escape_string($link, $password_curr); L86 $password_curr = hash("sha1", $password_curr, false); L86 $password_curr = hash("sha1", $password_curr, false); L88 $sql = "SELECT password FROM users WHERE login = '" . $login . "' AND password = '" . $password_curr . "'"; queries here:2 Found 2 SQL injections in /home/rab/Downloads/bWAPP/csrf_1.php. Scanning file /home/rab/Downloads/bWAPP/csrf_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/csrf_2.php. Scanning file /home/rab/Downloads/bWAPP/csrf_3.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/csrf_3.php. Scanning file /home/rab/Downloads/bWAPP/directory_traversal_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/directory_traversal_1.php. Scanning file /home/rab/Downloads/bWAPP/directory_traversal_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/directory_traversal_2.php. Scanning file /home/rab/Downloads/bWAPP/functions_external.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/functions_external.php. Scanning file /home/rab/Downloads/bWAPP/heartbleed.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/heartbleed.php. Scanning file /home/rab/Downloads/bWAPP/hostheader_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/hostheader_1.php. Scanning file /home/rab/Downloads/bWAPP/hostheader_2.php In file hostheader_2.php, line 45, col 17: $sql = "SELECT * FROM users WHERE email = '" . $email . "'"; Injectable variable $email. Other ocurrences: L31 $email = $_POST["email"]; L33 if(!filter_var($email, FILTER_VALIDATE_EMAIL)) L43 $email = mysqli_real_escape_string($link, $email); L43 $email = mysqli_real_escape_string($link, $email); L45 $sql = "SELECT * FROM users WHERE email = '" . $email . "'"; L113 $email_enc = urlencode($email); L113 $email_enc = urlencode($email); L116 $content.= "Click the link to reset and change your secret: http://" . $server . "/bWAPP/secret_change.php?email=" . $email_enc . "&reset_code=" . $reset_code . "\n\n"; L119 $status = @mail($email, $subject, $content, "From: $sender"); L135 $sql = "UPDATE users SET reset_code = '" . $reset_code . "' WHERE email = '" . $email . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/hostheader_2.php. Scanning file /home/rab/Downloads/bWAPP/hpp-1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/hpp-1.php. Scanning file /home/rab/Downloads/bWAPP/hpp-2.php In file hpp-2.php, line 147, col 13: $sql = "SELECT * FROM movies"; No dangerous concatenations in this query. Found 0 SQL injections in /home/rab/Downloads/bWAPP/hpp-2.php. Scanning file /home/rab/Downloads/bWAPP/hpp-3.php In file hpp-3.php, line 47, col 17: $sql = "SELECT * FROM movies WHERE id = '" . sqli_check_2($movie) . "'"; Injectable variable $movie. Other ocurrences: L45 $movie = $_REQUEST["movie"]; L47 $sql = "SELECT * FROM movies WHERE id = '" . sqli_check_2($movie) . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/hpp-3.php. Scanning file /home/rab/Downloads/bWAPP/htmli_current_url.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/htmli_current_url.php. Scanning file /home/rab/Downloads/bWAPP/htmli_get.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/htmli_get.php. Scanning file /home/rab/Downloads/bWAPP/htmli_post.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/htmli_post.php. Scanning file /home/rab/Downloads/bWAPP/htmli_stored.php In file htmli_stored.php, line 81, col 16: $sql = "INSERT INTO blog (date, entry, owner) VALUES (now(),'" . $entry . "','" . $owner . "')"; Injectable variable $entry. Other ocurrences: L25 $entry = ""; L68 $entry = htmli($_POST["entry"]); L71 if($entry == "") L81 $sql = "INSERT INTO blog (date, entry, owner) VALUES (now(),'" . $entry . "','" . $owner . "')"; L248 $entry_all = isset($_POST["entry_all"]) ? 1 : 0; L250 if($entry_all == false) queries here:1 Injectable variable $owner. Other ocurrences: L26 $owner = ""; L69 $owner = $_SESSION["login"]; L81 $sql = "INSERT INTO blog (date, entry, owner) VALUES (now(),'" . $entry . "','" . $owner . "')"; queries here:2 In file htmli_stored.php, line 253, col 31: $sql = "SELECT * FROM blog WHERE owner = '" . $_SESSION["login"] . "'"; No dangerous concatenations in this query. In file htmli_stored.php, line 264, col 4: $recordset = $link->query($sql); No dangerous concatenations in this query. Found 2 SQL injections in /home/rab/Downloads/bWAPP/htmli_stored.php. Scanning file /home/rab/Downloads/bWAPP/http_response_splitting.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/http_response_splitting.php. Scanning file /home/rab/Downloads/bWAPP/http_verb_tampering.php In file http_verb_tampering.php, line 61, col 25: $sql = "SELECT password FROM users WHERE login = '" . $login . "'"; Injectable variable $login. Other ocurrences: L56 $login = $_SESSION["login"]; L61 $sql = "SELECT password FROM users WHERE login = '" . $login . "'"; L77 $sql = "UPDATE users SET password = '" . $password_new . "' WHERE login = '" . $login . "'"; L137 $login = $_SESSION["login"]; L142 $sql = "SELECT password FROM users WHERE login = '" . $login . "'"; L158 $sql = "UPDATE users SET password = '" . $password_new . "' WHERE login = '" . $login . "'"; queries here:1 In file http_verb_tampering.php, line 142, col 25: $sql = "SELECT password FROM users WHERE login = '" . $login . "'"; Injectable variable $login. Other ocurrences: L56 $login = $_SESSION["login"]; L61 $sql = "SELECT password FROM users WHERE login = '" . $login . "'"; L77 $sql = "UPDATE users SET password = '" . $password_new . "' WHERE login = '" . $login . "'"; L137 $login = $_SESSION["login"]; L142 $sql = "SELECT password FROM users WHERE login = '" . $login . "'"; L158 $sql = "UPDATE users SET password = '" . $password_new . "' WHERE login = '" . $login . "'"; queries here:2 Found 2 SQL injections in /home/rab/Downloads/bWAPP/http_verb_tampering.php. Scanning file /home/rab/Downloads/bWAPP/iframei.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/iframei.php. Scanning file /home/rab/Downloads/bWAPP/index.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/index.php. Scanning file /home/rab/Downloads/bWAPP/info.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/info.php. Scanning file /home/rab/Downloads/bWAPP/info_install.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/info_install.php. Scanning file /home/rab/Downloads/bWAPP/information_disclosure_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/information_disclosure_1.php. Scanning file /home/rab/Downloads/bWAPP/information_disclosure_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/information_disclosure_2.php. Scanning file /home/rab/Downloads/bWAPP/information_disclosure_3.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/information_disclosure_3.php. Scanning file /home/rab/Downloads/bWAPP/information_disclosure_4.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/information_disclosure_4.php. Scanning file /home/rab/Downloads/bWAPP/insecure_crypt_storage_1.php In file insecure_crypt_storage_1.php, line 27, col 9: $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; Injectable variable $login. Other ocurrences: L25 $login = $_SESSION["login"]; L27 $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/insecure_crypt_storage_1.php. Scanning file /home/rab/Downloads/bWAPP/insecure_crypt_storage_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/insecure_crypt_storage_2.php. Scanning file /home/rab/Downloads/bWAPP/insecure_crypt_storage_3.php In file insecure_crypt_storage_3.php, line 27, col 9: $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; Injectable variable $login. Other ocurrences: L25 $login = $_SESSION["login"]; L27 $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/insecure_crypt_storage_3.php. Scanning file /home/rab/Downloads/bWAPP/insecure_direct_object_ref_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/insecure_direct_object_ref_1.php. Scanning file /home/rab/Downloads/bWAPP/insecure_direct_object_ref_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/insecure_direct_object_ref_2.php. Scanning file /home/rab/Downloads/bWAPP/insecure_direct_object_ref_3.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/insecure_direct_object_ref_3.php. Scanning file /home/rab/Downloads/bWAPP/insecure_iframe.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/insecure_iframe.php. Scanning file /home/rab/Downloads/bWAPP/install.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/install.php. Scanning file /home/rab/Downloads/bWAPP/insuff_transp_layer_protect_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/insuff_transp_layer_protect_1.php. Scanning file /home/rab/Downloads/bWAPP/insuff_transp_layer_protect_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/insuff_transp_layer_protect_2.php. Scanning file /home/rab/Downloads/bWAPP/insuff_transp_layer_protect_3.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/insuff_transp_layer_protect_3.php. Scanning file /home/rab/Downloads/bWAPP/insuff_transp_layer_protect_4.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/insuff_transp_layer_protect_4.php. Scanning file /home/rab/Downloads/bWAPP/lang_en.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/lang_en.php. Scanning file /home/rab/Downloads/bWAPP/lang_fr.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/lang_fr.php. Scanning file /home/rab/Downloads/bWAPP/lang_nl.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/lang_nl.php. Scanning file /home/rab/Downloads/bWAPP/ldap_connect.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ldap_connect.php. Scanning file /home/rab/Downloads/bWAPP/ldapi.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ldapi.php. Scanning file /home/rab/Downloads/bWAPP/lfi_sqlitemanager.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/lfi_sqlitemanager.php. Scanning file /home/rab/Downloads/bWAPP/login.php In file login.php, line 36, col 13: $sql = "SELECT * FROM users WHERE login = '" . $login; No dangerous concatenations in this query. Found 0 SQL injections in /home/rab/Downloads/bWAPP/login.php. Scanning file /home/rab/Downloads/bWAPP/logout.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/logout.php. Scanning file /home/rab/Downloads/bWAPP/maili.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/maili.php. Scanning file /home/rab/Downloads/bWAPP/manual_interv.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/manual_interv.php. Scanning file /home/rab/Downloads/bWAPP/password_change.php In file password_change.php, line 61, col 21: $sql = "SELECT password FROM users WHERE login = '" . $login . "' AND password = '" . $password_curr . "'"; Injectable variable $login. Other ocurrences: L52 $login = $_SESSION["login"]; L61 $sql = "SELECT password FROM users WHERE login = '" . $login . "' AND password = '" . $password_curr . "'"; L88 $sql = "UPDATE users SET password = '" . $password_new . "' WHERE login = '" . $login . "'"; queries here:1 Injectable variable $password_curr. Other ocurrences: L57 $password_curr = $_REQUEST["password_curr"]; L58 $password_curr = mysqli_real_escape_string($link, $password_curr); L58 $password_curr = mysqli_real_escape_string($link, $password_curr); L59 $password_curr = hash("sha1", $password_curr, false); L59 $password_curr = hash("sha1", $password_curr, false); L61 $sql = "SELECT password FROM users WHERE login = '" . $login . "' AND password = '" . $password_curr . "'"; queries here:2 Found 2 SQL injections in /home/rab/Downloads/bWAPP/password_change.php. Scanning file /home/rab/Downloads/bWAPP/php_cgi.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/php_cgi.php. Scanning file /home/rab/Downloads/bWAPP/php_eval.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/php_eval.php. Scanning file /home/rab/Downloads/bWAPP/phpi.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/phpi.php. Scanning file /home/rab/Downloads/bWAPP/phpi_sqlitemanager.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/phpi_sqlitemanager.php. Scanning file /home/rab/Downloads/bWAPP/phpinfo.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/phpinfo.php. Scanning file /home/rab/Downloads/bWAPP/portal.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/portal.php. Scanning file /home/rab/Downloads/bWAPP/reset.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/reset.php. Scanning file /home/rab/Downloads/bWAPP/restrict_device_access.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/restrict_device_access.php. Scanning file /home/rab/Downloads/bWAPP/restrict_folder_access.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/restrict_folder_access.php. Scanning file /home/rab/Downloads/bWAPP/rlfi.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/rlfi.php. Scanning file /home/rab/Downloads/bWAPP/secret-cors-1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/secret-cors-1.php. Scanning file /home/rab/Downloads/bWAPP/secret-cors-2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/secret-cors-2.php. Scanning file /home/rab/Downloads/bWAPP/secret-cors-3.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/secret-cors-3.php. Scanning file /home/rab/Downloads/bWAPP/secret.php In file secret.php, line 25, col 9: $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; Injectable variable $login. Other ocurrences: L23 $login = $_SESSION["login"]; L25 $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/secret.php. Scanning file /home/rab/Downloads/bWAPP/secret_change.php In file secret_change.php, line 35, col 13: $sql = "SELECT * FROM users WHERE email = '" . $email . "' AND BINARY reset_code = '" . $reset_code . "'"; Injectable variable $email. Other ocurrences: L29 $email = $_POST["email"]; L30 $email = mysqli_real_escape_string($link, $email); L30 $email = mysqli_real_escape_string($link, $email); L35 $sql = "SELECT * FROM users WHERE email = '" . $email . "' AND BINARY reset_code = '" . $reset_code . "'"; L66 $sql = "UPDATE users SET reset_code = NULL, secret = '" . $secret . "' WHERE email = '" . $email . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/secret_change.php. Scanning file /home/rab/Downloads/bWAPP/secret_html.php In file secret_html.php, line 28, col 9: $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; Injectable variable $login. Other ocurrences: L26 $login = $_SESSION["login"]; L28 $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/secret_html.php. Scanning file /home/rab/Downloads/bWAPP/security.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/security.php. Scanning file /home/rab/Downloads/bWAPP/security_level_check.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/security_level_check.php. Scanning file /home/rab/Downloads/bWAPP/security_level_set.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/security_level_set.php. Scanning file /home/rab/Downloads/bWAPP/selections.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/selections.php. Scanning file /home/rab/Downloads/bWAPP/shellshock.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/shellshock.php. Scanning file /home/rab/Downloads/bWAPP/sm_cors.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_cors.php. Scanning file /home/rab/Downloads/bWAPP/sm_cross_domain_policy.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_cross_domain_policy.php. Scanning file /home/rab/Downloads/bWAPP/sm_dos_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_dos_1.php. Scanning file /home/rab/Downloads/bWAPP/sm_dos_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_dos_2.php. Scanning file /home/rab/Downloads/bWAPP/sm_dos_3.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_dos_3.php. Scanning file /home/rab/Downloads/bWAPP/sm_dos_4.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_dos_4.php. Scanning file /home/rab/Downloads/bWAPP/sm_ftp.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_ftp.php. Scanning file /home/rab/Downloads/bWAPP/sm_local_priv_esc_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_local_priv_esc_1.php. Scanning file /home/rab/Downloads/bWAPP/sm_local_priv_esc_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_local_priv_esc_2.php. Scanning file /home/rab/Downloads/bWAPP/sm_mitm_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_mitm_1.php. Scanning file /home/rab/Downloads/bWAPP/sm_mitm_2.php In file sm_mitm_2.php, line 43, col 13: $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; Injectable variable $login. Other ocurrences: L38 $login = $_SESSION["login"]; L41 // echo $login; L43 $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; L85 $content = "Hello " . ucwords($login) . ",\n\n"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/sm_mitm_2.php. Scanning file /home/rab/Downloads/bWAPP/sm_obu_files.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_obu_files.php. Scanning file /home/rab/Downloads/bWAPP/sm_robots.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_robots.php. Scanning file /home/rab/Downloads/bWAPP/sm_samba.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_samba.php. Scanning file /home/rab/Downloads/bWAPP/sm_snmp.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_snmp.php. Scanning file /home/rab/Downloads/bWAPP/sm_webdav.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_webdav.php. Scanning file /home/rab/Downloads/bWAPP/sm_xst.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sm_xst.php. Scanning file /home/rab/Downloads/bWAPP/smgmt_admin_portal.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/smgmt_admin_portal.php. Scanning file /home/rab/Downloads/bWAPP/smgmt_cookies_httponly.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/smgmt_cookies_httponly.php. Scanning file /home/rab/Downloads/bWAPP/smgmt_cookies_secure.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/smgmt_cookies_secure.php. Scanning file /home/rab/Downloads/bWAPP/smgmt_sessionid_url.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/smgmt_sessionid_url.php. Scanning file /home/rab/Downloads/bWAPP/smgmt_strong_sessions.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/smgmt_strong_sessions.php. Scanning file /home/rab/Downloads/bWAPP/sqli_1.php In file sqli_1.php, line 143, col 13: $sql = "SELECT * FROM movies WHERE title LIKE '%" . sqli($title) . "%'"; Injectable variable $title. Other ocurrences: L141 $title = $_GET["title"]; L143 $sql = "SELECT * FROM movies WHERE title LIKE '%" . sqli($title) . "%'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/sqli_1.php. Scanning file /home/rab/Downloads/bWAPP/sqli_10-1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sqli_10-1.php. Scanning file /home/rab/Downloads/bWAPP/sqli_10-2.php In file sqli_10-2.php, line 64, col 13: $sql = "SELECT * FROM movies WHERE title LIKE '%" . sqli($title) . "%'"; Injectable variable $title. Other ocurrences: L61 $title = $_GET["title"]; L64 $sql = "SELECT * FROM movies WHERE title LIKE '%" . sqli($title) . "%'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/sqli_10-2.php. Scanning file /home/rab/Downloads/bWAPP/sqli_11.php In file sqli_11.php, line 153, col 13: $sql = "SELECT * FROM movies WHERE title LIKE '%" . sqli($title) . "%'"; Injectable variable $title. Other ocurrences: L149 $title = $_GET["title"]; L153 $sql = "SELECT * FROM movies WHERE title LIKE '%" . sqli($title) . "%'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/sqli_11.php. Scanning file /home/rab/Downloads/bWAPP/sqli_12.php In file sqli_12.php, line 219, col 19: // die("Error: " . $link->connect_error . "

"); No dangerous concatenations in this query. Found 0 SQL injections in /home/rab/Downloads/bWAPP/sqli_12.php. Scanning file /home/rab/Downloads/bWAPP/sqli_13-ps.php In file sqli_13-ps.php, line 35, col 9: $sql = "select * from movies"; No dangerous concatenations in this query. In file sqli_13-ps.php, line 142, col 13: $sql = "SELECT title, release_year, genre, main_character, imdb FROM movies WHERE id =?"; No dangerous concatenations in this query. Found 0 SQL injections in /home/rab/Downloads/bWAPP/sqli_13-ps.php. Scanning file /home/rab/Downloads/bWAPP/sqli_13.php In file sqli_13.php, line 35, col 9: $sql = "SELECT * FROM movies"; No dangerous concatenations in this query. In file sqli_13.php, line 167, col 13: $sql = "SELECT * FROM movies"; No dangerous concatenations in this query. Found 0 SQL injections in /home/rab/Downloads/bWAPP/sqli_13.php. Scanning file /home/rab/Downloads/bWAPP/sqli_14.php In file sqli_14.php, line 138, col 17: $sql = "SELECT * FROM movies WHERE title = '" . sqli($title) . "' COLLATE NOCASE"; Injectable variable $title. Other ocurrences: L134 $title = $_REQUEST["title"]; L138 $sql = "SELECT * FROM movies WHERE title = '" . sqli($title) . "' COLLATE NOCASE"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/sqli_14.php. Scanning file /home/rab/Downloads/bWAPP/sqli_15.php In file sqli_15.php, line 65, col 13: $sql = "SELECT * FROM movies WHERE title = '" . sqli($title) . "'"; Injectable variable $title. Other ocurrences: L63 $title = $_REQUEST["title"]; L65 $sql = "SELECT * FROM movies WHERE title = '" . sqli($title) . "'"; queries here:1 In file sqli_15.php, line 78, col 17: $sql = "SELECT email FROM users WHERE login = '" . $login . "'"; Injectable variable $login. Other ocurrences: L76 $login = $_SESSION["login"]; L78 $sql = "SELECT email FROM users WHERE login = '" . $login . "'"; L97 $content = "Hello " . ucwords($login) . ",\n\n"; queries here:2 Found 2 SQL injections in /home/rab/Downloads/bWAPP/sqli_15.php. Scanning file /home/rab/Downloads/bWAPP/sqli_16.php In file sqli_16.php, line 144, col 17: $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; Injectable variable $login. Other ocurrences: L137 $login = $_POST["login"]; L138 $login = sqli($login); L138 $login = sqli($login); L144 $sql = "SELECT * FROM users WHERE login = '" . $login . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/sqli_16.php. Scanning file /home/rab/Downloads/bWAPP/sqli_17.php In file sqli_17.php, line 95, col 8: $sql = "INSERT INTO visitors (date, user_agent, ip_address) VALUES (now(), '" . sqli($user_agent) . "', '" . $ip_address . "')"; Injectable variable $user_agent. Other ocurrences: L92 $user_agent = $_SERVER["HTTP_USER_AGENT"]; L95 $sql = "INSERT INTO visitors (date, user_agent, ip_address) VALUES (now(), '" . sqli($user_agent) . "', '" . $ip_address . "')"; L107 $line = "'" . date("y/m/d G.i:s", time()) . "', '" . $ip_address . "', '" . xss($user_agent) . "'" . "\r\n"; queries here:1 Injectable variable $ip_address. Other ocurrences: L91 $ip_address = $_SERVER["REMOTE_ADDR"]; L95 $sql = "INSERT INTO visitors (date, user_agent, ip_address) VALUES (now(), '" . sqli($user_agent) . "', '" . $ip_address . "')"; L107 $line = "'" . date("y/m/d G.i:s", time()) . "', '" . $ip_address . "', '" . xss($user_agent) . "'" . "\r\n"; queries here:2 In file sqli_17.php, line 114, col 9: $sql = "SELECT * FROM visitors ORDER by id DESC LIMIT 3"; No dangerous concatenations in this query. Found 2 SQL injections in /home/rab/Downloads/bWAPP/sqli_17.php. Scanning file /home/rab/Downloads/bWAPP/sqli_2-ps.php In file sqli_2-ps.php, line 35, col 9: $sql = "select * from movies"; No dangerous concatenations in this query. In file sqli_2-ps.php, line 142, col 13: $sql = "SELECT title, release_year, genre, main_character, imdb FROM movies WHERE id =?"; No dangerous concatenations in this query. Found 0 SQL injections in /home/rab/Downloads/bWAPP/sqli_2-ps.php. Scanning file /home/rab/Downloads/bWAPP/sqli_2.php In file sqli_2.php, line 35, col 9: $sql = "SELECT * FROM movies"; No dangerous concatenations in this query. In file sqli_2.php, line 167, col 13: $sql = "SELECT * FROM movies"; No dangerous concatenations in this query. Found 0 SQL injections in /home/rab/Downloads/bWAPP/sqli_2.php. Scanning file /home/rab/Downloads/bWAPP/sqli_3.php In file sqli_3.php, line 140, col 17: $sql = "SELECT * FROM heroes WHERE login = '" . $login . "' AND password = '" . $password . "'"; Injectable variable $login. Other ocurrences: L134 $login = $_POST["login"]; L135 $login = sqli($login); L135 $login = sqli($login); L140 $sql = "SELECT * FROM heroes WHERE login = '" . $login . "' AND password = '" . $password . "'"; queries here:1 Injectable variable $password. Other ocurrences: L137 $password = $_POST["password"]; L138 $password = sqli($password); L138 $password = sqli($password); L140 $sql = "SELECT * FROM heroes WHERE login = '" . $login . "' AND password = '" . $password . "'"; queries here:2 Found 2 SQL injections in /home/rab/Downloads/bWAPP/sqli_3.php. Scanning file /home/rab/Downloads/bWAPP/sqli_4.php In file sqli_4.php, line 131, col 17: $sql = "SELECT * FROM movies WHERE title = '" . sqli($title) . "'"; Injectable variable $title. Other ocurrences: L129 $title = $_REQUEST["title"]; L131 $sql = "SELECT * FROM movies WHERE title = '" . sqli($title) . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/sqli_4.php. Scanning file /home/rab/Downloads/bWAPP/sqli_5.php In file sqli_5.php, line 121, col 21: $sql = "SELECT * FROM movies"; No dangerous concatenations in this query. Found 0 SQL injections in /home/rab/Downloads/bWAPP/sqli_5.php. Scanning file /home/rab/Downloads/bWAPP/sqli_6.php In file sqli_6.php, line 143, col 13: $sql = "SELECT * FROM movies WHERE title LIKE '%" . sqli($title) . "%'"; Injectable variable $title. Other ocurrences: L141 $title = $_POST["title"]; L143 $sql = "SELECT * FROM movies WHERE title LIKE '%" . sqli($title) . "%'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/sqli_6.php. Scanning file /home/rab/Downloads/bWAPP/sqli_7.php In file sqli_7.php, line 143, col 24: $sql = "INSERT INTO blog (date, entry, owner) VALUES (now(),'" . $entry . "','" . $owner . "')"; Injectable variable $entry. Other ocurrences: L25 $entry = ""; L130 $entry = sqli($_POST["entry"]); L133 if($entry == "") L143 $sql = "INSERT INTO blog (date, entry, owner) VALUES (now(),'" . $entry . "','" . $owner . "')"; queries here:1 Injectable variable $owner. Other ocurrences: L26 $owner = ""; L131 $owner = $_SESSION["login"]; L143 $sql = "INSERT INTO blog (date, entry, owner) VALUES (now(),'" . $entry . "','" . $owner . "')"; queries here:2 In file sqli_7.php, line 185, col 9: $sql = "SELECT * FROM blog"; No dangerous concatenations in this query. Found 2 SQL injections in /home/rab/Downloads/bWAPP/sqli_7.php. Scanning file /home/rab/Downloads/bWAPP/sqli_8-1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sqli_8-1.php. Scanning file /home/rab/Downloads/bWAPP/sqli_8-2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sqli_8-2.php. Scanning file /home/rab/Downloads/bWAPP/sqli_9.php In file sqli_9.php, line 181, col 13: $sql = "SELECT * FROM movies WHERE title LIKE '%" . sqli($title) . "%'"; Injectable variable $title. Other ocurrences: L179 $title = $_GET["title"]; L181 $sql = "SELECT * FROM movies WHERE title LIKE '%" . sqli($title) . "%'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/sqli_9.php. Scanning file /home/rab/Downloads/bWAPP/sqli_drupal.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/sqli_drupal.php. Scanning file /home/rab/Downloads/bWAPP/ssii.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ssii.php. Scanning file /home/rab/Downloads/bWAPP/ssrf.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/ssrf.php. Scanning file /home/rab/Downloads/bWAPP/test.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/test.php. Scanning file /home/rab/Downloads/bWAPP/top_security.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/top_security.php. Scanning file /home/rab/Downloads/bWAPP/training.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/training.php. Scanning file /home/rab/Downloads/bWAPP/training_install.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/training_install.php. Scanning file /home/rab/Downloads/bWAPP/unrestricted_file_upload.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/unrestricted_file_upload.php. Scanning file /home/rab/Downloads/bWAPP/unvalidated_redir_fwd_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/unvalidated_redir_fwd_1.php. Scanning file /home/rab/Downloads/bWAPP/unvalidated_redir_fwd_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/unvalidated_redir_fwd_2.php. Scanning file /home/rab/Downloads/bWAPP/update.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/update.php. Scanning file /home/rab/Downloads/bWAPP/user_activation.php In file user_activation.php, line 32, col 13: $sql = "SELECT * FROM users WHERE login = '" . $login . "' AND BINARY activation_code = '" . $activation_code . "'"; Injectable variable $login. Other ocurrences: L26 $login = $_GET["user"]; L27 $login = mysqli_real_escape_string($link, $login); L27 $login = mysqli_real_escape_string($link, $login); L32 $sql = "SELECT * FROM users WHERE login = '" . $login . "' AND BINARY activation_code = '" . $activation_code . "'"; L59 $sql = "UPDATE users SET activation_code = NULL, activated = 1 WHERE login = '" . $login . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/user_activation.php. Scanning file /home/rab/Downloads/bWAPP/user_extra.php In file user_extra.php, line 109, col 29: $sql = "SELECT * FROM users WHERE login = '" . $login . "' OR email = '" . $email . "'"; Injectable variable $login. Other ocurrences: L31 $login = $_REQUEST["login"]; L38 if($login == "" or $email == "" or $password == "" or $secret == "") L66 if(preg_match("/^[a-z\d_]{2,20}$/i", $login) == false) L97 $login = mysqli_real_escape_string($link, $login); L97 $login = mysqli_real_escape_string($link, $login); L98 $login = htmlspecialchars($login, ENT_QUOTES, "UTF-8"); L98 $login = htmlspecialchars($login, ENT_QUOTES, "UTF-8"); L109 $sql = "SELECT * FROM users WHERE login = '" . $login . "' OR email = '" . $email . "'"; L140 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L187 $content = "Welcome " . ucwords($login) . ",\n\n"; L188 $content.= "Click the link to activate your new user:\n\nhttp://" . $server . "/bWAPP/user_activation.php?user=" . $login . "&activation_code=" . $activation_code . "\n\n"; L207 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:1 Injectable variable $email. Other ocurrences: L34 $email = $_REQUEST["email"]; L38 if($login == "" or $email == "" or $password == "" or $secret == "") L76 if(!filter_var($email, FILTER_VALIDATE_EMAIL)) L103 $email = mysqli_real_escape_string($link, $email); L103 $email = mysqli_real_escape_string($link, $email); L104 $email = htmlspecialchars($email, ENT_QUOTES, "UTF-8"); L104 $email = htmlspecialchars($email, ENT_QUOTES, "UTF-8"); L109 $sql = "SELECT * FROM users WHERE login = '" . $login . "' OR email = '" . $email . "'"; L140 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L191 $status = @mail($email, $subject, $content, "From: $sender"); L207 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:2 In file user_extra.php, line 207, col 40: $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; Injectable variable $login. Other ocurrences: L31 $login = $_REQUEST["login"]; L38 if($login == "" or $email == "" or $password == "" or $secret == "") L66 if(preg_match("/^[a-z\d_]{2,20}$/i", $login) == false) L97 $login = mysqli_real_escape_string($link, $login); L97 $login = mysqli_real_escape_string($link, $login); L98 $login = htmlspecialchars($login, ENT_QUOTES, "UTF-8"); L98 $login = htmlspecialchars($login, ENT_QUOTES, "UTF-8"); L109 $sql = "SELECT * FROM users WHERE login = '" . $login . "' OR email = '" . $email . "'"; L140 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L187 $content = "Welcome " . ucwords($login) . ",\n\n"; L188 $content.= "Click the link to activate your new user:\n\nhttp://" . $server . "/bWAPP/user_activation.php?user=" . $login . "&activation_code=" . $activation_code . "\n\n"; L207 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:3 Injectable variable $password. Other ocurrences: L32 $password = $_REQUEST["password"]; L33 $password_conf = $_REQUEST["password_conf"]; L38 if($login == "" or $email == "" or $password == "" or $secret == "") L86 if($password != $password_conf) L86 if($password != $password_conf) L100 $password = mysqli_real_escape_string($link, $password); L100 $password = mysqli_real_escape_string($link, $password); L101 $password = hash("sha1", $password, false); L101 $password = hash("sha1", $password, false); L140 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L207 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:4 Injectable variable $email. Other ocurrences: L34 $email = $_REQUEST["email"]; L38 if($login == "" or $email == "" or $password == "" or $secret == "") L76 if(!filter_var($email, FILTER_VALIDATE_EMAIL)) L103 $email = mysqli_real_escape_string($link, $email); L103 $email = mysqli_real_escape_string($link, $email); L104 $email = htmlspecialchars($email, ENT_QUOTES, "UTF-8"); L104 $email = htmlspecialchars($email, ENT_QUOTES, "UTF-8"); L109 $sql = "SELECT * FROM users WHERE login = '" . $login . "' OR email = '" . $email . "'"; L140 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L191 $status = @mail($email, $subject, $content, "From: $sender"); L207 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:5 Injectable variable $secret. Other ocurrences: L35 $secret = $_REQUEST["secret"]; L38 if($login == "" or $email == "" or $password == "" or $secret == "") L106 $secret = mysqli_real_escape_string($link, $secret); L106 $secret = mysqli_real_escape_string($link, $secret); L107 $secret = htmlspecialchars($secret, ENT_QUOTES, "UTF-8"); L107 $secret = htmlspecialchars($secret, ENT_QUOTES, "UTF-8"); L140 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L207 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:6 Injectable variable $activation_code. Other ocurrences: L166 $activation_code = random_string(); L167 $activation_code = hash("sha1", $activation_code, false); L167 $activation_code = hash("sha1", $activation_code, false); L170 // echo $activation_code; L188 $content.= "Click the link to activate your new user:\n\nhttp://" . $server . "/bWAPP/user_activation.php?user=" . $login . "&activation_code=" . $activation_code . "\n\n"; L207 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:7 Found 7 SQL injections in /home/rab/Downloads/bWAPP/user_extra.php. Scanning file /home/rab/Downloads/bWAPP/user_new.php In file user_new.php, line 106, col 29: $sql = "SELECT * FROM users WHERE login = '" . $login . "' OR email = '" . $email . "'"; Injectable variable $login. Other ocurrences: L28 $login = $_REQUEST["login"]; L35 if($login == "" or $email == "" or $password == "" or $secret == "") L63 if(preg_match("/^[a-z\d_]{2,20}$/i", $login) == false) L94 $login = mysqli_real_escape_string($link, $login); L94 $login = mysqli_real_escape_string($link, $login); L95 $login = htmlspecialchars($login, ENT_QUOTES, "UTF-8"); L95 $login = htmlspecialchars($login, ENT_QUOTES, "UTF-8"); L106 $sql = "SELECT * FROM users WHERE login = '" . $login . "' OR email = '" . $email . "'"; L137 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L184 $content = "Welcome " . ucwords($login) . ",\n\n"; L185 $content.= "Click the link to activate your new user:\n\nhttp://" . $server . "/bWAPP/user_activation.php?user=" . $login . "&activation_code=" . $activation_code . "\n\n"; L204 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:1 Injectable variable $email. Other ocurrences: L31 $email = $_REQUEST["email"]; L35 if($login == "" or $email == "" or $password == "" or $secret == "") L73 if(!filter_var($email, FILTER_VALIDATE_EMAIL)) L100 $email = mysqli_real_escape_string($link, $email); L100 $email = mysqli_real_escape_string($link, $email); L101 $email = htmlspecialchars($email, ENT_QUOTES, "UTF-8"); L101 $email = htmlspecialchars($email, ENT_QUOTES, "UTF-8"); L106 $sql = "SELECT * FROM users WHERE login = '" . $login . "' OR email = '" . $email . "'"; L137 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L188 $status = @mail($email, $subject, $content, "From: $sender"); L204 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:2 In file user_new.php, line 204, col 40: $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; Injectable variable $login. Other ocurrences: L28 $login = $_REQUEST["login"]; L35 if($login == "" or $email == "" or $password == "" or $secret == "") L63 if(preg_match("/^[a-z\d_]{2,20}$/i", $login) == false) L94 $login = mysqli_real_escape_string($link, $login); L94 $login = mysqli_real_escape_string($link, $login); L95 $login = htmlspecialchars($login, ENT_QUOTES, "UTF-8"); L95 $login = htmlspecialchars($login, ENT_QUOTES, "UTF-8"); L106 $sql = "SELECT * FROM users WHERE login = '" . $login . "' OR email = '" . $email . "'"; L137 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L184 $content = "Welcome " . ucwords($login) . ",\n\n"; L185 $content.= "Click the link to activate your new user:\n\nhttp://" . $server . "/bWAPP/user_activation.php?user=" . $login . "&activation_code=" . $activation_code . "\n\n"; L204 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:3 Injectable variable $password. Other ocurrences: L29 $password = $_REQUEST["password"]; L30 $password_conf = $_REQUEST["password_conf"]; L35 if($login == "" or $email == "" or $password == "" or $secret == "") L83 if($password != $password_conf) L83 if($password != $password_conf) L97 $password = mysqli_real_escape_string($link, $password); L97 $password = mysqli_real_escape_string($link, $password); L98 $password = hash("sha1", $password, false); L98 $password = hash("sha1", $password, false); L137 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L204 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:4 Injectable variable $email. Other ocurrences: L31 $email = $_REQUEST["email"]; L35 if($login == "" or $email == "" or $password == "" or $secret == "") L73 if(!filter_var($email, FILTER_VALIDATE_EMAIL)) L100 $email = mysqli_real_escape_string($link, $email); L100 $email = mysqli_real_escape_string($link, $email); L101 $email = htmlspecialchars($email, ENT_QUOTES, "UTF-8"); L101 $email = htmlspecialchars($email, ENT_QUOTES, "UTF-8"); L106 $sql = "SELECT * FROM users WHERE login = '" . $login . "' OR email = '" . $email . "'"; L137 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L188 $status = @mail($email, $subject, $content, "From: $sender"); L204 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:5 Injectable variable $secret. Other ocurrences: L32 $secret = $_REQUEST["secret"]; L35 if($login == "" or $email == "" or $password == "" or $secret == "") L103 $secret = mysqli_real_escape_string($link, $secret); L103 $secret = mysqli_real_escape_string($link, $secret); L104 $secret = htmlspecialchars($secret, ENT_QUOTES, "UTF-8"); L104 $secret = htmlspecialchars($secret, ENT_QUOTES, "UTF-8"); L137 $sql = "INSERT INTO users (login, password, email, secret, activated) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "',1)"; L204 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:6 Injectable variable $activation_code. Other ocurrences: L163 $activation_code = random_string(); L164 $activation_code = hash("sha1", $activation_code, false); L164 $activation_code = hash("sha1", $activation_code, false); L167 // echo $activation_code; L185 $content.= "Click the link to activate your new user:\n\nhttp://" . $server . "/bWAPP/user_activation.php?user=" . $login . "&activation_code=" . $activation_code . "\n\n"; L204 $sql = "INSERT INTO users (login, password, email, secret, activation_code) VALUES ('" . $login . "','" . $password . "','" . $email . "','" . $secret . "','" . $activation_code . "')"; queries here:7 Found 7 SQL injections in /home/rab/Downloads/bWAPP/user_new.php. Scanning file /home/rab/Downloads/bWAPP/ws_soap.php In file ws_soap.php, line 8, col 24: $sql = "SELECT tickets_stock FROM movies WHERE title = '" . $title . "'"; Injectable variable $title. Other ocurrences: L4 function get_tickets_stock($title) L9 $recordset = mysql_query($sql, $link); queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/ws_soap.php. Scanning file /home/rab/Downloads/bWAPP/xmli_1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xmli_1.php. Scanning file /home/rab/Downloads/bWAPP/xmli_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xmli_2.php. Scanning file /home/rab/Downloads/bWAPP/xss_ajax_1-1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_ajax_1-1.php. Scanning file /home/rab/Downloads/bWAPP/xss_ajax_1-2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_ajax_1-2.php. Scanning file /home/rab/Downloads/bWAPP/xss_ajax_2-1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_ajax_2-1.php. Scanning file /home/rab/Downloads/bWAPP/xss_ajax_2-2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_ajax_2-2.php. Scanning file /home/rab/Downloads/bWAPP/xss_back_button.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_back_button.php. Scanning file /home/rab/Downloads/bWAPP/xss_custom_header.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_custom_header.php. Scanning file /home/rab/Downloads/bWAPP/xss_eval.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_eval.php. Scanning file /home/rab/Downloads/bWAPP/xss_get.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_get.php. Scanning file /home/rab/Downloads/bWAPP/xss_href-1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_href-1.php. Scanning file /home/rab/Downloads/bWAPP/xss_href-2.php In file xss_href-2.php, line 147, col 13: $sql = "SELECT * FROM movies"; No dangerous concatenations in this query. Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_href-2.php. Scanning file /home/rab/Downloads/bWAPP/xss_href-3.php In file xss_href-3.php, line 47, col 17: $sql = "SELECT * FROM movies WHERE id = '" . sqli_check_2($movie) . "'"; Injectable variable $movie. Other ocurrences: L45 $movie = $_REQUEST["movie"]; L47 $sql = "SELECT * FROM movies WHERE id = '" . sqli_check_2($movie) . "'"; queries here:1 Found 1 SQL injections in /home/rab/Downloads/bWAPP/xss_href-3.php. Scanning file /home/rab/Downloads/bWAPP/xss_json.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_json.php. Scanning file /home/rab/Downloads/bWAPP/xss_login.php In file xss_login.php, line 140, col 17: $sql = "SELECT * FROM heroes WHERE login = '" . $login . "' AND password = '" . $password . "'"; Injectable variable $login. Other ocurrences: L134 $login = $_POST["login"]; L135 $login = sqli($login); L135 $login = sqli($login); L140 $sql = "SELECT * FROM heroes WHERE login = '" . $login . "' AND password = '" . $password . "'"; queries here:1 Injectable variable $password. Other ocurrences: L137 $password = $_POST["password"]; L138 $password = sqli($password); L138 $password = sqli($password); L140 $sql = "SELECT * FROM heroes WHERE login = '" . $login . "' AND password = '" . $password . "'"; queries here:2 Found 2 SQL injections in /home/rab/Downloads/bWAPP/xss_login.php. Scanning file /home/rab/Downloads/bWAPP/xss_php_self.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_php_self.php. Scanning file /home/rab/Downloads/bWAPP/xss_phpmyadmin.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_phpmyadmin.php. Scanning file /home/rab/Downloads/bWAPP/xss_post.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_post.php. Scanning file /home/rab/Downloads/bWAPP/xss_referer.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_referer.php. Scanning file /home/rab/Downloads/bWAPP/xss_sqlitemanager.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_sqlitemanager.php. Scanning file /home/rab/Downloads/bWAPP/xss_stored_1.php In file xss_stored_1.php, line 81, col 16: $sql = "INSERT INTO blog (date, entry, owner) VALUES (now(),'" . $entry . "','" . $owner . "')"; Injectable variable $entry. Other ocurrences: L25 $entry = ""; L68 $entry = xss($_POST["entry"]); L71 if($entry == "") L81 $sql = "INSERT INTO blog (date, entry, owner) VALUES (now(),'" . $entry . "','" . $owner . "')"; L248 $entry_all = isset($_POST["entry_all"]) ? 1 : 0; L250 if($entry_all == false) queries here:1 Injectable variable $owner. Other ocurrences: L26 $owner = ""; L69 $owner = $_SESSION["login"]; L81 $sql = "INSERT INTO blog (date, entry, owner) VALUES (now(),'" . $entry . "','" . $owner . "')"; queries here:2 In file xss_stored_1.php, line 253, col 31: $sql = "SELECT * FROM blog WHERE owner = '" . $_SESSION["login"] . "'"; No dangerous concatenations in this query. In file xss_stored_1.php, line 264, col 4: $recordset = $link->query($sql); No dangerous concatenations in this query. Found 2 SQL injections in /home/rab/Downloads/bWAPP/xss_stored_1.php. Scanning file /home/rab/Downloads/bWAPP/xss_stored_2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_stored_2.php. Scanning file /home/rab/Downloads/bWAPP/xss_stored_3.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_stored_3.php. Scanning file /home/rab/Downloads/bWAPP/xss_stored_4.php In file xss_stored_4.php, line 80, col 9: $sql = "SELECT * FROM visitors ORDER by id DESC LIMIT 3"; No dangerous concatenations in this query. Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_stored_4.php. Scanning file /home/rab/Downloads/bWAPP/xss_user_agent.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xss_user_agent.php. Scanning file /home/rab/Downloads/bWAPP/xxe-1.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xxe-1.php. Scanning file /home/rab/Downloads/bWAPP/xxe-2.php Found 0 SQL injections in /home/rab/Downloads/bWAPP/xxe-2.php. Total SQL injections found: 56